Biometrics

Abstract

Biometric identification refers to identifying an personel based on his/her distinguishing physiological and/or behavioural characteristics. As these characteristics are distinctive to each and every person, biometric identification is more trustworthy and capable than the original token based and knowledge based technologies differentiating between an authorized and a fraudulent person. This paper discusses the mainstream biometric technologies and the advantages and disadvantages of biometric technologies, their protection issues and finally their applications in day today life.

Pregnancy Care Centre

Introduction:

Biometrics

"Biometrics" are self-operating methods of recognizing an personel based on their bodily or behavioral characteristics. Some common commercial examples are fingerprint, face, iris, hand geometry, voice and dynamic signature. These, as well as many others, are in discrete stages of improvement and/or deployment. The type of biometric that is "best " will vary significantly from one application to another. These methods of identification are adored over original methods inviting passwords and Pin numbers for discrete reasons: (i) the person to be identified is required to be physically present at the point-of-identification; (ii) identification based on biometric techniques obviates the need to remember a password or carry a token. Biometric recognition can be used in identification mode, where the biometric law identifies a person from the whole enrolled population by searching a database for a match.

A Biometric System:

All biometric systems consist of three basic elements:

  • Enrollment, or the process of collecting biometric samples from an individual, known as the enrollee, and the subsequent generation of his template.
  • Templates, or the data representing the enrollee's biometric.
  • Matching, or the process of comparing a live biometric sample against one or many templates in the system's database.

Enrollment

Enrollment is the crucial first stage for biometric authentication because enrollment generates a template that will be used for all subsequent matching. Typically, the expedient takes three samples of the same biometric and averages them to furnish an enrollment template. Enrollment is involved by the dependence of the carrying out of many biometric systems on the users' familiarity with the biometric expedient because enrollment is regularly the first time the user is exposed to the device. Environmental conditions also sway enrollment. Enrollment should take place under conditions similar to those predicted while the routine matching process. For example, if voice verification is used in an environment where there is background noise, the system's capability to match voices to enrolled templates depends on capturing these templates in the same environment. In addition to user and environmental issues, biometrics themselves turn over time. Many biometric systems inventory for these changes by continuously averaging. Templates are averaged and updated each time the user attempts authentication.

Templates

As the data representing the enrollee's biometric, the biometric expedient creates templates. The expedient uses a ownership algorithm to extract "features" accepted to that biometric from the enrollee's samples. Templates are only a narrative of distinguishing features, sometimes called minutiae points, of a person's biometric characteristic or trait. For example, templates are not an image or narrative of the actual fingerprint or voice. In basic terms, templates are numerical representations of key points taken from a person's body. The template is regularly small in terms of computer memory use, and this allows for quick processing, which is a hallmark of biometric authentication. The template must be stored somewhere so that subsequent templates, created when a user tries to way the law using a sensor, can be compared. Some biometric experts claim it is impossible to reverse-engineer, or recreate, a person's print or image from the biometric template.

Matching

Matching is the comparison of two templates, the template produced at the time of enrollment (or at previous sessions, if there is continuous updating) with the one produced "on the spot" as a user tries to gain way by providing a biometric via a sensor. There are three ways a match can fail:

  • Failure to enroll.
  • False match.
  • False nonmatch.

Failure to enroll (or acquire) is the failure of the technology to extract distinguishing features accepted to that technology. For example, a small percentage of the population fails to enroll in fingerprint-based biometric authentication systems. Two reasons inventory for this failure: the individual's fingerprints are not distinctive adequate to be picked up by the system, or the distinguishing characteristics of the individual's fingerprints have been altered because of the individual's age or occupation, e.g., an elderly bricklayer.

In addition, the possibility of a false match (Fm) or a false nonmatch (Fnm) exists. These two terms are oftentimes misnomered "false acceptance" and "false rejection," respectively, but these terms are application-dependent in meaning. Fm and Fnm are application-neutral terms to spin the matching process between a live sample and a biometric template. A false match occurs when a sample is incorrectly matched to a template in the database (i.e., an imposter is accepted). A false non-match occurs when a sample is incorrectly not matched to a truly matching template in the database (i.e., a legitimate match is denied). Rates for Fm and Fnm are calculated and used to make tradeoffs between protection and convenience. For example, a heavy protection emphasis errs on the side of denying legitimate matches and does not tolerate acceptance of imposters. A heavy emphasis on user convenience results in miniature tolerance for denying legitimate matches but will tolerate some acceptance of imposters.

