Biometric Security

Biometric Security

Muzhir Shaban Al-Ani (Anbar University, Iraq)
Copyright: © 2017 |Pages: 20
DOI: 10.4018/978-1-5225-0983-7.ch057


The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.
Chapter Preview

Background Of Biometric Security

Biometrics as a Key of Security

Biometrics technology is not a new concept; it is the oldest form of identification. As early as the 14th century, the Chinese were reportedly using fingerprint-like methods as a method of identifying of their children.

There are three basic, independent but related concepts of security (Jain et al, 1999):

  • Concept of Identification: Who you are.

  • Concept of Authentication: Proving whom you are.

  • Concept of Authorization: What you are allowed to do.

Recently, huge data transfer all over the word every day, therefore identity theft and the loss of data and related intellectual property are growing problems. Now each have multiple accounts and use multiple passwords on an ever-increasing number of computers and Web sites. Maintaining and managing access while protecting both the user's identity and the computer's data and systems has become increasingly difficult. Security is the concept of authentication - verifying that the user is who he claims to be. Biometric based authentication applications refer to three types of authentication (Delac & Grgic, 2004).

  • Something you know (most common used is a password or pin)

  • Something you have (tokens such as a smart card), and finally

  • Something you are (such as biometric).

Complete Chapter List

Search this Book: