Question

In: Computer Science

Question 5 These are examples of biometric recognition systems: • Hand geometry recognition device. • Iris...

Question 5 These are examples of biometric recognition systems:

• Hand geometry recognition device.

• Iris recognition system.

• Signature recognition system.

• Voice recognition system.

(a) Recommend the recognition system with the highest authentication level. [2 marks]

(b) Based on your answer for (a), describe how that recognition system works. [2 marks]

(c) Briefly decribe TWO (2) weakneses for each of the recognition system which were not stated in (a). [12 marks]

(d) Distinguish the differences between VR and AR.

Solutions

Expert Solution

Firstly we should know what is a Biometric system?

Biometric System.

It is essentially a pattern recognition system that operates by acquiring biometric data from an individual, Then extracting a feature set from the acquired data, and comparing this on the application context.

It may operate in two modes:-

Verification mode or identification mode

In the verification mode, the system validates a person’s identity (via a(PIN) personal identification number) by comparing the captured biometric data with her/his own biometric template(s) stored in the system database.

In the identification mode, the system recognizes an individual by searching the templates of all the users in the database for a match. While traditional methods of personal recognition such as passwords, PINs, keys, and tokens may work for positive recognition.

a) Fingerprint recognition system is the system with highest authentication level :-

As humans have used fingerprints for personal identification for many centuries and the matching accuracy using fingerprints has been shown to be very high. The accuracy of the currently available fingerprint recognition systems is adequate for verification systems and small to medium scale identification systems involving a multiple fingerprints of a person provide additional information to allow for large scale recognition involving millions of identities.

The formation (of the pattern of ridges and valleys on the surface of a fingertip) is determined during the first seven months of fatal development. Fingerprints of identical twins are different and so are the prints on each finger of the same person. Today, a fingerprint scanner costs about U.S. $20 when ordered in large quantities and the marginal cost of embedding a fingerprint based biometric in a system has become affordable in a large number of applications.

b) How fingerprint recognition system work:-

recognition system worke by scanning fingers. An optical scanner works by shining a bright light over our fingerprint and taking what is effectively a digital photograph. If we've ever photocopied our hand, we'll know exactly how this works. Instead of producing a dirty black photocopy, the image feeds into a computer scanner. The scanner uses a light-sensitive microchip (either a CCD, charge-coupled device, or a CMOS image sensor) to produce a digital image. The computer analyzes the image automatically, selecting just the fingerprint, and then uses sophisticated pattern-matching software to turn it into a code.

Another type of scanner, known as a capacitive scanner, measures our finger electrically. When our finger rests on a surface, the ridges in your fingerprints touch the surface while the hollows between the ridges stand slightly clear of it. In other words, there are varying distances between each part of our finger and the surface below. A capacitive scanner builds up a picture of our fingerprint by measuring these distances. Scanners like this are a bit like the touchscreens on things like iPhones and iPads.

Having our fingerprints taken at a police station involves pressing our fingers onto an ink pad and then rolling your fingers onto paper to leave a clean impression on the page. our prints are also stored on a computer database so the police can check if you've committed any known crimes or if you do so in future.

But when fingerprints are being used to control access to buildings and computer systems, more sophisticated methods have to be used: a computer has to scan the surface of your finger very quickly and then turn the scanned representation into a code it can check against its database.

c) (i) Weakness of Hand geometry recognition system.

  • · Although most individuals possess some unique features to their hands, it does not possess rich data, like the retina. This is probably one of the biggest disadvantages of hand geometry recognition. Because the hand can be considered to be an external component of the human anatomy, it is prone to the harshness of the external environment. The shape of the hand can also be greatly influenced to a certain degree by weight loss and weight gain, injuries, and even other types of ailments.

  • The raw images which are captured of the hand are affected by the surface elements due to grime, dirt, and scars. It has an Equal Error Rate (also known as the ERR, this is where the False Acceptance Rate and the False Rejection Rate equal each other). But, the device itself is very bulky, and this can prove to be a serious disadvantage regarding end-user perception and acceptance.

(ii) Weakness of Iris recognition system.

  • Expensive: Iris scanners are relatively higher in cost compared to other biometric modalities. As one of the leading and latest technology of the modern times, the cost of the iris devices are fairly high. Large companies, agencies or Governments can afford that price, but the general public can’t afford to pay that price. Some say that it costs five times higher than fingerprint scanning which is more readily available to the general public.

  • Distance: Iris is small in size and can’t be located from a few meters distance. A person needs to be in close distance with the iris scanning device to be enrolled on the system properly. So, a proper setup is needed for initiating an iris recognition process.

(iii) Weakness of signature recognition system:-

· The actual structure of the signature can be changed very quickly, because of its fluid and dynamic nature. Thus, it is very difficult to spoof.

· Signature Recognition is prone to much higher levels of error rates, particularly when the behavioural characteristics of the signature are mutually inconsistent from one another. Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification.

(iv) Weakness of voice recognition system:-

· A person’s voice can be easily recorded and used for unauthorised PC or network. It is having Low accuracy rate. An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.

· Voice recognition systems can have problems with accents. Even though some may learn to decode your speech over time, you have to learn to talk consistently and clearly at all times to minimize errors. If you mumble, talk too fast or run words into each other, the software will not always be able to cope. Programs may also have problems recognizing speech as normal if your voice changes, say when you have a cold, cough, sinus or throat problem.

c) Difference between AR and VR:-

Let’s know what are AR and VR first:-

· Virtual reality (VR): A fully immersive experience where a user leaves the real-world environment behind to enter a fully digital environment via VR headsets. It adds digital elements to a live view often by using the camera on a smartphone. Examples of augmented reality experiences include Snapchat lenses and the game Pokemon Go.