Biometric Technologies:

The function of a biometric technologies authentication law is to facilitate controlled way to applications, networks, personal computers (Pcs), and bodily facilities. A biometric authentication law is essentially a formula of establishing a person's identity by comparing the binary code of a uniquely specific biological or bodily characteristic to the binary code of an electronically stored characteristic called a biometric. The defining factor for implementing a biometric authentication law is that it cannot fall prey to hackers; it can't be shared, lost, or guessed. Plainly put, a biometric authentication law is an effective way to replace the original password based authentication system. While there are many possible biometrics, at least eight mainstream biometric authentication technologies have been deployed or pilot-tested in applications in the social and secret sectors and are grouped into two as given,

  • facial recognition,
  • voice recognition
  • iris scan,
  • retinal scan,

Contact Biometric Technologies:

For the purpose of this study, a biometric technology that requires an personel to make direct touch with an electronic expedient (scanner) will be referred to as a touch biometric. Given that the very nature of a touch biometric is that a person desiring way is required to make direct touch with an electronic expedient in order to attain logical or bodily access. Because of the possible need of a person to make direct contact, many population have come to think a touch biometric to be a technology that encroaches on personal space and to be intrusive to personal privacy.

Fingerprint

The fingerprint biometric is an self-operating digital version of the old ink-and-paper formula used for more than a century for identification, primarily by law promulgation agencies. The biometric expedient involves users placing their finger on a platen for the print to be read. The minutiae are then extracted by the vendor's algorithm, which also makes a fingerprint pattern analysis. Fingerprint template sizes are typically 50 to 1,000 bytes. Fingerprint biometrics currently have three main application arenas: large-scale self-operating Finger Imaging Systems (Afis) generally used for law promulgation purposes, fraud prevention in entitlement pro-grams, and bodily and computer access.

Hand/Finger Geometry

Hand or finger geometry is an self-operating determination of many dimensions of the hand and fingers. Neither of these methods takes actual prints of the palm or fingers. Only the spatial geometry is examined as the user puts his hand on the sensor's outside and uses guiding poles between the fingers to properly place the hand and get underway the reading. Hand geometry templates are typically 9 bytes, and finger geometry templates are 20 to 25 bytes. Finger geometry regularly measures two or three fingers. Hand geometry is a well-developed technology that has been completely field-tested and is de facto accepted by users.

Dynamic Signature Verification

Dynamic signature verification is an self-operating formula of examining an individual's signature. This technology examines such dynamics as speed, direction, and pressure of writing; the time that the stylus is in and out of touch with the "paper"; the total time taken to make the signature; and where the stylus is raised from and lowered onto the "paper." Dynamic signature verification templates are typically 50 to 300 bytes.

Keystroke Dynamics

Keystroke dynamics is an self-operating formula of examining an individual's keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time of typing a singular password, and the time a user takes between hitting definite keys. This technology's algorithms are still being industrialized to improve robustness and distinctiveness. One potentially beneficial application that may emerge is computer access, where this biometric could be used to verify the computer user's identity continuously.

Contactless Biometric Technologies:

A contactless biometric can whether come in the form of a passive (biometric expedient continuously monitors for the literal, activation frequency) or active (user initiates activation at will) biometric. In whether event, authentication of the user biometric should not take place until the user voluntarily agrees to present the biometric for sampling. A contactless biometric can be used to verify a persons identity and offers at least two dimension that touch biometric technologies cannot match. A contactless biometric is one that does not want undesirable touch in order to extract the required data sample of the biological characteristic and in that respect a contactless biometric is most adaptable to population of changeable capability levels.

Facial Recognition

Facial recognition records the spatial geometry of distinguishing features of the face. Separate vendors use Separate methods of facial recognition, however, all focus on measures of key features. Facial recognition templates are typically 83 to 1,000 bytes. Facial recognition technologies can encounter carrying out problems stemming from such factors as no cooperative behavior of the user, lighting, and other environmental variables. Facial recognition has been used in projects to recognize card counters in casinos, shoplifters in stores, criminals in targeted urban areas, and terrorists overseas.

Voice Recognition

Voice or speaker recognition uses vocal characteristics to recognize individuals using a pass-phrase. Voice recognition can be affected by such environmental factors as background noise. Additionally it is unclear whether the technologies de facto recognize the voice or just the pronunciation of the pass-phrase (password) used. This technology has been the focus of considerable efforts on the part of the telecommunications manufactures and Nsa, which continue to work on

improving reliability. A telephone or microphone can serve as a sensor, which makes it a relatively cheap and de facto deployable technology.

Iris Scan

Iris scanning measures the iris pattern in the colored part of the eye, although the iris color has nothing to do with the biometric. Iris patterns are formed randomly. As a result, the iris patterns in your left and right eyes are different, and so are the iris patterns of identical-cal twins. Iris scan templates are typically nearby 256 bytes. Iris scanning can be used quickly for both identification and verification

Applications because of its large amount of degrees of freedom. Current pilot programs and applications include Atms ("Eye-Tms"), grocery market (for checking out), and the few International Airports (physical access).

