Biometrics (or biometric authentication) refers
to the identification of humans by their characteristics or traits. Computer
science, biometrics to be specific, is used as a form of identification and access
control. It is also used to identify individuals in groups
that are under surveillance.
Also, frequently travelers use a faster way to identify themselves in airports
checkpoints, they used what its called biometric passport, also known as e-passport or
a digital passport. Its a combination of paper and a microprocessor chip. The
same information printed on the passport, the microchip also has. It’s just a
faster way when getting through a lot of checkpoints that are now using this contact
less smart card technology, they can just be scanned and it insures the
identity of that person.
New technology has been discovered in the bio-metric field. Technology now have a device to record your. "Bio-metric signature, in other words, the pattern of your heartbeats. This device consist of a small computer mouse with two metal contacts, each hand have to be touching both metal contacts for a few seconds which completes the circuit necessary to record your biodynamic signature. The signature includes a genetic and physiological components, meaning that it can not be altered by any activity. Experts in this field are suggesting that since it is a new technology, that it is suspected to machine and human error.
New technology has been discovered in the bio-metric field. Technology now have a device to record your. "Bio-metric signature, in other words, the pattern of your heartbeats. This device consist of a small computer mouse with two metal contacts, each hand have to be touching both metal contacts for a few seconds which completes the circuit necessary to record your biodynamic signature. The signature includes a genetic and physiological components, meaning that it can not be altered by any activity. Experts in this field are suggesting that since it is a new technology, that it is suspected to machine and human error.
Biometric identifiers are the distinctive, measurable characteristics used to
label and describe individuals. The two categories of biometric
identifiers include physiological and behavioral characteristics. A biometric would identify by ones voice, DNA, hand
print or behavior. Behavioral characteristics are related to the
behavior of a person, including but not limited to: typing rhythm, gait,
and voice. Some researchers have coined the
term behaviometrics to describe the latter class of biometrics.
More
traditional means of access control include token-based identification systems,
such as a driver's license or passport,
and knowledge-based identification systems, such as a password or personal identification number. Since
biometric identifiers are unique to individuals, they are more reliable in
verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate
use of this information.
Bio-metric Functionality
Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors.
Jain et al. (1999) identified seven such factors to be used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using a system should possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant population such that they can be distinguished from one another. Permanence relates to the manner in which a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of acquisition or measurement of the trait.
In addition, acquired data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of technology used (see performance section for more details).Acceptability relates to how well individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be imitated using an artifact or substitute.
Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors.
Jain et al. (1999) identified seven such factors to be used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using a system should possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant population such that they can be distinguished from one another. Permanence relates to the manner in which a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of acquisition or measurement of the trait.
In addition, acquired data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of technology used (see performance section for more details).Acceptability relates to how well individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be imitated using an artifact or substitute.
A biometric system can operate in the following two modes. In verification mode the system performs a
one-to-one comparison of a captured biometric with a specific template stored
in a biometric database in order to verify the individual is the person they
claim to be. Three steps involved in person verification. In the first
step, reference models for all the users are generated and stored in the model
database. In the second step, some samples are matched with reference models to
generate the genuine and impostor scores and calculate the threshold. Third
step is the testing step. This process may use a smart card,
username or ID number (e.g. PIN) to indicate which
template should be used for comparison. 'Positive recognition' is a common
use of verification mode, "where the aim is to prevent multiple people
from using same identity".
In Identification mode the system
performs a one-to-many comparison against a biometric database in attempt to
establish the identity of an unknown individual. The system will succeed in
identifying the individual if the comparison of the biometric sample to a
template in the database falls within a previously set threshold.
Identification mode can be used either for 'positive recognition' (so that the
user does not have to provide any information about the template to be used) or
for 'negative recognition' of the person "where the system establishes
whether the person is who she (implicitly or explicitly) denies to be". The
latter function can only be achieved through biometrics since other methods of
personal recognition such as passwords, PINs or keys are ineffective.
