Good Security Building Biometrics Access Research Paper Example

Type of paper: Research Paper

Topic: Voice, Biometrics, Recognition, Camera, Information, System, Recorder, Facial Recognition

Pages: 2

Words: 550

Published: 2020/11/25

New WowEssays Premium Database!

Find the biggest directory of over
1 million paper examples!

Biometrics refers to technologies that aim to measure biological data. It can store and analyze data for research and for further use. In present types, it is commonly used for security purposes. Companies and other institutions use biometrics to identify personnel. It is beneficial for larger companies because of the number of persons that work for them. They can easily build biometrics access for security because of budget availability. In contrast, smaller companies and non-profit organizations have limited amount of resources available. Do they have the capability to build biometrics access for security? A system will be designed and analyze that fits smaller companies and non-profit organization (Rouse, 2015).

Facial Recognition with Voice Recognition

There are many types of biometric devices designed for a specific purpose. For large businesses, they tend to have the budget so they can choose any biometric device they needed. For smaller businesses, the choices are limited. Facial recognition is one option to consider. It is relatively cheap compared to other devices with more complicated algorithm. It can come together with voice recognition. This also has a simpler methodology when compared to the likes of the iris and retina scanner. A camera and a voice recorder are the essential equipment for this type of system. A computer is also essential because it will do the analysis on the gathered data (“Types of,” 2015).

Benefits of the System

It is relatively cheap. Many stores sell camera and voice recorder so they tend to lower their prices. There are also different variants. It is up to the design if it needs a higher quality of the machines. In addition, it is easier to understand how the whole system function. Some points in the face were compared to the stored data inside a computer. In voice recognition, the pitch of the voice is the one being compared to a stored data of the voice. A program in a computer will do the analysis. Another benefit is ease of use and access. In under 2 minutes, the biometric analysis can easily be done (“Advantages and,” 2007).


A beginner’s camera, specifically a DSLR, costs around $300 (Wilkinson, 2014). The facial recognition software is a separate purchase. You will to choose on different programs that suits the best interest of the security design. For the voice recognition device, there is a recorder that comes with software. The Sony’s ICD-IMX20 recorder comes with Nuance’s Dragon NaturallySpeaking speech recognition software which costs around $215 dollars (“The best,” 2014). The company will have to pay around $600 dollars for the two devices. The maintenance costs are another thing. It is recommended that the device shall be checked regularly for precision and accuracy. The cost of the system is a bit lower compared to nearly $1000 for a good iris scanner alone (“Biometric Iris,” 2012).


The system has flaws. First, it has a lower accuracy compared to the iris or hand geometry biometrics. Discrepancies may arise during the analysis of data. Changes in lighting, the hair’s orientation of the person, age, or even the person wears glasses can have an effect on the processing of the image. Camera and analysis comes separately, as a result, the purchase is also separate. In voice recognition, the voice can easily be altered. Sickness may also be a cause of changes in voice of a person. Low accuracy is also expected in voice recognition. In addition, the biometrics analysis shall be done one at a time. The person cannot speak while the facial recognition is on-going (“Advantages and,” 2007).


Rouse, Margaret (2015). Biometrics. Retrieved from
Wilkinson, David (2014). The Best Cameras under $300 in 2014. Retrieved from
Advantages and disadvantages of technologies. Retrieved from
Biometric Iris Scanners and Cameras. Retrieved from
The Best Digital Voice Recorder. Retrieved from
Types of Biometrics. Retrieved from

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2020, November, 25) Good Security Building Biometrics Access Research Paper Example. Retrieved April 23, 2021, from
"Good Security Building Biometrics Access Research Paper Example." WePapers, 25 Nov. 2020, Accessed 23 April 2021.
WePapers. 2020. Good Security Building Biometrics Access Research Paper Example., viewed April 23 2021, <>
WePapers. Good Security Building Biometrics Access Research Paper Example. [Internet]. November 2020. [Accessed April 23, 2021]. Available from:
"Good Security Building Biometrics Access Research Paper Example." WePapers, Nov 25, 2020. Accessed April 23, 2021.
WePapers. 2020. "Good Security Building Biometrics Access Research Paper Example." Free Essay Examples - Retrieved April 23, 2021. (
"Good Security Building Biometrics Access Research Paper Example," Free Essay Examples -, 25-Nov-2020. [Online]. Available: [Accessed: 23-Apr-2021].
Good Security Building Biometrics Access Research Paper Example. Free Essay Examples - Published Nov 25, 2020. Accessed April 23, 2021.

Share with friends using:

Please remember that this paper is open-access and other students can use it too.

If you need an original paper created exclusively for you, hire one of our brilliant writers!

Contact us
Chat now