Assignment #6

docx

School

American Public University *

*We aren’t endorsed by this school

Course

452

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by PresidentRiverWasp4

Report
1 Accuracy in Biometrics Steven Engelken February 11, 2024 ISSC452-Cybersecurity Prof. Ahmad Salim
2 Engelken_Assignment 6 Biometrics are measurable unique physical or behavioral traits that can be used to verify a person. It usually requires three steps to utilize an automated biometric system, a physical measurement that scans the characteristic, software to transition it into digital information, and a storage area to record characteristics (Tom, 2021). The type of biometric measurement varies and is decided by the level of accuracy the system offers and the simplicity of use. There are numerous different biometric characteristics that can be recorded, however there are certain ones that are not commonly used due to the low chance of common accuracy and the user acceptance of the method. There are currently 5 commonly used biometric characteristics that have been successfully implemented into organizations or personal devices. The most common are facial recognition, voice recognition, fingerprint scan, iris scan, and palm vein scan. The accuracy of the biometric can be measured in False Rejection Rate (FFR) and the False Acceptance Rate (FAR). FRR is the measurement of the likelihood that the security system will incorrectly reject access to an authorized user, while FAR is the measurement of the likelihood a security system will incorrectly accept access from an unauthorized user. (Clark, 2020). The most accurate form of biometric characteristic would be the iris scan. The iris is formed I the early stages of an individual’s life and once formed it stays stable for the rest of a person’s life, leading to low FRR and FAR rates. The efficiency of the scan is very rarely impeded by any kind of glass wear or lenses and much more difficult to take effect from external environments with the scan being close and specific area. As well as speedy recognition between different systems due to its small template size, making it well suited for one-to-many identifications. (Clark, 2020). The least accurate method of the 5 would be facial recognition, as there are many factors that can affect acceptance. The face of an individual can change over their life, other factors
3 affecting recognition are lighting during recording, objects covering the face of the individual ex. sunglasses, and low-resolution images. (Clark, 2020). Many of these forms of biometric recording are feasible and used in our current lives. Some are much easier and cheaper to utilize, such as fingerprint and facial recognition. Although they are not considered the most accurate of the 5 described these methods have been the most viable to utilize due to ease of use, price to setup, and accuracy. In personal devices it is much more feasible to set up fingerprint and facial recognition, where iris scans require a more in-depth system to accurately record. Palm vein is recorded very similarly to fingerprints, only requiring less to be scanned making ease of use more desired. Voice recognition can be utilized just as commonly as facial and fingerprint, however there are more factors that can lead to higher rates of errors and FRR. There are many other biometric characteristics, however their overall method of recording requires more advance methods not as commonly setup in our current society.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Reference: Clark, M. (2020, July 10). Top five biometrics (Face, Fingerprint, iris, palm and voice) modalities comparison. Bayometric. https://www.bayometric.com/biometrics-face-finger-iris- palm-voice/ Tom, N. (2021, May 24). What are biometrics? The Pros/Cons of biometric Security. Auth0 - Blog. https://auth0.com/blog/what-are-biometrics-the-proscons-of-biometric-security/