Biometrics refers to the field of technology involving the identification, authentication, surveillance, or screening of individuals based on measurable physical and /or behavioral traits. Biometric-based systems, in their various forms, have become popular over the last few years. Unlike various token or knowledge based system, they cannot be easily compromised and are used in a variety of low or high security applications.
The use fingerprints for identification and authentication can be traced back to ancient Babylonian times, where the imprints of human fingers were found on clay tablets as part of business transactions.
A fingerprint is completely unique to an individual and stayed unchanged for lifetime. The uniqueness of fingerprints can be extracted by different features such as bifurcation, termination, singular points and pores, which are used as identification marks in fingerprint authentication system. This exclusively demonstrates that fingerprint authentication is far more accurate and efficient than any other methods of authentication.
Fingerprint can be taken and digitalized by relatively compact and cheap devise and takes only a small capacity to store a large database of information. Used fingerprint based biometric systems store a user’s fingerprint data not as an image but in the form of a template which is its compact form. The template is considered to be an accurate representation of the users biometric.
Fingerprint images typically contain between 30-50 minutiae, although prints with up to 100 minutiae have also been observed. For a match between two fingerprints s a match of 6-8 minutiae points are usually considered sufficient; however up to 12 matching points are needed for some particular law-enforcement applications.
Fingerprint for identification and authentication
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commer...
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent. ...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
-
An international team of researchers from Switzerland, the United Kingdom, and Canada has identified the gene responsible for a rare but life-threatening...
-
Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...