Saturday 14 April 2012

BIO-METRIC TECHNOLOGY

Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Also, frequently travelers use a faster way to identify themselves in airports checkpoints, they used what its called biometric passport, also known as e-passport or a digital passport. Its a combination of paper and a microprocessor chip. The same information printed on the passport, the microchip also has. It’s just a faster way when getting through a lot of checkpoints that are now using this contact less smart card technology, they can just be scanned and it insures the identity of that person.



New technology has been discovered in the bio-metric field. Technology now have a device to record your. "Bio-metric signature, in other words, the pattern of your heartbeats. This device consist of a small computer mouse with two metal contacts, each hand have to be touching both metal contacts for a few seconds which completes the circuit necessary to record your biodynamic signature. The signature includes a genetic and physiological components, meaning that it can not be altered by any activity. Experts in this field are suggesting that since it is a new technology, that it is suspected to machine and human error.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. The two categories of biometric identifiers include physiological and behavioral characteristics. A biometric would identify by ones voice, DNA, hand print or behavior. Behavioral characteristics are related to the behavior of a person, including but not limited to: typing rhythmgait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. 

Bio-metric Functionality
Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors. 


Jain et al. (1999) identified seven such factors to be used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using a system should possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant population such that they can be distinguished from one another. Permanence relates to the manner in which a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of acquisition or measurement of the trait. 


In addition, acquired data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of technology used (see performance section for more details).Acceptability relates to how well individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be imitated using an artifact or substitute.

The basic block diagram of a bio-metric system
No single biometric will meet all the requirements of every possible application. 




A biometric system can operate in the following two modes. In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step. This process may use a smart card, username or ID number (e.g. PIN) to indicate which template should be used for comparison. 'Positive recognition' is a common use of verification mode, "where the aim is to prevent multiple people from using same identity".

In Identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for 'positive recognition' (so that the user does not have to provide any information about the template to be used) or for 'negative recognition' of the person "where the system establishes whether the person is who she (implicitly or explicitly) denies to be". The latter function can only be achieved through biometrics since other methods of personal recognition such as passwords, PINs or keys are ineffective.

The first time an individual uses a biometric system is called enrollment. During the enrollment, biometric information from an individual is captured and stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. The first block (sensor) is the interface between the real world and the system; it has to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalization, etc. In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted in the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of the relevant characteristics extracted from the source. Elements of the biometric measurement that are not used in the comparison algorithm are discarded in the template to reduce the file size and to protect the identity of the enrollee[citation needed].

If enrollment is being performed, the template is simply stored somewhere (on a card or within a database or both). If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area)[citation needed]. Selection of biometrics in any practical application depending upon the characteristic measurements and user requirements. We should consider Performance, Acceptability, Circumvention, Robustness, Population coverage, Size, Identity theft deterrence in selecting a particular biometric. Selection of biometric based on user requirement considers Sensor availability, Device availability, Computational time and reliability, Cost, Sensor area and power consumption.

Technologies
  • Palm Print Recognition
  • Fingerprint Recognition
  • Hand Geometry
  • Dynamic Signature
  • Vascular Pattern Recognition
  • Iris Recognition
  • Face Recognition
  • Speaker Recognition
FACE:

A brief glance at the face is enough for most people to identify one another. Face recognition technology can be just as swift.

2D face recognition involves making a unique template from measurements between key points on the face.

This can be done from a live image or from a clear photograph - a method being used with the issue of new biometric passports in the UK.

Face recognition is being used by some authorities to scan crowds to identify suspects whose faces have been logged on a database.
However, some of the technology may be easy to fool through ageing or face coverings and there are privacy concerns over surveillance uses.

IRIS:

Iris scanning measures patterns on the coloured part of the eye - the iris.
The tissue has a unique pattern of markings which does not change and is different for each eye.

Iris scanners read from the outer edge towards the pupil, detecting and plotting the markings.

Data is saved and stored within a chip, on a passport or ID card for example, which will be verified when the eye is scanned in future.

While iris scanning is fast and accurate, its accuracy can be affected by objects obscuring the eye and may not be suitable for people with cataracts.

FINGER:

Using fingerprints is the oldest method of identification.

In the digital world, the fingerprint is electronically read by a sensor plate.
The corrugated ridges of the skin are non-continuous and form a pattern that has distinguishing features, or minutiae.

The minutiae can be plotted and joined up to form a template that can be stored and compared against fingerprints in the future.

Some readings may be affected by fingerprints that have been damaged through injury and some sensors may not be able to read fingers that are too wet or too dry.

GLOSSARY:

Identification/One-to-many: Sample is compared to all biometric data saved in a system. It seeks to find an identity, rather than verify a claimed one.
Some systems identify subjects by comparing multiple files

Verification/One-to-one: Comparison of sample with previously enrolled template to determine if from same person.

Slaps: Fingerprints taken by simultaneously pressing four fingers of one hand onto a scanner.  
Fingers can be scanned individually or together as 'slaps'
                                                                     
False Acceptance Rate: Probability that a system will incorrectly identify an individual or fail to reject an impostor.

False Rejection Rate: Probability that a system will fail to identify a registered user.


Enrolment: Process of collecting a biometric, converting it into a biometric reference and storing it for later comparison.

Most systems require the subject to be present for enrollment

Liveness detection: Ensures only characteristics from a living person can be stored, read or used.


Multimodal Biometric System: A system that uses two or more biometric characteristics or sensor types.

No comments:

Post a Comment