Βιομετρική και εφαρμογές.
Biometric and applications.
View/ Open
Subject
Βιομετρία ; Βιομετρική αναγνώριση ; ΑνθρωπομετρίαAbstract
The term Biometrics refers to the automated identification of a person based on physiological characteristics or behavior. A biometric system is essentially a pattern recognition system, which verifies the identity of the person determining the authenticity of a particular biological feature. This is an emerging authentication method, which in recent years seems to be gaining ground over traditional methods. The purpose of this paper is to introduce the reader to the concept of biometrics, identifying its strengths and weaknesses. This is achieved by recording the operation of biometric systems, reporting the dominant biometric technologies of the markets and the wider area, exploring the various biometric applications, the concern about privacy issues, and finally cover security issues associated with the use of biometric technology. The work is divided into six chapters. The first chapter introduces the reader to the concept of biometrics, initially giving a full definition. Also, it distinguishes between biometric systems certification and recognition systems, as well as in natural and logical access, and the developing differences between them. After this the reader is acquainted with the purposes and methods of biometrics in the second chapter all the known biometric technologies are developed that exploit features of the physiology of the individual. Specifically in separate sections addressed the finger scan, the facial, the iris, the hand, the retina, and the AFIS scan. The issues that concern us are the components, the function, the dominant technologies, the applications, the advantages and disadvantages of each technology. A single structure is kept, which facilitates the comparison and ranking of technologies, and helps to highlight the special features. What is written is based on specific examples, while at the end of each section there are short conclusions on the usefulness and potentials of each technology. The third chapter has the same structure as the second, except that the technologies developed in this are related to the behavioral characteristics of the individual. The distinction is necessary because of the differences caused in performance issues and the violation of privacy. Thus, in the same chapter the scanning of the voice and signature scanning are explored as well as the possible ways to integrate relevant technologies into traditional shapes of certification. And here what ever is written, are documented with examples from actual tests on operating environments. The fourth chapter is devoted to the categories of biometric applications. Depending on the role of the individual, we distinguish the citizens applications, the administrative applications of officials and commercial applications or applications of customers. Based on this classification, we progress and further develop the main biometric applications, which are the forensic identification, the recognition of citizens, surveillance, access to computers and networks, physical access, electronic commerce and trade as a selling point. For each of these applications typical uses, the technologies, vertical markets, new trends, development costs and implementation issues are examined. Also, at the end of each section the overall conclusions for each application are presented. The fifth chapter examines cases of violation of human privacy and develops precautionary measures against this possibility. Finally, in the sixth chapter, the Office of the Greek Police Department Forensic Laboratory, is presented, which is dedicated to the biometric methods in the field of security and in particular the object, the composition and the operating methods and its methodology. After this chapter, general conclusions and a reference to the sources of labor are followed. Throughout the range of the present study it is proven that a biometric solution is applied in many cases, and that does not move into the realm of scientific experiment. The challenge of course is for it to be able to spread more extensively and to conquer the market, keeping the same level of reliability and responsibility.