Tomorrow: Biometrics to Come?

November 2006
Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p22
Trade Publication
The article presents several biometrics identification concerning the revelation of the biological flaws of the person. DNA identification is the most precise system of identifcation, and is widely accepted as absolutely accurate. However, vein pattern identification technology is like a retinal scan that uses light to produce an image of one's vein pattern in their face and hand. On the other hand, ear shape identification technology measures the geometry of the ear.


Related Articles

  • Changes in patterns in the eye cast doubt on biometric scans. Graham-Rowe, Duncan // New Scientist;7/31/2010, Vol. 207 Issue 2771, p22 

    The article discusses research by Kevin Bowyer and colleagues at the University of Notre Dame in Indiana that suggests the Hamming distance, which is a measurement of the degree of difference between any two scans, increases over time for biometric scans of the same eye.

  • How Biometrics Work. Angelo, Jean Marie // University Business;Aug2004, Vol. 7 Issue 8, p55 

    Features various biometrics technologies that can be used by universities and colleges for their security systems. Fingerprint identification; Hand recognition; Retinal and iris recognition; Vocal recognition.

  • An Introduction to Biometrics. Das, Ravi // Military Technology;Jul2005, Vol. 29 Issue 7, p20 

    Discusses biometrics technology that are being used as security solutions. Hardware and software components of biometric system; DNA identification; Fingertip recognition; Facial recognition; Iris/retinal recognition; Hand geometry recognition; Voice recognition; Signature recognition.

  • AN OVERVIEW OF BIOMETRICS. Ashok, Jammi; Shivashankar, Vaka; Mudiraj, P. V. G. S. // International Journal on Computer Science & Engineering;2010, p2402 

    The term biometrics is derived from the Greek words bio meaning "life" and metrics meaning " to measure" . Biometrics refers to the identification or verification of a person based on his/her physiological and/or behavioral characteristics. Several verification/identification based biometrics...

  • A Comparative Study of Biometric Technologies with Reference to Human Interface.  // International Journal of Computer Applications;Jan2011, Vol. 14, p10 

    The article presents a study regarding biometric technologies to human interface. It says that biometrics offer several advantages including person's biometric traits are cannot be lost, it has unique traits that are difficult to copy, and biometrics requires the presence of the person to be...

  • The Questionable Effect of Retinal Variables on Information Displays: Implications for Problem Solving and Learning. Kealy, William A.; Subramaniam, Chitra // Journal of Visual Literacy;Spring2005, Vol. 25 Issue 1, p1 

    This study challenged the long-held assumption that the ‘retinal variable,’ such as color or shape, used to represent data on an information display influences how well it is interpreted and understood. Forty-eight undergraduates solved problem scenarios by consulting a multivariate...

  • Retinal scan posed as answer to tracking. Buss, Jessica // Farmers Weekly;3/5/2004, Vol. 140 Issue 10, p40 

    Focuses on the use of retinal scanning in tracing livestock. Comment from doctor Bruce Golden of Optibrand on retinal scanning; Details of how the system works; Advantages of retinal scanning.

  • How Rich Stevens Used iBooks Author to Build a 3300-Page Webcomic Ebook. CALDWELL, SERENITY // Macworld;Jun2014, Vol. 31 Issue 6, p84 

    An interview with cartoonist Rich Stevens is presented. He talks about his first Mackintosh (Mac) personal computer and his current 2012 15-inch Retina MacBook Pro portable computer as of June 2014. He cites the reason why he made an electronic book (ebook) that features his 3,000 comics. He...

  • ENTERPRISES HAVE SMART-PHONE BIOMETRIC OPTIONS. Jacobs, David // Information Security;Dec2012, Vol. 14 Issue 10, p30 

    The article reports on the biometric authentication technologies used by enterprises to protect critical data on smartphones and tablet devices and the trend toward bring your own device (BYOD). It discusses the importance of authenticating users of smartphones and mobile device users....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics