ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Biometric Identification Advantages Research

Essay by   •  September 23, 2013  •  Research Paper  •  4,441 Words (18 Pages)  •  1,761 Views

Essay Preview: Biometric Identification Advantages Research

Report this essay
Page 1 of 18

Biometric identification Advantages Research

Numerous advantages for the biometrics make the technology for identification much easier than the traditional methods. The simplest theory starts with the knowledge that each person has unique features, which belong to him or her, even when passed from generation to generation. The most advanced technology for identifying criminal suspects are biometric identification systems. Biometric identification defined as the process for identifying a person by human physical characteristics. Because each human unique, various parts of the human body are analyzed for comparison, and identification. Some forms of biometric identification are hand geometry, palm vein authentication, retina scan, iris scan, and facial scan recognition. The advantages of biometric technology are the extreme accuracy, and secured access to information. Retinal scan technology offers the proof that this technology has a near zero failure rate, which means that fooling this technology almost impossibility. Identification is fast as well, providing a system that is almost foolproof. The main pro of iris reading technology accuracy and alternation near impossible. Iris patterns do not require direct contact, and some scanners can focus on the eye finding the streaking patterns. The advances made in this area of expertise makes the iris reader scanner an excellent choice for law enforcement, and military applications (Blumenthal, 2010).

Biometric Identification Methods

Facial Recognition

Facial recognition surveillance used often in law enforcement. The technology in law enforcement has its advantages and disadvantages because technology does not completely replace humans. The advantages of facial recognition surveillance help to deter crime, and capture criminals. The imaging equipment controlled by remote, for days, weeks, and months watching, and recording every face that passes the imaginer. These facial imagining cameras produce high quality images with advantage to facial scan technology human faces identifiable at a distance without even knowing. Face recognition biometrics operates under the premise every face has valleys, and peaks that come together to make up the features. The intelligent system using facial biometrics looks specifically at the nodal points of the face. More than 80 different nodal points on the face, including eye socket depth, jawline length, distance between eyes, cheekbone shape, and nose width. When the nodal points measured, a numerical code creates a faceprint. The measured the distance between the eyes, nose, cheek bones, and mouth provides the parameters for the facial recognition scan software to create an individual unique face (NCJRS, 2009).

Computer Holographic Imaging

Computer holographic imaging has move forward in time from standard two-dimensional form-base to the three-dimensional free-base imaging using the computer tomography. Computer Tomography (CT) obtains the digitalized holographic image (data file recording) of the skull by scanning slices into the whole images showing the depth. The three-dimensional scanning of the skull is nondestructive. The skull must rotate slowly allowing the laser scanner beam to aim small bursts of light against a perpendicular strip of reflective mirrors. Reflecting mirrors send the images to sensors. Information gathered shows the distance between each peg on the skull by creating a digitalized holographic image of the skull. The computer tomography scan and data file recording by merging the two scans; the CT scan placed over the digitalized holographic image. Merging the two images will allow the computer program to adjust and adapt the differences. As the new image emerges completing the imagery completed copy. The computer holographic image and the CT scans are stored for future identification. The holographic advancement has moved into the biometrics arena of scientific research for the future of law enforcement and private uses (Prieel, & Hirsch, & Heering, 1999).

Biometrics Faceprint Technology

The mathematical space (faceprint) uses the visual details of the skin. These details are scanning techniques for matching different three-dimensional images made during the enrollment phase of the iris and facial recognition software. The three-dimensional overlay is not affected by changes in lighting, or shadows. The imagery can use the identifying markers to change or adapt the image by scanning different views, including the profile views of the human expression. Police artists use this type of imagery to help witnesses describe the subject. The benefit of using three-dimensional face recognition is the continuing research into retina, iris, and facial biometrics (Prieel, & Hirsch, & Heering, 1999).

Retinal, Retina, and Iris Technology

Using the biometric scanning technology, the retinal, retina, and the iris can perform major advancements into personal, private, and professional identification arena. Retinal scan technology depicts the blood vessels in the back of the eye. Every blood vessel pattern unique, and never changes, unless an injury to the eye. Retina defined as the surface at the back of the eye. The retina scans the surface on the back of the eye reflecting the light showing the streaking pattern. Iris reading innovation recognizes a slightly different approach to using the eye for identification. The iris defined as the colored area around the eye as the iris contracts and expands the size of the pupil to control the amount of light. A special scanner reads the unique patterns turning rings, furrows, and freckles into data to help with identification and authentication. The location at the back and surface of the eye makes alterations difficult. The two main advantages of iris recognition define the back of the iris as the extremely protected organ on a person. Each iris is so unique that even identical twins do not share the same pattern streaking, or flaws. Algorithms locate and use more than 200 point comparison for detection of identification theft (NSTC, 2011).

Hand Geometry (Palm Vein)

As the oldest form of biometric technology, the hand geometry device measures the dimensions, and recording the surface area of the hand. The enrollment process captures three images of the hand from different angles. Palm vein authentication reads the vein patterns in a human palm. The hand passes over an infrared light beam; detecting a vein pattern. The palm has a more complicated vascular pattern and is not as susceptible to changing color. The complexity of vein patterns shows a highly effective and accurate identification process. Recent

...

...

Download as:   txt (29.5 Kb)   pdf (285.3 Kb)   docx (19.7 Kb)  
Continue for 17 more pages »
Only available on ReviewEssays.com