To master a subject, the first thing to do is to have a proficient grasp of its basic concepts and basic principles, and then repeatedly think about its connotation and extension. It is not a simple matter to explain a concept clearly. It may not only use the concepts of this subject, but also restore it to outside the subject. For example, if we study economics, then to explain the interest theory clearly, it is not enough to simply say "interest is the reward obtained by the owner of funds for lending money", but also to restore it to outside the economic terms. For example, Fisher's interest theory "not only ignores inflation, risk, and transaction costs, but more importantly, it ignores currency. He believes that in a society without currency, interest still exists when goods are exchanged for goods. The existence of interest does not require currency, but requires a market, and the exchange of goods is the market." This returns to the origin of the concept - the market. When explaining the market, it is necessary to restore it to outside economics. Of course, after crossing the boundaries of economics, we do not need to explain it anymore, because it has exceeded the scope of economics.
Although I personally think that it is very questionable whether biometrics can become a subject, I personally think that it is still very necessary to master the relevant knowledge and understand its basic concepts.
The following is a preliminary list of ten basic concepts related to biometrics. It is inevitable that some are omitted, and the explanation here is difficult to reach a truly in-depth level. I just hope to arouse your interest in thinking:
Biometrics (Biometric Authentication):
Biometrics (Biometric Identification Technology): It is the use of human biological characteristics for identity authentication. It is based on the two points that (1) human biological characteristics are different and (2) they can be measured or automatically identified and verified. Human biological characteristics include physiological characteristics or behavioral patterns. Physiological characteristics include hand shape, fingerprints, face shape, iris, retina, pulse, auricle, etc. Behavioral characteristics include signature, voice, keystroke strength, etc.
Question: 1. Should biometrics be called person identification or human body identification? 2. Do different biometric technologies have more similarities or differences? Should these technologies be completely independent?
Fingerprint identification:
Fingerprint identification is a technology that uses human fingerprint characteristics to authenticate human identity. Among all biometric technologies, fingerprint technology is the most mature and widely used.
Question: 1. Is fingerprint identification technology really mature? How should those who cannot collect fingerprints be included in the relevant system? 2. In addition to fingerprint recognition, what recognition technology has the most promising development prospects?
Algorithm
Algorithm is a computer software term, which mainly refers to the specific steps and methods required to complete a task. That is to say, given the initial state or input data, after a limited number of operations by the computer program, the required result can be obtained. Algorithms often contain repeated steps and some comparisons or logical judgments. If an algorithm is defective or not suitable for a problem, executing this algorithm will not solve the problem.
The algorithm mentioned in the field of biometrics is essentially the application of software algorithms in this field. Taking the fingerprint recognition algorithm as an example, its core algorithms include fingerprint matching algorithm, fuzzy fingerprint image processing algorithm, fingerprint feature classification, positioning, extraction algorithm, and fingerprint splicing algorithm.
Question: 1. Should the algorithm be the core of biometrics? 2. Chinese companies frequently win good rankings in fingerprint algorithm competitions. Does it mean that we have reached the world level in this regard?
Fingerprint Sensor In general, a sensor is a device that converts the measured value into an electrical signal output that has a certain relationship with it and is easy to process with a certain accuracy for the purpose of measurement. The fingerprint sensor is a device that measures the electrical signal of the finger. At present, there are different types of fingerprint sensors, such as optical and crystal capacitive. Question: What are the main technical challenges of fingerprint sensors for Chinese companies? Identity authentication (identity recognition) is simply a way of authenticating people who want to obtain a certain identity through some means or methods. For example, you can use your ID card or account number/password to authenticate whether you are a legitimate user of this system. Question: How many identity authentication technologies are there at present? What are their classification standards? AFIS (Automatic Fingerprint Identification System) AFIS (Automated Fingerprint Idenification System) refers to the computer processing of input fingerprint images to achieve fingerprint classification, positioning, extraction of morphology and detail features, and then comparison and identification of fingerprints based on the extracted features. Question: AFIS traditionally refers to fingerprint recognition systems specifically used in the police field. Is this term still necessary today? Information security In general, information security is to ensure the effectiveness and security of electronic information. Information security involves the confidentiality, integrity, availability, and controllability of information. Confidentiality is to resist passive attacks from opponents and ensure that information is not leaked to unauthorized persons. Integrity is to resist the active attack of the opponent and prevent the information from being tampered with without authorization. Availability is to ensure that information and information systems are indeed used by authorized users. Controllability is to implement security monitoring of information and information systems. Question: 1. Should the application focus of biometric technology be in the field of information security? 