Biometric authentication is a security process of the user identity verification process that involves biological input, or the scanning or analysis of some part of the body such as fingerprints, palm or finger vein patterns, iris features, and voice or faces patterns. These last three involve no physical contact with a biometric sensor, which makes them less intrusive to use.
The reference model is the first store in a database or a secure portable element like a smart card. The data stored is then compared to the person’s biometric data to be authenticated If both samples of the biometric data match, authentication is confirmed. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.
Biometric authentication methods are used to protect many different kinds of systems – from logical systems facilitated through hardware access points to physical systems protected by physical barriers, such as secure facilities and protected research sites. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Behavioral characteristics such as keystroke dynamics – a measure of the way that a user types, analyzing features such as typing speed and the amount of time they “dwell” on a given key – can also be used to authenticate a user. Biometric authentication is widely known as the most effective type of authentication because it is extremely difficult to transfer biological material or features from one user to another.
Types of biometric authentication
Visual Biometric The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.
Iris recognition is one type of biometric method used to identify the people based on single patterns in the region of ring-shaped surrounded the pupil of the eye. Generally, the iris has a blue, brown, gray or green color with difficult patterns which are noticeable upon close inspection.
Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.
Voice recognition technology is used to produce speech patterns by combining behavioral and physiological factors that can be captured by processing speech technology. The most important properties used for speech authentication are nasal tone, fundamental frequency, inflection, cadence.
By placing your hand on a scanner, you not only have a unique fingerprint pattern, but the size and shape of your entire hand are also very unique. It differs to a unique finger impression in that it likewise contains other data, for example, touch, indents, and symbols which can be utilized when contrasting one palm with another. Handprints can be used for criminal, forensic or commercial applications. The main difficulty of handprint is that the print changes with time depending on the type of work the person is doing for an extended duration of time.