Biometrics Seclusion to Technology
Transcript of Biometrics Seclusion to Technology
Biometrics Seclusion to Technology B.Thaladiyan
M.Phil Scholar, Department of Computer Science,KG College of Arts and Science, Saravanampatti.
Abstract - The present century has been one of
many scientific discoveries and technological
advancements. With the advent of technology
came the issue of security. As computing
systems became more complicated, there was an
increasing need for security. This paper deals
with the concept of Biometrics which gives
security to various ways. There are two
security methodologies Token-based security
and Secret based security. This identifies the
psychological and behavioral characteristics
of the user. Web-Based Enterprise Management
(WBEM) supports a limited form of security for
the Microsoft Windows XP. There are many
security mechanisms which are followed in
protecting the password, our paper discuss
some of those techniques. There are several
types of verification methods. They are
psychological verification, behavioral
verification etc. in turn the above methods
have sub methods along with their advantages
and disadvantages. The various possible
methods in implementing biometrics are
discussed in this paper.
Keywords— Bertillonage, Dilation, Vascular patterns.
I. INTRODUCTION
Biometrics comprises methods for
uniquely recognizing humans based upon
one or more intrinsic physical or
behavioral traits. In computer science,
in particular, biometrics is used as a
form of identity access management and
access control. It is also used to
identify individuals in groups that are
under surveillance. In the most
contemporary computer science
applications, the term "life measurement"
adapts a slightly different role.
Biometrics in the high technology sector
refers to a particular class of
identification technologies. These
technologies use an individual's unique
biological traits to determine one's
identity. The traits that are considered
include fingerprints, retina and iris
patterns, facial characteristics and many
more.
It is possible to understand if a
human characteristic can be used for
biometrics in terms of the following
parameters:
Universality – each person should
have the characteristic.
Uniqueness – is how well the
biometric separates individuals
from another.
Permanence – measures how well a
biometric resists aging and other
variance over time.
Collectability – ease of
acquisition for measurement.
Performance – accuracy, speed, and
robustness of technology used.
Acceptability – degree of approval
of a technology.
Circumvention – ease of use of a
substitute.
A biometric system can operate in the
following two modes
A. Verification
A one to one comparison of a captured
biometric with a stored template to
verify that the individual is who he
claims to be. Can be done in conjunction
with a smart card, username or ID number.
B. Identification
A one to many comparison of the
captured biometric against a biometric
database in attempt to identify an
unknown individual. The identification
only succeeds in identifying the
individual if the comparison of the
biometric sample to a template in the
database falls within a previously set
threshold.
II. PERFORMANCE
The following are used as performance
metrics for biometric systems:
A. False Accept Rate or False Match Rate (FAR
or FMR).
The probability that the system
incorrectly matches the input pattern
to a non-matching template in the
database. It measures the percent of
invalid inputs which are incorrectly
accepted.
B. False reject rate or false non-match rate (FRR or
FNMR)
The probability that the system
fails to detect a match between the
input pattern and a matching template
in the database. It measures the
percent of valid inputs which are
incorrectly rejected.
C. Receiver operating characteristic or relative
operating characteristic (ROC)
The ROC plot is a visual
characterization of the trade-off
between the FAR and the FRR. In
general, the matching algorithm
performs a decision based on a
threshold which determines how close
to a template the input needs to be
for it to be considered a match. If
the threshold is reduced, there will
be less false non-matches but more
false accepts. Correspondingly, a
higher threshold will reduce the FAR
but increase the FRR. A common
variation is the Detection error
trade-off (DET), which is obtained
using normal deviate scales on both
axes. This more linear graph
illuminates the differences for higher
performances (rarer errors).
D. Equal error rate or crossover error rate (EER or CER)
The rates at which both accept and
reject errors are equal. The value of the
EER can be easily obtained from the ROC
curve. The EER is a quick way to compare
the accuracy of devices with different
ROC curves. In general, the device with
the lowest EER is most accurate.
E. Failure to enroll rate (FTE or FER)
The rate at which attempts to
create a template from an input is
unsuccessful. This is most commonly
caused by low quality inputs.
F. Failure to capture rate (FTC)
Within automatic systems, the
probability that the system fails to
detect a biometric input when
presented correctly.
G. Template capacity
The maximum number of sets of data
which can be stored in the system.
III. BIOMETRICS CLASSIFICATIONS
A. Physical Biometrics:
Bertillonage - measuring body
length’s.
Fingerprint - analyzing fingertip
patterns
Facial Recognition - measuring
facial characteristics
Hand Geometry - measuring the
shape of the hand
Retinal Scan - analyzing blood
vessels in the eye
Vascular Patterns - analyzing vein
patterns
DNA - analyzing genetic makeup
B. Behavioral Biometrics Solutions:
Speaker Recognition - analyzing
vocal behavior.
Signature - analyzing signature
dynamics.
Keystroke - measuring the time
spacing of typed words
IV. BERTILLONAGE BIOMETRICS
Bertillonage biometrics was a late
19th century method of identifying
individuals by the use of multiple bodily
measurements. Bertillonage biometrics is
no longer used.
