Thursday, March 26, 2009

Biometric Authentication Techniques

Fingerprint scanning is the most common biometric tool.


Biometric authentication is a security method used to protect physical and digital data. Fingerprints, irises, retinas, speech, facial features and other aspects of behavior and physiology are all used in biometric authentication to administer access to a computer system or physical space. Fingerprint scanning, facial recognition, and voice recognition are three biometric authentication techniques that individuals, corporations, and military facilities frequently use.


Fingerprint Scanning


Fingerprint scanners are used on laptop and desktop computers and flashdrives. According to Russell Kay's article "QuickStudy: Biometric Authentication" on ComputerWorld.com, fingerprint authentication is the most popular and least expensive method to authenticate using biometrics. Fingerprint readers or scanners record the unique series of lines, whorls, and arches that make up your fingerprint, allowing only prints with a statistically significant match to log on to a system or network. Fingerprint readers are also embedded in travel or flash drives, which offer another level of security to protect your portable information.


Facial Recognition


Facial recognition authentication is a security technique that records and measures your facial features such as the distance between your eyes, the height of your cheekbones, and additional characteristics. According to the article "Face Recognition Systems" on GlobalSecurity.org, facial recognition systems can offer a heightened level of security only if the template image is effectively captured. For this reason, if you use facial recognition security software be sure the template images are created using proper lighting and focus.








Voice Recognition


Another biometric authentication technique is voice recognition, a type of security system that works by matching the pattern of a person's voice to a template recording. Kay's article notes that voice recognition is not the same as speech recognition, in that the words being said are not as important as the way in which they are said. The article "Voice Verification" on GlobalSecurity.org argues that one problem with voice recognition security software is that it does not account for voice changes due to emotional states, sickness or other reasons.

Tags: voice recognition, authentication security, biometric authentication, facial features, facial recognition, Fingerprint readers