Source httpswwwbiometricupdatecom202008eyelock

This preview shows page 7 - 11 out of 14 pages.

Source:
Teaching ICT as an ExploratoryAuthenticationPage8of14Retinal ScanningRetinal biometrics involves the scanning of retina and analyzing the layer of blood vessels at theback of the eye.Retinal scanning involves using a low-intensity light source and an optical coupler and can read thepatterns at a great level of accuracy.Retina scanning requires the user to remove glasses, place their eye close to the device, and focuson a certain point. Whether the accuracy can outweigh the public discomfort is yet to be seen.The accuracy in retinal scanning is very good and the cost involved is fair.Source:VoiceRecognitionVoice recognition system compares a persons live speech with their stored voice pattern.Voice recognition biometrics requires user to speak into a microphone. What he speaks can be hispassword or an access phrase.Verification time is approximately 5 seconds. To prevent recorded voiceuse, most voicerecognition devices require the high and low frequencies of the sound to match, which is difficult formany recording instrumentsto recreate well. Also, some devices generate random number of sequencesfor verification.The accuracy in voice recognition is fair and the cost involved is very reasonable.
Teaching ICT as an ExploratoryAuthenticationPage9of14Signature Verification SystemSignature verification system uses special pen and tablet. After pre-processing the signature,several features are extracted.The authenticity of a writer is determined by comparing an input signature to a stored reference set(template) consisting of three signatures.The similarity between an input signature and the reference set is computed using string matchingand the similarity value is compared to a threshold.The accuracy in signature verification system is fair and the cost involved is excellent.1.2 CALLBACK SYSTEMThe callback system is commonly used in the bank operation and business transaction.For example, when you book for the taxi service, the operator will ask you to hang up and she willcall you back to confirm for the service required.2.0 WHY IS AUTHENTICATION IMPORTANT?Authentication is important in order to safeguard against the unauthorized accessand use.Authenticationisimportantbecause it enables organizations to keep their networkssecure by permitting onlyauthenticatedusers (or processes) to access its protectedresources, which may include computer systems, networks, databases, websites andother network-based applications or services.We had just finished the discussion on Authentication. Let’s move onto the next higher level of activity/ies or exercise/s that demonstrate yourpotential skills/knowledge of what you have learned.
Teaching ICT as an ExploratoryAuthenticationPage10of14V. ANALYSIS, APPLICATION AND EXPLORATIONACTIVITY 1Name:JHAN JAN S. MARCIALCourse& Section:

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
Maam maty
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture