With their fake versions can be effectively working

With the growing demand for more user friendly and rigorous safety,Personal verification is becoming an increasingly important and widely usedtechnique for security access systems. Biometric feature authenticationtechnology is a process using inherent physiological or behaviorcharacteristics to enable identification of individuals. It has high securityand reliability compared to the traditional authentication modes such as passwordor code, because biometric features are hard to forge and relatively easy to us1. Furthermore, some multimedia content in consumer electronicappliances can be secured by biometrics.

As compared to traditionalidentification techniques such as personal Identification Numbers (PINs),passwords, the biometric techniques based on human physiological qualities canensure higher security and more convenience for the consumer, hence the biometrics-basedautomated human recognition are now attractive more and become more popular ina huge range of inhabitant applications. Now days, a number of biometriccharacteristics have been employed to achieve the identification task and canbe broadly categorized in two categories: first extrinsic biometric features,such as faces, fingerprints, iris, hand shapes ,gait and signature, and voice 2; second intrinsic biometric features such as palm-veins,hand-veins and finger-veins. Extrinsic biometric features are easy to usebecause their fake versions can be effectively working to imitate theidentification. Also has the advantages of simple convenience of thesebiometric traits cause some concerns on privacy and security. On the disparity,the intrinsic biometric features do not remain on the capturing device when theuser interacts with the device, which ensure high security in various applications.

The grand challenge to biometrics is thus to improve recognition performancefor both accuracy and efficiency and be maximally resistant to deceptivepractices. To this end, many researchers have required to recover consistencyby developing biometrics that are highly individuating; however at the sametime, present a greatly complex, hopefully unbeatable challenge to those whodesire to defeat them. Especially for consumer electronics applications,biometrics recognition systems require to be cost-efficient and easy to apply.


I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Click here