Retinal Scan

Retinal scans quantum the blood vessel patterns in the back of the eye. Retinal scan templates are typically 40 to 96 bytes. Because users perceive the technology to be somewhat intrusive, retinal scanning has not gained popularity with end-users. The expedient involves a light source shined into the eye of a user who must be standing very still within inches of the device. Because the retina can turn with definite medical conditions, such as pregnancy, high blood pressure, and Aids, this biometric might have the possible to spin more facts than just an individual's identity.

Emerging biometric technologies:

Many inventors, companies, and universities continue to hunt the frontier for the next biometric that shows possible of becoming the best. Emerging biometric is a biometric that is in the infancy stages of proven technological maturation. Once proven, an emerging biometric will evolve in to that of an established biometric. Such types of emerging technologies are the following:

  • Brainwave Biometric
  • Dna Identification
  • Vascular Pattern Recognition
  • Body Odor Recognition
  • Fingernail Bed Recognition
  • Gait Recognition
  • Handgrip Recognition
  • Ear Pattern Recognition
  • Body Salinity Identification
  • Infrared Fingertip Imaging & Pattern Recognition

Security Issues:

The most common standardized encryption formula used to gather a company's infrastructure is the social Key Infrastructure (Pki) approach. This approach consists of two keys with a binary string fluctuating in size from 1024-bits to 2048-bits, the first key is a social key (widely known) and the second key is a secret key (only known by the owner). However, the Pki must also be stored and inherently it too can fall prey to the same authentication limitation of a password, Pin, or token. It too can be guessed, lost, stolen, shared, hacked, or circumvented; this is even added justification for a biometric authentication system. Because of the buildings of the technology industry, manufacture biometric protection a feature of embedded systems, such as cellular phones, may be simpler than adding similar features to Pcs. Unlike the personal computer, the cell phone is a fixed-purpose device. To successfully consolidate Biometrics, cell-phone developers need not gather hold from nearly as many groups as Pc-application developers must.

Security has always been a major concern for enterprise executives and facts technology professionals of all entities. A biometric authentication law that is correctly implemented can furnish unparalleled security, enhanced convenience, heightened accountability, classic fraud detection, and is very effective in discouraging fraud. Controlling way to logical and bodily assets of a enterprise is not the only concern that must be addressed. Companies, executives, and protection managers must also take into inventory protection of the biometric data (template). There are many urban biometric legends about cutting off person finger or removing a body part for the purpose of gain access. This is not true for once the blood furnish of a body part is taken away, the unique details of that body part starts to deteriorate within minutes. Hence the unique details of the severed body part(s) is no longer in any condition to function as an accepted input for scanners.

The best extensive way to gather an enterprise infrastructure, whether it be small or large is to use a smart card. A smart card is a portable expedient with an embedded central processing unit (Cpu). The smart card can whether be fashioned to look a prestige card, identification card, radio frequency identification (Rfid), or a Personal Computer Memory Card International relationship (Pcmcia) card. The smart card can be used to store data of all types, but it is generally used to store encrypted data, human resources data, medical data, financial data, and biometric data (template). The smart card can be way via a card reader, Pcmcia slot, or proximity reader. In most biometric-security applications, the law itself determines the identity of the person who presents himself to the system. Usually, the identity is supplied to the system, often by presenting a machine-readable Id card, and then the law asked to confirm. This question is "one-to- one matching." Today's Pcs can show the way a one-to-one match in, at most, a few seconds. One-to-one matching differs significantly from one-to-many matching. In a law that market a million sets of prints, a one-to-many match requires comparing the presented fingerprint with 10 million prints (1 million sets times 10 prints/set). A smart card is a must when implementing a biometric authentication system; only by the using a smart card can an organization satisfy all protection and legal requirements. Smart cards possess the basic elements of a computer (interface, processor, and storage), and are therefore very capable of performing authentication functions right on the card.

The function of performing authentication within the confines of the card is known as 'Matching on the Card (Moc)'. From a protection prospective Moc is ideal as the biometric template, biometric sampling and linked algorithms never leave the card and as such cannot be intercepted or spoofed by others (Smart Card Alliance). The question with smart cards is the public-key infrastructure certificates built into card does not solve the question of person stealing the card or creating one. A Ttp (Trusted Third Party) can be used to verify the authenticity of a card via an encrypted Mac (Media way Control).

Cultural Barriers/Perceptions:

People as diverse as those of changeable abilities are branch to many barriers, theories, concepts, and practices that stem from the relative culture (i.e. Stigma, dignity or heritage) and perceptions (i.e. Religion or philosophical) of the international community. These factors are so great that they could encompass a study of their own. To that end, it is also theorized that to a definite degree that the application of diversity factors from current theories, concepts, and practices may be capable of providing a sturdy framework to the management of employees with disabilities. Moreover, it has been implied that the term diversity is a synonymous reflection of the initiatives and objectives of affirmative action policies. The thought of diversity in the workplace de facto refers to the differences embodied by the workforce members at large. The differences between all employees in the workforce can be equated to those employees of Separate or diverse ethnic origin, racial descent, gender, sexual orientation, chronological maturity, and ability; in ensue minorities.

