Summary
In addition to the commonly known biometrics, such as iris or fingerprint recognition, we can now see that each person has many other unique identifiers. In this chapter, we learned how several elements of a hand, such as the palm and hand geometry, can be used to provide identification. We then saw how palm vein recognition can provide a more robust, contactless biometric that can be used in a variety of applications.
By now, you can see how gait recognition can assist in identifying someone, even if we can’t see their face. As a result, gait recognition can be used as a passive biometric that is optimal in large venues such as malls as a tool for threat management.
We then saw how using two biometrics, DNA and retinal scans, are strong methods to identify someone when security is imperative. In addition, you can now appreciate how using keystroke dynamics and signature verification can complement a PIN or password when interacting online. Finally, we saw how...