ABSTRACT
Biometric system used for security
purpose. Mostly the biometric system used for individual identification e.g. to
scan finger, eye, iris, voice, signature, DNA, and Hand geometry. The main
purpose of installing biometric system to minimize crimes and terrorist attack.
The methodology of the study to collect primary data from research, interviews,
and human observation case studies. The objective of this research study to
control human theft, and terrorist activity in Nigeria.
Keywords
component; Biometrics system, criminal identification, terrorist
identification, facial recognition, Finger identification.
CHAPTER
ONE
INTRODUCTION
Biometric systems are used to verify
and identify human. It analyzes which person has its own unique identity.
Basically biometric systems are used for security purposes, the main objective
of biometric system to achieve goal of transparent identity. Biometrics measure
individual‘s unique physical or behavioral characteristics to recognize
authenticate their identity. Common physical biometrics system includes
fingerprints, hand or palm geometry, and retina, iris, or facial
characteristics, enrollment and authentication. Behavioral characters include
DNA recognition, Palm Print recognition, signature, voice, (which also has a
physical component), keystroke pattern and gait, of this class of biometrics,
technologies for signature and voice are the most developed. The main purpose
of biometric to verify and identify users. Identification has a tendency to be
more difficult of the two uses because a system must search a database of
enrolled users to find a match. Biometric systems ensure to depend in part of
what the system is protecting and what it is trying to protect alongside. In
France biometric system are used for crime detection and protection. It
minimizes the terrorist attack, open weapon attack, misbehavior attack, cyber
crime attack, bomb blast attack. Biometric system is basically a pattern
recognition
system that recognizes a person based
on a feature vector derived from a specific physiological or behavioral
characteristic that the person process. Depending on the application situation.
A biometric system typically operates in one of two modes. Biometrics offer
greater security and ease than traditional methods of personal recognition. In
some applications biometric can replace or supplement the existing technology.
In others, it is the only feasible approach. Biometric contain sensitive
information about the people. The biometric system that is considered in this
paper is a verification system. Biometric system makes two types of errors e.g.
false match or false accept. Mistaking biometric measurements from two
different people to be from the same person. Biometric system also used for
attendance system in different organization and institution.The paper is
organized as follows section II describe Classification of Biometric System
Section III describe literature review, section IV describe purpose and
objective and section V describe methodology and section VI describe experiment
and results.
Classification
Components of a Typical Biometric
System. A typical biometric authentication system consists of five
modules/components Sensor module: It is used to capture user's raw biometric
data. An example is camera used to take a picture of human face. Feature
extraction module: It is used to process the acquired biometric data to extract
a set of features. For example, features on the surface of a face, such as the
contour of the eye sockets, nose, and chin can be extracted. Matcher module: It
is used to compute matching scores of comparing the extracted features against
the stored ones. System database module: It is used to store the biometric
templates of features the enrolled users. Decision-making module: It is used to
either determine the user's identity or confirm the users claimed identity [1].
Fingerprint Biometric fingerprint
identification is most popular method for person identification. Fingerprint
has been widely used in business transaction. Fingerprints consist of a regular
texture pattern composed of ridges and valleys. These ridges are characterized
by several landmarks points, recognized as minutiae, which are typically in the
form of ridge endings and ridge bifurcations. The spatial distribution of these
details points is maintain to be unique to each finer, it is the collection of
minutia points in a fingerprint that is primarily
employed for matching two
fingerprints. Since all government agencies and institution used automatic
fingerprint identification system. Materialization of low cost and compact
fingerprint readers has made fingerprint modality a preferred choice in many
civil and commercial applications [2].
BIOMETRIC IDENTIFICATION CRIMINAL, TERRORIST, AND INDIVIDUAL IDENTIFICATION
Format: MS Word
Chapters: 1 - 5
Delivery: Email
Delivery: Email
Number of Pages: 60
Price: 3000 NGN
In Stock
No comments:
Post a Comment
Add Comment