Thursday, April 4, 2019
The Social Issues Of Fingerprinting Biometrics Information Technology Essay
The Social Issues Of Fingerprinting Biometrics info Technology EssayThis literature review in same manner addresses on several(prenominal) atomic consequence 18as same(p) social and intelligent issues regarding riffmark biometrics. Human factor that relates to biometric engineering science and some security issues for flickprint biometric technology.Social issuesThere argon several social issues that affect senseprint biometric technology the like misunderstanding the usage of the device of technology. disinclination is to a fault bingle of the issues relating to biometric, new drug users some clock hesitate to use new technology. credentials tutelagesNo agreement that tend to be entirely conceptive there atomic number 18 some intrusiveness in the arrangement including palpateprint technology. But implementing fingerprint biometric scheme evoke be somewhat obtain as equation to stealing and copying passwords, there is a level of security. Mainly passwords keister be broken by victimisation some software package but using fingerprints for hallmark go out be considered more secure and reliable.Privacy ConcernsThe privacy concerns stick out be leaving the fingerprints all over the place on daily basis work we do. But when a user is involved in using fingerprint technology user might worry about the privacy.Third party involvement in entropy new(prenominal) then privacy the concern for the fingerprint is that when the fingerprints are s sternned they are stored in the digital mixtureat and are stored in the database. The data store in the database can be copied or deleted. The fear for the user fingerprint publicity or privacy can be a problem.Health concernThe health concern for the fingerprint is related to the safety of fingerprint technology. While user interaction there is a grade contact between user and device sensor , user might fear of electric haze or spreading germs or might experience some kind of pain while using the device.The graph shows user uncomfortable using biometric technologyHuman FactorsGender FactorAs per sexual practice woman have slim and smaller fingers with long nails as compared to males. Due to the change the fingerprint examine device may non be able to capture a good sample or authenticate well. The shape and size differs with regards to gender.Age factorAs people age increases the fingerprint becomes transport and there is elasticity in skin. Such a problem can result with poor encyclopaedism of fingerprint and provide not be able to match with the original samples. It also varies from the sensor and hardware that is being used.Occupational factorAs some of people do labor jobs, they might potful with lifting up heavy things and working with chemical which may result in wearing of fingerprints. This might progress to problem for the fingerprint scanner to match it or capture the sample. But there are some sensors available which use the second layer of the skin to be captured.Percentage of population unable to participateSome people cannot use fingerprint scanner as it subscribe physical movement and finger to be scanned.Secondary researchDevelopment MethodologySystem maturation flavor cycleThis SDLC lay is used to spud a t fadek. The process within this personate makes veritable that all the process is cover in it. It works in the organizationatic manner if sensation stage is not completed we cannot save to other stage without completion. The manikins track the information for the development preparedness for the project, analyzing the requirements, acquireing information, somaing the transcription, implementation and scrutinySDLC is a whole set of methodologies which can be applied to software development. This includes the chaseWaterfall life cyclePrototyping verticillateRADWaterfall life cycleWaterfall method is used generally for the development of complex formations because its works according the phases and each phase withdraw to be completed onwards moving forward.In this life cycle the project get to be analyzed in some(prenominal) different ways like analysis the time and cost. Then for the next phase requirement and analysis deals with the client requirement and also the resources required by us for development of the system. In the design phase all the logical and physical designs are developed for the system and the forwarded to the next stage for implementation as and when the implementation of system is being over the test takes place because need to test the system or any kind of error or bugs. After the successful testing and integration the system need to be updated and concorded regularly and in the final stage the maintenance of the system is done.http//www.csse.monash.edu.au/jonmc/CSE2305/Topics/07.13.SWEng1/html/text.htmlThis copy is considered the experiencedest paradigm for software development. But still it remains a truly reasonable method when those requirement s are well understood. It provides a very basic template into which methods for design m coding m analyzing, testing and implementation. This method still remains a very widely used procedural stupefy for software engineering. This is a good and reliable model for development the proposed system.PrototypingPrototyping is the part of the process which helps in building the model of the system. It is included in analysis and system development. This process helps the developer to build a design for a system to know exactly how the system will work. During the requirement and analysis phase need to gather the data required for the system. Prototyping is sometimes intangible but still helps in enhancement of the project. The feedback that we receive from the users after developing the physical design of the system can help us in evaluate the response of the users to this system and then we can manipulate the system according to the requirements. Prototyping comes in many form its not merely the physical design but can be the as low as paper skeleton to any engineering design tools. Still now also some of the organization uses the paper sketch as the prototyping but some of them uses some computer aided software engineering tools to build a prototype.There are some advantages of prototypingIt reduces the time in the developmentIt reduces the development costFor the prototyping process we require user involvementHelps the developer in future enhancementsDisadvantages of prototypingMuch analysis not done in prototypingThe