Effectiveness of Creating of a Biometric Scanning System to Control Access to a Secure Workplace

According to Lisa and Krissler (2002), they describe biometrics as the usage of certain biometric technologies in recognition of human feeling and other related characteristics. Lisa and Krissler (2002) identify human characteristics such as feelings, taste, and traits, among other characteristics are fully recognized through the utilization of the biometric technologies in direct collaboration of the human body. Thus, through the biometric technology, both physiological and behavioral characteristics are recognized by the usage of the human body (Lisa and Krissler, 2002). This capability of technology has bee at the center of the drive to develop better systems that would efficiently enhance communication between human beings and the diverse technologies which are available in the modern world.

As a result, the need to create both the Iris recognition system and an automated fingerprint identification scanning systems that are more intelligent has continued to be more agent and vital than ever before. It is however very evident that a number of challenges are closely associated with the creation of most biometric systems thus making the entire concepts of biometric systems to very complex and complex venture (Kaushik and Prabir, 2008). In this regard, this paper shall look at the Iris recognition system and an automated fingerprint identification scanning systems as part of biometric technologies and attempt to evaluate their effectiveness based on available literature.

Iris recognition System
In order to efficiently and effectively create better control access systems that would be used to secure our working places, the utilization of Iris Recognition biometric systems is fundamental. Designing a technology system that would utilize the human Iris of the eye, proper understanding of the functioning of the human Iris always needs to be done (Kaushik and Prabir, 2008). In this regard, Iris recognition making always ensures that the Iris system being made clearly uses various biometrics techniques in the sense that various algorithms involved in programming the systems are able to recognize the individual human eye-iris from others and send the messages to the recording and communication system (Steve, Tim, and Herb 2005). This is possible when reinforced to extend that the recognition system should ensure the recognition is fact, non -invasive, and highly reliable (Steve, Tim, and Herb 2005).

Iris coding method used for the efficient programming of the human iris code to ensure that the designed systems detect various human Iris and is in a position to differentiate them with ease. Commonly used is the Zak-Gabor algorithm for coding which is important technique for coding the system (Steve et al., 2005). To ensure more secure work flow with the Zak-Gabor algorithm, precautions should be taken to ensure that an in-depth analysis of the Iris is done within the shortest time possible. This is important because it leads to faster, accurate and reliable detection of the Iris is done (Utilization of Biometrics 2009 Scheibert et al., 2009).

This coding technique also selects transformation of coefficients in an automatic manner to make the designed system to be more adaptive to the Iris image detected. However, it should be noted that it is not mandatory, for the Zak-Gabor algorithm iris-coding system, for the outcome to fully adhere to the internationally recognized ISOIEC 19794-6 standards. Moreover, Kaushik and Prabir (2008) states that video recording capabilities in the Zak-Gabor algorithm Iris recognition system is enabled to ensure that proper and more reliable security systems are put into place. This method of creating Iris recognizers does not involve the usage of blues in the system. Spoof resistance is also done to a few selected Iris recognition devices depending on their specific areas of use (Scheibert et al., 2009). By involving spoof resistance and video recording capability, the coding thus help in reducing the carious capabilities and available loopholes which could be employed in infringing on the security levels of the system. Thus, the complete system is deigned to manage Iris image capture.

To complete the creation of an efficient imaging hardware, the hardware is typically inseparable to the authenticating methodology chosen. This capturing process should never take more than five seconds if efficiency and effectiveness of the system has to be achieved. Zak-Gabor based coding normally provides foe conversion of the Iris stripes into the specified Gabor transformation related coefficients (Steve et al., 2005). Therefore, filtering of the images is avoided. For increased efficiency, electronic replay is stopped thus not replay attack effect is felt (Steve et al., 2005). Not cryptographic procedures are avoided thus ensuring that less connection between the image space and code is enhanced.

