Biometric Security Systems

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Biometric Security Systems

Abstract- The word biometric can be


defined as "Life - Measure". A well
orchestrated biometric authentication
solution not only prevents and detects an
imposter but also keeps a secure log of
transaction activities for prosecution of
imposters. This paper provides an
overview of the various types of
Biometric Classification
biometric technologies present in
civilian and military domains, their Biometric characteristics can be divided
applications, advantages and in two main categories physiological and
disadvantages. The paper also describes behavioral. The biometric systems
the future prospects of biometric security consist of three basic elements:
systems. Enrollment is the process of collecting
Keywords-Identification, Verification, biometric samples from an individual
False Accept Rate (FAR), False Reject known as enrollee and subsequent
Rate (FRR). generation of his template.
Template is the data representing the
Introduction- The present day world is
enrollee’s biometric.
obsessed with security. It is easy to
Matching is the process of comparing
understand the need for biometrics if
the live biometric sample against one or
you've ever forgot or left your network
many templates in the system’s database.
password on your computer. There is an
increasing need to find a way to solve Characteristics for identification-
user identification issues and cut costs 1. The physical characteristic should
for password administration. There are not change over the course of the
many reasons to consider this form of person's lifetime
personal identification. For each reason, 2. The physical characteristics must
authenticating ourselves by who we are identify the individual person
and not what we know, what we carry, uniquely.
or how we choose to identify ourselves 3. The characteristic needs to be easily
(i.e. PINs, passwords, smart card scanned with immediate results.
security token) solves and simplifies 4. The data must be simply checked in
these issues. Biometrics combined with an automated way.
other automation can eliminate our sole 5. Ease of use by system operators and
reliance on a paper trail for a given individuals.
transaction or event. While there are many possible
The biometric authentication system biometrics, at least eight mainstream
cannot fall prey to hackers; it can’t be biometric technologies have been
shared, lost or guessed. Therefore it is an deployed which are classified into two
efficient way to replace the traditional major categories Contact and non
password based authentication system. Contact biometric. Contact Biometric
can be sub classified as Fingerprint,
hand/ finger geometry, Dynamic
signature verification, Keystroke
dynamics. The non contact biometric
technologies may be sub classified as
Facial Recognition, Voice recognition, identify individuals using a pass phrase
Iris scan, Retinal Scan. (password).Iris recognition combines
Fingerprint biometric takes an image of computer vision, pattern recognition,
a person's fingertips and records its statistical inference, and optics. Its
characteristics. This information may purpose is real-time, high confidence
then be processed or stored as an image recognition of a person's identity by
or as an encoded computer algorithm to mathematical analysis of the random
be compared with other fingerprint patterns that are visible within the iris of
records. This Technique finds an eye from some distance. Iris scans are
applications in Law enforcement, fraud extremely accurate. Retinal scanning
prevention and Computer access. Hand analyses the layer of blood vessels at the
geometry involves the measurement and back of the eye.
analysis of the shape of one's hand. It is
a fairly simple procedure and is
surprisingly accurate. Though it requires
special hardware to use, it can be easily
integrated into other devices or systems.
Unlike fingerprints, the human hand isn't
unique. Individual hand features are not
descriptive enough for identification. Retina Scan
However, it is possible to devise a It involves using a low-intensity light
method by combining various individual source and an optical coupler and can
features and measurements of fingers read the patterns at a great level of
and hands for verification purposes. accuracy. It does require the user to
Signature verification is the process used remove glasses, place their eye close to
to recognize an individual’s hand- the device, and focus on a certain point.
written signature. It uses the behavioral Retina scan devices are great long-term,
biometrics of a hand written signature to high-security options.
confirm the identity of a computer user. Emerging Biometric Technologies- An
This is done by analyzing the shape, emerging biometric is in infancy stage of
speed, stroke, pen pressure and timing technological maturation. Once proven,
information during the act of signing. an emerging biometric will evolve into
In Keystroke Dynamics the manner and an established biometric. Some
rhythm in which an individual types examples include Brainwave biometric,
characters is analyzed to develop a DNA identification, Vascular pattern
unique biometric template of the users recognition, Body Odour recognition,
typing pattern for future authentication. Fingernail bed recognition, Gait
It is used to verify or even try to recognition, Handgrip recognition, Ear
determine the identity of the person who pattern recognition, Body salinity
is producing those keystrokes. Facial identification, Infrared fingertip imaging
recognition system is a computer-driven and pattern recognition.
application for automatically identifying
or verifying a person from a digital still Brainwave biometric Brainwaves
or video images by comparing selected resolve into nothing more then
facial features in the live image and a recognizable patterns. If we could
facial database.Voice recognition is the identify at least one pattern that was
process of determining which registered unique, unchanging, and monotonous,
speaker provides a given utterance or then we would have a security protocol
"voiceprint". Voice or speaker of peerless supremacy. Such a solution
recognition uses vocal characteristics to could not be stolen or easily duplicated
and could theoretical be applied to all tissues, blood vessel patterns, veins,
people, to include mobility challenged arteries and fatty tissues of a hand in a
individuals. gripped position.

