GET THE APP

Biometrics and Biometric Database Systems
..

Journal of Biometrics & Biostatistics

ISSN: 2155-6180

Open Access

Brief Report - (2022) Volume 13, Issue 2

Biometrics and Biometric Database Systems

Siddiqui Farman*
*Correspondence: Siddiqui Farman, Department of Entomology, Pennsylvania State University, Pennsylvania, USA, Email:
Department of Entomology, Pennsylvania State University, Pennsylvania, USA

Received: 01-Feb-2022, Manuscript No. jbmbs -22-64665; Editor assigned: 03-Feb-2022, Pre QC No. P-64665; Reviewed: 17-Feb-2022, QC No. Q-64665; Revised: 22-Feb-2022, Manuscript No. R-64665; Published: 28-Feb-2022 , DOI: 10.37421/2155-6180.2022.13.95
Citation: Farman, Siddiqui. “Biometrics and Biometric Database Systems.” J Biom Biostat 13 (2022): 95.
Copyright: © 2022 Farman S. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Introduction

The historical development of biometric databases in the European Union (EU) and how these advancements reshape concepts of boundaries within this region of the world and at its peripheries. This lays the groundwork for understanding how the confluence of biometrical technologies and digitization has reshaped how we think about people's mobility, how surveillance modes connect to human rights and ethical dilemmas, how regulation is applied, and how borders have shifted. the development of a variety of biometric technologies and database systems, as well as their application in migration control and police enforcement It specifically refers to the growing usage of DNA technologies, as well as other biometric technologies like fingerprinting and facial recognition, at border crossings. The context for why the Prüm system, a decentralised database system designed to facilitate the mandatory exchange of forensic DNA data among Member States to control criminality and terrorism, is relevant to the concept of bioborders is provided by an overview of the uses of biometric technologies in migration control and law enforcement [1,2].

Websites, cellphones, safes, automobiles, houses, buildings, banks, and airports are just a few of the conveniences in our society that rely on identity or authentication systems to protect and guard ourselves, our information, or our possessions. Traditional systems relying on extrinsic things or knowledge, like as cards, keys, or passwords, are still used by many. Researchers have worked in recent decades on avoiding the difficulties that traditional systems have: they can be lost, stolen, discovered, or replicated. Biometrics are an excellent way to attain that goal because they focus on a person's intrinsic features, requiring their physical presence, and reducing the chances of impostors succeeding [3].

About the Study

Medical biometrics, a new set of biometric features, has gained traction. When compared to other biometric traits, the Electrocardiogram (ECG) has proven to be the most promising, excelling in most of the characteristics that characterize a biometric trait's quality. Its nature makes it difficult to capture and insert into the system for spoofing purposes, and the biometric system's inherent liveness detection assures that it is not compromised. Furthermore, because of its unidimensional nature, it is a more computationally efficient alternative to image or video-based systems, particularly for continuous recognition systems that rely on quick judgements. Researchers have lately begun to investigate several deep learning approaches, which provide major advances in robustness while simultaneously posing new data availability difficulties [4].

The ECG is a physiological signal created by the contraction and recovery of the heart. It is more than a trending biometric attribute. We will cover the electrocardiogram's inter-subject and intra-subject variability aspects, how they relate to each person's anatomy, and how they may be useful or prejudicial for biometric recognition in this part, from generation to acquisition. When working with ECG signals for biometric recognition or autonomous diagnosis of medical heart problems, several researchers choose private data acquisition. Researchers became more conscious of the relevance of public signal collections as the demand for more full datasets grew, with more individuals, including medical problems, on more sessions, distributed across longer time frames, and under diverse posture and activity settings [5].

Future Perspective

Biometrics is widely used to provide answers to a variety of problems, including character verification. Biometrics is envisioned as an equipment for boosting incorporation and as a tool for repairing a destroyed state foundation when it comes to public ID initiatives in agricultural countries. There is a lot of debate among European border executives about how new developments, such as biometrics, can speed up line entry while also making it safer. Biometrics, they believe, will allow for certain identification. This assurance is based on the assumption that the individual biometric features used are unchanging, unalienable, and unique, as opposed to tokens, cards, passwords, pins, or reports, which can be lost, copied, manufactured, shared, and so on. However, actual responses to these new methods have been made by basic freedoms activists, information security specialists, and social researchers in response to this increased reliance on and faith in biometrics for determining personality.

References

  1. Kaur, Gagandeep, Gurpreet Singh, and Vineet Kumar. “A review on biometric recognition.” Int J Bio-Sci Bio-Technol 6(2014):69-76.
  2. Google Scholar, Crossref, Indexed at

  3. Shen, Tsu-Wang David, Willis J. Tompkins, and Yu Hen Hu. “Implementation of a one-lead ECG human identification system on a normal population.” J Eng Comput Innov 2(2011):12-21.
  4. Google Scholar, Crossref, Indexed at

  5. Chi, Yu Mike, Tzyy-Ping Jung, and Gert Cauwenberghs. “Dry-contact and noncon-tact biopotential electrodes: Methodological review.” IEEE Rev Biomed Eng 3(2010):106-119.
  6. Google Scholar, Crossref, Indexed at

  7. Bullée, Jan-Willem H., Lorena Montoya, Wolter Pieters, and Marianne Junger, et al. “The persuasion and security awareness experiment: Reducing the success of social engineering attacks.J Exp Criminol 11(2015):97-115.
  8. Google Scholar, Crossref, Indexed at

  9. Jia, Lingyao, Xueyu Shi, Qiule Sun, and Xingqiang Tang, et al. “Second-order convolutional networks for iris recognition.Appl Intell 115(2022):1573-7497.
  10. Google Scholar, Crossref, Indexed at

Google Scholar citation report
Citations: 3254

Journal of Biometrics & Biostatistics received 3254 citations as per Google Scholar report

Journal of Biometrics & Biostatistics peer review process verified at publons

Indexed In

arrow_upward arrow_upward