Article Preview
Top2. Introducing Biometrics: Methodologies And Application
Biometrics regards the possibility of recognizing someone’s identity from an unambiguous set of biological data, or behaviour. The essential idea is that every human being is unique: no matter how many physiological features or feelings or behaviours all human beings have in common, every person is different one from others just like every snowflake is different from others. Biometrics techniques can be divided and categorized in two different areas: (i) physiological: including DNA, facial-scan, finger-scan, hand-scan, iris-scan, otoacoustic emission, retinal-scan, vascular patterns; (ii) behavioural: including gait, gesture and grip, handwriting, keystroke, lip motion, mouse movements, signature, voice. Obviously, each of those techniques has reached a different level of maturity. Nevertheless, they have all developed for two different ends: (i) to protect information: especially biological data are detected in order to replace old systems based on passwords or PINs for identification purposes; (ii) to perform various kinds of verification: biological data are detected in order to assess someone’s identity, especially in forensic applications for verification purposes.
In order to shed light on biometrics in a more specific way, it is essential to clarify and distinguish the areas in which it operates starting from the difference between identifying someone and verifying someone’s identification: (i) identifying means to establish that a particular person, thing or quality corresponds to a determinate identity; (ii) verifying one’s identity is about assessing the validity and truthfulness of the relationship I just defined. As for biometrics, the different meaning between these two words shows the differences in their applications: (i) the first case refers to those determining criteria used to establish the identity of a certain person; (ii) the second case refers to the necessity of a verification process that allows the adoption of evaluation criteria to approve the legitimacy of an individual’s request, and consequently allow her to access a certain system (Nanavati, Thieme, & Nanavati, 2002).