Physical Security and Biometric Techniques Essay

Exclusively available on IvyPanda Available only on IvyPanda

Summary

One of the most important aspects of physical security is its manifestation in technology as the latter progresses and develops. In other words, physical events have cyber consequences and vice versa. Information technology (IT) physical security has more relevance and criticality today than ever, especially in the highly competitive business environment. The sophistication of technology-enabled a greater level of identification of key personal physical traits unique to an individual, and the use of this enhanced recognition is biometrics. A wide range of physical security and network protection measures can be protected by biometrics in an effective manner. The techniques include vascular pattern recognition, retinal and iris scanning, facial recognition, hand and finger geometry, fingerprinting, and behavioral formats, as shown in Figure 1 below (Hay, 2003). The process takes place in two steps, which involve identification and verification.

We will write a custom essay on your topic a custom Essay on Physical Security and Biometric Techniques
808 writers online
Biometrics
Figure 1. Biometrics

History

Firstly, the historical origins of biometrics can be traced back to 14th-century China. It was a fingerprinting technique where children’s palm prints and footprints were used to distinguish them apart (Hay, 2003). In the 18th century, Bertillonage was utilized to record a criminal’s body measurements, such as limbs, head, and body (Hay, 2003). However, the most sophisticated and advanced level of biometrics emerged in the last three decades, and it has become integral for physical security.

Physical Biometric Techniques

Secondly, when it comes to fingerprinting, it is the most well-known as well as oldest technique. The basic framework involves taking a snapshot image of one’s fingertips, where the specific pattern is recorded for future recognition (Hay, 2003). It can be performed either with the use of ink or a digital scanner, with the latter being preferred. The advantages are the convenience of not needing passwords, flexibility, unlimited user number, privacy, and compatibility (Hay, 2003). The disadvantages are scanner durability, high maintenance costs, and fake fingerprints. Hand geometry uses a hand’s and fingers’ unique geometry for identification purposes. The benefits are similar to fingerprinting with additional resistance to fooling, but hardware is costlier and larger, and hand geometry changes as a person ages (Hay, 2003). Facial recognition analyzes a person’s face, and it is non-intrusive, flexible, and easy to integrate (Hay, 2003). However, its faces are not as static as hands or fingerprints because of lighting, facial position, facial expression, background distortion, and fake faces.

In the case of iris scanning, the technique is highly accurate due to the uniqueness of human irises. It is non-invasive, convenient, and hard to replicate, but the equipment is expensive, eyelashes and eyelids obscure irises, and lighting is still an issue (Hay, 2003). Retinal scanning is the most accurate form of biometrics known today due to the complexity of the retina. The technique uses low-intensity light to read the retinal pattern, and it is outstanding for long-term use, 100% accurate, and non-replicable (Hay, 2003). However, it is invasive and uncomfortable to use because of reading challenges. Similar to the latter, the vascular technique also recognizes vascular patterns in one’s face or hands. Its advantages include accuracy and independence on external factors, but vasculature changes with aging and medical conditions.

Behavioral Biometric Techniques

Thirdly, speaker recognition identifies an individual’s voice and speech patterns for authentication. The technique is flexible, inexpensive, easy to implement, and convenient, but the problems include the possibility of faking through recorded voices and the unaccommodating nature of the hearing impaired (Hay, 2003). Signature recognition is low-cost and convenient but non-adaptive for foreign languages with no future prospects. Keystroke recognition is extremely cheap, but it has questionable accuracy.

Reference

Hay, R. (2003). [PDF document].

Print
Need an custom research paper on Physical Security and Biometric Techniques written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, May 17). Physical Security and Biometric Techniques. https://ivypanda.com/essays/physical-security-and-biometric-techniques/

Work Cited

"Physical Security and Biometric Techniques." IvyPanda, 17 May 2023, ivypanda.com/essays/physical-security-and-biometric-techniques/.

References

IvyPanda. (2023) 'Physical Security and Biometric Techniques'. 17 May.

References

IvyPanda. 2023. "Physical Security and Biometric Techniques." May 17, 2023. https://ivypanda.com/essays/physical-security-and-biometric-techniques/.

1. IvyPanda. "Physical Security and Biometric Techniques." May 17, 2023. https://ivypanda.com/essays/physical-security-and-biometric-techniques/.


Bibliography


IvyPanda. "Physical Security and Biometric Techniques." May 17, 2023. https://ivypanda.com/essays/physical-security-and-biometric-techniques/.

Powered by CiteTotal, free essay referencing maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1