Test Solution

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

TEST ANSWERS

1. (a) (4marks)

The term "biometrics" is derived from the Greek words bio (life) and metric (to
measure). Biometrics refers to technologies for measuring and analyzing a person's
physiological or behavioural characteristics. These characteristics are unique to
individuals hence can be used to verify or identify a person

There are many physical features that can be used as biometric identifiers. These
include, most commonly, human physiology, such as patterns of the skin, aspects of the
eyes, shape of the hands or blood vessel networks; facial appearance, taking account of
the distance between the eyes, nose or mouth, or the general shape of the face.
Behavioural traits, such as gait or voice characteristics; and bio dynamics, such as the
pressure, pattern and speed of keystroke typing.

(b) There are three main ways in which biometrics are used: (6marks)

 The first is one-to-many searching which involves a biometric profile being


compared with a database of profiles to identify the individual through a direct or
partial match, resulting in a computer-generated likelihood that any two profiles
are from the same individual. This approach is generally used by police,
intelligence agencies or in a criminal investigation when a DNA profile is obtained
from a crime scene and the police seek to identify an unknown individual.
 The second approach is one-to-one verification of identity, which seeks to
determine whether an individual is who they claim to be. In this case, a live
profile is provided by the individual and compared with a template stored in the
computer system or identification document, such as a passport or license. This
is increasingly being used in providing an individual with physical access to a
building or computer network, or to transit through international borders.
 The third approach many-to-many identification in which biometrics can be used
to identify individuals on a watch-list from other random individuals or crowd, for
example, by screening CCTV footage using facial recognition technology.
2. (a) (5marks)

Fingerprints are composed of a series of ridges and valleys in the skin on the surface of
the fingertip that form a unique pattern. Fingerprint patterns are described by three key
features, arches, loops and whorls: one of each is present in every finger-print. The
centre of a pattern is described as the core and points of discontinuity in the fingerprint
ridges are known as minutiae. Fingerprint identification compares the unique
combination of the patterns of ridges and valleys. Fingertips are placed against an
optical scanner and a laser illuminates the fingerprint and converts the image into a
digital format. An algorithm filters out distortions and enhances the definition of the
ridges in the image.

Minutiae uses the ridge endings and junctions on a person’s finger to plot points known
as Minutiae. The number and locations of the minutiae vary from finger to finger in any
particular person, and from person to person for any particular finger.

(b) (5marks)

1. Optical Sensors

– Optic reflexive
– Optic Transmissive
– Fiber Optic Plate

2. Capacitative/semiconductor Sensors

– Static Capacitative I, II
– Dynamic Capacitative

Pros / Cons

• Semiconductor (capacitative) sensors are considered to be Low Cost. (but some are
prone to ESD (Eletro-Static Discharge) problems over long term use.
• Optical Sensors are considered to have a high degree of stability and reliability. (No
ESD problems), however are larger in size!

3. (a) (6marks)

Keystroke dynamic recognition enables authentication via the identification of individual


typing characteristics and patterns, including key press durations. Like other forms of
behavioural biometrics, keystroke dynamics are generally considered less reliable than
physiological biometrics due to the variability of this type of human behaviour.

The rhythms with which one types at a keyboard are sufficiently distinctive to form the
basis of the biometric technology known as keystroke dynamics. It is 100% software-
based, requiring no sensor more sophisticated than a home computer.

At the enrolment stage of keystroke dynamic recognition, individual typing


characteristics are extracted to create a digital typing signature. At enrolment the user
is typically asked to repeatedly enter their details to extract the typing profile. These
characteristics are used to develop a profile of an individual user that forms a reference
for future verification.

(b) Advantages: (4marks)

1. providing stronger authentication, identity confirmation, user identification and


tracking over the Internet.

2. Keystroke dynamics as new forms of biometric identification enhance computer


security by adding an additional layer of authentication in addition to passwords.

You might also like