See
discussions, stats, and author profiles for this publication at:
https://www.researchgate.net/publication/306064545
Comparison of biometric identification methods
Conference Paper
· May 2016
DOI: 10.1109/SACI.2016.7507397
CITATIONS
9
READS
5,790
1 author:
Csaba Otti
Óbudai
Egyetem
19
PUBLICATIONS
45
CITATIONS
SEE PROFILE
All content following
this page was uploaded by
Csaba Otti
on 17 May 2018.
The user has requested enhancement of the downloaded file.
Comparison of biometric identification methods
Csaba OTTI,
Doctoral School on Safety and
Security Sciences
Budapest, Hungary
otti.csaba@bgk.uni-obuda.hu
Abstract—This paper introduces the different biometric
identification technologies along with a number of practical
applications, their errors and the suggested solutions.
I.
I
NTRODUCTION
The word biometry stems from two Greek words: “bio” –
life and “metria” – measurement. Within the security
sciences, we aim to measure the unique bodily features of
people with automated system, and as such, biometric
identification is the process of measuring of said features
with automatic systems.
A fundamental task in establishing security is to make
sure that any given person, object or information is only
accessed by authorised people. A definitive part of
security systems focus on this task – the PIN codes in
security systems, the cards of an access control systems or
the passwords for CCTV systems.
Three technologies exist within the automatized
identification systems:
1.
Knowledge based
2.
Possession based
3.
Or biometry based
In order to achieve the required level of security, these
methods might be combined.
A.
Knowledge based identification
A good example for knowledge based identification is the
password access system used on computers or the PIN
code used at ATMs. This method is not used alone in
modern access control systems. The advantage of this
method is its low cost (no card fees); however knowledge
might be parted to unauthorised people easily.
B.
Possession based identification
Possession based identification means that an object (e.g.
a card) is assigned to a person, and ultimately, this object
is identified. This method is the most
widespread
nowadays and there are several areas where this has to be
used.
Disadvantages:
It may be stolen or lent
It may be copied. Although secure and intelligent
chip
cards are spreading, even those have
weaknesses
Advantages:
It is easy to use: everybody knows it, learn to use
a card is easy. One just
have to put it near the
reader.
It is widely accepted: employees have low
resistance to such a system.
The readers are cheap:
installation of a card
identification endpoint has much lower cost than
a biometric one.
Possibility of visual identification: If the card has
to be worn such that it is visible all times, and
features a photo and a name of the owner, it is easy
to spot an intruder.
Other possibilities for deployment:
o
Network login to a computer system
o
Storage of digital signature
o
Controlling vending machines
o
Controlling printers and photocopiers