Criminals and fraudulent individuals have been getting smarter in outwitting security measures everyday. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. (An Introduction 2007) There is a growing need for better security measures in our world today and science has brought about an answer to this: Biometric Security.
Challenges With Fingerprinting, Iris, Facial and Hand Technology Because each iris is unique, this biometric application is very advantageous in eliminating the concern over fraudulent activities especially in banks, secured agencies and prisons. It also corrects the problems with forgotten or stolen passwords. This system is faster and more accurate as compared to having security personnel interviews but also less labor demanding. However, use of it in places like the airport has its disadvantages because its implementation must also be applicable to other countries.
Also, the high cost of implementation and technological instruments to be used are common factors against iris biometrics. Aside from being affordable, fingerprint biometrics is preferred by many because it helps put an end to information theft by providing next level security that limits access to the device or information to only the authorized user. So, even if the device is lost or stolen – the information is safe. (The Power 2007) However, there are disadvantages to this biometric system. We leave a lot of fingerprints in the things that we touch everyday.
Therefore, anyone can steal our fingerprints just by getting their patterns on the objects we touched. Another biometric system is facial recognition and one of its strongest positive aspects is that it is non-intrusive. Verification or identification can be accomplished from two feet away or more, and without requiring the user to wait for long periods of time or do anything more than look at the camera. (Facial Recognition 2002) However, unpublished studies carried out in Europe have also found that this biometric system has a 10% failure rate.
This means that the system can be wrong in one out of ten cases. The problems are apparently due to the technology’s sensitivity to light conditions. Hand geometry biometric system is security system wherein the computer analyzes the individual by the parts of his hands and fingers. It is advantageous because it is a fairly simple procedure and is surprisingly accurate. Though it requires special hardware to use, it can be easily integrated into other devices or systems.
It is also harder to hack because the time and energy required to sufficiently emulate a person’s hand is generally too much to be worth the effort, especially since it is generally used for verification purposes only. The disadvantages going against this biometric are it’s hardware cost required size, injuries to hands which can cause scanning difficulty and its data system can malfunction if there are too many people on record. Biometric Systems are very good solutions to security breaches but they are not yet 100% secured.
More research has to be done to perfect these measures. Brief Description of Fiingerprint, Iris, Facial and Hand technology Biometric security employs the use of high technological gadgets to identify people based on certain physiological characteristics for security purposes. Some of the features that can be measured using this method are iris, face, fingerprints and hand geometry. For iris recognition, the camera and subtle Infrared illumination create images based on 200 points of the iris to make a template for its database.
Whenever an individual has his iris scanned, the computer analyzes the present template to match the one on its data base before it verifies the individual. Face recognition has the same principle except that the infrared camera either uses the facial heat patterns or takes a number of points and measurements, including the distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.
In fingerprint biometrics, an individual lays his finger on an electronic pad that sends the patterns of the finger’s ridges or prints to the database to confirm its authenticity. Meanwhile, hand geometry involves putting the whole hand properly aligned on an electronic pad that has guidance pegs on it. The device then checks the individual shape and morphometric characteristics or biological form of the hand on its database to verify the identification of the individual.