Biometrics is the measurement and calculation of a person's unique physical and behavioural attributes to recognize his actual identity. Physical attributes, which can be taken in the account, are finger prints, hand geometry, handwriting, face, eye retina and voice. The use of information technology and its automation in every process have introduced security checks which are more rigorous than standard password protection. The use of biometric technology is incorporated by every organization to prevent hacking and theft of high security data by controlling access of unknown user. The use of biometric technology is common publicly and by private owned companies. Biometric technology is used to keep checks on databases by every organization. Military and other security agencies work to track for blocking access of unauthorized user on high profile data (Meenakshi, 2010)
Benefits of using Niometrics in MOD
The need of biometric technology was felt in the public domain with increasing fraud in a transaction and high rate of security breach in companies. The current terrorism situation of the world has compelled the governments and security agencies to incorporate high level security biometrics to prevent unauthorized access upon, databases, research material, training tutorials and future plans. Biometrics is further used to avoid the entrance of illegal emigrants into countries. The military incorporated biometrics in battle fields to prevent loss of war plans, technical documents for machinery, and databases of camps and information of on field officers. Military further use biometric security for their vaults and warehouses where they keep their ammunitions, licenses, files and captivated enemies (Maxion, 2010).
Leading Edge approaches used in MOD
The current leading edge approaches used in biometrics are face recognition, retina scan; finger print scan, handwriting scan, hand geometry, voice scans and iris scan. Face recognition uses basic face features of eye distance, nose gap, lip structure, face width and length. It calculates these values and forms a code which is unique for every user. It is easily applicable through digital camera and software. Retina and iris scan are the most authenticate forms of biometric technology, they require a 15 second concentration from the user, they remain unchanged throughout the life time and are unique for every user. Handwriting scan is relatively easy, it matches the new template with an existing one, and they are typically incorporated by banks for drafts and other documentation purpose. Voice scan analyses and acts upon distinctive characteristics of the human voice and are mostly environment specific and are used as door securities and computer securities. Hand geometry is a unique pattern individual for every person; it is not environment specific like voice security normally incorporated by industrial mangers. Finger print recognition is used in judicial and governmental methodology to keep individual's identity in use for government databases (Nakanishi, 2011).
The current leading biometric technologies are rule based and usually contain an existing template with which the run time sample is matched, this technology is prone to hacking as templates can be easily tampered, however in all these technologies if the run ...