In: Computer Science
Question 5 These are examples of biometric recognition systems:
• Hand geometry recognition device.
• Iris recognition system.
• Signature recognition system.
• Voice recognition system.
(a) Recommend the recognition system with the highest authentication level. [2 marks]
(b) Based on your answer for (a), describe how that recognition system works. [2 marks]
(c) Briefly decribe TWO (2) weakneses for each of the recognition system which were not stated in (a). [12 marks]
(d) Distinguish the differences between VR and AR.
Firstly we should know what is a Biometric system?
Biometric System.
It is essentially a pattern recognition system that operates by acquiring biometric data from an individual, Then extracting a feature set from the acquired data, and comparing this on the application context.
It may operate in two modes:-
Verification mode or identification mode
In the verification mode, the system validates a person’s identity (via a(PIN) personal identification number) by comparing the captured biometric data with her/his own biometric template(s) stored in the system database.
In the identification mode, the system recognizes an individual by searching the templates of all the users in the database for a match. While traditional methods of personal recognition such as passwords, PINs, keys, and tokens may work for positive recognition.
a) Fingerprint recognition system is the system with highest authentication level :-
As humans have used fingerprints for personal identification for many centuries and the matching accuracy using fingerprints has been shown to be very high. The accuracy of the currently available fingerprint recognition systems is adequate for verification systems and small to medium scale identification systems involving a multiple fingerprints of a person provide additional information to allow for large scale recognition involving millions of identities.
The formation (of the pattern of ridges and valleys on the surface of a fingertip) is determined during the first seven months of fatal development. Fingerprints of identical twins are different and so are the prints on each finger of the same person. Today, a fingerprint scanner costs about U.S. $20 when ordered in large quantities and the marginal cost of embedding a fingerprint based biometric in a system has become affordable in a large number of applications.
b) How fingerprint recognition system work:-
recognition system worke by scanning fingers. An optical scanner works by shining a bright light over our fingerprint and taking what is effectively a digital photograph. If we've ever photocopied our hand, we'll know exactly how this works. Instead of producing a dirty black photocopy, the image feeds into a computer scanner. The scanner uses a light-sensitive microchip (either a CCD, charge-coupled device, or a CMOS image sensor) to produce a digital image. The computer analyzes the image automatically, selecting just the fingerprint, and then uses sophisticated pattern-matching software to turn it into a code.
Another type of scanner, known as a capacitive scanner, measures our finger electrically. When our finger rests on a surface, the ridges in your fingerprints touch the surface while the hollows between the ridges stand slightly clear of it. In other words, there are varying distances between each part of our finger and the surface below. A capacitive scanner builds up a picture of our fingerprint by measuring these distances. Scanners like this are a bit like the touchscreens on things like iPhones and iPads.
Having our fingerprints taken at a police station involves pressing our fingers onto an ink pad and then rolling your fingers onto paper to leave a clean impression on the page. our prints are also stored on a computer database so the police can check if you've committed any known crimes or if you do so in future.
But when fingerprints are being used to control access to buildings and computer systems, more sophisticated methods have to be used: a computer has to scan the surface of your finger very quickly and then turn the scanned representation into a code it can check against its database.
c) (i) Weakness of Hand geometry recognition system.
(ii) Weakness of Iris recognition system.
(iii) Weakness of signature recognition system:-
· The actual structure of the signature can be changed very quickly, because of its fluid and dynamic nature. Thus, it is very difficult to spoof.
· Signature Recognition is prone to much higher levels of error rates, particularly when the behavioural characteristics of the signature are mutually inconsistent from one another. Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification.
(iv) Weakness of voice recognition system:-
· A person’s voice can be easily recorded and used for unauthorised PC or network. It is having Low accuracy rate. An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.
· Voice recognition systems can have problems with accents. Even though some may learn to decode your speech over time, you have to learn to talk consistently and clearly at all times to minimize errors. If you mumble, talk too fast or run words into each other, the software will not always be able to cope. Programs may also have problems recognizing speech as normal if your voice changes, say when you have a cold, cough, sinus or throat problem.
c) Difference between AR and VR:-
Let’s know what are AR and VR first:-
· Virtual reality (VR): A fully immersive experience where a user leaves the real-world environment behind to enter a fully digital environment via VR headsets. It adds digital elements to a live view often by using the camera on a smartphone. Examples of augmented reality experiences include Snapchat lenses and the game Pokemon Go.
Augmented reality (AR): An experience where virtual objects are superimposed onto the real-world environment via Smartphone’s, tablets, heads-up displays, or AR glasses. Virtual reality (VR) implies a complete immersion experience that shuts out the physical world. Using VR devices such as HTC Vive, Oculus Rift or Google Cardboard, users can be transported into several real-worlds and imagined environments such as the middle of a squawking penguin colony or even the back of a dragon.
Difference between AR and VR
AR |
VR |
The system augments the real-world scene |
Completely immersive virtual environment |
AR requires upwards of 100 Mbps bandwidth |
VR requires at least a 50 Mbps connection |
AR is 25% virtual and 75% real. |
VR is 75% virtual and 25% real |
It is used to enhance both real and virtual worlds. |
It is used to enhance fictional reality for the gaming world. |
In AR User always have a sense of presence in the real world |
In VR, visual senses are under control of the system |
This technology partially immerses the user into the action |
This technology fully immerses the user into the action |
With AR, end-users are still in touch with the real world while interacting with virtual objects nearer to them. |
By using VR technology, VR user is isolated from the real world and immerses himself in a completely fictional world. |
No AR headset is needed. |
Some VR headset device is needed. |