Conclusion

 <  Day Day Up  >  

Face biometrics present a very attractive system to use for network access. As we saw, local feature analysis provided the most suitable algorithm for use based on certain assumptions. However, there are some tradeoffs in its use. Namely, the user is required to be presented in good light and to hold still as much as possible. Also, because face biometrics being passive, there can be concerns over spoofing and privacy. Consequently, a company needs to evaluate its risk structure and find the right tradeoff between user convenience, cost, and security. The security part of the tradeoff involves analyzing the level of effort required to compromise the system, and the possible loss of data or time.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net