Page 15 - Digicode_AI_class_6
P. 15
Some of the authentication procedures as follows:
1. Password Protection: Protecting your computer using password is an important step to
make the data of computer safe from unauthorised use. A password is a word or collection of
characters used for user authentication to prove the identity or get approval to gain access to
the computer. The password should be kept secret from those who are not allowed to access
your computer.
2. Biometric Authentication: Biometric authentication is a process in which biological characteristics
such as finger print, face and retina are used to check the identity of an individual. In this process,
a biometric machine is used to capture the biological details of a person and compare these
details with the existing details, which are stored in computer. It is an automated method of
recognising a person’s identity by using his/her biological characteristics such as:
Face Recognition: Face recognition is the process of identifying an individual by using his/
her facial features. Biometric machine captures the facial image or video of person's face.
This image is transformed into a unique faceprint. The image is transformed using a technique
called 'elastic graph matching'. Images are sent to a back-end database for comparison
and possible match. Algebraic algorithms are used to make a perfect match. Currently, face
recognition technique is most widely used in smartphones.
Iris and Retinal Recognition: Biometrics which analyse the complex and unique characteristics
of the eyes can be divided into two different types:
Iris biometrics: Iris is the coloured band of tissue that surrounds the pupil of the eye. An iris
recognition system uses a video camera to capture the sample while the software compares
the resulting data against stored templates.
Retina biometrics: Retina is the layer of blood vessels at the back of the eye. A retinal
recognition system shoots an infrared light beam into eye that has been placed close to the
signal receiver.
3. Voice Recognition: The term voice recognition refers to finding the identity of a person who is
speaking, rather than what he/she is saying. Recognising the speaker can simplify the task of
translating speech into system that has been trained on a specific person’s voice or it can be used
to authenticate or verify the identity of a speaker as part of a security process.
Safeguarding your Computer 13