Advantages Of Biometric Technologies:

Biometric technologies can be applied to areas requiring logical way solutions, and it can be used to way applications, personal computers, networks, financial accounts, human reserved supply records, the telephone system, and invoke customized profiles to improve the mobility of the disabled. In a business-to-business scenario, the biometric authentication law can be linked to the enterprise processes of a enterprise to increase accountability of financial systems, vendors, and provider transactions; the results can be very beneficial.

The global reach of the Internet has made the services and products of a enterprise ready 24/7, in case,granted the buyer has a user name and password to login. In many cases the buyer may have forgotten his/her user name, password, or both. The buyer must then take steps to retrieve or reset his/her lost or forgotten login information. By implementing a biometric authentication law consumers can opt to register their biometric trait or smart card with a company's business-to-consumer e-commerce environment, which will allow a buyer to way their inventory and pay for goods and services (e-commerce). The benefit is that a buyer will never lose or forget his/her user name or password, and will be able to show the way enterprise at their convenience. A biometric authentications law can be applied to areas requiring bodily way solutions, such as entry into a building, a room, a safe or it may be used to start a motorized vehicle. Additionally, a biometric authentication law can de facto be linked to a computer-based application used to monitor time and attendance of employees as they enter and leave enterprise facilities. In short, contactless biometrics can and do lend themselves to population of all capability levels.

Disadvantages Of Biometric Technologies:

Some people, especially those with disabilities may have problems with touch biometrics. Not because they do not want to use it, but because they undergo a disability that whether prevents them from maneuvering into a position that will allow them to make use the biometric or because the biometric authentication law (solution) is not adaptable to the user. For example, if the user is blind a voice biometric may be more appropriate.

Biometric Applications:

Most biometric applications fall into one of nine general categories:

  • Financial services (e.g., Atms and kiosks).
  • Immigration and border operate (e.g., points of entry, precleared frequent travelers, passport and visa issuance, asylum cases).
  • Social services (e.g., fraud prevention in entitlement programs).
  • Health care (e.g., protection quantum for privacy of medical records).
  • Physical way operate (e.g., institutional, government, and residential).
  • Time and attendance (e.g., exchange of time punch card).
  • Computer protection (e.g., personal computer access, network access, Internet use, e-commerce, e-mail, encryption).
  • Telecommunications (e.g., movable phones, call center technology, phone cards, televised shopping).
  • Law promulgation (e.g., criminal investigation, national Id, driver's license, correctional institutions/prisons, home confinement, smart gun).

Conclusion:

Currently, there exist a gap between the amount of feasible biometric projects and knowledgeable experts in the field of biometric technologies. The post September 11 th, 2002 strike (a.k.a. 9-11) on the World Trade Center has given rise to the knowledge gap. Post 9-11 many nations have recognized the need for increased protection and identification protocols of both domestic and international fronts. This is however, changing as studies and curriculum linked to biometric technologies are starting to be offered at more colleges and universities. A formula of conclusion the biometric knowledge gap is for knowledge seekers of biometric technologies to partake in biometric seminar groups and biometric standards committees.

The solutions only needs the user to possess a minimum of want user knowledge and effort. A biometric clarification with minimum user knowledge and attempt would be very welcomed to both the purchase and the end user. But, keep in mind that at the end of the day all that the end users care about is that their computer is functioning correctly and that the interface is friendly, for users of all capability levels. Alternative methods of authenticating a person's identity are not only a good convention for manufacture biometric systems accessible to population of changeable capability level. But it will also serve as a viable alternative formula of dealing with authentication and enrollment errors.

Auditing processes and procedures on a quarterly basis while and after factory is an exquisite formula of ensuring that the clarification is functioning within general parameters. A well-orchestrated biometric authentication clarification should not only prevent and detect an impostor in instantaneous, but it should also keep a gather log of the transaction activities for prosecution of impostors. This is especially important, because a great deal of Id theft and fraud involves employees and a gather log of the transaction activities will furnish the means for prosecution or quick resolution of altercations.

References:

  • Pankanti S, Bolle R & Jain A, Biometrics:The hereafter of Identification
  • Nalwa V, self-operating on-line signature verification
  • Biometric Consortium homepage, http://Www.biometrics.org

Biometrics

Relate Link iPad3Sale.net on Facebook Appliance Supplies Store 26inch Hdtv Hair Clippers Professional

No comments:

Post a Comment