Article guidelines (Important):


Feb 23, 2014 (7 years and 4 months ago)


Article guidelines


Make sure that you use your own creativity in writing the article as the research
provided is just a guideline for you to frame the article.

Make sure to include all the sub
headers given in the research notes as they
important part of the article format.

Include top image relevant to the topic of 250


(whichever mentioned in the
research notes)

Resize the images

provided under each utility

to 550


(whichever mentioned in the resear
ch notes)

and include in the article.

Include relevant tags for the story.

Make doubly sure to include the links and images in the story provided at the relevant
places in the article text.

In case the article is written referring to a single blog only

then make sure to give the
credit by providing the inline text link in the beginning paragraph or giving Via: [Followed
by the blog/website from where the article is written] and linking the URL.



What is it?


Existing biometric technologies


Advantages of Biometrics


c technology that can be hacked


Research notes:

Article header:
Biometric technologies

are they safe?



(resize to 250 width and upload)

Image Link:




Image Source Link:

Biometrics technology overview

Biometrics consists of methods for uniquely recognizing humans based upon one or more
intrinsic physical or behavioral traits.
In computer science, in particular, biometrics is used
as a form of identity access management and access control. It is also use
d to identify
individuals in groups that are under surveillance.

Biometrics has fast emerged as a promising technology for authentication and has already
found place in most hi
tech security areas.

It is becoming widely used within the government, nuclear

power plants, hospitals, airports,
the workplace, and even schools. Its use is controversial but its benefits are undeniable.
Biometrics helps protect sensitive data, ensure login identity, and prevent criminal activity.

It is this specific aspect of the
technology that we would like to focus on.

Existing biometric technologies

Biometric characteristics can be divided in two main classes:


Physiological are related to the shape of the body. Examples include, but are not limited to
fingerprint, face
recognition, DNA, Palm print, hand geometry, iris recognition, which has
largely replaced retina, and odour/scent.


Behavioral are related to the behavior of a person. Examples include, but are not limited to
typing rhythm, gait, and voice. Some researchers
[1] have coined the term behaviometrics
for this class of biometrics.

Advantages of Biometrics

Increase security

Provide a convenient and low
cost additional tier of security.

Reduce fraud by employing hard
forge technologies and materials. For

e the
opportunity for

ID fraud, buddy

Eliminate problems caused by lost IDs or forgotten passwords by using physiological
attributes. For e.g. Prevent

use of lost, stolen or "borrowed" ID cards.

Reduce password administration costs.

Replace hard
remember passwords which may be shared or observed.

Integrate a wide range of biometric solutions and technologies, customer applications and
databases into a robust and

scalable control solution
for facility and network access

Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!

Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time &

Unequivocally link an individual to a transact
ion or event.

Biometric technology that can

We know that

is widely in

use in

these days

and also used by the many
common electronic gadgets like;
laptop, mobile phones and guns also. The next popular
biometric technology is
, but main problem with these that they are not as
reliable as we think so, they can be hacked



Fingerprint recognition hack:

Today biometric systems ar
e becoming mainstream. They can be found everywhere. In mobile
phones, computers, entrance systems even in ATMs. Because of the low costs, small sizes and the
alleged maturity mostly fingerprint sensors are used.

But contrary to the assurance of the
cturers they are still very easy to hack.

Here are the videos that shows, how easily it can be
hack by anyone.

Video Link:

(embed the video code
in 550 width)


Face recognition hack:

Face recognition system scans the face of the person and use its captured image as his
password for the next time.
Face recognition systems are also widely in use. But this system
is not safe to use it as password.
The researchers cracked the biometric aut
embedded in Lenovo, Asus, and Toshiba laptops by spoofing the biometric systems with everything
from a photo of the authorized user to brute
force hacking using fake facial images.

Here is the
video that demonstrates that how easy it is to hac
k with the use of the sca
ned image, photograp
and other electronic devices
like mobile phone

and other which can take photo as well display it on
the device

Video Link:

(embed the video code in 550 width)


oice recognition hack:

It is very easy

and simple

to hack by anyone
, as one can record other person’s

voice (pitch)
using voice recording devi
es and play it at the same volu

Biometric technologies

that are safe till the day


ris & retinal

or recognition

Iris recognition technology is used to identify individuals by photographing the iris of their
eye. It falls under a category of technology known as
based authentication, also
called biometric security. Iris recognition technology has become popular in security
applications because of its ease of use, accuracy, and safety. Its most common use is
controlling access to high
security areas.


recognition technology offers the highest accuracy in identifying individuals of any
method available. This is because no two irises are alike

not between identical twins, or
even between the left and right eye of the same person. Irises are also stable
; unlike other
identifying characteristics that can change with age, the pattern of one's iris is fully formed
by ten months of age and remains the same for the duration of their lifetime. Iris
recognition technology is also accurate because it uses more t
han 240 points of reference in
an iris pattern as a basis for a match. By comparison, fingerprints use about 60.


DNA Identification System


(Deoxyribonucleic acid)

Identification System does have its benefits, as it would
help in the medical department. If you were rushed to hospital from a car accident and you
are unconscious the doctor will know if you were allergic to the anaesthetic or if you were a
private pati
ent or not. This would also help in the crime department

DNA identification can be quite effective if used intelligently. Portions of the DNA sequence
that vary the most among humans must be used; also, portions must be large enough to
overcome the fact t
hat human mating is not absolutely random.

From Paul Saffo, "DNA is the gold standard of biometrics, but even DNA starts to look like
fool's gold under close inspection. With a bit of discipline, one can keep a card safe or a PIN
secret, but if your DNA be
comes your identity, you are sharing your secret with the world
every time you sneeze or touch something."