Page 15 - Digicode_AI_class_6
P. 15

Some of the authentication procedures as follows:

            1.  Password  Protection:  Protecting  your  computer  using  password  is  an  important  step  to
               make the data of computer safe from unauthorised use. A password is a word or collection of
               characters used for user authentication to prove the identity or get approval to gain access to
               the computer. The password should be kept secret from those who are not allowed to access
               your computer.
            2.  Biometric Authentication: Biometric authentication is a process in which biological characteristics
               such as finger print, face and retina are used to check the identity of an individual. In this process,
               a biometric machine is used to capture the biological details of a person and compare these
               details with the existing details, which are stored in computer. It is an automated method of
               recognising a person’s identity by using his/her biological characteristics such as:
                   Face Recognition: Face recognition is the process of identifying an individual by using his/
                 her facial features. Biometric machine captures the facial image or video of person's face.
                 This image is transformed into a unique faceprint. The image is transformed using a technique
                 called  'elastic  graph  matching'.  Images  are  sent  to  a  back-end  database  for  comparison
                 and possible match. Algebraic algorithms are used to make a perfect match. Currently, face
                 recognition technique is most widely used in smartphones.

                   Iris and Retinal Recognition: Biometrics which analyse the complex and unique characteristics
                 of the eyes can be divided into two different types:
                   Iris biometrics: Iris is the coloured band of tissue that surrounds the pupil of the eye. An iris
                   recognition system uses a video camera to capture the sample while the software compares
                   the resulting data against stored templates.
                    Retina biometrics: Retina is the layer of blood vessels at the back of the eye. A retinal
                   recognition system shoots an infrared light beam into eye that has been placed close to the
                   signal receiver.

























            3.   Voice Recognition: The term voice recognition refers to finding the identity of a person who is
               speaking, rather than what he/she is saying. Recognising the speaker can simplify the task of
               translating speech into system that has been trained on a specific person’s voice or it can be used
               to authenticate or verify the identity of a speaker as part of a security process.


                                                                            Safeguarding your Computer    13
   10   11   12   13   14   15   16   17   18   19   20