A. The Process
An individual is required to go
through a 20-60 minute measuring exam
where they would have various body
measurements taken. These measurements
would ideally include the height, length,
and breadth of the head, the length of
different fingers, the length of
forearms, etc. The results obtained were
then recorded and/or compared to a record
database.
Though
all this
was done
by hand,
the
record filing and checking system was
quite fast for its time. (Remember we are
talking about the 19th century!)
B. Evaluation Results for Bertillonage biometrics
Predicted to be accurate at
286,435,456 to 1 allowing for possible
(and eventually proven) duplicates, human
error in measuring contributed to a
smaller effective accuracy. Non-unique
measurements allowed for multiple people
to have the same results, reducing the
usefulness of this method. Also, the time
involved to measure a subject was
prohibitive for uses other than prison
records.
V. BIOMETRICS FINGERPRINT
Lets understand what
"fingerprinting" is, before we start on
with biometrics fingerprint technology.
Fingerprinting basically means to take an
of an individual's fingertips and then
store or records its characteristics. The
whorls, arches, and loops are what make
up these characteristics of a fingertip.
These are recorded along with the
patterns of ridges, furrows, and
minutiae.
A. The Process
The user places his finger against
a small biometrics fingerprint reader (or
biometrics fingerprint scanner) surface
(optical or silicon) usually of about 2
inch square size. This biometrics
fingerprint reader is attached to a
computer and takes the information from
the scan and sends it to the database.
There it is compared to the information
stored within. The user is usually
required to leave his finger on the
reader for less than 5 seconds during
which time the identification or
verification takes place.
To prevent fake fingers from being
used, many biometrics fingerprint systems
also measure blood flow, or check for
correctly arrayed ridges at the edges of
the fingers.
B. Evaluation
In the digital arena, the software
will map the minutiae points in relative
placement on the fingertip and then will
search for similar minutiae information
in the database.
Often an algorithm is used for
biometrics fingerprint systems. This
algorithm will encode the information
into a character string that can be
searched for in the database, improving
search time.
This method was meant to alleviate
the public's fear of their biometrics
fingerprint being recorded or stolen, but
most people still do not understand or
believe the actual method use.
Fig 1. Finger print Evaluation
VI. BIOMETRIC FACIAL RECOGNITION
Biometric Facial recognition
analyzes the characteristics of an
individual's face images captured through
a digital video camera. It records the
overall facial structure, including
distances between eyes, nose, mouth, and
jaw edges. These measurements are stored
in a database and used as a comparison
when a user stands before the camera.
Biometric facial recognition has
been widely, touted as a fantastic system
for recognizing potential threats
(whether terrorists, scam artists, or
known criminals) but so far it has been
unproven in high-level usage. It is
currently used in verification only
systems with a good deal of success.
A. The Process
User
faces the
camera,
standing
about two
feet from
it. The
system will locate the user's face and
perform matches against the claimed
identity on the facial database. It is
possible that the user may need to move
and reattempt the verification based on
his facial position. The system usually
gives a decision in less than 5 seconds.
To prevent a fake face or mold from
faking out the system, many systems now
require the user to smile, blink, or
otherwise move in a way that is human
before verifying.
B. Skin texture analysis:
Another emerging trend uses the
visual details of the skin, as captured
in standard digital or scanned images.
This technique, called skin texture
analysis, turns the unique lines,
patterns, and spots apparent in a
person’s skin into a mathematical space.
Tests have shown that with the addition
of skin texture analysis, performance in
recognizing faces can increase 20 to 25
percent.
Fig 2. Skin texture analysis
C. Comparative Study
Among the different biometric
techniques, facial recognition may not be
the most reliable and efficient. However,
one key advantage is that it does not
require aid (or consent) from the test
subject. Properly designed systems
installed in airports, multiplexes, and
other public places can identify
individuals among the crowd. Other
biometrics like fingerprints, iris scans,
and speech recognition cannot perform
this kind of mass identification.
However, questions have been raised
on the effectiveness of facial
recognition software in cases of railway
and airport security
D. Criticisms
Face recognition is not perfect and
struggles to perform under certain
conditions. It has been getting pretty
good at full frontal faces and 20 degrees
off, but as soon as you go towards
profile, there've been problems.
Other conditions where face
recognition does not work well include
poor lighting, sunglasses, long hair, or
other objects partially covering the
subject’s face, and low resolution
images.
Another serious disadvantage is
that many systems are less effective if
facial expressions vary. Even a big smile
can render in the system less effective.
VII. BIOMETRIC HAND SCANNING
Hand scanning involves the
measurement and analysis of the shape of
one's hand. It is a fairly straight
forward procedure and is surprisingly
accurate. Though it requires special
hardware to use, it can be easily
integrated into other devices or systems.
Unlike fingerprints, the human hand
isn't unique. Individual hand features
are not descriptive enough for
identification. However, it is possible
to devise a method by combining various
individual features and measurements of
fingers and hands for verification
purposes.
A. The Process
The user places the palm of his
hand on a metal surface which has
guidance pegs on it. The hand is then
properly aligned by the pegs so the
device can read the hand attributes. The
device then checks its database for
verification of the user. The process
usually takes less than 5 seconds.
