Biometrics Seclusion to Technology

11
Biometrics Seclusion to Technology B.Thaladiyan M.Phil Scholar, Department of Computer Science, KG College of Arts and Science, Saravanampatti. [email protected] Abstract - The present century has been one of many scientific discoveries and technological advancements. With the advent of technology came the issue of security. As computing systems became more complicated, there was an increasing need for security. This paper deals with the concept of Biometrics which gives security to various ways. There are two security methodologies Token-based security and Secret based security. This identifies the psychological and behavioral characteristics of the user. Web-Based Enterprise Management (WBEM) supports a limited form of security for the Microsoft Windows XP. There are many security mechanisms which are followed in protecting the password, our paper discuss some of those techniques. There are several types of verification methods. They are psychological verification, behavioral verification etc. in turn the above methods have sub methods along with their advantages and disadvantages. The various possible methods in implementing biometrics are discussed in this paper. KeywordsBertillonage, Dilation, Vascular patterns. I. INTRODUCTION Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. In the most contemporary computer science applications, the term "life measurement" adapts a slightly different role. Biometrics in the high technology sector refers to a particular class of identification technologies. These technologies use an individual's unique biological traits to determine one's identity. The traits that are considered include fingerprints, retina and iris patterns, facial characteristics and many more.

Transcript of Biometrics Seclusion to Technology

Biometrics Seclusion to Technology B.Thaladiyan

M.Phil Scholar, Department of Computer Science,KG College of Arts and Science, Saravanampatti.

[email protected]

Abstract - The present century has been one of

many scientific discoveries and technological

advancements. With the advent of technology

came the issue of security. As computing

systems became more complicated, there was an

increasing need for security. This paper deals

with the concept of Biometrics which gives

security to various ways. There are two

security methodologies Token-based security

and Secret based security. This identifies the

psychological and behavioral characteristics

of the user. Web-Based Enterprise Management

(WBEM) supports a limited form of security for

the Microsoft Windows XP. There are many

security mechanisms which are followed in

protecting the password, our paper discuss

some of those techniques. There are several

types of verification methods. They are

psychological verification, behavioral

verification etc. in turn the above methods

have sub methods along with their advantages

and disadvantages. The various possible

methods in implementing biometrics are

discussed in this paper.

Keywords— Bertillonage, Dilation, Vascular patterns.

I. INTRODUCTION

Biometrics comprises methods for

uniquely recognizing humans based upon

one or more intrinsic physical or

behavioral traits. In computer science,

in particular, biometrics is used as a

form of identity access management and

access control. It is also used to

identify individuals in groups that are

under surveillance. In the most

contemporary computer science

applications, the term "life measurement"

adapts a slightly different role.

Biometrics in the high technology sector

refers to a particular class of

identification technologies. These

technologies use an individual's unique

biological traits to determine one's

identity. The traits that are considered

include fingerprints, retina and iris

patterns, facial characteristics and many

more.

It is possible to understand if a

human characteristic can be used for

biometrics in terms of the following

parameters:

Universality – each person should

have the characteristic.

Uniqueness – is how well the

biometric separates individuals

from another.

Permanence – measures how well a

biometric resists aging and other

variance over time.

Collectability – ease of

acquisition for measurement.

Performance – accuracy, speed, and

robustness of technology used.

Acceptability – degree of approval

of a technology.

Circumvention – ease of use of a

substitute.

A biometric system can operate in the

following two modes

A. Verification

A one to one comparison of a captured

biometric with a stored template to

verify that the individual is who he

claims to be. Can be done in conjunction

with a smart card, username or ID number.

B. Identification

A one to many comparison of the

captured biometric against a biometric

database in attempt to identify an

unknown individual. The identification

only succeeds in identifying the

individual if the comparison of the

biometric sample to a template in the

database falls within a previously set

threshold.

II. PERFORMANCE

The following are used as performance

metrics for biometric systems:

A. False Accept Rate or False Match Rate (FAR

or FMR).

The probability that the system

incorrectly matches the input pattern

to a non-matching template in the

database. It measures the percent of

invalid inputs which are incorrectly

accepted.

