Explore BrainMass

Biometric Vulnerabilities

This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

I need help getting started on this. Thanks in advance!

Please discuss the following biometrics and the vulnerabilities of each: Fingerprints, Voice recognition, Iris/Retinal Scan, and Facial recognition.

No introduction or conclusion needed.

© BrainMass Inc. brainmass.com March 21, 2019, 9:01 pm ad1c9bdddf

Solution Preview

Biometrics and vulnerabilities

A fingerprint is made up of a number of ridges and valleys. Every person has different pattern of ridges and valleys which constitutes a unique fingerprint for biometrics. The biometric device using fingerprint technique uses technologies such as optical, silicon, and ultrasound to capture the fingerprint. Biometric fingerprint technique requires the person to slide the finger over a reader (in case of optical reader). The reader captures certain details of the finger scanned such as distance between ridges, depth of valleys, pattern of placement of ridges, etc. The detail of the user is entered in the database system associated with the fingerprint reader and when the user tries to log in to the system by swiping his finger over the reader, overall characteristics of finger are compared to characteristics stored in the database. If these characteristics match, the user is granted access, else not.

There are many advantages of using fingerprints, these are:
- Easy to use
- Less expensive than other biometrics
- Smaller in size
- Requires low power and maintenance
- Non-intrusive

- The portion of the finger from which measurements are taken is susceptible to dirt, cuts, or day-to-day wear and tear. In such case acquiring a high quality image becomes difficult
- Some people have little or no minutia points which are an important input to the reader. For example surgeons wash their hands with very strong soap ...

Solution Summary

This solution provides a detailed discussion of biometrics.