Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Biometrics provides the advantage that access is based on who the user
is, and not on what is possessed or known. This implies that the driver himself
becomes the key. Convenience is improved, as a key or transponder are no
longer required.
1
CHAPTER 2: WHAT IS BIOMETRICS?
Taken from the Greek 'Bio' meaning life, and 'Metric' the measure of,
Biometrics is the measure (study) of life( humans, plants and animals).Biometric
technologies are defined as "automated methods of identifying or authenticating
the identity of a living person based on a physical or behavioral characteristic."
Biometrics uses the measurement of biological characteristics and a biometric is
any human physiological or behavioral characteristic that is universal, unique,
permanent and collectable.
2
Biometric Characteristics
• Unique: In order for something to be unique, it has to be the one and only,
have no like or equal, and be different from all others. When trying to identify an
individual with certainty, finding something that is unique to that person is
absolutely essential.
• Measurable: In order for identification to be reliable, the item being used must
be relatively static and easily quantifiable. For example, hairstyle or colours are
not dependable characteristics for identifying an individual, as both can be easily
and frequently changed.
3
CHAPTER 3: PRINCIPLES OF BIOMETRICS
An interface with the application system that will use the result to confirm
an individual’s identity
5
During enrolment, it is usual to repeat the Data Acquisition to Feature
Extraction steps multiple times, to make sure that typical and relevant features
are stored. Some systems use a quality assessment to select the best of several
acquisitions and more sophisticated systems may even combine the information
from several acquisitions into one enhanced feature template.
6
CHAPTER 4: TYPES OF BIOMETRICS
7
Recently, another variation has been developed known as acoustic
emission. This measures the sound that is generated as an individual
writes their signature on a paper document.
9
FINGERPRINT TECHNOLOGY
11
Capacitance based silicon sensors have recently been developed by
many companies. These sensors are usually large silicon chips (15 x 15 mm)
with an array of capacitive electrodes, which typically provides a resolution of 500
DPI. Each electrode forms a capacitance together with a fingertip surface just
above the area of the electrode. The distance between the skin and an electrode
differs between ridges, that directly touch the sensor surface. This difference in
distance cases a difference in capacitance, which is measured by the sensor and
finally results in an image describing the contours of the fingertip.
The thermal sensor differs from the other types in that a finger must be
dragged across the sensor surface and the resulting multiple small image
segments are then combined to create a single complete image of the fingerprint.
The sensor’s main advantages are a significantly smaller silicon area compared
to capacitive sensors and the possibility of a thicker protective layer between the
silicon surface and the finger.
Ultrasonic sensors emit a sound wave towards the fingertip and due to
changes in acoustic impedance, some of the energy is reflected back towards
the sensor at the interface of materials of different density. The time difference
between emission and receipt of an echo is proportional to the distance the
sound wave had to cover to reach these interfaces and thus the contour of the
fingerprint can be determined. Bulky commercial sensors, with up to 500 DPI
resolution, exist and is still unclear if cost effective sensors can be realized.
13
FEATURE EXTRACTION-
Ridges are usually more than one pixel wide and this complicates the
search for line ending and bifurcation minutiae. Therefore a much simpler image
is computed with Ridge Lines represented by a one pixel width line. The resultant
image is known as the Skeleton.
Using the Skeleton, line end and fork detection is relatively simple. Initially
the start of all ridge lines need to be found. Once the ridge line is detected, a
tracking algorithm sequentially enumerates all pixels along the ridge line. The
result is a list of minutiae with X and Y co-ordinates, type (either line ending or
bifurcation) and ridge orientation.
MATCHING
Even using the same finger, no two images will be the same. Finger
translation, rotation and distortion all lead to the minutiae lists never being
identical and thus it is not possible to compare the absolute co-ordinates
contained in minutiae lists. The effect of translation and rotation with a
mechanical guide, which provides hard limits and tactile feedback to the user.
14
CHAPTER 5: APPLICATIONS OF BIOMETRICS
Applications
Globally, airports have expressed interest in another system that can pick
a moving face out of a crowd.
At the beginning of 1999, the Bank of America started a pilot program that
uses finger scans to give customers access to their online banking
services. Before using the system, the customer enrolls a fingerscan on a
chip attached to a multi-application smart card. Authentication is
completed by the customer placing a finger on a scanning device attached
to their personal computer. The software matches the fingerscan from the
scanner against the image stored in the smart card.
15
A number of vendors have developed fingerscanners resembling a
computer mouse. Scanners built into computer keyboards also have been
produced. Recognition of a fingerscan takes place in an average of two
16
ARTICLE 5.1: AUTOMOTIVE APPLICATION OF BIOMETRICS
Personal features are unique and inseparable from the person; so it is not
possible to lend them to another. This implies that a vehicle with a
biometric system cannot simply be loaned, unless the person is enrolled
into the system.
Any new user must first be enrolled into the system and added to a
database of known users. An administrator is required to authorize the
biometric system to learn the characteristics of a new user. It is also
reasonable to enable the passing-on of the right to enroll users from an
administrator to others. As a result, multiple users may have the right to
enroll new users.
An effective interface for the administration of users and access rights
must be accomplished. As authorization is uniquely linked to a specific
person, it is possible to set user-specific usage restrictions. Examples
could be maximum speed or an expiration date.
PERSONAL PROFILE-
Existing seat memories offer the possibility of storing seat and mirror
position for different drivers and to recall these settings whenever the same
driver uses the vehicle. The user interface is typically through numbered or
colored pushbuttons, which are assigned to different drivers. The maximum
number of drivers is limited by the number of buttons and the assignment of
buttons needs coordination between the drivers. Furthermore, each driver must
remember his assigned button.
