•Biometrics method of uniquely identifying.
•Identification based upon one or more physical or behavioral traits.
•In computer science, in particular, biometrics is used as a form of identity access management and access control.
•To overcome Traditional methods involving passwords and PIN numbers.
•Biometrics highest level of security.
•Physiological are related to the shape of the body. Examples include fingerprint, face recognition, DNA, Palm Print, hand geometry, iris recognition and many more.
•Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm and voice.
•Finger Print
•Facial Scan
•Iris Scan
•Voice Identification
•Hand Scanner
•Handwriting
•Keystroke dynamics
Biometric | Approx Template Size |
Voice | 70k – 80k |
Face | 84 bytes – 2k |
Signature | 500 bytes – 1000 bytes |
Fingerprint | 256 bytes – 1.2k |
Hand Geometry | 9 bytes |
Iris | 256 bytes – 512 bytes |
Retina | 96 bytes |
Biometric | Approx Template Size |
Voice | 70k – 80k |
Face | 84 bytes – 2k |
Signature | 500 bytes – 1000 bytes |
Fingerprint | 256 bytes – 1.2k |
Hand Geometry | 9 bytes |
Iris | 256 bytes – 512 bytes |
Retina | 96 bytes |
No comments:
Post a Comment