Employee Time & Attendance and Biometrics
Author: Victor Reyes
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. The oldest form of biometric verification is fingerprinting. With the advent of the computers and technology, Biometric Identity Verification has advanced considerably.
No matter what method is used, the ID verification process remains the same. Data of a person’s unique characteristic is captured and stored in a database. When ID verification is required, the new record is captured and compared with the previous record in the database. If there’s a match between both data, then the person’s identity is confirmed.
Here are some methods along with the pros and cons of each:
- DNA Matching – The identification of an individual using the analysis of segments from DNA
- Advantages: Very accurate
- Disadvantages: Not practical all the time
- Eyes – Iris or Retina recognition. This is extensively used in airports
- Advantages: Most accurate and robust biometric technology.
- Disadvantages: Distance between scanner and eye can be bothersome. Intruders can use high-quality image instead of real Iris.
- Facial recognition – analysis of facial features or patterns for authenticating individual’s identity
- Advantages: No time fraud and better security.
- Disadvantages: Face can be obstructed by hair, glasses, hats, etc. Also changes in lighting or facial expressions can throw off a device. When people’s faces change over time, algorithm might not recognize the person.
- Fingerprint – Most commonly used before – patterns of ridges and valleys found on the surface tips of a human finger
- Advantages: High Accuracy
- Disadvantages: Manual laborers have their prints distorted.
- Palm Vein recognition – Veins in the palms are used as an identification trait.
- Advantages: Quick and simple. Fast and accurate.
- Disadvantages: The response time might be a complex issue
- Voice authentication – auditory biometric
- Advantages: Flexible and can be used to control the simulation
- Disadvantages: An intruder can use a recorded voice. It is less accurate if there’s background noise
- Gait – use of an individual’s walking style or gait to determine identity