2. o
o
Process where user verify that they are who they
say they are.
The user who attempts to perform function in a
system is in fact the user who is authorized to do
so.
6. o To
prevent fake finger from being
used
o Measure blood flow or check
correctly arrayed ridges
7. o Analyses
the characteristic of an
individual’s face images
o Capture through a digital video
camera
o Touted as a fantastic system for
recognizing potential treats
8. Measure and analysis of the shape of
one’s hand
o Individual features are not descriptive
for identification
o Possible to devise a method by
combining various individual and
measurement of finger and hands
o
9. o
o
o
Analyses the feature that exist in the
coloured tissue surrounding the pupil
The scan use a regular video camera and
can be done from further away thank a
retinal scan
Will work perfectly and get the accurate
measurement that can be use in
identification purpose
10. o
o
o
o
Scanning the retina and analysing the layer of
blood vessel at the back of the eye
Using a low-intensity light source and a optical
coupler
Requires user to remove glasses , place their eye
to the device and focus on a certain point
The accuracy is very good and the cost is fair
11. o
o
o
o
Compares a person’s live speech with their stored
voice pattern
Requires user to speak into a microphone and the
word or anything that he speaks can be his
password or an access phrase
Most voice recognition devices require the high and
low frequencies of the sound to match , which is
difficult for many recording instrument to recreate
well
Fair and the cost reasonable
12. o
o
o
o
o
Recognizes the shape of user handwritten signature as
measuring the pressure exerted and the motion use to
write the signature
Special pen and tab are used
The authenticity is determined by , comparing an input
signature to a stored reference set (template) consisting
of three signature
The similarity between input signature are reference set
is computed using string matching and compared to a
threshold
Fair and the price is excellent
13. Picture 2 : Visualization of iris scan and extracted “IrisCode”
Picture (C) IriScan , Inc.
14. Picture 3 : Digitized fingerprint image with the minutiae points
extracted.
Image (C) 1998 Idex AS
15. Picture 4 : Hand with biometric measurements visualized
Image (C) Michigan State University
16. o
From this assignment I can conclude that authentication
is one of the security measure . One of the method of
authentication is Biometric Devices . The biometric
method is the method that are commonly use . There
are seven example of Biometric . From this assignment ,
I also find out that the Fingerprint Recognition is the
best method because the fingerprint is very unique ,
different person will have the different fingerprint . It also
the best method because the accuracy in this method is
good and the cost involved is cheaper than the other
method .