B. False reject rate or false non-match rate (FRR or

FNMR)

The probability that the system

fails to detect a match between the

input pattern and a matching template

in the database. It measures the

percent of valid inputs which are

incorrectly rejected.

C. Receiver operating characteristic or relative

operating characteristic (ROC)

The ROC plot is a visual

characterization of the trade-off

between the FAR and the FRR. In

general, the matching algorithm

performs a decision based on a

threshold which determines how close

to a template the input needs to be

for it to be considered a match. If

the threshold is reduced, there will

be less false non-matches but more

false accepts. Correspondingly, a

higher threshold will reduce the FAR

but increase the FRR. A common

variation is the Detection error

trade-off (DET), which is obtained

using normal deviate scales on both

axes. This more linear graph

illuminates the differences for higher

performances (rarer errors).

D. Equal error rate or crossover error rate (EER or CER)

The rates at which both accept and

reject errors are equal. The value of the

EER can be easily obtained from the ROC

curve. The EER is a quick way to compare

the accuracy of devices with different

ROC curves. In general, the device with

the lowest EER is most accurate.

E. Failure to enroll rate (FTE or FER)

The rate at which attempts to

create a template from an input is

unsuccessful. This is most commonly

caused by low quality inputs.

F. Failure to capture rate (FTC)

Within automatic systems, the

probability that the system fails to

detect a biometric input when

presented correctly.

G. Template capacity

The maximum number of sets of data

which can be stored in the system.

III. BIOMETRICS CLASSIFICATIONS

A. Physical Biometrics:

Bertillonage - measuring body

length’s.

Fingerprint - analyzing fingertip

patterns

Facial Recognition - measuring

facial characteristics

Hand Geometry - measuring the

shape of the hand

Retinal Scan - analyzing blood

vessels in the eye

Vascular Patterns - analyzing vein

patterns

DNA - analyzing genetic makeup

B. Behavioral Biometrics Solutions:

Speaker Recognition - analyzing

vocal behavior.

Signature - analyzing signature

dynamics.

Keystroke - measuring the time

spacing of typed words

IV. BERTILLONAGE BIOMETRICS

Bertillonage biometrics was a late

19th century method of identifying

individuals by the use of multiple bodily

measurements. Bertillonage biometrics is

no longer used.

A. The Process

An individual is required to go

through a 20-60 minute measuring exam

where they would have various body

measurements taken. These measurements

would ideally include the height, length,

and breadth of the head, the length of

different fingers, the length of

forearms, etc. The results obtained were

then recorded and/or compared to a record

database.

Though

all this

was done

by hand,

the

record filing and checking system was

quite fast for its time. (Remember we are

talking about the 19th century!)

B. Evaluation Results for Bertillonage biometrics

Predicted to be accurate at

286,435,456 to 1 allowing for possible

(and eventually proven) duplicates, human

error in measuring contributed to a

smaller effective accuracy. Non-unique

measurements allowed for multiple people

to have the same results, reducing the

usefulness of this method. Also, the time

involved to measure a subject was

prohibitive for uses other than prison

records.

V. BIOMETRICS FINGERPRINT

Lets understand what

"fingerprinting" is, before we start on

with biometrics fingerprint technology.

Fingerprinting basically means to take an

of an individual's fingertips and then

store or records its characteristics. The

whorls, arches, and loops are what make

up these characteristics of a fingertip.

These are recorded along with the

patterns of ridges, furrows, and

minutiae.

A. The Process

The user places his finger against

a small biometrics fingerprint reader (or

biometrics fingerprint scanner) surface

(optical or silicon) usually of about 2

inch square size. This biometrics

fingerprint reader is attached to a

computer and takes the information from

the scan and sends it to the database.

There it is compared to the information

stored within. The user is usually

required to leave his finger on the

reader for less than 5 seconds during

which time the identification or

verification takes place.

To prevent fake fingers from being

used, many biometrics fingerprint systems

also measure blood flow, or check for

correctly arrayed ridges at the edges of

the fingers.

B. Evaluation

In the digital arena, the software

will map the minutiae points in relative

placement on the fingertip and then will

search for similar minutiae information

in the database.

Often an algorithm is used for

biometrics fingerprint systems. This

algorithm will encode the information

into a character string that can be

searched for in the database, improving

search time.

