Biometrics Is The Technique of Using Unique, Non-Transferable
Biometrics Is The Technique of Using Unique, Non-Transferable
1
WHAT IS BIOMETRICS
2
HISTORY BEHIND BIOMETRIC SECURITY
3
Later, in the nineteenth century there was a peak of interest as
researchers into criminology attempted to relate physical features and
characteristics with criminal tendencies. This resulted in a variety of
measuring devices being produced and much data being collected. The
results were not conclusive but the idea of measuring individual
physical characteristics seemed to stick and the parallel development
of fingerprinting became the international methodology among police
forces for identity verification.
4
METHODOLOGIES OF BIOMETRICS
RETINA
IRIS
5
FACE
A technique which has attracted considerable interest and
whose capabilities have often been misunderstood . Face recognition
analyzes facial characteristics. It requires a digital camera to develop a
facial image of the user for authentication. It is one thing to match two
static images (all that some systems actually do - not in fact
biometrics at all), it is quite another to unobtrusively detect and verify
the identity of an individual within a group (as some systems claim). It
is easy to understand the attractiveness of facial recognition from the
user perspective, but one needs to be realistic in ones expectations of
the technology. To date, facial recognition systems have had limited
success in practical applications. However, progress continues to be
made in this area and it will be interesting to see how future
implementations perform. If technical obstacles can be overcome, we
may eventually see facial recognition become a primary biometric
methodology.
SIGNATURE
Signature verification devices have proved to be
reasonably accurate in operation and obviously lend themselves to
applications where the signature is an accepted identifier. Signature
verification analyzes the way a user signs her name. Signing features
such as speed, velocity, and pressure are as important as the finished
signature's static shape. Signature verification enjoys a synergy with
existing processes that other biometrics do not. People are used to
signatures as a means of transaction-related identity verification, and
most would see nothing unusual in extending this to encompass
biometrics. Surprisingly, relatively few significant signature
applications have emerged compared with other biometric
6
methodologies. But if your application fits, it is a technology worth
considering.
VOICE
Voice authentication is not based on voice recognition but on
voice-to-print authentication, where complex technology transforms
voice into text. Voice biometrics has the most potential for growth,
because it requires no new hardware—most PCs already contain a
microphone. However, poor quality and ambient noise can affect
verification. In addition, the enrollment procedure has often been more
complicated than with other biometrics, leading to the perception that
voice verification is not user friendly. Therefore, voice authentication
software needs improvement. One day, voice may become an additive
technology to finger-scan technology. Because many people see finger
scanning as a higher authentication form, voice biometrics will most
likely be relegated to replacing or enhancing PINs, passwords, or
account names.
HAND RECOGNITION
7
result from this, the hand geometry data for that person is retrieved
from a database. The user is then required to place their hand into the
reader machine, which has pegs inside to separate the fingers. A scan
of the hand is taken and is matched against the hand geometry data
retrieved from the database. Assuming the verification is complete;
the user is allowed access to the area in question.
Hand geometry verification is widely used today, especially in
airports and military centers. This methodology may be suitable where
we have larger user bases or users who may access the system
infrequently and may therefore be less disciplined in their approach to
the system.
FINGERPRINT VERIFICATION
8
HOW THE SYSTEM WORKS
9
Option 1, storing the template within the biometric device has both
advantages and disadvantages depending on exactly how it is
implemented. The advantage is potentially fast operation as a
relatively small number of templates may be stored and manipulated
efficiently within the device. In addition, you are not relying on an
external process or data link in order to access the template. In some
cases, where devices may be networked together directly, it is possible
to share templates across the network.
The potential disadvantage is that the templates are somewhat
vulnerable and dependent upon the device being both present and
functioning correctly. If anything happens to the device, you may need
to re-install the template database or possibly re-enrol the user base.
Option 2, storing the templates in a central repository is the option
which will naturally occur to IT systems engineers. This may work well
in a secure networked environment where there is sufficient
operational speed for template retrieval to be invisible to the user.
