Biometrics
- Concepts
- Computer Science And IT
- BlockChain
- Medical Informatics
- Multimedia Computing
- Digital Currencies – Bitcoin and cryptocurrencies
- Context-Aware Search System (CASS)
- Big Data
- Industrial Internet of things (IIoT)
- Assisted reality and virtual reality
- Deep learning - Artificial Intelligence and Machine Learning
- Cryptography
- Embedded System
- Databases and Data mining
- Computer Vision
- Wireless Body Area Network (WBAN)
- Computer Graphics and Visualization
- Operating Systems
- Data Privacy
- Programming Languages and Systems
- Scientific And Numerical computing
- Cyber-Security And AI
- Softwre Engineering
- Natural language Generation
- Producing Text From Computer Data
- AI Optimized Hardware
- Decision Management
- Deep Learning Platforms
- Pytorch
- Biometrics
- Robotic Process Automation
- Text Analytics And NLP
Biometrics
Biometrics is specifically implemented to digitally identify the individuals based on their biological or behavioural characteristics to allow access to the systems, devices, or data. The best examples of biometrics included facial patterns, fingerprints, and voice or typing cadence. These types of identifiers can be used to recognize the individual and the combination of these technologies allows providing greater accuracy in identification.
Biometrics can be used for authenticating the person’s identity that leads to an increase the enterprise security.
Computers and devices embedded with biometrics technology which can detect the identity of a particular person. The organizations which have been used the Biometrics need to be taken care of how the technology used to avoid infringing on employee or customer privacy or improper exposing of sensitive information. Some of the organizations have been adopted biometrics specifically for facilitating secure IT infrastructure in SaaS, Cloud, and hybrid environments.
Different Types of Biometrics
As biometric identifiers related to the intrinsic human characteristics, they have two types of categories such as physical and behavioural biometrics. Physical identifiers are basically immutable and device-independent that subsumed (TechTarget, 2019):
Fingerprints
As technology tremendously increased its footprint in various applications, fingerprints are the most popular type of biometrics due to the widespread deployment in smartphones. In most of the companies, fingerprint scanning is the common authentication type of biometrics that automatically detects the employees’ presence.
Physiological Recognition
Facial recognition is another most commonly used type of biometrics device that lets to authenticate the identity of individuals. In the category of physiological recognition, there are other types of imaging methods such as iris or rental recognition, ear recognition, palm or vein recognition, etc.
Photo and Video
If a device is embedded with the camera, there is a possibility of authenticating the person’s identity through the common approaches like facial recognition and rental scans.
Voice
Through voice authentication devices and telephone-based service portals, companies can recognize the users and authenticate the customers.
Signature
The digital signature authentication devices can be used mostly at retail checkouts and banks as well where users or customers want to sign their names for protecting the data.
DNA
Initially, DNA identification has been used to solve law enforcement suspects. Now, it has been too slow for widespread use.
Whereas behavioural identifiers are a newer approach and being used in collaboration with other methods owing to the lower reliability. As technology improves, it will also increase the existence of a wide variety of applications. It is limited to some types of human characteristics, unlike human identifiers. The behavioural approach has been used to distinguish between a human and a robot that assists the organizations to sort out or detect the spam attempts to access the accounts. Different types of behavioural approaches will be discussed here that subsumed:
Typing Patterns
In general, everyone has their own typing style and speed. That means, it automatically detects the identity based on the speed at which they type, the degree of impact on the keyboard, and the length of the time taking from one letter to another(Korolov, 2019) .
Physical Movements
Based on the physical movements like walking of an individual, it will detect the authentication for particularly at sensitive locations.
Navigation Patterns
As finger movements on the touch-pad or mouse movements are unique in individuals, companies can authenticate the users’ identity without using any other additional software.
Engagement Patterns
The engagement patterns will interact with the devices to distinguish persons from bots. It obviously works efficiently until the bots developed in imitating of the humans.
Is Biometric Authentication Reliable?
The biometric authentication types like fingerprint or voice recognition systems can be used in most of the organizations to detect the individuals. But, they have included false positives and false negatives too. For instance, a facial recognition system might not work efficiently when a user wearing make-up or glasses or the one who sick or tired (Thales, 2019).
The voice also may vary in the sense that the person’s voice can change in different situations like angry or impatient or after waking up. In these scenarios, biometric authentication fails by detecting the wrong information that causes insecurity for the organizations.To avoid this, most of the experts suggested that it’s better to use multiple types of authentication devices simultaneously and find out the suspicious activities easily by analyzing the warning signs immediately (Korolov, 2019).
Is Biometric Authentication Secure?
The security of biometric authentication should be attained by the organization to avoid the loss of customers’ data. If any company wants to collect the customers’ data and keep it on their own servers, they mandate to follow the best security measures. By using improved technological ways, companies need not store the authentication information on the servers to maintain a high level of security (Korolov, 2019).
References:
Dhere. (2018). Introduction to Numerical Computing. Journal of Applied & Computational Mathematics, 07(04). https://doi.org/10.4172/2168-9679.1000423
Korolov, M. (2019). What is biometrics? Retrieved from https://www.csoonline.com/article/3339565/what-is-biometrics-and-why-collecting-biometric-data-is-risky.html
Lurie, Y., & Mark, S. (2016). Professional Ethics of Software Engineers: An Ethical Framework. Science and Engineering Ethics, 22(2), 417–434. https://doi.org/10.1007/s11948-015-9665-x
Oberwolfach. (2019). Conferences and Meetings on Numerical Analysis and Computational Mathematics.
Sharama, P. (2019). 5 Amazing Deep Learning Frameworks Every Data Scientist Must Know! (with Illustrated Infographic). Retrieved from https://www.analyticsvidhya.com/blog/2019/03/deep-learning-frameworks-comparison/
Techlabs, M. (2019). Top 8 Deep Learning Frameworks. Retrieved from https://marutitech.com/top-8-deep-learning-frameworks/
TechTarget. (2019). Services and Conditions of Use. Retrieved from https://searchsecurity.techtarget.com/about/copyright
Thales. (2019). Biometric technology: Gemalto’s solutions and services. Retrieved November 29, 2019, from https://www.gemalto.com/govt/biometrics
Ueberhuber, C. W. (2012). Numerical Computation 1: Methods, Software, and Analysis. Springer Berlin Heidelberg. Retrieved from https://books.google.co.in/books?id=giH7CAAAQBAJ