The first
time an individual uses a biometric system is called enrollment. During
the enrollment, biometric information from an individual is captured and
stored. In subsequent uses, biometric information is detected and compared with
the information stored at the time of enrollment. Note that it is crucial that
storage and retrieval of such systems themselves be secure if the biometric
system is to be robust. The first block (sensor) is the interface between the
real world and the system; it has to acquire all the necessary data. Most of
the times it is an image acquisition system, but it can change according to the
characteristics desired. The second block performs all the necessary
pre-processing: it has to remove artifacts from the sensor, to enhance the
input (e.g. removing background noise), to use some kind of normalization, etc.
In the third block necessary features are extracted. This step is an important
step as the correct features need to be extracted in the optimal way. A vector
of numbers or an image with particular properties is used to create a template.
A template is a synthesis of the relevant characteristics extracted from the
source. Elements of the biometric measurement that are not used in the
comparison algorithm are discarded in the template to reduce the file size and
to protect the identity of the enrollee[citation
needed].
If
enrollment is being performed, the template is simply stored somewhere (on a
card or within a database or both). If a matching phase is being performed, the
obtained template is passed to a matcher that compares it with other existing
templates, estimating the distance between them using any algorithm (e.g. Hamming
distance). The matching program will analyze the template with the
input. This will then be output for any specified use or purpose (e.g. entrance
in a restricted area)[citation
needed]. Selection of biometrics in any practical application
depending upon the characteristic measurements and user requirements. We should
consider Performance, Acceptability, Circumvention, Robustness, Population
coverage, Size, Identity theft deterrence in selecting a particular biometric. Selection
of biometric based on user requirement considers Sensor availability, Device
availability, Computational time and reliability, Cost, Sensor area and power
consumption.
Technologies
- Palm Print Recognition
- Fingerprint Recognition
- Hand Geometry
- Dynamic Signature
- Vascular Pattern Recognition
- Iris Recognition
- Face Recognition
- Speaker Recognition
FACE:
A brief glance at the face is enough for most people to identify one another. Face recognition technology can be just as swift.
2D face recognition involves making a unique template from measurements between key points on the face.
This can be done from a live image or from a clear photograph - a method being used with the issue of new biometric passports in the UK.
Face recognition is being used by some authorities to scan crowds to identify suspects whose faces have been logged on a database.
However, some of the technology may be easy to fool through ageing or face coverings and there are privacy concerns over surveillance uses.
IRIS:
Iris scanning measures patterns on the coloured part of the eye - the iris.
The tissue has a unique pattern of markings which does not change and is different for each eye.
Iris scanners read from the outer edge towards the pupil, detecting and plotting the markings.
Data is saved and stored within a chip, on a passport or ID card for example, which will be verified when the eye is scanned in future.
While iris scanning is fast and accurate, its accuracy can be affected by objects obscuring the eye and may not be suitable for people with cataracts.
FINGER:
Using fingerprints is the oldest method of identification.
In the digital world, the fingerprint is electronically read by a sensor plate.
The corrugated ridges of the skin are non-continuous and form a pattern that has distinguishing features, or minutiae.
The minutiae can be plotted and joined up to form a template that can be stored and compared against fingerprints in the future.
Some readings may be affected by fingerprints that have been damaged through injury and some sensors may not be able to read fingers that are too wet or too dry.
GLOSSARY:
Identification/One-to-many: Sample is compared to all biometric data saved in a system. It seeks to find an identity, rather than verify a claimed one.
Some systems identify subjects by comparing multiple files |
Verification/One-to-one: Comparison of sample with previously enrolled template to determine if from same person.
Slaps: Fingerprints taken by simultaneously pressing four fingers of one hand onto a scanner.
Fingers can be scanned individually or together as 'slaps' |
False Acceptance Rate: Probability that a system will incorrectly identify an individual or fail to reject an impostor.
False Rejection Rate: Probability that a system will fail to identify a registered user.
Enrolment: Process of collecting a biometric, converting it into a biometric reference and storing it for later comparison.
Liveness detection: Ensures only characteristics from a living person can be stored, read or used.
Multimodal Biometric System: A system that uses two or more biometric characteristics or sensor types.
Enrolment: Process of collecting a biometric, converting it into a biometric reference and storing it for later comparison.
Most systems require the subject to be present for enrollment
|
Multimodal Biometric System: A system that uses two or more biometric characteristics or sensor types.
No comments:
Post a Comment