Vascular patterns: are best described as


a picture of the veins in a person's hand
or face. The thickness and location of
these veins are believed to be unique
enough to an individual to be used to
verify a person's identity.
Depiction of EEG Brain waveforms

DNA Identification DNA is a unique and


measurable human characteristic that is
accepted by society as absolute evidence
of one’s identity with a near probability
of 99.999% accuracy. Scientists use a
small number of sequences of DNA that
are known to greatly vary among
individuals in order to ascertain the Vein scanners use near-infrared light
probability of a match. to reveal the patterns in a person’s veins.
Body odor recognition is a contact less Ear Pattern Recognition The shape of
physical biometric that attempts too the outer ear, lobes, bone structure and
confirm a person’s identity by analyzing the size are unique to each person. Ear
the olfactory properties of the human pattern recognition is employed as a
body scent. Each chemical of the human physical Contactless biometric and uses
scent is extracted by the biometric an Optophone to verify the shape of the
system and converted into a unique data ear. A French company, ART
string which is analyzed by sensors. Techniques, developed the Optophone
Gait Recognition Is a behavior biometric and the process. It is a telephone type
that attempts to recognize people by the handset, which is comprised of two
manner in which they walk and/or run. components (lighting source and
Gait recognition or gait signature as it is cameras).Body salinity biometric an
sometime referred to; it uses a radar individual’s salinity level of salt in the
system to capture the subject in motion. body is believed to be unique. This
Georgia Tech Research Institute are technology passing a tiny electrical
building a new radar system that can current through the body in order to
identify people from up to 500 feet away analysis the salt content. The more salt
during the day, night, and all-weather in the body, the more conductive the
conditions. Handgrip Recognition body becomes to electricity. As the
Advanced Biometrics Incorporated electrical current passes through the
invented this technology, with hope of it body it can also carry data at a transfer
one day being used to prevent rates equivalent to a 2400-baud modem.
unauthorized use of handguns. It is the This technology could be used to
hope of handgun manufactures to create facilitate communication between cell
a smart handgun that will only recognize phones, watches. Fingernail bed
authorized users. Handgrip technology recognition The system scans the dermal
focuses on the internal part of the hand structure under the fingernails. The
by analyzing the unique subcutaneous
human nail bed is a unique longitudinal False reject rate (FRR) or false non-
structure that is made up of nearly match rate (FNMR): the probability that
parallel rows of vascular rich skin with the system incorrectly declares failure of
parallel dermal structures in between match between the input pattern and the
narrow channel matching template in the database. It
measures the percent of valid inputs
being rejected.

Equal error rate (EER): The rates at


which both accept and reject errors are
equal.
Failure to capture rate (FTC): Within
automatic systems, the probability that
Magnification of Human Nail Bed the system fails to detect a biometric
characteristic when presented correctly.
Disadvantages of Biometric Systems: Verification: does the template match
People with disability may have the input sample? (A 1:1 match) A pre-
problems with contact biometrics. stored template is matched against a
The truth is that the security codes and sample directly, e.g. a card or known
the passwords used in the ATMs, Phone database entry.
lock and credit and debit cards are a Identification: what is the input sample?
supplement to the biometric security (A 1: N match) where N is the total
systems. The biometric solutions are number of entries in the database. It is a
going to play a very big role in near process of identifying from all the
future. So it is best that one puts in a bit templates which one is the closest match
of an effort to field test the various to the input sample.
biometric solutions. Conclusion-
Biometric Applications: Most biometric Biometrics can do a lot more than just
applications fall into one of the nine determine whether someone has access
general categories: to walk through a particular door. Some
1. Financial services ( ATM) hospitals use biometric systems to make
2. Immigration and border control sure mothers take home the right
(passport and visa issuance) newborns. Experts have also advised
3. Social services(fraud detection) people to scan their vital documents, like
4. Health care birth certificates and social security
5. Physical access control cards, and store them in biometrically-
6. Time and attendance secured flash memory in the event of a
7. Computer security (e-commerce) national emergency. Here are some
8. Telecommunications (mobile) biometric technologies you might see in
9. Law enforcement (national ID) the future:
New methods that use DNA, nail bed
Performance Parameters structure, teeth, ear shapes, body odor,
False accept rate (FAR) or false match skin patterns and blood pulses, More
rate (FMR): the probability that the accurate home-use systems, Opt-in club
system incorrectly declares a successful memberships, frequent buyer programs
match between the input pattern and a and rapid checkout systems with
non-matching pattern in the database. It biometric security, More prevalent
measures the percent of invalid matches. biometric systems in place of passports
at border crossings and airports.
Nowadays Banks are contemplating
putting Biometric Systems on the ATM
cards to ensure no imposters are able to
withdraw money even after knowing the
password.

A biometric security smart Card

The United Kingdom has already started


the Distribution of Biometric Passports
to prevent forgery and check imposters.
A major use of biometrics can be in
protecting the copyright privileges of
music, movies, and software creators. A
biometric algorithm could be employed
to encrypt and decrypt media stored on a
multitude of mediums (i.e. CD-R/RW,
DVD-R/RW, flash memory). The end
result would be that only the legitimate
owner of might access the work of art.
Think of biometrics as a key! Yes… A
key, it can open doors for you and
provides security to keep others out. It is
a key that can be customized to an
individual’s access needs. You can use a
biometric to access your home, your
account, or to invoke a customized
setting for any secure area /application.

References-
www.biometrics.org
http://www.dodcounterdrug.com/
facialrecognition/
http://www.ins.gov/graphics/lawenfor/
bmgmt/inspect/inspass.htm.

You might also like