Fig 3. Hand Scanning
B. Evaluation
It is very easy for users to work
the system - requiring nothing more than
placing one's hand on the device. It has
no public attitude problems as it is
associated most commonly with authorized
access. The amount of data required to
uniquely identify a user in a system is
the smallest by far, allowing it to be
used with Smartcards easily. It is also
quite resistant to attempt to fool the
system. The time and energy required to
sufficiently emulate a person's hand is
generally too much to be worth the
effort, especially since it is generally
used for verification purposes only.
C. Criticism
There are some disadvantages to
biometric hand readers, including it's
proprietary hardware cost and required
size. Also, while injuries to hands can
cause difficulty in using the reader
effectively, the lack of accuracy in
general requires that it be used for
verification alone.
VIII. RETINAL BIOMETRICS
Retinal biometrics involves the
scanning of retina and analyzing the
layer of blood vessels at the back of the
eye. The blood vessels at the back of the
eye have a unique pattern, from eye to
eye and person to person. Retinal
scanning involves using a low-intensity
light source and an optical coupler and
can read the patterns at a great level of
accuracy. It does require the user to
remove glasses, place their eye close to
the device, and focus on a certain point.
Whether the accuracy can outweigh the
public discomfort is yet to be seen
A. The Process
The user looks through a small
opening in the retinal biometrics device
at a small green light. The user must
keep their head still and eye focused on
the light for several seconds during
which time the device will verify his
identity. This process takes about 10 to
15 seconds total.
There is no known way to replicate
a retina, and a retina from a dead person
would deteriorate too fast to be useful,
so no extra
precautions
have been
taken with
retinal
scans to be
sure the user is a living human being.
B. Evaluation
Contrary to popular public
misconceptions, retina scan is used
almost exclusively in high-end security
applications. It is used for controlling
access to areas or rooms in military
installations, power plants, and the like
that are considered high risk security
areas.
Fig 4. Retinal Biometrics
C. Criticism
The cost of the proprietary
hardware as well as the inability to
evolve easily with new technology make
retinal scan devices a bad fit for most
situations. It also has the stigma of
consumer's thinking it is potentially
harmful to the eye, and in general not
easy to use.
IX. VASCULAR PATTERNS BIOMETRICS
Vascular pattern biometrics
technology involves measuring the
characteristics related to the veins in a
person's hand or face. The thickness and
location of these veins are believed to
be unique enough to an individual to be
used to verify a person's identity.
A. The Process
The most common form of vascular
patterns readers are hand-based,
requiring the user to place their hand on
a curved reader that takes an infrared
scan. This scan creates a picture that
can then be compared to a database to
verify the user's stated identity.
Fig 5. Vascular Patterns Biometrics
B. Evaluation
Vascular patterns biometrics
technology is still fairly new and there
are few published details about it,
indicating its use. Though minimally used
at the moment, vascular patterns scanners
can be found in testing at major military
installations and is being considered by
some established companies in the
security industry and multi-outlet
retailers. Currently it is still building
acceptance.
C. Criticism
Since the effects of aging, heart
attacks, and medical problems with one's
arteries on the scans has yet to be
determined fully. It also requires a
large amount of space to mount the device
is that the entire hand can be scanned
which may restrict its usability.
X. APPLICATIONS OF BIOMETRICS
Biometric Time Clocks or Biometric
time and attendance systems, which are
being increasingly used in various
organizations to control employee
timekeeping.
Biometric access control systems,
providing strong security at
entrances.
Applications of biometrics technology
in identifying DNA patterns for
identifying criminals, etc.
Biometrics airport security devices
are also deployed at some of the
world's famous airports to enhance
the security standards.
XI. CONCLUSION
As a whole I conclude that
Biometrics has fast emerged as a
promising technology for authentication
and has already found place in most hi-
tech security areas. It has always been a
forerunner in the security and the access
control arenas too. It is this specific
aspect of the technology that this
generation likes to focus on.
ACKNOWLEDGMENT
With profound sense of
indebtedness, I express my sincere thanks
to Mrs. Bobby Lukose Asst. Professor
computer science for providing all sorts
of support and guidance in preparing this
paper. I express my sincere gratitude to
all the staff members who provided
necessary facility and cooperation for me
in making this paper to present here.
REFERENCES
[1] Michael J.A. Berry, Gordan Linoff, “Biometric
Techniques for Marketing and Customer
Relations”, Special Edition.
[2] Phipps Arabae Lawrence, J.Herbret, “Clustering
and Classification”, 2005.
[3] Ralph Kimball, “The Biometrics Toolkit”, a
complete guide to dimensional modeling.
[4] Claudia Nicholas, G.Geiger, “Mastering Data
Warehouse Design”, John wisely 2003 Edition.
[5] www.reportmining.com/dataextraction/conv
[6]
www.datawatch.com/_solutions/data_analysis/whit
epapers.php
[7] www.thearling.com/text/datawhite/d_text.php
[8]
www.xclustering.com/dt_extraction/report_analys
is/demo.dt
[9] Developersfusion.ac.uk/beginners.org