What is Biometrics identification?

As a user when you log into your computer of phone you have an option to use retina scan or fingerprint to enhance security. However, there are advantages and disadvantages for this. It provides the best security for the device, but sometimes these methods limit use of a shared device.

Multi-modal biometric uses information from more than one source. For example, a fingerprint and a retina scan or voice combination to authenticate a user. Multi-modal biometrics are more accurate than other authentication because it is harder to spoof several personal traits.

An advantage to using multi-modal biometrics for physical security on a computer room is that it doubles the authentication. The first scan of a fingerprint can be used to identify a person. The second scan of an iris can be used to verify whether the person is an imposter or not (Saravanan, Saranya & Saranya, 2012).

A disadvantage to using multi-model biometrics for information access on a database is that only one user may access a database on a given computer. Then must be logged out and re-authenticated prior to obtaining further information queries. Another disadvantage is the possibility of access being denied and failing to complete the mission. Research shows between a 60-86% success rate on identification (Jothi & Arumugam, 2013).

References

Jothi, V. L., & Arumugam, D. S. (2013). Fingerprint-face feature matching using multi-modality system by agglomerative multi-clustering. Journal of Theoretical & Applied Information Technology,57(3), 452-458. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=iih&AN=93654161&site=eds-live&scope=site

Saravanan, K., Saranya, C., & Saranya, M. (2012). A new application of multi modal biometrics in home and office security system. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=edsarx&AN=1210.2971&site=eds-live&scope=site; http://arxiv.org/abs/1210.2971

Previous
Previous

How do you know you have been hacked?

Next
Next

Is my server room Fire Protection user friendly?