Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BIOMETRICS - Introduction
The term "Biometrics" has been used to refer to the emerging field of
technology devoted to identification of individuals using biological traits,
such as those based on retinal or iris scanning, fingerprints, or face
recognition. Neither the journal "Biometrics" nor the International Biometric
Society is engaged in research, marketing, or reporting related to this
technology. Likewise, the editors and staff of the journal are not
knowledgeable in this area.
Strictly speaking, voice is also a physiological trait because every person has
a different pitch, but voice recognition is mainly based on the study of the
way a person speaks, commonly classified as behavioral.
REPORT ON BIOMETRICS 2
Biometrics
For instance, if the biometrics system uses thumb impression as the mode of
verification, then your thumb impression will be first captured in film and
stored in the biometrics database system. Instead of storing as it is, the
system will compress and store it.
If for instance your face is used as the mode of verification, then your face
will be photographed in different angles and stored in the biometrics
database systems. The same goes for voice recording and eyes mode of
verification.
Once this storing process is done, the 'comparing' process is done daily or as
and when required. For example let us assume that your company uses
finger print biometrics systems. When you come to office daily, there will be
a finger print reader at the entrance. You will have to put your finger on this
finger print reader which will capture your finger print and send to the
biometrics system. The biometrics system will then 'compare' this finger
print to the finger print that was previously stored in the database. If both of
them match then you are authenticated.
and for the protection of all types of digital content such as in Digital
Rights Management and Health Care applications. Utilized alone or
integrated with other technologies such as smart cards, encryption
keys and digital signatures, biometrics are anticipated to pervade
nearly all aspects of the economy and our daily lives. For example,
biometrics is used in various schools such as in lunch programs in
Pennsylvania, and a school library in Minnesota. Examples of other
current applications include verification of annual pass holders in an
amusement park, speaker verification for television home shopping,
Internet banking, and users' authentication in a variety of social
services.
Using biometrics for identifying human beings offers some unique
advantages. Biometrics can be used to identify you as you. Tokens,
such as smart cards, magnetic stripe cards, photo ID cards, physical
keys and so forth, can be lost, stolen, duplicated, or left at home.
Passwords can be forgotten, shared, or observed. Moreover, today's
fast-paced electronic world means people are asked to remember a
multitude of passwords and personal identification numbers (PINs) for
computer accounts, bank ATMs, e-mail accounts, wireless phones,
web sites and so forth. Biometrics hold the promise of fast, easy-to-
use, accurate, reliable, and less expensive authentication for a variety
of applications.
There is no one "perfect" biometric that fits all needs. All biometric
systems have their own advantages and disadvantages. There are,
however, some common characteristics needed to make a biometric
system usable. First, the biometric must be based upon a
distinguishable trait. For example, for nearly a century, law
enforcement has used fingerprints to identify people. There is a great
deal of scientific data supporting the idea that "no two fingerprints are
alike." Technologies such as hand geometry have been used for
many years and technologies such as face or iris recognition have
come into widespread use. Some newer biometric methods may be
just as accurate, but may require more research to establish their
uniqueness.
Another key aspect is how "user-friendly" a system is. The process
should be quick and easy, such as having a picture taken by a video
camera, speaking into a microphone, or touching a fingerprint
scanner. Low cost is important, but most implementers understand
REPORT ON BIOMETRICS 6
that it is not only the initial cost of the sensor or the matching software
that is involved. Often, the life-cycle support cost of providing system
administration and an enrollment operator can overtake the initial cost
of the biometric hardware.
The advantage biometric authentication provides is the ability to
require more instances of authentication in such a quick and easy
manner that users are not bothered by the additional requirements.
As biometric technologies mature and come into wide-scale
commercial use, dealing with multiple levels of authentication or
multiple instances of authentication will become less of a burden for
users. An indication of the biometric activities.
As of March 2005, NIST and NSA have co-sponsored and
spearheaded a number of biometric-related activities including the
development of a Common Biometric Exchange File Format (CBEFF)
, NIST Biometric Interoperability, Performance, and Assurance
Working Group, a BioAPI Users' and Developers' Seminar, and the
NIST BioAPI Interoperability Test Bed. CBEFF describes a set of
data elements necessary to support biometric technologies in a
common way independently of the application and the domain of use
(e.g., mobile devices, smart cards, protection of digital data, biometric
data storage). CBEFF facilitates biometric data interchange between
different system components or between systems, promotes
interoperability of biometric-based application programs and systems,
provides forward compatibility for technology improvements, and
simplifies the software and hardware integration process. CBEFF was
developed by a Technical Development Team, comprised of
members from industry, NIST and NSA and in coordination with
industry consortiums (BioAPI Consortium and TeleTrusT) and a
standards development group (ANSI/ASC X9F4 Working Group).
CBEFF is described in detail in NISTIR 6529, "Common Biometric
Exchange File Format (CBEFF)", January 3, 2001. The International
Biometric Industry Association (IBIA) is the Registration Authority for
CBEFF format owner and format type values for organizations and
vendors that require them.
The NIST Biometric Interoperability, Performance and Assurance
Working Group supports advancement of technically efficient and
compatible biometric technology solutions on a national and
international basis. It promotes and encourages exchange of
REPORT ON BIOMETRICS 7
Characteristics of biometrics
Biometric technologies should be considered and evaluated giving full
consideration to the following characteristics:
FINGERPRINT
Hand geometry
Retina scan
the pattern formed by the blood vessels. Retina scans were first
suggested in the 1930's.
