Thursday, March 7, 2013

Biometrics



Biometrics

What is Biometrics?
  • "Biometrics" means "life measurement" but the term is usually associated with the use of unique physiological characteristics to identify an individual.
  • The application which most people associate with biometrics is security.
  • However, biometrics identification has eventually a much broader relevance as computer interface becomes more natural.
  •  Knowing the person with whom you are conversing is an important part of human interaction and one expects computers of the future to have the same capabilities.
  • A number of biometric traits have been developed and are used to authenticate the person's identity.
  •  The idea is to use the special characteristics of a person to identify him.
  • By using special characteristics we mean the using the features such as face, iris, fingerprint, signature etc. 


Biometric technologies are thus defined as the "automated methods of identifying or authenticating the identity of a living person based on a physiological or behavioral characteristic".

A biometric system can be either an 'identification' system or a 'verification' (authentication) system, which are defined below.

Identification - One to Many: Biometrics can be used to determine a person's identity even without his knowledge or consent. For example, scanning a crowd with a camera and using face recognition technology, one can determine matches against a known database.

Verification - One to One:
Biometrics can also be used to verify a person's identity. For example, one can grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM by using retinal scan.

Biometric authentication requires to compare a registered or enrolled biometric sample (biometric template or identifier) against a newly captured biometric sample (for example, the one captured during a login). This is a three-step process (Capture, Process, Enroll) followed by a Verification or Identification process.

During Capture process, raw biometric is captured by a sensing device such as a fingerprint scanner or video camera.
The second phase of processing is to extract the distinguishing characteristics from the raw biometric sample and convert into a processed biometric identifier record (sometimes called biometric sample or biometric template).
Next phase does the process of enrollment. Here the processed sample (a mathematical representation of the biometric - not the original biometric sample) is stored / registered in a storage medium for future comparison during an authentication. In many commercial applications, there is a need to store the processed biometric sample only. The original biometric sample cannot be reconstructed from this identifier.

Biometric Characteristics

A number of  biometric characteristics may be captured in the first phase of processing. However, automated capturing and automated comparison with previously stored data requires that the biometric characteristics satisfy the following characteristics:

Universal: Every person must possess the characteristic/attribute. The attribute must be one that is universal and seldom lost to accident or disease.

Invariance of properties: They should be constant over a long period of time. The attribute should not be subject to significant differences based on age either episodic or chronic disease.

Measurability: The properties should be suitable for capture without waiting time and must be easy to gather the attribute data passively.

Singularity: Each expression of the attribute must be unique to the individual. The characteristics should have sufficient unique properties to distinguish one person from any other. Height, weight, hair and eye color are all attributes that are unique assuming a particularly precise measure, but do not offer enough points of differentiation to be useful for more than categorizing.

Acceptance: The capturing should be possible in a way acceptable to a large percentage of the population. Excluded are particularly invasive technologies, i.e. technologies which require a part of the human body to be taken or which (apparently) impair the human body.

Reducibility: The captured data should be capable of being reduced to a file which is easy to handle.

Reliability and tamper-resistance: The attribute should be impractical to mask or manipulate. The process should ensure high reliability and reproducibility.

Privacy: The process should not violate the privacy of the person.

Comparable: Should be able to reduce the attribute to a state that makes it digitally comparable to others. The less probabilistic the matching involved, the more authoritative the identification.

Inimitable: The attribute must be irreproducible by other means. The less reproducible the attribute, the more likely it will be authoritative.

Among the various biometric technologies being considered, the attributes which satisfy the above requirements are fingerprint, facial features, hand geometry, voice, iris, retina, vein patterns, palm print, DNA, keystroke dynamics, ear shape, odor, signature etc.

A biometric system can be classified into two modules- (i) Database Preparation Module and (ii) Verification Module. The Database Preparation Module consists of two sub-modules, and they are (a) Enroll Module and (b) Training Module while the other module, Verification module can be divided into two modules (a) Matching Module and (b) Decision Module.
 
Multimodal Biometric Systems

  • Multimodal biometric systems are those that utilize more than one physiological or behavioral characteristic for enrollment, verification, or identification. 
  • In applications such as border entry/exit, access control, civil identification, and network security, multi-modal biometric systems are looked to as a means of
  • Reducing false non-match and false match rates,
  • Providing a secondary means of enrollment, verification, and identification if sufficient data cannot be acquired from a given biometric sample, and
  • Combating attempts to fool biometric systems through fraudulent data sources such as fake fingers.
  • A multimodal biometric verification system can be considered as a classical information fusion problem i.e. can be thought to combine evidence provided by different biometrics to improve the overall decision accuracy. Generally, multiple evidences can be integrated at one of the following three levels.

Abstract level: The output from each module is only a set of possible labels without any confidence value associated with the labels; in this case a simple majority rule may be used to reach a more reliable decision.
Rank level: The output from each module is a set of possible labels ranked by decreasing confidence values, but the confidence values themselves are not specified.
Measurement level: the output from each module is a set of possible labels with associated confidence values; in this case, more accurate decisions can be made by integrating different confidence values.
 
The biggest issue in biometric implementation is user acceptance.

 If a user doesn’t like a particular system it will not be used properly and will not be effective, no matter how efficiently the system is implemented.

 Fingerprinting is one of the first methods that comes to mind when talking about using biometrics for security.

 These remind the user or the other main use of fingerprints, identifying and cataloging criminals. A more subtle approach is required for obtaining fingerprints. It exists in the form of a fingerprint reader built into a mouse.

 A mouse with a thumbprint scanner built into its side was demonstrated in the 1999 COMDEX exhibition. Such biometric mice are now widely available to the public.

Eye recognition is a frequently touted means of biometric identification, however one problem with early systems was that people are naturally very protective of their eyes and in the past have found this type of scan intrusive. However improvements in eye recognition technology enable a person’s iris to be scanned from up to twelve inches away. The scanning device no longer intrudes on a person’s personal space.

Voice recognition is another option for biometric security.

Voice recognition has problems in that a persons voice can be subject to more change than their fingerprint e.g. through sickness
Also somebody’s voice can be easily reproduced with a high quality recording.
Just because a persons voice is present doesn’t mean they are.
It does have the advantage of being probably the cheapest biometric security device at the low end of the market, as they require no special hardware.
Cost is considered to be another major factor in the implementation of biometrics. In the past this was more the case, as biometrics was an emergent unproven technology but as biometrics have gained more industry support the cost has fallen. 

No comments:

Post a Comment