Mayank Vatsa (Indian Institute of Technology Kanpur, India), Richa Singh (Indian Institute of Technology Kanpur, India), P. Gupta (Indian Institute of Technology Kanpur, India) and A. K. Kaushik (Electronic Niketan, India)
Copyright: © 2005
Identity verification in computer systems is done based on measures like keys, cards, passwords, PIN and so forth. Unfortunately, these may often be forgotten, disclosed or changed. A reliable and accurate identification/verification technique may be designed using biometric technologies, which are further based on the special characteristics of the person such as face, iris, fingerprint, signature and so forth. This technique of identification is preferred over traditional passwords and PIN-based techniques for various reasons: • The person to be identified is required to be physically present at the time of identification. • Identification based on biometric techniques obviates the need to remember a password or carry a token.