2. In the future, should information security technology lead biometric technology or should biometrics lead information security technology? Encryption Encryption technology mainly refers to a technical means used to protect data from leakage. It mainly converts important data into garbled code (encryption) for transmission, and then restores (decrypts) by the same or different means after reaching the destination. Encryption technology includes two elements: algorithm and key. The algorithm is the step of combining ordinary text (or understandable information) with a string of numbers (key) to produce incomprehensible ciphertext. The key is an algorithm used to encode and decode data. Question: 1. Is the file encryption function necessary for fingerprint recognition applications? 2. Does its existence itself indicate that the simple fingerprint recognition application is too simple to meet user needs? Fingerprint attendance The meaning of fingerprint attendance is very clear: use fingerprints instead of cards to record employee attendance. The reason why fingerprint attendance is listed as one of the ten basic concepts of biometrics is because of its importance. It is said that fingerprint attendance has occupied 60% of the entire Chinese fingerprint recognition market, and fingerprint recognition accounts for 90% of the market share. The fingerprint attendance system is a management system that uses fingerprint readers and computer systems to realize attendance registration and attendance management. Question: Why is fingerprint attendance the most successful biometric application? What aspects of user needs does it meet? True rejection rate and false recognition rate Because the computer only involves some limited information of the fingerprint when processing fingerprints, and the comparison algorithm is not an exact match, the result cannot be guaranteed to be 100% accurate. The important measurement indicator for specific applications of fingerprint recognition systems is the recognition rate. It mainly consists of two parts, the rejection rate (FRR) and the false positive rate (FAR). We can adjust these two values according to different uses. FRR and FAR are inversely proportional. Express this number as 0-1.0 or as a percentage. ROC (Receiver Operating Curve)-curve gives the relationship between FAR and FRR.
Questions: 1. Should a standard be established for FAR and FER? 2. How many biometric products currently have real FER and FAR values? Who will verify their authenticity?
Reference address:Basic concepts and principles of biometric technology
Although I personally think that it is very questionable whether biometrics can become a subject, I personally think that it is still very necessary to master the relevant knowledge and understand its basic concepts.
The following is a preliminary list of ten basic concepts related to biometrics. It is inevitable that some are omitted, and the explanation here is difficult to reach a truly in-depth level. I just hope to arouse your interest in thinking:
Biometrics (Biometric Authentication):
Biometrics (Biometric Identification Technology): It is the use of human biological characteristics for identity authentication. It is based on the two points that (1) human biological characteristics are different and (2) they can be measured or automatically identified and verified. Human biological characteristics include physiological characteristics or behavioral patterns. Physiological characteristics include hand shape, fingerprints, face shape, iris, retina, pulse, auricle, etc. Behavioral characteristics include signature, voice, keystroke strength, etc.
Question: 1. Should biometrics be called person identification or human body identification? 2. Do different biometric technologies have more similarities or differences? Should these technologies be completely independent?
Fingerprint identification:
Fingerprint identification is a technology that uses human fingerprint characteristics to authenticate human identity. Among all biometric technologies, fingerprint technology is the most mature and widely used.
Question: 1. Is fingerprint identification technology really mature? How should those who cannot collect fingerprints be included in the relevant system? 2. In addition to fingerprint recognition, what recognition technology has the most promising development prospects?
Algorithm
Algorithm is a computer software term, which mainly refers to the specific steps and methods required to complete a task. That is to say, given the initial state or input data, after a limited number of operations by the computer program, the required result can be obtained. Algorithms often contain repeated steps and some comparisons or logical judgments. If an algorithm is defective or not suitable for a problem, executing this algorithm will not solve the problem.
The algorithm mentioned in the field of biometrics is essentially the application of software algorithms in this field. Taking the fingerprint recognition algorithm as an example, its core algorithms include fingerprint matching algorithm, fuzzy fingerprint image processing algorithm, fingerprint feature classification, positioning, extraction algorithm, and fingerprint splicing algorithm.
Question: 1. Should the algorithm be the core of biometrics? 2. Chinese companies frequently win good rankings in fingerprint algorithm competitions. Does it mean that we have reached the world level in this regard?
