It gained considerable attention in after Sir Alec Jeffreys [2] delivered the possible mean for assessing the variations in the DNA in natural and domesticated populations.
Thereafter DNA Fingerprinting is been used by the forensic laboratories for criminal forensics and paternity testing around the world since it is one of the highly reliable biometric system available. Deoxyribonucleic Acid is a molecule that encodes the genetic instructions used in the development and functioning of all known living organisms and many viruses. DNA is one of the three major macromolecules essential for all known forms of life.
Genetic information is encoded as a sequence of nucleotides guanine, adenine, thymine, and cytosine recorded using the letters G, A, T, and C. DNA Recognition process is completely relied on to these repeats to identify individuals. STR fragments are extracted from the samples by following the procedures which are given below. This process contains the below given procedures and yields to the result that will be stored as an Image where the distances travelled by the fragments can be calculated.
The distances travelled by STR fragments are recorded as Bands and the similarity between the bands of various samples are calculated. DNA can be recognized by calculating the Similarity Index between the samples. Similarity Index [7] is a number of common fragments in DNA fingerprinting profile of individual x and y, divided by the average number of fragments exhibited by both individual. The Similarity S xy index is given by Equation:.
For voice recognition methods, illnesses such as strep throat can make it hard for authorized users to get access to their information. Another factor that can influence voice recognition systems is the continuous aging of its users.
Noise in an environment where voice recognition is used to identify its users can also make it hard for users to be identified [PBworks ]. For iris or retinal scanning applications, users may find it very intrusive. Users may also have the concern for the safety of their eyes during the iris or retinal scan. Furthermore, databases used to store user identification data will be very large which might form a potential threat. Therefore, the cost for equipment is also expensive [PBworks ].
Finally, lots of people are still concerned about biometrics technology in different aspects such as: security, adaptability to rate of change in life, scalbility, accuracy, privacy and others.
As we can see from different products from various companies, biometrics technology has major effects on our lives. Biometrics technology provides us with great number of new inventions which improves both the quality and the longevity of our lives. Nowadays, biometrics technology is considered one of the best protection methods of user information, data, etc.
Basically, biometrics technology method will collect and measure data of human physiology and behavior. There are several ways to collect and measure data of users such as: scanning the unique characteristics of the person retinal, finger-print, facial expression, etc.
The main purpose of biometric system is to identify and verify a person's identity. Biometrics technology is more convenient than other protection technologies of identity authentication. For example, ID card student IDs in school is one of the examples to authenticate a user's identity. If you forget your ID card at home then you will not be able to access to school building.
In this case, biometrics system will be more efficient and useful because chances that you forgot your eyes or fingers at home are very unlikely. With biometrics security system, we just need to verify our identity by the unique characteristics that are always with us reducing the chances of losing ID cards and other identifying accessories.
Furthermore, ID cards can be duplicated increasing the risk of unauthorized users gaining access to import data. With our own unique characteristics and behaviors, it will be harder to change or make copies. Biometrics security system has bigger applications in our lives and in recent years, scientists have developed higher stages of identifying a user's identity. Our main application is facial recognition technology.
With this technology, we can recognize any person in a crowded group; therefore, we can verify their identification. We can also use this method of biometrics technology to detect previously identified criminals and terrorists in society.
This will help us to reduce the crime rate in the world. Biometrics technology is applied in a variety of ways and different fields of practice. For example, we can see that it is applied in hospitals to verify the identity of patients and to protect their privacy.
Furthermore, biometrics technology has been used at airports to verify the identity of people. By using this technology, it helps governments keep track of people going in and out of country.
It also helps to identify criminals and terrorists. Other example of this technology which is applied in our daily lives is voice recognition; voice recognition systems are applied in homes to verify identities of authorized users. This technology is not only used for security sections, but it also can be applied in the other aspects of life. It has been used in businesses such as e-commerce and shipping sections.
Biometrics technology such as 2-D barcode makes our life a lot easier with much faster item identification. With this technology, it will make sure packages are sent to correct recipients. For example, it is applied to items in supermarkets and stores with detailed information of that item.
There are many concerns for biometrics technology over its advantages and disadvantages. Many experts have been looking into this aspect of new technology to try and find out the value of biometrics technology. There are three main concerns about this new-born technology including: information privacy, physical privacy and religion objections.
Information privacy: there are threats function creep and tracking capabilities of biometrics system that are concerns affecting the privacy of information of users [Woodward, ]. Physical Privacy: by affecting of information privacy, the physical privacy also gets some attention from users. These concerns include the stigma associated with some biometrics, the possibility of actual harm to the participants by the technology and the concern that the devices used to obtain or read the biometrics data may be not clean as expected [Woodward, ].
