Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Biometrics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Metrics related to human characteristics}} {{Hatnote group| {{For|the academic journal|Biometrics (journal){{!}}''Biometrics'' (journal)}} {{Distinguish|Biostatistics{{!}}Biometry}} }} {{Use dmy dates|date=June 2020}} '''Biometrics''' are body measurements and calculations related to human characteristics and features. Biometric [[authentication]] (or realistic authentication) is used in [[computer science]] as a form of identification and access control. It is also used to identify individuals in groups that are under [[surveillance]].<ref>{{Cite journal |last1=Blanco-Gonzalo |first1=Ramon |last2=Lunerti |first2=Chiara |last3=Sanchez-Reillo |first3=Raul |last4=Guest |first4=Richard Michael |date=2018-03-22 |title=Biometrics: Accessibility challenge or opportunity? |journal=PLOS ONE |language=en |volume=13 |issue=3 |pages=e0194111 |doi=10.1371/journal.pone.0194111 |doi-access=free |issn=1932-6203 |pmc=5864003 |pmid=29565989|bibcode=2018PLoSO..1394111B }}</ref> Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to [[fingerprint]],<ref>{{Cite journal |last1=Cao |first1=Liling |last2=Ge |first2=Wancheng |date=2015-03-10 |title=Analysis and improvement of a multi-factor biometric authentication scheme: Analysis and improvement of a MFBA scheme |url=https://onlinelibrary.wiley.com/doi/10.1002/sec.1010 |journal=Security and Communication Networks |language=en |volume=01 |issue=4 |pages=617β625 |doi=10.1002/sec.1010|url-access=subscription }}</ref> palm veins, [[Facial recognition system|face recognition]], [[DNA]], [[palm print]], [[hand geometry]], [[iris recognition]], [[Retinal scan|retina]], odor/scent, voice, shape of ears and gait. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to [[mouse tracking|mouse movement]],<ref>{{Cite web|last=Villas-Boas|first=Antonio|title=Passwords are incredibly insecure, so websites and apps are quietly tracking your mouse movements and smartphone swipes without you knowing to make sure it's really you |quote=Passwords are incredibly insecure, so websites and apps are quietly tracking your mouse movements and Android swipes without you knowing to make sure it's really you|url=https://www.businessinsider.com/websites-apps-track-mouse-movements-screen-swipes-security-behavioral-biometrics-2019-7|access-date=2021-11-22|website=Business Insider|language=en-US}}</ref> [[Keystroke dynamics|typing rhythm]], [[gait analysis|gait]], [[Signature recognition|signature]], [[Speaker recognition|voice]], and behavioral profiling. Some researchers have coined the term '''behaviometrics''' (behavioral biometrics) to describe the latter class of biometrics.<ref>{{Cite journal|last1=Alzubaidi|first1=Abdulaziz|last2=Kalita|first2=Jugal|date=2016|title=Authentication of Smartphone Users Using Behavioral Biometrics|url=http://dx.doi.org/10.1109/comst.2016.2537748|journal=IEEE Communications Surveys & Tutorials|volume=18|issue=3|pages=1998β2026|doi=10.1109/comst.2016.2537748|issn=1553-877X|arxiv=1911.04104|s2cid=8443300}}</ref><ref>{{Cite journal |last1=Yang |first1=Wencheng |last2=Wang |first2=Song |last3=Sahri |first3=Nor Masri |last4=Karie |first4=Nickson M. |last5=Ahmed |first5=Mohiuddin |last6=Valli |first6=Craig |date=2021-09-14 |title=Biometrics for Internet-of-Things Security: A Review |journal=Sensors |volume=21 |issue=18 |pages=6163 |doi=10.3390/s21186163 |doi-access=free |issn=1424-8220 |pmc=8472874 |pmid=34577370|bibcode=2021Senso..21.6163Y }}</ref> More traditional means of access control include [[Security token|token-based identification systems]], such as a driver's [[license]] or [[passport]], and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)