Biometrics refers to the field of technology involving the identification, authentication, surveillance, or screening of individuals based on measurable physical and /or behavioral traits. Biometric-based systems, in their various forms, have become popular over the last few years. Unlike various token or knowledge based system, they cannot be easily compromised and are used in a variety of low or high security applications.
The use fingerprints for identification and authentication can be traced back to ancient Babylonian times, where the imprints of human fingers were found on clay tablets as part of business transactions.
A fingerprint is completely unique to an individual and stayed unchanged for lifetime. The uniqueness of fingerprints can be extracted by different features such as bifurcation, termination, singular points and pores, which are used as identification marks in fingerprint authentication system. This exclusively demonstrates that fingerprint authentication is far more accurate and efficient than any other methods of authentication.
Fingerprint can be taken and digitalized by relatively compact and cheap devise and takes only a small capacity to store a large database of information. Used fingerprint based biometric systems store a user’s fingerprint data not as an image but in the form of a template which is its compact form. The template is considered to be an accurate representation of the users biometric.
Fingerprint images typically contain between 30-50 minutiae, although prints with up to 100 minutiae have also been observed. For a match between two fingerprints s a match of 6-8 minutiae points are usually considered sufficient; however up to 12 matching points are needed for some particular law-enforcement applications.
Fingerprint for identification and authentication
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
Consuming resources responding to change and generating offspring, the internet may not be alive in literally sense, but it displays charact...
-
In business and government, many important issues are being debated, as Internet technologies accelerate the ubiquity of global telecommunic...
-
Almost every day the newspaper, televisions and electronic media carry reports of significant advances in computing, such as high speed supe...
-
The evolution of hyperlinked multimedia documents has transitioned from the public World Wide Web to private corporate intranets, offering n...