Fingerprint Sensor In general, a sensor is a device that converts the measured value into an electrical signal output that has a certain relationship with it and is easy to process with a certain accuracy for the purpose of measurement. The fingerprint sensor is a device that measures the electrical signal of the finger. At present, there are different types of fingerprint sensors, such as optical and crystal capacitive. Question: What are the main technical challenges of fingerprint sensors for Chinese companies? Identity authentication (identity recognition) is simply a way of authenticating people who want to obtain a certain identity through some means or methods. For example, you can use your ID card or account number/password to authenticate whether you are a legitimate user of this system. Question: How many identity authentication technologies are there at present? What are their classification standards? AFIS (Automatic Fingerprint Identification System) AFIS (Automated Fingerprint Idenification System) refers to the computer processing of input fingerprint images to achieve fingerprint classification, positioning, extraction of morphology and detail features, and then comparison and identification of fingerprints based on the extracted features. Question: AFIS traditionally refers to fingerprint recognition systems specifically used in the police field. Is this term still necessary today? Information security In general, information security is to ensure the effectiveness and security of electronic information. Information security involves the confidentiality, integrity, availability, and controllability of information. Confidentiality is to resist passive attacks from opponents and ensure that information is not leaked to unauthorized persons. Integrity is to resist the active attack of the opponent and prevent the information from being tampered with without authorization. Availability is to ensure that information and information systems are indeed used by authorized users. Controllability is to implement security monitoring of information and information systems. Question: 1. Should the application focus of biometric technology be in the field of information security? 2. In the future, should information security technology lead biometric technology or should biometrics lead information security technology? Encryption Encryption technology mainly refers to a technical means used to protect data from leakage. It mainly converts important data into garbled code (encryption) for transmission, and then restores (decrypts) by the same or different means after reaching the destination. Encryption technology includes two elements: algorithm and key. The algorithm is the step of combining ordinary text (or understandable information) with a string of numbers (key) to produce incomprehensible ciphertext. The key is an algorithm used to encode and decode data. Question: 1. Is the file encryption function necessary for fingerprint recognition applications? 2. Does its existence itself indicate that the simple fingerprint recognition application is too simple to meet user needs? Fingerprint attendance The meaning of fingerprint attendance is very clear: use fingerprints instead of cards to record employee attendance. The reason why fingerprint attendance is listed as one of the ten basic concepts of biometrics is because of its importance. It is said that fingerprint attendance has occupied 60% of the entire Chinese fingerprint recognition market, and fingerprint recognition accounts for 90% of the market share. The fingerprint attendance system is a management system that uses fingerprint readers and computer systems to realize attendance registration and attendance management. Question: Why is fingerprint attendance the most successful biometric application? What aspects of user needs does it meet? True rejection rate and false recognition rate Because the computer only involves some limited information of the fingerprint when processing fingerprints, and the comparison algorithm is not an exact match, the result cannot be guaranteed to be 100% accurate. The important measurement indicator for specific applications of fingerprint recognition systems is the recognition rate. It mainly consists of two parts, the rejection rate (FRR) and the false positive rate (FAR). We can adjust these two values according to different uses. FRR and FAR are inversely proportional. Express this number as 0-1.0 or as a percentage. ROC (Receiver Operating Curve)-curve gives the relationship between FAR and FRR.
Questions: 1. Should a standard be established for FAR and FER? 2. How many biometric products currently have real FER and FAR values? Who will verify their authenticity?
Previous article:Research progress of optical fiber hydrogen sensors
Next article:Opportunities for the development of modern automotive sensing technology
- Popular Resources
- Popular amplifiers
Latest sensor Articles
- Melexis launches ultra-low power automotive contactless micro-power switch chip
- Infineon's PASCO2V15 XENSIV PAS CO2 5V Sensor Now Available at Mouser for Accurate CO2 Level Measurement
- Milestone! SmartSens CMOS image sensor chip shipments exceed 100 million units in a single month!
- Taishi Micro released the ultra-high integration automotive touch chip TCAE10
- The first of its kind in the world: a high-spectral real-time imaging device with 100 channels and 1 million pixels independently developed by Chinese scientists
- Melexis Launches Breakthrough Arcminaxis™ Position Sensing Technology and Products for Robotic Joints
- ams and OSRAM held a roundtable forum at the China Development Center: Close to local customer needs, leading the new direction of the intelligent era
- Optimizing Vision System Power Consumption Using Wake-on-Motion
- Infineon Technologies Expands Leading REAL3™ Time-of-Flight Portfolio with New Automotive-Qualified Laser Driver IC
MoreSelected Circuit Diagrams
MorePopular Articles
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
MoreDaily News
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
Guess you like
- EEWORLD University Hall----GPS Principles and Applications
- Keil5 software simulation problem
- [ESP32 Learning_1] The first ESP32-S3 example - hello_world
- How TI dual-core processor ARM+DSP achieves collaborative work
- GD32F307VG supports Mbed development
- TMS320C6000 Basic Learning (1) - Understanding
- How to measure analog voltage using the ADC of MSP430?
- AD sampling has been used for so long, it's time to get familiar with the internal structure
- Solution: Vivado cannot find the ILA core, or finds the ILA but there is no corresponding data line in the window
- There are posts everywhere. Why hang it on a tree?