For the identification purposes, a database which contained about seven hundred and twenty images is utilized to check for the strength of the created iris-recognition (BioSec, 2002). The images should have been captured with great consistency of about one hundred and eighty eyes. For every four images from a singe eye, close comparison is done to establish whether or not the Iris recognizer can fully determine any similarities or not (Kaushik and Prabir, 2008). Same eyes could be used though with different images. Failure rates are also detected in and the consequent steps of testing done to establish any similarities (Scheibert et al., 2009).

Automatic Fingerprint Identification Scanning
The usage of fingerprints in recognizing individuals within organizations has been in used for a considerably long time. People are recognized based on their natural characteristics of their fingers and other human body part which may be considered vital for the recognition purposes. Under the automatic finger print recognition system, Steve et al. (2005) believes that the system is programmed based on the users needs thus making. The various algorithms are then integrated in the relevant coding methods which allow the human person to fully communicate with the machines and make the machines to perform the tasks which the persons want (Steve et al., 2005).

Live scanning is normally utilized in the automatic scanning system. The automatic fingerprint identification system utilizes the concept of an automatic fingerprint system in detection of a given finger. A database is therefore provided in the system within which sample images of the fingerprints are stored (BioSec, 2002). Using the biometric techniques of the human body and related techniques, it becomes possible for the persons concerned to fully ensure that close comparison is done.

Registration of new finger prints is enabled through coding of systems that would enable comparison between the stored images and a fingers print (Scheibert et al., 2009). Finger print cards are designed through encoding, programming and coding of the system so as to be able to fully recognize the designed system (The Digital Library 2008). Both the tent-print card and Dead-Scan technologies could also be used in the creation of an automatic fingerprint identification scanning systems.

Various forensic AFIS issues are also put into consideration (Kaushik and Prabir, 2008). Scanners are also utilized in scanning fingerprints which are then stored in the designed database. Various algorithms are constantly employed in marking the minutia points, the deltas, and cores that exist on a print. Software development is also done in order to enable detection of features and subsequent submission of the features in the database. In some instances, fingerprint processor, through the usage of virtual memory, is utilized in the search process when carrying out the process of authenticating the fingerprint (Steve et al., 2005). For testing processes, plastic prints, latent prints, and the patent prints are normally utilized in the recognition process. Diazafluorenone, Vacuum Metal Deposition, and Ninhydrin are the common techniques utilized in the fingerprint recognition systems (Steve et al., 2005 Scheibert et al., 2009). In such automatic systems, coding and constant repetition of testing and elimination of bugs is done to ensure clarity of and efficiency of the designed system.

Efficiency and effectiveness of the Iris recognition System and Automatic Fingerprint Identification Scanning
It is still very difficult for the modern Iris recognition system to determine whether the Iris being detected is still alive or whether it is already dead. According to the BioSec study (2002), the difficulty of detecting whether or not an eye is alive is indeed a complex procedure which thus leaves the entire process to be unrealistic. The fact that most Iris recognition security devices and automatic fingerprint identification scanners are not easily affordable means that their usage is also compromised this reduces their effectiveness (Scheibert et al., 2009). In addition to that, Lisa, Krissler (2002) argues that the constant maintenance and monitoring required for use in this system also renders the systems less efficient. It is however very evident that the usage of this two technologies in a business environment greatly increases the levels of efficiency and effectiveness.

The two methods requires minimal or nor close supervision at all thus improving the efficiency and cot effectiveness of the system (Scheibert et al., 2009). Furthermore, the creation and usage of automatic fingerprint recognition system helps in the determination of validity and reliability in the systems (BioSec, 2002). The determination of the forensic fingerprint systems is also not an easy task

Conclusion
It is crucial and possible to fully conceptualize the fact that understanding of the human characteristics which include permanence, universality of the human behaviors, uniqueness of being, circumvention, collective responsibility, acceptability and the need for identification and verification. Proper planning, organization, and focus always ought to be put into consideration when deciding on the manner in which biometric scanning systems should be created (Oezcan 2003 Kaushik and Prabir, 2008). This is vital in ensuring that the human health and other related security issues are not ignored. Integrity of private information of individual persons concerned should always be fully adhered to.

0 comments:

Post a Comment