However, we must bear in mind that with a large number of readers
working simultaneously there could be significant data traffic,
especially if users are impatient and submit multiple verification
attempts. The size of the biometric template itself will have some
impact on this, with popular methodologies varying between 9 bytes
and 1.5k. Another aspect to consider is that if the network fails, the
system effectively stops unless there is some sort of additional local
storage. This may be possible to implement with some devices, using
the internal storage for recent users and instructing the system to
search the central repository if the template cannot be found locally.
Option 3, storing the template on a token. This is an attractive option
for two reasons. Firstly, it requires no local or central storage of
10
templates (unless you wish to) and secondly, the user carries their
template with them and can use it at any authorised reader position.
However, there are still considerations. If the user is attracted to the
scheme because he believes he has effective control and ownership of
his own template (a strong selling point in some cases) then you
cannot additionally store his template elsewhere in the system. If he
subsequently loses or damages his token, then he will need to re-
enroll. Another consideration may be unit cost and system complexity
if you need to combine chip card readers and biometric readers at
each enrolment and verification position.
If the user base has no objection, you may wish to consider both on
token and central storage of templates (options 2 and 3) this could
provide fast local operation with a fallback position if the chip card
reading process fails for any reason or if a genuine user loses their
token and can provide suitable identity information. Your choice of
template storage may be dictated to some extent by your choice of
biometric device. Some devices offer greater flexibility than others in
this respect.
11
Setting this parameter requires some thought. On the one hand, you
want to provide every opportunity for a valid user (who may be having
difficulty using the system) to be recognised. On the other hand, you
do not want impostors to have too much opportunity to experiment.
With some systems, the reference template is automatically updated
upon each valid transaction. This allows the system to accommodate
minor changes to the users live sample as a result of ageing, local
abrasions etc. and may be a useful feature when dealing with large
userbases.
12
PERFORMANCE MEASURES
13
viewed as a rough guide and not relied upon for actual system
performance expectations.
This situation is not because vendors are trying to mislead
you (in most cases anyway) but because it is almost impossible to give
an accurate indication of how a device will perform in a limitless
variety of real world conditions.
Similarly, actual enrolment times will depend upon a number
of variables inherent in your enrolment procedure. Are the users pre-
educated? Have they used the device before? What information are
you gathering? Are you using custom software? How well trained is the
enrolling administrator? How many enrolment points will you be
operating? What other processes are involved? And so on. The vendors
cannot possibly understand these variables for every system and their
quoted figure will again be based upon their own in house experiences
under controlled conditions.
Verification time is often misunderstood as vendors will typically
describe the average time taken for the actual verification process,
which will not typically include the time taken to present the live
sample or undertake other processes such as the presentation of a
token or keying of a PIN. Consider also an average time for user error
and system response and it will be apparent that the end to end
verification transaction time will be nothing like the quoted figure.
Given the above, it will come as no surprise that biometric
device performance measures have sometimes become a contentious
issue when implementing real systems. In order to provide an
independent view a National Biometric Test Centre has been
established in the US with a similar facility recently announced in Hong
Kong. These centres are based at academic institutions and will over
time no doubt provide for some interesting views. However, this does
14
not necessarily mean that vendors will rush to conform with regard to
their quoted specifications and the method used to arrive at them. We
should therefore continue to view such specifications as a rough guide
and rely on our own trials and observations to provide a more
meaningful appraisal of overall performance.
As a side issue to the above, there is a question concerning the
uniqueness of biometric parameters such as fingerprints, irises, hands
and so forth. The degree of individuality or similarity within a userbase
will naturally affect performance to some degree. It is outside the
scope of this paper to examine this aspect in any detail, but suffice it
to say that no one has reliable data for the whole world and cannot
therefore say that any biometric is truly unique. What we can say is
that the probability of finding identical fingerprints, irises, hands etc.
within a typical userbase is low enough for the parameter in question
to be regarded as a reliable identifier. Splitting hairs maybe, but
beware of claims of absolute uniqueness - some individuals are similar
enough to cause false accepts, even in finely tuned systems.
