HyperLink HyperLink

Featured Report

Subject:

Biometrics

This article has multiple issues. Please help improve it or discuss these issues on the talk page. This article is in a list format that may be better presented using prose. You can help by converting this article to prose, if appropriate. Editing help is available. (August 2010) This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (August 2010) This article is incomplete. Please help to improve the section, or discuss the issue on the talk page. (July 2010) At Walt Disney World in Lake Buena Vista, Florida, biometric measurements are taken from the fingers of guests to ensure that a ticket is used by the same person from day to day Biometrics refers to metrics related to human characteristics Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. Cite error: There are tags on this page, but the references will not show without a {{reflist|group=note}} template (see the help page). ^ "Biometrics: Overview". Biometrics.cse.msu.edu. 6 September 2007. Retrieved 2012-06-10.  ^ a b c Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the ACM, 43(2), p. 91-98. DOI 10.1145/328236.328110 ^ Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; Flynn; Ross, A. Handbook of Biometrics. Springer. pp. 1–22. ISBN 978-0-387-71040-2.  ^ "Biometrics for Secure Authentication" (PDF). Retrieved 2012-07-29.  ^ Weaver, A.C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97. DOI 10.1109/MC.2006.47
Created By: System
Join To Create/Save Reports
Forgot Password

Related Reports