For a long time most of the government organizations, public and private companies were looking for a highly responsible security system and attendance maintenance organism without significantly increasing their budget for these. To meet their increasing demand, biometric system appeared to the scene. Finding its super sensitive efficiency in preventing identity theft and maintaining attendance records, everybody greeted it and installed it at their premises. It received high appreciation from various sectors.Not only did it meet their expectations, but also exceeded their expectation in a great extent. Since then till date, various types of biometric identification and verification systems have come to serve more than meeting these two purposes. Keeping pace with the complex needs of the day, it has become cleverer, more complex and supersensitive. Now it can take a significant role in successful financial transactions.
As the name suggests, biometrics works on biological characteristics of a human being. It measures and verifies biological characteristics of an individual. According to the methods used in it, biometrics is of two types. One type that works on verification method is called behavioral biometrics. Another type is called physical biometrics. It works on both identification and verification method. Former type has extensive uses in offices, business centers and various educational institutions. Later type is used by banks and other investigative departments for secure transaction and criminal investigation.
Behavioral Biometrics is again divided into two types: Keystroke Recognition and Speaker Identification.
It measures the characteristics of a person’s typing patterns. This is used for identifying the persona’s creating inappropriate email and unethical typing. It is highly useful for reducing fraudulent activity on the Internet. Keystroke recognition software within a computer recognizes it and sends a message about it to the person taking care of surveillance system.
Speaker Identification
Speaker identification and recognition is used to identify an unknown speaker’s identity. It verifies and tallies a person’s voice and its patterns, pitch and speech style. . Behavioral pattern, intensity and pitch of a voice vary from man to man.
Physical Biometrics Systems may be of various types as given below:
Fingerprint identification
Fingerprint identification is the oldest and cheapest method used widely. It works on a same principle that says fingerprints of different individuals are not the same. It identifies and verifies an individual’s fingerprint with the data stored in it.
Palm Vein Authentication
Hand geometry is verisimilitude to fingerprint analysis. It takes and analyses palm prints and other physical characteristics to uniquely identify an individual’s palm. It measures and compares the different physical characteristics of various human hands.
Retina Scan
It analyzes and identifies unique blood vessel patterns of an individual. It works on the capillary blood vessels existing in the back of human eye. It throws a low-intensity light to a person’s eye to get an image pattern formed by the blood vessels.
Face Recognition
It identifies and analyses the face of a person. It uses an analyzing method that easily distinguishes the difference between the two faces of two different persons.