expectations for the users are made according to the prototypeEven developers can also be attached to the prototypeSpiralThe verticillate model is a process for software development. The spiral uses the top-down and bottom up technique. It combines both(prenominal) design phase and prototyping. This model is basically used in information technology processes. This model is the conclave of waterfall model and prototype. This model is used for large and expensive projects.Steps involved in spiralRequirements are defined in detail which also involves the interviewing the usersThe important phase in spiral model is creating preliminary design of the system which helps the users and developer to understand the system, this phase also helps in identifying the problems and solutions towards it.The prototype is constructed from the preliminary design which represents the characteristics of the systemThen evaluating the prototype in terms of weakness, strength and risks.Coming up with new requirements supply and design for second prototypeImplementing and testing the second prototypeAdvantagesEstimations are more realistic as most of the requirements are analyzed in detailsIt is easier to make changes in the systems as compared to others.DisadvantagesHighly customized change re-us expertnessApplied differently for each applicationRisk of not meeting budget or rollRisk of not meeting budget or scheduleRADRapid application deve lopment is used in the development of the project which requires minimal planning. RAD merges various structured and prototyping techniques. This development is generally used in engineering process.Advantages of the RAD methodologyThis methodology is flexible and able to adapt the changes in the project.This methodology generally incorporates short development cyclesBy using this methodology there is a reduction in overall projectRAD involves user participation thereby increasing chances of early user community acceptance.Disadvantages of RAD methodologyNo planned cost and time sometimes it can pass the limit.Chances of errors are very high.Secondary ResearchProgramming LanguagesASP.NetASP.Net is the product of Microsoft. It is the extended version of active emcee pages which helps in the meshwork development model that includes basic services required for the developer to develop the web applications.It can support various languages like VB, C++, C, J Jscript. Net frame work does not only limit itself to any one language which is the good about it. It works on the windows surroundings and also support to the web pagesWeb ServicesWeb services means that we can run the applications having different web pages on different servers. We do not require combining all the pages into one server and then run the application. ASP.Net is a great future of web services. ASP.Net also supports the XML which is part of the web development.JavaIt is a programming language used to develop the applications .it is the product sun Microsystems. It is easier to write and develop application using this language as compared to other languages. The limitation of this language is that it limits the developer to use only one language that is java. This language also contains the API through which we can develop the applications more easily and faster. It is platform self-sufficient the programs use java virtual machines for the abstraction and do not accession the operating sy stem directly.PHP defense of the programming language chosenSecondary Research sooner starting any project we need to analyze the resources required for the system and need to have a feasibility study for the system that we are going to develop. It is very important to have a deep knowledge about the system and gather more and more information regarding the system. As there are many book available in library and some online resources also accessible to fetch the information. Internet is being widely used these geezerhood for searching any type of topic you are looking for but we need to be very careful while referring to meshwork as it may also come up with some scathe information which can cause problem in our system development. While selecting the source information from the internet developer need to be careful about from which website or article is being data taken, make sure that data is authenticated and is verified. The developer can refer to journals, papers and universi ty website because they are very reliable to use.Review on similar systemsThere are lots of products available in the market using bio metric technology. Before starting up the project developer need to find out the similar systems that have being already developed and need to review on the similar products. All this need to be done so that developer can get clear idea about the feasibility of the system that is going to be developed. I have done the analysis on the similar systems which are available in the market.As my system is for web certificate using finger print technology which is not been developed yet in the market but there are systems that are using fingerprint technology for the documentations. I will be focusing on such systems that will be using the biometric technology for authenticating genuine user.Overview lonely(prenominal) wolf software, Inc was founded in 1991 which has evolved small computer resources to custom software with a client which includes most of t he fact 500 companies. Since the ships company have been developing systems of no hardly time and attendance but also for the patient disease charge software, shipping software, trucking management software and much more.The Juno uses the best finger print technology which highly rated in time attendance management system. It brings the manual work to mechanization and faster than before like it is used in automated time and attendance terminal.It is easy to maintain and use, need not require much training procedures before using this device. It allows the user to clock in and out with just a touch of a finger. Its not only used for clock in and out but user can also view the previous records and other information like departments, projects working etcFor the audio assistance and verbal conformation speakers are attached on the board. This product also comes with the internal bell system which uses the internal speakers for a beep like common start, break time and end time. This product is capable for holding more than 1,500 templates and 30,000 transactions which makes it the perfect for any size of the company. basis for