This method was meant to alleviate

the public's fear of their biometrics

fingerprint being recorded or stolen, but

most people still do not understand or

believe the actual method use.

Fig 1. Finger print Evaluation

VI. BIOMETRIC FACIAL RECOGNITION

Biometric Facial recognition

analyzes the characteristics of an

individual's face images captured through

a digital video camera. It records the

overall facial structure, including

distances between eyes, nose, mouth, and

jaw edges. These measurements are stored

in a database and used as a comparison

when a user stands before the camera.

Biometric facial recognition has

been widely, touted as a fantastic system

for recognizing potential threats

(whether terrorists, scam artists, or

known criminals) but so far it has been

unproven in high-level usage. It is

currently used in verification only

systems with a good deal of success.

A. The Process

User

faces the

camera,

standing

about two

feet from

it. The

system will locate the user's face and

perform matches against the claimed

identity on the facial database. It is

possible that the user may need to move

and reattempt the verification based on

his facial position. The system usually

gives a decision in less than 5 seconds.

To prevent a fake face or mold from

faking out the system, many systems now

require the user to smile, blink, or

otherwise move in a way that is human

before verifying.

B. Skin texture analysis:

Another emerging trend uses the

visual details of the skin, as captured

in standard digital or scanned images.

This technique, called skin texture

analysis, turns the unique lines,

patterns, and spots apparent in a

person’s skin into a mathematical space.

Tests have shown that with the addition

of skin texture analysis, performance in

recognizing faces can increase 20 to 25

percent.

Fig 2. Skin texture analysis

C. Comparative Study

Among the different biometric

techniques, facial recognition may not be

the most reliable and efficient. However,

one key advantage is that it does not

require aid (or consent) from the test

subject. Properly designed systems

installed in airports, multiplexes, and

other public places can identify

individuals among the crowd. Other

biometrics like fingerprints, iris scans,

and speech recognition cannot perform

this kind of mass identification.

However, questions have been raised

on the effectiveness of facial

recognition software in cases of railway

and airport security

D. Criticisms

Face recognition is not perfect and

struggles to perform under certain

conditions. It has been getting pretty

good at full frontal faces and 20 degrees

off, but as soon as you go towards

profile, there've been problems.

Other conditions where face

recognition does not work well include

poor lighting, sunglasses, long hair, or

other objects partially covering the

subject’s face, and low resolution

images.

Another serious disadvantage is

that many systems are less effective if

facial expressions vary. Even a big smile

can render in the system less effective.

VII. BIOMETRIC HAND SCANNING

Hand scanning involves the

measurement and analysis of the shape of

one's hand. It is a fairly straight

forward procedure and is surprisingly

accurate. Though it requires special

hardware to use, it can be easily

integrated into other devices or systems.

Unlike fingerprints, the human hand

isn't unique. Individual hand features

are not descriptive enough for

identification. However, it is possible

to devise a method by combining various

individual features and measurements of

fingers and hands for verification

purposes.

A. The Process

The user places the palm of his

hand on a metal surface which has

guidance pegs on it. The hand is then

properly aligned by the pegs so the

device can read the hand attributes. The

device then checks its database for

verification of the user. The process

usually takes less than 5 seconds.

Fig 3. Hand Scanning

B. Evaluation

It is very easy for users to work

the system - requiring nothing more than

placing one's hand on the device. It has

no public attitude problems as it is

associated most commonly with authorized

access. The amount of data required to

uniquely identify a user in a system is

the smallest by far, allowing it to be

used with Smartcards easily. It is also

quite resistant to attempt to fool the

system. The time and energy required to

sufficiently emulate a person's hand is

generally too much to be worth the

effort, especially since it is generally

used for verification purposes only.

C. Criticism

There are some disadvantages to

biometric hand readers, including it's

proprietary hardware cost and required

size. Also, while injuries to hands can

cause difficulty in using the reader

effectively, the lack of accuracy in

general requires that it be used for

verification alone.

