The term “Biometrics” refers to the analysis and measurement of human being’s characteristics that are distinct and unique in a particular individual.
Biometrics in literal terms means life measurement and is usually associated with operation of typical physiological characteristics in order to identify a particular individual. It’s most important and significant application is security, but despite that it is also used as a computer interface. A wide range of Biometric applications are used for authenticating an individual’s identity such as various individual features including face, fingerprints, iris recognition and signature.
Identification methods used in biometrics are preferred over the conventional passwords and PIN based methods. Due to various benefits, biometric technology is gaining more and more popularity with time. The requirement of physical presence of an individual at the time of identification by a biometric system makes it more reliable and authentic. Because of the wide usage of this “Biometric Technology”, it overcomes the need and requirement of remembering PINS and passwords. This automated setup thus makes the identification and verification process easier by identifying physiological and behavioural characteristics of a human being.
Types of Biometric Devices:-
Applications of Biometrics:-
Most of the biometric applications fall under one of nine all-purpose categories:-
Biometrics provides very mature and robust choice for a biometric based technology. As such, there is an enormous way out in the market. The alternative within a marketplace allows a company to pick that solution which is right. With this kind of maturity also comes the familiarity. This familiarity inturn has allowed attackers to research for different kinds of attacks on a biometric setup. So, in this connection a company needs to measure its risk factor and then ultimately find the right exchange between user security and convenience. This security part needs to analyse the amount of effort which is inturn required to compromise the viable lost of data, time and to compromise a system.