Save
...
Paper 2
Fundamentals of computer organisation and architecture
Biometric techniques
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Livi
Visit profile
Cards (10)
Biometric
A physical characteristic such as fingerprints, facial images,
irises
, and
voice
View source
Biometric scanners
Improvements in
technology
have made their use
increasingly common
Recognition
techniques have become more and more
reliable
View source
Biometric spoofing
A method of
fooling
biometric scanners
View source
Iris recognition
One of the most secure forms of authentication
The
iris
is well protected by the
cornea
View source
Fingerprints
Can be
damaged
by cuts
Easier
to
spoof
as it is fairly easy to obtain copies
View source
Uses of fingerprint recognition
Accessing
phones
and
computers
Authorising small
payments
View source
Uses of iris recognition
Major part of
airport security
systems
View source
Voice recognition
An emerging use of
biometrics
Our voices have unique characteristics such as
length
of the vocal tract, pitch, and
accent
View source
Users of voice recognition
Banks
Insurance
companies
View source
With all
biometric systems
, it is important that users opt in and consent to the
storage
and processing of their personal data
View source