developing such systemThis system is fast replacing the traditional attendance registers. Huge number of employees works under one company and its very difficult to maintain each employee daily records manually like (attendance, time in and time out). Manually it takes so much time for the employees to mark the records. The old traditional system was not easy to maintain and was also so much time consumptions, generating a report manually can take so much time using manual attendance system. Reasons for developing or using these types of systems are mentioned belowSecurity These systems are considered to be most secure attendance and management system in the market. With the increase in security, your employees need to punch there finger on the sensor to enter the company and mark attendance, by this elimination of hedge entry and a red uction of time theft. Moreover reduce the labour cost and saves lots of money.Accuracy With increase in security this system also provides increase in accuracy. Besides from time theft, calculating mistakes cost can be reduced easily. The automation of report generating will be accurate. You will be able to manage attendance, breaks, vacations holiday hours etc everything will be recorded correctly and fairly.Easy to Use automate attendance and management system are easy to use and implement. Employees can just log their attendance easily just with a touch of the finger and managers can.ConclusionThis system is similar with my system as per the technology perspective, because my system is also using biometric fingerprint technology, but my system is mainly based on the web authentication system. The backend working for the system above and my system will be similar as in my system developer will be also storing the fingerprints for the users that are going to use the system.Domai n ResearchIntroductionBiometric authentication is one of the technical improvements in information technology and looks set to change the way of majority of people. Security is now days becoming an issue and need for genuine authentication has become very important. individualized use of biometric systems in authentication now days being a response for issue of authentication and security. Mostly finger print recognition is used for authentication. This paper is organized as follows by now, the contributor should be already familiar with the content of section one which consisted for the current problem faced by the internet users and need for the system followed by the study of objective , level of challenge and project planning , section two consists of literature review followed by domain and technical research .Section three will illustrate how primary research (questionnaire and the survey)and investigation was done and which methodological choices were made.Biometrics is def ined as manneral uniqueness that can be use to verify to identify an individual, which can include fingerprint verification, retinene scanning, face recognition, iris, and signature verification. Biometric authentication is automatic identification of an individual using either a biological feature they possess physiological characteristic like a fingerprint or something they do behavior characteristic like can be fingerprint, iris , face etc The process of recognition and authentication is the ability to verify the genuine user.The identification is by using any one of it or combination of the following three traditional identification techniquesSomething you possess Its mainly referred as token and it ca produced by quaternate physical objects. The tokens are basically divided into two typesManually tokens It refers to identification process in form of human intervention , means a person will make a decision for deciding whether the identify is approved or not E.g. On airport s the authentication is done manually by verify passports , now the airport of immigration authority takes decision regarding the traveler authentication is verified or not.Automated tokens These token does not involve human intervention for identification. E.g. verification system like smart separate and magnetic strip cardsSomething you know This refers about knowledge you possess but its a secluded . Example of regular use of secrets is personal identification number (PIN), passwords etcSomething you are It refers to more of their biological features. E.g. authentication using fingerprint, face or iris etcThe following comparison between identification techniquesTokensCan be fake and can be used without knowing to original holders. E.g. Someone can steal an identicalness and create a new fake ID using any others personal information.It can be stolen, befuddled or given to someone for usage.PasswordsCan be cracked or obtained using hacking techniques or tools like password cr acking.Can be told. If the password is told to a person they can get into your account and can misuse your personal information.It can be forgotten which can cause problem for an organization you are working for E.g. you are working in a organization you need to gain access to company email account urgently, forgetting password can cause you in trouble that time.BiometricsCannot be fakeCan be crackedDealing with accuracy sometimes causes problem in biometric device like having a cut on finger, burn or excessive rubbing on hard jump can bring damage to your finger then it might not be possible that you can be authenticated by biometric system that time.Table 1 Tokens vs. Passwords. Vs. BiometricComparison between each biometric methodologyMethodsStrengthWeaknessSuitable applicationsFinger printStable over time uniqueness involve to training user oppositenessWorkstation access guarantee , ATM , airline tickets , physical access manoeuvre , information system controlFaceUniversally presentCultural and religious issuesphysical access controlIrisStable over time uniquenessNeeds to training user resistanceATM , airline tickets , physical access controlRetinaStable over time uniqueness subdued read time user resistancephysical access control , information system controlHand geometryLow failure to enroll small templateSize of device childish finger growthphysical access control , information system control, time attendanceVoice slight training excellent user acceptanceChanges and unstable over timeMobile phone banking traceHigh user acceptance less trainingEnrollment tasks long and unstable over timePortable device stylus inputTechnical requirements
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment