{"id":144,"date":"2018-05-24T11:18:24","date_gmt":"2018-05-24T10:18:24","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itinnovation\/?p=144"},"modified":"2018-05-24T11:20:33","modified_gmt":"2018-05-24T10:20:33","slug":"biometric-authentication-overview-and-experiments","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itinnovation\/2018\/05\/24\/biometric-authentication-overview-and-experiments\/","title":{"rendered":"Biometric authentication &#8211; Overview and Experiments"},"content":{"rendered":"<p>From the casual users of the home computer to the business, corporations and government, there is a great concern about the security of files, systems, and the ability of technology to protect us from unauthorized access. Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and classified information. This is where the biometric technology is getting widely adopted. In recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. By using biometrics, authentication is directly linked to the person, rather than their token or password.<\/p>\n<p>Biometric authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. Biometric samples include fingerprints, retinal scans, face recognition, voice prints and even typing patterns. In this article, we will discuss the concept of biometric authentication, the different types of biometric authentication, compare their pros and cons and the technology current maturity level. Finally, we will conclude our paper with findings and recommendations on how biometric authentication could be used in the university.<\/p>\n<p><a href=\"https:\/\/intranet.birmingham.ac.uk\/it\/innovation\/documents\/public\/Experiments\/Biometric-Authentication-Overview.pdf\" target=\"_blank\" rel=\"noopener\">Read the full report<\/a><\/p>\n<p>IT Innovation Centre also conducted the experiments of developing\u00a0 a fingerprint based\u00a0security and access tracking system, also a\u00a0face detection and\u00a0recognition prototype and give insight on how feasible it is to use the technology in\u00a0a university environment.<\/p>\n<p><a href=\"https:\/\/intranet.birmingham.ac.uk\/it\/innovation\/documents\/public\/Experiments\/Fingerprint-Security-and-Access-Tracking-System.pdf\" target=\"_blank\" rel=\"noopener\">Read the full\u00a0 report of &#8220;Fingerprint security and access tracking system&#8221;<\/a><\/p>\n<p><a href=\"https:\/\/intranet.birmingham.ac.uk\/it\/innovation\/documents\/public\/Experiments\/Face-Detection-Recognition-Report.pdf\" target=\"_blank\" rel=\"noopener\">Read the full report of &#8220;Face detection and recognition prototype&#8221;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the casual users of the home computer to the business, corporations and government, there is a great concern about the security of files, systems, and the ability of technology to protect us from unauthorized access. Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itinnovation\/2018\/05\/24\/biometric-authentication-overview-and-experiments\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Biometric authentication &#8211; Overview and Experiments&#8221;<\/span><\/a><\/p>\n","protected":false},"author":96,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,6],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-biometric-authentication","category-projects"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":4,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/144\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}