Every person who is born into the world certainly has a unique, nothing similar between the one and the other. Each person has unique traits or attributes. Although born a twin, they still have differences.
Based on these facts, built a system that uses human characteristics or nature identical, ie biometrics system. So a person's body is also the password for that person. Biometrics consists of methods for uniquely recognizing humans based upon one or more characteristics intrinsic physical or behavioral. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. There are different types of biometric systems are now available.
Fingerprint scanner
The system includes a scanner hardware (scanners) and software. Devices that record specific characteristics of a fingerprint, each user stores data into a template. When the user tries again strengthen access, the software compares the data stored in the template and the reading of the fingerprint scanner. The fingerprint system is very accurate, but can be influenced by changes in the fingerprint. For example, burns, scars, dirt.
Face Recognition
The introduction of the shape and position of a person's facial features is a complex task. At first, the camera captures an image of a face, then the software sort out patterns and then compare the information with user templates.
The introduction of the Retina or Iris.
Perhaps most of all it is safe and the layers of the retina vessels behind the eye. Difficult retinal images captured and during data collection, the user must concentrate to a point of view and defend it. So the camera can capture images with good. Determination of the pattern of blood vessels. However, when the pattern is unique to each person, to be more accurate identification. The system is based on two parts of the eye, the iris and retina, considered to offer the best level of security.
Geometry Arm.
With this system, the user straighten the arm according to the instructions on the sign of the hardware arm readers (reader), captures three-dimensional images of the fingers and bones, then store the data in a template. Arm geometry has been used for several years and used the security system at the 1996 Olympics.
Finger Geometry.
The equipment is similar to the geometry systems. Users put one or two fingers under a camera that captures the shape and length of the fingers and bones. The system captures three-dimensional images and matching the data with the stored templates to determine the identity, Based Phone
Introduction Palms.
Same with fingerprint recognition, biometric palm focusing on the diverse arrangements. For example, parts and worthless edges found on the palm of the hand.
Introduction to Sound.
The method captures the voice of the speaker according to the properties of the language. Its primary use is a telephone-based security applications. Accuracy can be influenced by noise and the effect of illness or fatigue in the sound.
The real problem with speech recognition is the sound system can be fooled by the tape of a person's voice. For that reason, an advanced sound system must be able to expand or extend the verification process by giving the words more difficult and lengthy, read aloud, or ask for a different word that is read each time.
Introduction of Signature.
Signature verification systems require one main thing, which is the public acceptance (public). In every respect of the declaration of independence to slip a credit card, people tend to accept a signature as proof of identity.
No matter how simple a signature, necessary equipment to measure, both traits that distinguish signatures and characteristics that distinguish the signature of the writing process. Traits that include pen pressure, velocity and the points when the pen is lifted from the paper. The patterns were captured through a specially designed pen or tablet (could be both) and compared with the template patterns.
DNA.
The use of DNA in biometrics technology is closely related to forensic activities. Its use is not the same with other biometrics, which is a relatively short time may give a decision. Therefore, DNA biometrics to be done in the laboratory by a special expert staff, then match, only then can give a decision on the DNA examined.
Thermal Imaging.
This is related to body temperature. System that uses thermal imaging has the same process by firing rays into the body. Then, the computer captures a person's body heat and verify compliance with requirements.
Ear Shape.
Shape of the ear is one of the special characteristics of humans. When viewed at a glance, every human ear is similar. However, when measured certainly have differences.
Body Odor.
Body odor is developed into a system of biometrics technology in accordance with the fact that humans have a distinctive body odor. However, some problems arise, because the smell of someone's body relative change depending on the physiological situation. Body odor after exercise is different from a person after a bath. It was one of the obstacles. The rate validation of the system tend to be low, almost like a signature and voice recognition.
Today, the use of biometric identification equipment with systems more widely in society. The introduction of biometrics systems is very important so that people can use appropriately according to the current circumstances.
And body movement,
Movement of the human body during running every person is unique. By studying them we may be making a room security system and recognize the person of him walking pattern, with artificial intelligence (AI) course.
Thank you for reading this article. Written and posted by Bambang Sunarno .
sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://primadonablog.blogspot.com/2013/12/human-identification-system.html
DatePublished: December 5, 2013 at 12:04
.png)
Code : 7MHPNPADAEFW.
Tag : Human identification system.
No comments:
Post a Comment