Religious Objections: this aspect of concern for biometrics security system is not expected to be wide-spread. However, its problem will decide if the biometrics system can be applied in public or not. One example for this concern is 2-D barcode. There are certain religious groups that believe barcodes on users is "the Mark of the Beast" and can a number of evils. For religious objections, governments must take this problem seriously and find the solutions for the biometrics technology in order to spread its use [Woodward, ].
The biggest problem for network security is the authentication system. However, passwords need to be renewed within a certain period of time to maintain a high level of security. Moreover, it might be copied and used by unauthorized users. To fix that problem, biometrics security system can be applied. The most use of biometrics security system in network is the logical access control method. It will verify person's identification for secure workstation logon or network logon to get access control to the system [Reid, ].
In conclusion, biometrics technology is a new technology for most of us because it has only been implemented in public for short period of time. There are many applications and solutions of biometrics technology used in security systems. Figure 4. The electronic biometric distributed data bases. The criminal is always one step ahead of the security man. The world has developed critically in the past eight decades, and some people think of an invention and find it the next day in the market, so we say that we live in the future in our present.
A man was known by his name, and this is the first biometrics. With scientific and technical development, verification methods have developed, but forgery and hacking are a hypothesis that always exists. Therefore, the race between the criminal and the protection systems continues, whether in ordinary or electronic crimes. We expect to see a new invention that aligns digital biometrics with human biometric identifying adults. Institute of Technology FIT.
International Journal of Intelligence Science, 10, Biometrics Symposium, September , Baltimore. Journal of Information Security, 6, Journal of Computer and Communications, 8, Home Journals Article. DOI: Abstract This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio metrics ID. Share and Cite:. Laarfi, A. International Journal of Intelligence Science , 12 , Conflicts of Interest The authors declare no conflicts of interest.
References [ 1 ] Laarfi, A. Journals Menu. Contact us. All Rights Reserved. Scheirer, W. Harinda, E. Dynamic Time Warping: The statistical closeness between two sequences of gait movements is calculated and compared with one another. In this technique, the examined variables include the time, speed, and the various stride patterns of the individual.
Hidden Markov Models also known as HMMs : With this, various statistical profiles are created to examine the probability of similarity between the different shapes which appear in the walking stride of the individual. Some are further along in this process than others, and none of them have proven to be viable security solutions yet which can be procured and implemented.
Each of them has their own strengths and weaknesses which can be outlined as follows:. The largest advantage is that the DNA of an individual possesses the richest and most unique features, and as a result, it will provide the most irrefutable proof in confirming that particular identity. In fact, if DNA Recognition makes its way to be a viable modality, it will be considered to be the ultimate Biometric of all.
But despite this, it also possesses its own set of weaknesses as well. For example, the analysis which is required in DNA Recognition can take hours. Also, unlike the other Physical Biometrics, DNA is prone to rapid degradation if exposed to the outside environment. Because the use of DNA is often correlated with law enforcement and the judicial system here in the United States, it is very much prone to privacy rights issues and claims of civil liberties violations. Gait Recognition: One of the strongest advantages of using the unique walking stride of an individual is that it can be used in a very covert fashion.
For example, if it proves to be a viable Biometric modality, it will be a very valuable security tool in both international airport settings and other large-scale transportation hubs. It can also be considered to be a non-contactless type of Biometric, which will be a catalyst in its acceptance rate with society in general. But, the walking stride can be greatly affected by such variables as the type of surface the individual is walking on, extra weight gains or weight loss that the individual may experience over time, older age, physical ailments, and even diseases.
In other words, the walking stride is not considered to be a stable feature. Earlobe Recognition: Regarding strengths, various scientific studies have shown that most individuals do possess a unique ear structure.
Also, while the ear is exposed to the extremities of harsh weather especially in cold temperatures , it is still considered to be a rather stable component of the human body. But, collecting a quality based raw image of the ear can be a challenge, especially if jewelry such as earrings and hearing devices such as a hearing aid, or a Bluetooth device are worn, or even if the lighting conditions are poor from the external environment.
There is no direct contact required with the ear to capture the raw images, thus like Gait Recognition; it too can be considered a non-contactless type of Biometric on a theoretical basis. When these three potential modalities are compared to each other on a spectrum, it is Gait Recognition which has advanced the furthest regarding research and development.
Thus, it holds the greatest potential to enter the marketplace and serve security applications in the short term. A new tab for your requested boot camp pricing will open in 5 seconds. If it doesn't open, click here. Net, Inc.
0コメント