Tutorial Exam Biometrics
Tutorial Exam Biometrics
4. Give 4 shortcomings of conventional security AIDS and why Biometrics is required (list 3 reasons).
6. Give the definition of behavioral biometrics and list its 4 main recognition systems.
7. A biometric system can fail to work in two ways. Intrinsic failures and Failures due to attacks. List three
intrinsic failures.
8. List the Merits of Finger Recognition System and of Facial Recognition System Demerits.
10. Complete the following table of comparison, using the following sentences:
▪ The objective of voice recognition is to recognize WHO is speaking.
▪ The speech recognition aims at understanding and comprehending WHAT was spoken.
▪ It is used to identify a person by analyzing its tone, voice pitch, and accent.
------------- -------------
------------- -------------
C. FILL THE BLANK (DASHED) SPACES AND NAME EACH OF THE FOLLOWING 3 FIGURES
Fig. _ _ _ _ _ _ _ _ _ _
Fig. _ _ _ _ _ _ _ _ _ _ _
Fig. _ _ _ _ _ _ _ _ _ _ _
INDICATIONS:
❑ There are four general steps a biometric
system takes to perform identification and
verification:
1. Acquire live sample from candidate. (using
sensors)
2. Extract prominent features from sample.
(using processing unit)
3. Compare live sample with samples stored in
database. (using algorithms)
4. Present the decision. (Accept or reject the Fig. _ _ _ _ _ _ _ _ _ _ _
candidate.)