Iris scan
An iris scan provides an analysis of the rings, furrows and freckles in the
colored ring that surrounds the pupil of the eye. More than 200 points are
used for comparison. Iris scans were proposed in 1936, but it was not
until the early 1990's that algorithms for iris recognition were created
(and patented). All current iris recognition systems use these basic
patents, held by Iridian Technologies.
This recognition method uses the iris of the eye which is the colored area
that surrounds the pupil. Iris patterns are thought unique. The iris patterns
are obtained through a video-based image acquisition system. Iris
scanning devices have been used in personal authentication applications
for several years. Systems based on iris recognition have substantially
decreased in price and this trend is expected to continue. The technology
works well in both verification and identification modes (in systems
performing one-to-many searches in a database). Current systems can be
used even in the presence of eyeglasses and contact lenses. The
technology is not intrusive. It does not require physical contact with a
scanner. Iris recognition has been demonstrated to work with individuals
from different ethnic groups and nationalities.
Face recognition
Facial characteristics (the size and shape of facial characteristics, and their
relationship to each other). Although this method is the one that human
beings have always used with each other, it is not easy to automate it.
Typically, this method uses relative distances between common landmarks
on the face to generate a unique "faceprint."
Signature Verification:
Although the way you sign your name does change over time, and
can be consciously changed to some extent, it provides a basic
means of identification.
Speaker Recognition:
• Face recognition
Of the various biometric identification methods, face recognition
is one of the most flexible, working even when the subject is
unaware of being scanned. It also shows promise as a way to
search through masses of people who spent only seconds in
front of a "scanner" - that is, an ordinary digital camera.
Face recognition systems work by systematically analyzing
specific features that are common to everyone's face - the
distance between the eyes, width of the nose, position of
cheekbones, jaw line, chin and so forth. These numerical
quantities are then combined in a single code that uniquely
identifies each person.
• Fingerprint identification
Fingerprints remain constant throughout life. In over 140 years
of fingerprint comparison worldwide, no two fingerprints have
ever been found to be alike, not even those of identical twins.
Good fingerprint scanners have been installed in PDAs like the
iPaq Pocket PC; so scanner technology is also easy. Might not
work in industrial applications since it requires clean hands.
Fingerprint identification involves comparing the pattern of
ridges and furrows on the fingertips, as well as the minutiae
points (ridge characteristics that occur when a ridge splits into
two, or ends) of a specimen print with a database of prints on
file.
• Retina scan
There is no known way to replicate a retina. As far as anyone
knows, the pattern of the blood vessels at the back of the eye is
unique and stays the same for a lifetime. However, it requires
about 15 seconds of careful concentration to take a good scan.
Retina scan remains a standard in military and government
installations.
• Iris scan
Like a retina scan, an iris scan also provides unique biometric
data that is very difficult to duplicate and remains the same for
a lifetime. The scan is similarly difficult to make (may be difficult
for children or the infirm). However, there are ways of encoding
the iris scan biometric data in a way that it can be carried
around securely in a "barcode" format. (See the SF in the News
article Biometric Identification Finally Gets Started for some
detailed information about how to perform an iris scan.)
• Signature
A signature is another example of biometric data that is easy to
gather and is not physically intrusive. Digitized signatures are
sometimes used, but usually have insufficient resolution to
ensure authentication.
• Voice analysis
Like face recognition, voice biometrics provide a way to
authenticate identity without the subject's knowledge. It is
REPORT ON BIOMETRICS 16
Security personnel look for biometric data that does not change over
the course of your life; that is, they look for physical characteristics
that stay constant and that are difficult to fake or change on purpose.
Most of us can remember when biometric security checks were the
stuff of science fiction or action movies like James Bond. However,
biometric identification is becoming commonplace as hardware and
software come down in price.
REPORT ON BIOMETRICS 17
History of biometrics
The term "biometrics" is derived from the Greek words bio (life) and metric
(to measure).
After this, the police used finger printing, which was developed by Richard
Edward Henry of Scotland Yard, instead. Essentially reverting to the same
methods used by the Chinese for years. However the idea of biometrics as a
field of study with usefull identification applications, was there and interest
in it has grown.
Today we have the technology to realise the aims, and to refine the accuracy
REPORT ON BIOMETRICS 18
Advantages
Advantages of Biometrics :
• For people affected with diabetes, the eyes get affected resulting in
differences.
• Biometrics is an expensive security solution.
CHALLENGES
There are also many questions about how the biometric data will be
stored and used:
FUTURE OF BIOMETRICS
The future is bright and sunny!!!!
A system that analyses body odour is under development.Each human smell
consists different amount of volatiles…In this system the sensors try to
obtain odour from non intrusive parts of the body like back of hand.
Currently DNA testing by latest methods takes atleast 10 minutes and ergo
it cannot be taken as a biometric tool,but it holds a great promise in the
future.
Do you know that each human being has got a unique tongue print!!!!
How about sticking out your tongue in front of a machine at a public place
to identify yourself !!!!Now that is intrusive technology for you…..
CONCLUSION
REPORT ON BIOMETRICS 23