2User identification

Nowadays information technologies are getting more and more into the foreground. We meet with them in our daily lives, starting with smart-phones and ending with more sophisticated devices.

Every device working with our personal data should be therefore protected using some type of security system. The most widely used authentication type is password, but with development of information technologies and security protection algorithms, systems and applications start to use authentication based on the biometric factors. There are several benefits based on using biometric signals: biometrics are unique to a person, so it’s sufficient a person’s presence in front of the sensor and there is no need to remember several passwords or PINs. We know identification systems based on several different biometric modalities like iris, fingerprint, voice, face etc. In this part we will focus on the face recognition systems and speaker identification systems in general.