SlideShare une entreprise Scribd logo
1  sur  19
Introduction

• Identifying individuals
• Using unique physical attributes
• Keeping valuables secure
Introduction

• The benefits in businesses
• Other methods aren’t as reliable
• Biometrics is the highest level of security
History of Biometrics

• Origins back to 200 BC
• Alphonse Bertillon, “Bertillonage”
• The introduction of fingerprints
History of Biometrics

• Sir Francis Galtons classification system
• The advancement of biometrics
• Biometric databases are international
Types of Biometrics

• Records basic information about user
• Sensor captures unique traits about ID
• Computer stores data for later use
Types of Biometrics
Physiological:
• Face
• Fingerprint
• Hand
• Iris
• DNA

Behavioral:
• Keystroke
• Signature
• Voice
Biometrics and Practical Application

• NEXUS
 Program for pre-approved travelers
 Iris recognition kiosks
Biometrics and Practical Application

• Faster movement through border security
• Cost reduction for Canada Border Services
• Instructions provided to avoid error
Privacy Concerns

• Biometric information not stored on systems
• Converted into code for later use
Disadvantages

• Software and hardware failures
• User difficulties
• High start-up cost
Limitations

• Physical anomalies cause temporary difficulties
• Research will provide adaptive solutions
Conclusion

• Advantages outweigh disadvantages
• Significant return on investment
• Continued research required

Contenu connexe

Tendances

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric SecurityNed Hayes
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureMichael James
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 

Tendances (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the Future
 
Biometrics
BiometricsBiometrics
Biometrics
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Vermury-BAT-HIIDE
Vermury-BAT-HIIDEVermury-BAT-HIIDE
Vermury-BAT-HIIDE
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric
BiometricBiometric
Biometric
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
070327 biometrics
070327 biometrics070327 biometrics
070327 biometrics
 

Similaire à Assignment5 pp

INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NRavikumar Chilmula
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity managementMyAssignmenthelp.com
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxTusharKataria22
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Easy Solutions Inc
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptxPavani839789
 

Similaire à Assignment5 pp (20)

Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
biometrics
biometricsbiometrics
biometrics
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Assignment5 pp

Notes de l'éditeur

  1. Biometrics is the process of identifying an individual using their unique physical attributes of their body.Using your fingerprints, or your iris, biometric readers can quickly, and easily, verify who you are and what access you should have to secure equipment, locations, and data.
  2. Access control and security are vital parts of businesses around the world, and advances in technology have made biometrics readily available to help organizations manage their security risks. Other methods of identification can be stolen, copied, or otherwise fraudulently obtained. Using biometric authentication provides a more secure way to identify individuals. This report will examine different types of biometric authentication, the advantages and disadvantages of biometric technology, and how biometrics is used in business today.
  3. The origin of biometrics can be traced back to 200 BC. Simple biometrics, like palm and footprint tracings, were used to distinguish different people, usually for crime related incidents. This lead to a 14th century Persian book on using fingerprints to identify people. In the 19th century, Alphonse Bertillon invented anthropometry, a way of using body measurements to identify offenders. This type of biometric was later then called Bertillonage. The largest step in biometrics was taken in the late 19th century when fingerprinting was introduced
  4. Many people, including Bertillon and an Argentinian police official helped established fingerprinting, but the largest contributor was Sir Francis Galton. Galton made a classification system that revolutionized biometrics. He recognized that no two fingerprints were the same and published a book on the classification of fingerprinting.Now we use computers to automate and save fingerprints, and large databases across the world contain information on not only fingerprints but also voices, hands, irises and faces.
  5. All biometric systems will have 3 similar steps and components. When you enroll, the system will record basic information about you, and a sensor will capture an image of the trait that it will use for identification (ex. fingerprint). A computer will then store this information and use software to compare it to the information provided when you try to access the system again.
  6. Biometrics identifiers are classified as either physiological or behavioral. Physiological are related to characteristics of the body, while behavioral relates to patterns of behaviour. Listed are examples of common biometrics used in business today.
  7. NEXUS is program for pre-approved travellers entering Canada or the United States at designated airports. It allows members to easily pass through border services using self-serve iris recognition kiosk. NEXUS cardholders stand in front of the kiosk and look into the adjustable camera so that their irises can be photographed and compared to the images they submitted with their applications.
  8. Nexus users are able to move through border security quickly. Canada Border Services will see a benefit in labour cost reduction by having to employee less border guards and each location. Users must stand perfectly still and look into the camera from the correct height and distance. The system provides audio and visual direction if a user is not in the correct position.
  9. Though biometric technology is becoming commonplace, some users still have questions about privacy. Systems do not store your biometric information; it converted it into a code. Stealing and decoding that data for fraudulent use would be far more difficult than stealing a swipe card, or accessing a password based system.
  10. Like any technology, biometric systems have some disadvantages. Despite research and testing, biometric technology can still fail, and because it is relatively new in the marketplace users can have difficulty adjusted to the system. The start-up cost can also be prohibitive, and lead some companies to remain with the password or pin systems they already have in place.
  11. There are also limitations on biometrics. A fingerprint scanner may not work if a finger is dirty, or cut. Voice recognition can be disturbed by background noise, or voice that is changed because of a temporary cold or throat infection. Continued research will help find the gaps in biometric authentication, and help enhance the systems.
  12. Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.