1 / 18

Various Aspects of Biometric Security

Biometric-security can be implemented in any device by installing the software and providing scanner as an additional hardware to provide input device. Read this document, we have mentioned some information regarding Biometric Security.<br><br>https://www.instantassignmenthelp.com.au/it-assignment-help

Download Presentation

Various Aspects of Biometric Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Technology

  2. INTRODUCTION Biometric consists of two words 'bio' means life and • metrics which means 'metrikos'. Biometric-security is used for the purpose of • identification and verification of individual. For the purpose of identification different biological • traits are considered.

  3. Implementation of Biometric Security Biometric-security can be implemented in any • device by installing the software and providing scanner as an additional hardware to provide input device. Then comparison between provided input and store • data takes places on the basis of that locking and unlocking depends.

  4. To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

  5. Steps involved in investigation The investigation process of biometric-fingerprintscanner depends on three stages such as: Image enhancement • Minutiae extraction • Minutiae matching •

  6. Image Enhancement Under this methodology image is capture and processed through algorithm. Stages of algorithm are mentioned below. Normalization • Local orientation estimation • Local frequency estimation • Region mask identification • Filtering •

  7. Minutiae extraction & matching The process of minutiae extraction convert image into • binary formate and then compare with other adjacent pixels in order to produce considerable output image. In the process of minutiae matching comparison of image • takes place between the image in database and input one.

  8. Types of fingerprint scanner They are described on the basis of technologies and properties such as mentioned below: USB fingerprint devices: They can be attached through • USB port and available at cost of 77.77 pound.

  9. Cont... Keyboard fingerprint devices: They are attached with • keyboard and provide security to user. They are available at price of 124.40 pound. Fingerprint scanner and card reader: they are provided in • the combination of scanner and card reader at the price of 31.03 pound. Car fingerprint scanner: This is considered as new feature • of auto mobiles and available at the price of 27686120.00 pounds.

  10. To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

  11. Reviews of device • USB Fingerprint Device: On the basis of users review. This device is useful for individual as well as businesses for security purpose. As they are provided with USB so they provide easy installation interface to users. And also provided at considerable price. • Keyboard Fingerprint Device: On the basis of users review. This reduces the chances of data lost and stole from individuals device.

  12. Cont... Fingerprint Scanner and card reader: On the • basis of users review the price of product is affordable along with this it is portable and mobile. Car Fingerprint Scanner: On the basis of users • review this decreases the chances of car stolen and also give ride of carrying keys.

  13. Advantages of Biometrics security As the process involve identification through • biological traits therefore level of security automatically get improved. As customers are not require to remember password • and codes which improves their experience.

  14. Disadvantages of Biometrics security The main disadvantage of using biometric security is it is • not 100% secure. Secondly, it requires additional hardware such as scanner, • camera etc.

  15. Conclusion On the basis of above presentation the following conclusion drawn: ICT is used to provide reliable and safe devices to • business and industries. Biometric security devices are produced by ICT. • They use to provide security by using biological traits. •

  16. To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

  17. References Devaraj, S., Ow, T.T. and Kohli, R., 2013. Examining the impact of information • technology and patient flow on healthcare performance: ATheory of Swift and Even Flow (TSEF) perspective. Journal of Operations Management. 31(4). pp.181-192. Han, K. and Mithas, S., 2013. Information technology outsourcing and non-IT • operating costs:An empirical investigation. Mis Quarterly. 37(1). pp.315-331. Ingebrigtsen, T., Georgiou, A and et.al., 2014. The impact of clinical leadership on • health information technology adoption: systematic review. International journal of medical informatics. 83(6). pp.393-405.

  18. THANK YOU

More Related