(CNN)-- Who can forget the scene of Xu Ke 1997 B The movie \"double team\", A imprisoned Jean- Claude Van Damm scraped the skin off his index finger, attached it to an impromptu mechanical device and booed -- Fix it on the scanner at the scheduled time every morning so his kidnappers don\'t notice him running away? In fact, biometric systems are harder to fool than simply entering a password correctly. With the development of this technology, there are increasing concerns about its true effectiveness. \"Public Acceptance of biometrics has been growing slowly, and it will continue to be a problem until privacy and data security issues reach a level that most people can accept,\" Isabel Mueller, general manager Institute of Biology. The concept of biometric identification systems can actually be traced back to 1879, when French police chief alfones beseron suggested that individuals could be identified by precise measurements of the body. Argentina is one of the first countries to widely implement fingerprint records. By 1976, Argentine police are using a system that combines scanned fingerprints with digital processing and radio technology to send biological information on police cars to a central database, the aim is to trace the suspects in Argentina. Nowadays, fingerprints are used not only for forensic investigations, but also for passports, identity cards, border surveillance, access control and even shopping. German IT company- Werke, who specializes in biometric applications, has successfully implemented a digital proof system for fingerprint payment at 120 Edeka stores in Germany. In June 2008, it launched 6- Working with payment processor Equens, a similar system was tried out at Albert Heijn, a Dutch supermarket chain. Other physiological biometrics, in addition to fingerprints, include facial recognition, iris scanning, retina scanning, hand geometry, facial thermal images, body odor, hand or finger veins, footprints, and handprints. Among them, iris scanning is the most accurate. - In the iris, there are about 250 unique features on average, and the odds of two people having the same pattern are 1 out of 7 billion. Due to the relative difficulty of replication, it is also considered one of the safest biometric technologies. However, it is also the most expensive given the complexity of the process, and its accuracy depends on the cooperation of the subject. ( For example, it is well known that criminals use eye drops to expand their pupils, thus masking most of their iris. ) On the contrary, face recognition is technically the least interference, because the surveillance camera can scan the face from a distance ( Although this also brings privacy issues) , But its accuracy varies greatly due to light, exposure, etc. Another biometric system currently being developed by the Hong Kong Polytechnic University\'s biometric research center is tongue scanning. \"Different people have different tongue shapes, so the tongue can be used to tell different topics,\" said Zhang Lei, an assistant professor at the University . \". \"Our system uses laser scanning to build 3- D shape of tongue. Tongue information can be collected in about two-three seconds. Then feature extraction and matching are carried out to determine the identity of the person. \"Other biometric recognition systems that need to capture subjects in action and compare them similarly to the sample database are behavioral. Including voice printing ( The way a person speaks) Dynamic Signature or handwriting ( The way one writes) Key dynamics ( The way a person types a password, usually used as an additional security layer for a password)and gait ( The way one walks). Professor Hanseok Ko, director of the Intelligent Signal Processing Laboratory at Seoul University of Korea, said: \"Recent progress in most face recognition, speech recognition or speech recognition algorithms has been demonstrated in the laboratory, \"\" But the deployment of this product is limited to criminal investigations, not personal identification. Commercial products are still mainly limited to door locks and fingerprint identification technology on PC/laptop computers. \"Electronics manufacturer Fujitsu went one step further at a time and is selling peripherals such as a handheld computer login kit with a functional mouse that verifies the identity of the user by analyzing the vein under the palm of the user\'s hand. At the same time, Motorola, an active developer of automatic fingerprint identification system (AFIS) For more than 30 years now, it is marketing its own Mobile AFIS device, which can capture fingerprints and facial images, connect to the wireless network to upload data, run on Windows Mobile, integrate barcode scanners, smart card reader/writer, GPS, phone, can be placed in the palm of your hand. Digital security, so it\'s natural to take very seriously the protection of these high levels of personal data. While biomedical identity theft is more challenging than forging a credit card signature, it is still possible to illegally access and copy Archived prints that can then be used to make manual models. \"In general, systems that have easy access to biometric data (stolen) \"It is expected that the availability of these data will increase the way the system is attacked,\" said Moeller of the Biometrics Institute . \". \"We have tested facial and fingerprint systems that belong to this category. The speaker recognition we are currently testing is also of this type. \"Stealing\" biometric data from hand geometry, Iris, and DNA is a little more difficult, and Palm/finger veins and retina scans are also more difficult, so we expect less vulnerability to these biometric features. \"In order to apply the research to the actual situation, the Biometrics Institute recently announced its proprietary biometric Vulnerability Assessment Service (BVAS). \"The customer submits the system to us for independent testing,\" Moeller explains . \". \"The test will be conducted in an independent laboratory where biometric devices can be sent to investigate, evaluate and report its vulnerability. The lab will then work with the contracting organization to study how to address any loopholes found through appropriate countermeasure. \"One way to improve security is to ensure that data is transmitted and stored through strong encryption. Another technology is the use of multimodal biometrics ( Confirm identity using multiple biometric systems at the same time). At the biometric technology research center, Zhang said they are working to make counterfeiting as difficult as possible: \"We have developed a 3-D palm- Printing system with higher- Ability to fake 2-D palm-print system. We also developed close. infrared palm- A printing system that can perform activity detection. \" \"Anti- \"Hacking technology is being introduced in the form of lab algorithms,\" added Professor Ko of the Korean university . \". \"For example, by using a fingerprint/Palm molding in the form of plastic to simulate, it is possible to prevent the simulation by connecting it to a thermal sensor to confirm that an actual human body sample is being submitted for verification.
Umeasure here! Just in case you leave or we reply later,please leave your email,mobile or Skype. Will get back to you later. Contact us email:email@example.com, skype:firstname.lastname@example.org, mobile/whatsApp/WeChat: 0086 166 7561 7862