15
ACCURACY
16
COMPARISION OF BIOMETRICS TECHNIQUES
Hand
Characteristic Fingerprints Retina Iris Face Signature Voice
Geometry
Ease of Use High High Low Medium Medium High High
Lighting,
Hand Noise,
Error Dryness, Poor age, Changing
injury, Glasses colds,
incidence dirt, age Lighting glasses, signatures
age weather
hair
Very Very
Accuracy High High High High High
High High
Cost * * * * * * *
User
Medium Medium Medium Medium Medium Medium High
acceptance
Required Very
High Medium High Medium Medium Medium
security level High
Long-term
High Medium High High Medium Medium Medium
stability
ADVANTAGES
17
Biometric identification provide a unique identification.
The techniques like DNA profiling are highly reliable and efficient
that’s why it is going to be adopted widely.
DISADVANTAGES
18
Biometric system may not give an accurate identification.
19
APPLICATIONS
Physical access:
Today, the primary application of biometrics is in physical security: to
control access to secure locations (rooms or buildings). Biometrics are
useful for high-volume access control. For example, biometrics
controlled access of 65,000 people during the 1996 Olympic Games,
and Disney World uses a fingerprint scanner to verify season-pass
holders entering the theme park.
Government – passports, national ID cards, voter cards, driver’s
licenses, social services, etc;
Financial – bank cards, ATM cards, credit cards and debit cards;
Virtual Access:
For a long time, biometric-based network and computer access were
areas often discussed but rarely implemented. Analysts see virtual
access as the application that will provide the critical mass to move
biometrics for network and computer access from the realm of
science-fiction devices to regular system components. passwords are
currently the most popular way to protect data on a network.
Biometrics, however, can increase a company's ability to protect its
data by implementing a more secure key than a password. Using
20
biometrics also allows a hierarchical structure of data protection,
making the data even more secure: Passwords supply a minimal level
of access to network data; biometrics, the next level. You can even
layer biometric technologies to enhance security levels.
E-Commerce:
E-commerce developers are exploring the use of biometrics and smart
cards to more accurately verify a trading party's identity. For example,
many banks are interested in this combination to better authenticate
customers and ensure nonrepudiation of online banking, trading, and
purchasing transactions. Some are using biometrics to obtain secure
services over the telephone through voice authentication. Developed
by Nuance Communications, voice authentication systems are
currently deployed nationwide by the Home Shopping Network.
21
FUTURE OF BIOMETRICS
Although companies are using biometrics for
authentication in a variety of situations, the industry is still evolving
and emerging. To both guide and support the growth of biometrics, the
Biometric Consortium formed in December 1995.
Standardization:
Standards are emerging to provide a common software interface, to
allow sharing of biometric templates, and to permit effective
comparison and evaluation of different biometric technologies.
The BioAPI standard released at the
conference, defines a common method for interfacing with a given
biometric application. BioAPI is an open-systems standard developed
by a consortium of more than 60 vendors and government agencies.
Written in C, it consists of a set of function calls to perform basic
actions common to all biometric technologies, such as
* enroll user,
* verify asserted identity (authentication), and
* discover identity.
Another draft standard is the Common Biometric Exchange File
Format, which defines a common means of exchanging and storing
templates collected from a variety of biometric devices.
Hybrid Technology:
One of the more interesting uses of biometrics involves combining
biometrics with smart cards and public-key infrastructure (PKI).
Vendors enhance security by placing more biometric functions directly
on the smart card. Some vendors have built a fingerprint sensor
directly into the smart card reader, which in turn passes the biometric
to the smart card for verification. PKI uses public- and private-key
cryptography for user identification and authentication. It is
mathematically more secure, and it can be used across the Internet.
22
CONCLUSION
23
24