As biometric system can uniquely identify drivers, automated Personal
Profile systems becomes viable. The person specific pushbuttons are replaced
by a biometric sensor, which is used for recalling, as well as storing, the user’s
specific settings. The maximum number of drivers is no longer limited by the
number of pushbuttons, only by memory capacity. User comfort is increased, as
user specific buttons (either numbered or colored) do not need to be
remembered or coordinated. All the driver has to do when he enters the vehicle
is to put his finger on the sensor and adjustment of the accessories can start
immediately.
Other, not so obvious, settings can also be remembered, such as driving
style and suspension tuning parameters, navigation system destination settings,
telephone numbers, e-mail or billing account details for a Telematics system, as
well as driver status information such as the length of time a person has driven
versus the amount of rest.
VEHICLE ENTRY-
DEMONSTRATION VEHICLE-
Positive Identification
Companies are looking to biometrics because they see the positive
identification provided by the technology as a way to: control fraud and abuse,
build non-repudiation into electronic commerce transactions, and to enhance
customer service. Companies are looking for means whereby individuals can be
recognized reliably, at a distance, over a period of time, without reliance on
human memory, and, in some cases, despite the preference by the person not to
be recognized. Financial institutions have long been evaluating the merits of
biometrics. Biometrics are seen as ideally suited for electronic commerce and
other online applications because they can automatically “prove” the identity of a
person while ensuring that no-one else can impersonate them.
Restoring Identity
Biometrics offer another potential benefit to consumers in that they can
verify their identity should their identifying papers be lost or stolen. An example
illustrating the utility of biometrics may be found in Oklahoma where authorities
issued new driver’s licenses with a thumbprint, to replace documents lost in
tornadoes. Should these licenses be lost in the future, the biometric will re-
establish identity so the appropriate person can be issued the necessary
documentation quickly and easily. This benefit is equally applicable to
membership or credit cards.
Enhanced Security
Opening up access to computer systems and networks may enhance
customer service, but it also increases the potential for security breaches. The
most serious losses occurred through the theft of proprietary information and
financial fraud. Cards or keys can be forgotten, given away, lost, stolen,
duplicated, or forged. Passwords can be shared, guessed, observed, stolen, or
forgotten. Passwords are seen as being far too vulnerable, while biometrics are
seen, by some, as offering superior security. The technology offers two
significant advantages over other authentication methods:
• the person to be identified is required to be physically present at the point-of-
identification;
• identification based on biometric techniques eliminates the need to remember a
password, PIN, or carry a token.
Data Authentication
To prevent the unauthorized altering of information (deliberate or
unintentional) during online transactions, some form of data authentication
becomes necessary. Encryption is a mathematical process that changes data
from plaintext (i.e., that which can be read) to an unintelligible form. In order to
reconstructed the original data or decrypt it, the key to the algorithm used must
be known. Certain newer biometric systems can be used to encrypt data — the
process is called biometric encryption.
Performance
The first thing that consumers should understand is that biometric systems
do not guarantee 100% accuracy, 100% of the time. Commercially available
biometric systems allow for some degree of variability in the measured
characteristic or trait and update the referenced sample after each use. The
biometric system must allow for these subtle changes, so a threshold is set. This
can take the form of an accuracy score. While the threshold is set to
accommodate some variation, the challenge is to set it so that the system only
matches authorized individuals. Two potential problems can arise:
User Attitude
How users feel about the biometric system can also impact performance.
Some individuals are “technophobic” or have other personal reasons for being
concerned about using a biometric system. The intention and overall co-
operation of the user, as well as the way a person interacts with a system, may
affect its accuracy. Some techniques are generally more acceptable to people
than others. As an example, one study found iris and retinal scans to be the most
unacceptable; finger scans, hand geometry, and hand vein recognition more
acceptable; and face, signature, and voice recognition, as well as thermograms,
the most acceptable. People’s acceptance of biometrics is based on perceived
intrusiveness, speed of enrolment and use, and similarity to other familiar
processes.
23
Uniqueness
The degree of “uniqueness” varies among the different types of biometric
characteristics. While vendors may claim their systems use unique
characteristics, in actuality, uniqueness is measured by statistical probability.
Some industry analysts maintain that, with the exception of fingerprints, biometric
characteristics have not been demonstrated to be unique. The degree to which a
biometric characteristic must be unique in order to accurately identify users
depends on the type and size of the application. In small applications, the
uniqueness of the biometric feature is less important. In large applications,
systems based on non-unique features may be more likely to have false positives
due to similarities. One of the factors influencing the uniqueness and, therefore,
the accuracy of the different biometric techniques is the amount of data collected
and compared.
Privacy Concerns
Informational Privacy
A 1998 Canadian newspaper poll asked if biometric technology was a
threat to privacy — 51% of respondents said yes. The majority of privacy
concerns about biometrics relate to informational privacy and the ability of a
person to determine when, how, and to what extent their biometric information is
communicated to others. However, associated with biometrics is a high level of
general anxiety about privacy because the technology can reveal information that
is so intimate and intrinsic to oneself. Some people have the view that biometrics,
“much more so than other identification schemes, may imperil the sense of
individuality.” It is necessary to first understand this concern, in order to put the
specific informational privacy issues into context.
24
CHAPTER 8: CONCLUSION
Over the next few years, publicly visible biometric systems will become
commonplace. Both automated and personal bank teller applications using
fingerprint, speaker and iris recognition already exist and will expand. Computer
network access and log-on applications involving fingerprint, speaker and face
recognition are expected to be widespread.
Biometric will appear in automotive applications over the next few years.
Existing sensor technology was developed for office environment to be reliable in
the automotive environment, but sensor manufacturers are achieving promising
progress.
REFERENCES: