Word limit: 1500 to 1800 words Students are expected to research and discuss and submit the report in this format: 1. Cover page 2. Table of contents 3. Biometric Systems (5Marks) a) Fingerprint •...

1 answer below »


Word limit: 1500 to 1800 words


Students are expected to research and discuss and submit the report in this format:


1. Cover page


2. Table of contents


3. Biometric Systems (5Marks)


a) Fingerprint
• Define Fingerprint
• Techniques and technologies used for fingerprint
• Advantages of fingerprint
• Disadvantages of fingerprint
• Example application


b) Hand Geometry
• Define Hand Geometry
• Techniques and technologies used for hand geometry
• Advantages of hand geometry
• Disadvantages of hand geometry
• Example application


c) Iris Recognition
• Define Iris Recognition
• Techniques and technologies used for Iris Recognition
• Advantages of Iris Recognition
• Disadvantages of Iris Recognition
• Example application


4. Privacy Enhancing Technologies used on the internet (5Marks)
• Introduction on PET used on the internet
• Research and discuss 3 PET’s used on the internet
• Example to illustrate your answer


5. Wireless Sensor networks (5Marks)
• Introduction on Wireless sensor networks
• Research and discuss 3 types of Threats and Vulnerabilities which attacks WSN
• Recommendations to reduce the threat and vulnerabilities


6. References


The word document should be saved in the following format:


Studentid_studentname_assessment 2.doc.
Example: 1234567_student name_assessment 2.doc


The final document has to be submitted via Blackboard on or before the due date. i.e., 26-Aug-2018 by 11.59


To follow:


• Header includes Subject code, subject name, semester number
• Footer includes Student id, student name, page number
• Font- Times New Roman – size 12
• Heading font – Times New Roman – size 14
• Include pictures, images if required with references.
• Referencing list should be alphabetically ordered with APA referencing style.
Answered Same DayAug 25, 2020ITC596Charles Sturt University

Answer To: Word limit: 1500 to 1800 words Students are expected to research and discuss and submit the report...

Soumi answered on Aug 25 2020
156 Votes
Running Head: BIOMETRIC SYSTEMS        1
BIOMETRIC SYSTEMS         2
COMPUTER SCIENCE: BIOMETRIC SYSTEMS
Table of Contents
Biometric Systems    3
a) Fingerprint    3
b) Hand Geometry    3
c) Iris Recognition    4
Privacy Enhancing Technologies used on the Internet    4
Communication anonymiser    5
Use of bogus account    5
Obfuscation    6
Wireless Sensor Networks    6
WSN    6
Threats and Vulnerability of WSN    7
Recomm
endations for reducing the Threat and Vulnerabilities of WSN    8
References    9
Biometric Systems
a) Fingerprint
The literal sense of the term, ‘fingerprint’ refers to the impression created on a surface by the microbial ridges of human skin on the tip of each finger. At time of collecting the fingerprint from a surface, as described by Kadane (2018), there are two major three of methods used -using fingerprint powder and using 3d moulds and using photographic details. It is evident that only one in 64billion people can have a same fingerprint pattern. As assessed by Morgan et al. (2018), fingerprint of two persons are more different than their DNAs; a twin can have similar DNA patterns, but can never have same fingerprints. Considering the uniqueness of fingerprints, it is used for effective security and personalised access, which is a very big advantage of using fingerprints in biometric technologies. One of the major problems of using fingerprint is the fact that fingerprints change over time and a lack of keeping track of that change lead to false rejection and identity crisis. As seen in the case of biometric fingerprint scanner, where the fingerprint impression have been saved in the database, would not give access to a person who has recently had a wound on the top of his or her finger.
b) Hand Geometry
    Considering the fact that every human being has a different type of hand structure, a visual map of the hand is stored in data in a three-dimensional pattern. The use of the stored three-dimensional data of the hand is known as hand geometry. As stated by Murshed, Krishna, Alqubati and Ali (2018), hand geometry biometrics method uses the shape of the palm, its size, the ratio of the length of the fingers, their shape, width and length coupled with the distance between the knuckles. One of the major advantages of hand geometry is the fact that it is cheap in comparison to fingerprint or Irish scanning systems. However, the hand geometry biometric is not idea for high security and very personal data access control, as there remains a significantly higher chance of another person getting access to important and confidential data. Hand geometry is often used for access to school or college online liberty to ensure that the library is not accessed by false ID.     
c) Iris Recognition
    The ring shaped region around the pupil, in a similar fashion to that of fingerprint and hand geometry is moderately unique for each person, and considering the image matching technology of that unique pattern access is offered to individuals; this whole process is known as Iris recognition. As noted by Nguyen, Pham, Lee and Park (2018), Iris recognition is done through the use of high resolution pictures taken by an image sensor which is placed as a distance of infrared wavelength. In many ways, Iris recognition is safer that fingerprint recognition, as the mechanism of fingerprint recognition can be fooled if a person’s fingerprint is taken forcefully or unethically. In terms of disadvantages it can be seen that Iris scanners does not perform well in lights that has reflection all around and it also hampers the human pupil as it continuously use infrared light blinks. As seen in research labs, Iris Scanners are used for recognition as the hands of persons are often covered in gloves for safety.
Privacy Enhancing Technologies used on the Internet
    The situation becomes ironical when the user data which is used for identification purpose and safety on internet is used against the users themselves. As defined by...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here