VIII. RETINAL BIOMETRICS

Retinal biometrics involves the

scanning of retina and analyzing the

layer of blood vessels at the back of the

eye. The blood vessels at the back of the

eye have a unique pattern, from eye to

eye and person to person. Retinal

scanning involves using a low-intensity

light source and an optical coupler and

can read the patterns at a great level of

accuracy. It does require the user to

remove glasses, place their eye close to

the device, and focus on a certain point.

Whether the accuracy can outweigh the

public discomfort is yet to be seen

A. The Process

The user looks through a small

opening in the retinal biometrics device

at a small green light. The user must

keep their head still and eye focused on

the light for several seconds during

which time the device will verify his

identity. This process takes about 10 to

15 seconds total.

There is no known way to replicate

a retina, and a retina from a dead person

would deteriorate too fast to be useful,

so no extra

precautions

have been

taken with

retinal

scans to be

sure the user is a living human being.

B. Evaluation

Contrary to popular public

misconceptions, retina scan is used

almost exclusively in high-end security

applications. It is used for controlling

access to areas or rooms in military

installations, power plants, and the like

that are considered high risk security

areas.

Fig 4. Retinal Biometrics

C. Criticism

The cost of the proprietary

hardware as well as the inability to

evolve easily with new technology make

retinal scan devices a bad fit for most

situations. It also has the stigma of

consumer's thinking it is potentially

harmful to the eye, and in general not

easy to use.

IX. VASCULAR PATTERNS BIOMETRICS

Vascular pattern biometrics

technology involves measuring the

characteristics related to the veins in a

person's hand or face. The thickness and

location of these veins are believed to

be unique enough to an individual to be

used to verify a person's identity.

A. The Process

The most common form of vascular

patterns readers are hand-based,

requiring the user to place their hand on

a curved reader that takes an infrared

scan. This scan creates a picture that

can then be compared to a database to

verify the user's stated identity.

Fig 5. Vascular Patterns Biometrics

B. Evaluation

Vascular patterns biometrics

technology is still fairly new and there

are few published details about it,

indicating its use. Though minimally used

at the moment, vascular patterns scanners

can be found in testing at major military

installations and is being considered by

some established companies in the

security industry and multi-outlet

retailers. Currently it is still building

acceptance.

C. Criticism

Since the effects of aging, heart

attacks, and medical problems with one's

arteries on the scans has yet to be

determined fully. It also requires a

large amount of space to mount the device

is that the entire hand can be scanned

which may restrict its usability.

X. APPLICATIONS OF BIOMETRICS

Biometric Time Clocks or Biometric

time and attendance systems, which are

being increasingly used in various

organizations    to control employee

timekeeping.

Biometric access control systems,

providing strong security at

entrances.

Applications of biometrics technology

in identifying DNA patterns for

identifying criminals, etc.

Biometrics airport security devices

are also deployed at some of the

world's famous airports to enhance

the security standards.

XI. CONCLUSION

As a whole I conclude that

Biometrics has fast emerged as a

promising technology for authentication

and has already found place in most hi-

tech security areas. It has always been a

forerunner in the security and the access

control arenas too. It is this specific

aspect of the technology that this

generation likes to focus on.

ACKNOWLEDGMENT

With profound sense of

indebtedness, I express my sincere thanks

to Mrs. Bobby Lukose Asst. Professor

computer science for providing all sorts

of support and guidance in preparing this

paper. I express my sincere gratitude to

all the staff members who provided

necessary facility and cooperation for me

in making this paper to present here.

REFERENCES

[1] Michael J.A. Berry, Gordan Linoff, “Biometric

Techniques for Marketing and Customer

Relations”, Special Edition.

[2] Phipps Arabae Lawrence, J.Herbret, “Clustering

and Classification”, 2005.

[3] Ralph Kimball, “The Biometrics Toolkit”, a

complete guide to dimensional modeling.

[4] Claudia Nicholas, G.Geiger, “Mastering Data

Warehouse Design”, John wisely 2003 Edition.

[5] www.reportmining.com/dataextraction/conv

[6]

www.datawatch.com/_solutions/data_analysis/whit

epapers.php

[7] www.thearling.com/text/datawhite/d_text.php

[8]

www.xclustering.com/dt_extraction/report_analys

is/demo.dt

[9] Developersfusion.ac.uk/beginners.org