Augmented reality (AR): An experience where virtual objects are superimposed onto the real-world environment via Smartphone’s, tablets, heads-up displays, or AR glasses. Virtual reality (VR) implies a complete immersion experience that shuts out the physical world. Using VR devices such as HTC Vive, Oculus Rift or Google Cardboard, users can be transported into several real-worlds and imagined environments such as the middle of a squawking penguin colony or even the back of a dragon.

Difference between AR and VR

AR

VR

The system augments the real-world scene

Completely immersive virtual environment

AR requires upwards of 100 Mbps bandwidth

VR requires at least a 50 Mbps connection

AR is 25% virtual and 75% real.

VR is 75% virtual and 25% real

It is used to enhance both real and virtual worlds.

It is used to enhance fictional reality for the gaming world.

In AR User always have a sense of presence in the real world

In VR, visual senses are under control of the system

This technology partially immerses the user into the action

This technology fully immerses the user into the action

With AR, end-users are still in touch with the real world while interacting with virtual objects nearer to them.

By using VR technology, VR user is isolated from the real world and immerses himself in a completely fictional world.

No AR headset is needed.

Some VR headset device is needed.


Related Solutions

Facial geometry Fingerprint Hand and palm print Hand geometry Iris recognition Retinal recognition Signature recognition Voice...
Facial geometry Fingerprint Hand and palm print Hand geometry Iris recognition Retinal recognition Signature recognition Voice recognition For each of the above, locate a vendor that provides a product designed to examine that feature. Provide the name of the vendor, the name of the product, the URL, and the Cross-over Error Rate (CER) associated with the product if you can find it. If you cannot find some of the requested information, please indicate that. Of those in the list, which...
Question 5: Iris wants to save money to buy a new sailboat. • In 2010, Iris...
Question 5: Iris wants to save money to buy a new sailboat. • In 2010, Iris earns $20,000, and faces a marginal tax rate of 25 percent. • In 2015, Iris will earn $50,000, and face a marginal tax rate of 40 percent. • If she invests money from 2010 to 2015, she will earn interest totaling 50 percent of her initial investment. a. Explain the difference between a registered retirement savings plan (RRSP) and a tax free savings account...
Discussion Question Cash in Hand Topic: Revenue Recognition/Misrepresentation of Fact by Client Characters: Heather Hunter, Senior...
Discussion Question Cash in Hand Topic: Revenue Recognition/Misrepresentation of Fact by Client Characters: Heather Hunter, Senior in CPA firm “Buzz” Thompson, Owner/manager of Fashion First Sandy, part-time bookkeeper of Fashion First Author: Mary Brady Greenawalt, Associate Professor of Business Administration, The Citadel Co-author: Janine Cloutier, Virginia Tech In addition to the usual mix of compilation, review, and audit clients for which Heather Hunt serves as a senior in a small office of a regional CPA firm, she has been assigned...
Describe the information/data exchanges for Fieldbus Systems on device and control level as well as examples of network/communication protocols used.
Describe the information/data exchanges for Fieldbus Systems on device and control level as well as examples of network/communication protocols used.
QUESTION 5 Recognition and recall tasks both ask subjects to __________ information.   retrieve encode acquire store...
QUESTION 5 Recognition and recall tasks both ask subjects to __________ information.   retrieve encode acquire store QUESTION 6 In considering the Serial Position Effect, the “primacy effect” refers to the fact that the items presented most recently in a list are more likely to be remembered than items presented earlier. the most important items in a list are more likely to be remembered than less important items. those items in a list which have the greatest emotional impact are those...
QUESTION 5 Explain THREE (3) examples of overhead costs.
QUESTION 5 Explain THREE (3) examples of overhead costs.
Question (5) [12 Marks] Note: Do not use R, do the calculations by hand. A very...
Question (5) [12 Marks] Note: Do not use R, do the calculations by hand. A very large (essentially infinite) number of butterflies is released in a large field. Assume the butterflies are scattered randomly, individually, and independently at a constant rate with an average of 6 butterflies on a tree. (a) [3 points] Find the probability a tree (X) has > 3 butterflies on it.   (b) [3 points] When 10 trees are picked at random, what is the probability 8...
Demonstrate your knowledge and understanding of health information systems by listing 5 examples of terminology used...
Demonstrate your knowledge and understanding of health information systems by listing 5 examples of terminology used in the world of Electronic Health Record (EHR). One such example is CPOE Explain the difference between EMR, EHR, and PHR?
Question 5 There are various types of IT systems which come in all shapes and sizes....
Question 5 There are various types of IT systems which come in all shapes and sizes. They are categorised to assist us in evaluating the appropriateness of their handling of business risk. List the five types of system and describe each system. (20)
QUESTION 5 Jim Black has filed a qui tam lawsuit against a medical device maker, which...
QUESTION 5 Jim Black has filed a qui tam lawsuit against a medical device maker, which means that Mr. Black is trying to enforce the federal False Claims Act wants his money back because the device was defective wants the manufacturer to replace the device thinks the manufacturer has violated the antitrust laws QUESTION 6 Payment of something of value with the intent of inducing referrals is a violation of which of the following statutes? Stark law Sherman Anti-Fraud Law...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT