Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
i. What a. b. c. d. e. f. g. h.
are the goodness and weakness about the current technology? Facial recognition: Voice recognition: Signature recognition: DNA: Retinal scanning: Iris recognition: Fingerprint: Hand Geometry:
The following table compares s ome of the biometric s ys tems us ed lately, from the point of view of accuracy, cos t, devices required and s ocial acceptability.
From this comparative table we can deduce that the mos t adequate methodology is the fingerprint authentication.
What are the goodness and weakness about the current technology?
Each one of the Technologies us ed in our days bring us a manner to res trict the acces s to a s ys tem, allowing the entrance only to thos e pers ons who know a s pecific code, own a card or have determined phys ic marks . The more complex is the s ys tem, the mos t difficult is to be attacked, although it will be more expens ive and will require more s oftware and hardware res ources . When a new authentication s ys tem is implanted, it is es s ential a judgement between s implicity, price and efficiency, as well as s ocial acceptability. The pas s word method is the cheapes t and s imples t technology, becaus e it only requires elementary s oftware res ources . On the other hand, this s ys tem is eas ily attackable, s ince he is quite s imple to obtain the data from a pers on, either extracting the information to the pers on its elf us ing deceits , or attacking the s oftware of the s ys tem. For example, it can be eas ily ins talled in the computer, a program that s imulates the us er name and pas s word window, s o that when the us er introduces his data in that window, that will be collected by the Spy program. Immediately after this , it appears the true window, identical, and the us er will s imply believe that he has been mis taken. So, this method, in s pite of being us ually us ed, for example, to acces s banking accounts , is not at all the mos t indicated if we want a s afe s ys tem, and in a s hort-time future is tried to be changed by mos t immune methods . The Smart Cards are very us eful s ince they can be eas ily combined with other authentication s ys tems , s erving as s torage s ys tem. Self-containment of s mart card makes it res is tant to attack as it does not need to depend upon potentially vulnerable external res ources . But its s mall s ize and bend requirements (which are des igned to protect the card phys ically), limits the memory and proces s ing res ources . And us ed like the only identification s ys tem, is not exces s ively trus tworthy, s ince it can be eas ily s tolen, los t or s imply forgotten at home. Bes ides , s ometimes they are combined with cryptography methods , which makes them more difficult (more expens ive) to implement. The Digital Signature is very difficult to fals ify, s ince is encrypted by complicated mathematic operations . It is cons idered that is even les s fals ifiable than the manual s ignature recognition (although this las t is already enough trus tworthy). The advantage that Biometrics pres ents is that the information is unique for each individual and that it can identify the individual in s pite of variations in the time (it does not matter if the firs t biometric s ample was taken year ago).The pillars of e-learning s ecurity are: authentication, privacy (data confidentiality) authorization (acces s control), data integrity and non-
repudiation. Biometric is a technique that can provide all this requirements with quite lot reliability. Although biometrics is cons idered the mos t effective and s afe method (is very difficult to fals ify), we have to bear in mind its dis advantages , for example, that s ince it is a relative new technology, it is not s till integrated in PC, s o IT departments need to make a cons cious decis ion before making the purchas e and change its s tructure. We als o have to cons ider the advantages and dis advantages of each individual s ys tem. In the next paragraphs , we will make an enumeration of the problems that thes e techniques can pres ent:
Facial recognition:
Advantages : a. Non intrus ive b. Cheap technology. Dis advantages a. 2D recognition is affected by changes in lighting, the pers ons hair, the age, and if the pers on wear glas s es . b. Requires camera equipment for us er identification; thus , it is not likely to become popular until mos t PCs include cameras as s tandard equipment.
Voice recognition:
Advantages : a. Non intrus ive. High s ocial acceptability. b. Verification time is about five s econds . c. Cheap technology. Dis advantages : a. A pers ons voice can be eas ily recorded and us ed for unauthoris ed PC or network. b. Low accuracy. c. An illnes s s uch as a cold can change a pers ons voice, making abs olute identification difficult or impos s ible.
Signature recognition:
Advantages : a. Non intrus ive. b. Little time of verification (about five s econds ). c. Cheap technology. Dis advantages : a. Signature verification is des igned to verify s ubjects bas ed on the traits of their unique s ignature. As a res ult, individuals who do not s ign their names in a cons is tent manner may have difficulty enrolling and verifying in s ignature verification. b. Error rate: 1 in 50.
DNA:
Advantages :
a. Very high accuracy. b. It impos s ible that the s ys tem made mis takes . c. It is s tandardized. Dis advantages : a. Extremely intrus ive. b. Very expens ive.
Retinal scanning:
Advantages : a. Very high accuracy. b. There is no known way to replicate a retina. c. The eye from a dead pers on would deteriorate too fas t to be us eful, s o no extra precautions have to been taken with retinal s cans to be s ure the us er is a living human being. Dis advantages : a. Very intrus ive. b. It has the s tigma of cons umer's thinking it is potentially harmful to the eye. c. Comparis ons of template records can take upwards of 10 s econds , depending on the s ize of the databas e. d. Very expens ive.
Iris recognition:
Advantages : a. Very high accuracy. b. Verification time is generally les s than 5 s econds . c. The eye from a dead pers on would deteriorate too fas t to be us eful, s o no extra precautions have to been taken with retinal s cans to be s ure the us er is a living human being. Dis advantages : a. Intrus ive. b. A lot of memory for the data to be s tored. c. Very expens ive
Fingerprint:
Advantages : a. Very high accuracy. b. Is the mos t economical biometric PC us er authentication technique. c. it is one of the mos t developed biometrics d. Eas y to us e. e. Small s torage s pace required for the biometric template, reducing the s ize of the databas e memory required f. It is s tandardized. Dis advantages :
a. For s ome people it is very intrus ive, becaus e is s till related to criminal identification. b. It can make mis takes with the drynes s or dirty of the fingers s kin, as well as with the age (is not appropriate with children, becaus e the s ize of their fingerprint changes quickly). c. Image captured at 500 dots per inch (dpi). Res olution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory s pace, 240 Kbytes approximately Compres s ion required (a factor of 10 approximately).
Hand Geometry:
Advantages : a. Though it requires s pecial hardware to us e, it can be eas ily integrated into other devices or s ys tems . b. It has no public attitude problems as it is as s ociated mos t commonly with authorized acces s . c. The amount of data required to uniquely identify a us er in a s ys tem is the s malles t by far, allowing it to be us ed with SmartCards eas ily. Dis advantages : a. Very expens ive b. Cons iderable s ize. c. It is not valid for arthritic pers on, s ince they cannot put the hand on the s canner properly.