Professional Documents
Culture Documents
Ravi Das
I A I C S
An Introduction to Biometrics
Ever since the tragic events of 11
September 2001, security is a topic
that has received much attention.
We keep hearing in the news about
security increasing at airports and
seaports. There are many solutions
to security. However, there is one
solution that utilises a unique technological approach: Biometrics.
Biometrics leverages physiological
characteristics to identify and verify people. This article reviews in
some detail the biometric technologies that are availabie today, and
what is being envisioned for the
future.
Before examining the various biometric technologies, it is important to expand upon the definition of biometrics.
Biometrics Defined
While detective novels and cop shows have
long made us aware that our fingerprints are
unique, perhaps less known is the fact that our
bodies are unique in several other measurable
areas as well. Biometrics technology uses
those points of measurable uniqueness to determine our identities, and acts as a front end to
20
An example of a computer
mouse with built-in fingertip
recognition system.
(Photo: Xelios)
The thermographic image of the
human face is also a unique biometric
feature, and could thus be used
for recognition purposes.
(Photo: internet)
intrusion. Nor is there any way for passwordbased systems to determine user identity beyond doubt.
Individuals have physiological features that
make them different from everybody else.
These distinct, physiological features can also
be thought of as "unique identifiers". More specifically, the science of biometrics can be
defined as the process of locating and determining these unique identifiers to identify and
verify people. These unique identifiers include
the distinct features of fingerprints, the various
iris patterns, the blood vessel patterns in the
retina, voice inflections in speech, and the
shape and geometry of the hand and face.
Biometrics are automated methods of recognising a person based on a physiological or
behavioural characteristic. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and
personal verification solutions.
The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures,
government IDs, secure electronic banking,
investing and other financial transactions, retail
saies, law enforcement, and health and social
services are already benefiting from these technologies. Biometric-based authentication
applications include workstation, network, and
domain access, single sign-on application
logon, data protection, remote access to resources, transaction security and Web security.
Trust of these electronic transactions is essential to the healthy growth of the global economy. Utilised alone or integrated with other technologies such as smart cards, encryption keys
and digital signatures, biometrics ar set to pervade nearly all aspects of the economy and our
daily lives.
from the scan and stores the data as a template. You then interact with the biometric device again, and the system verifies that the data
corresponds to the template. It the software
fails to get a match, more tries may be needed,
just as dictation software learns tc recognise
the user's speech patterns over time. Once this
procedure is complete, the system is operational. The next time you try to access the system, you are scanned by whatever device is
being used (you might be asked to supply a
user name as well), and the hardware passes
the data to the software, which checks the user
templates. If there Is a match, you are granted
access; otherwise, a message reports that the
system can't identify the user.
Let's us now examine in detail a real world
example that utilises biometrics. The technology is fingerprint recognition, and the scenario is
that of verification for physical access entry.
Imagine that you are trying to enter a high-
21
SerEorDats
>
*
Registration or
Enroinent
Sensor Data
Create Template
Authentication
Venficationor
idertificabon
Create Templets
Threshold arxJ
Authenticate
Match and
Generate Score
1
YES
i
NO
template
Quality
checker
Feature
Extractor
System DB
User interface
Enrollment
claimed identity
Biometric Technologies
Feature
Extractor
Matcher
(1 match)
one
template
System DB
User interface
True/False
Verification
Feature
Extractor
User interface
Identification
22
Matcher
(N matches)
-a
User's identity or
"user non identified"
System DB
Military Technology
MILTECH
Performance
Acceptability
Circumvention
Facial thermogram
Fingerprint
Gail
Hand geometry
Hand vein
Iris
Keystroke
Odor
Palmprint
Retina
Signature
Voice
Collectability
['dec
Permanence
DNA
Far
Facial Recognition
Recognising the shapes and positioning of
the features of a person's face is a complex
task, and facial recognition software has only
Distinctiveness
Biometric identifier
Universality
H
M
H
H
M
M
M
M
H
L
H
M
H
L
M
H
M
L
H
H
L
M
M
H
L
H
H
H
L
L
H
H
M
L
H
L
M
M
H
L
H
H
M
L
L
L
M
H
H
M
H
H
M
M
M
L
M
I,
H
M
H
M
L
M
H
L
M
M
H
L
L
H
H
L
L
L
H
H
H
M
H
M
M
L
M
M
M
L
H
H
L
M
H
L
M
M
M
L
L
M
L
M
L.
H
H
7/2005
23
Iris/Retinal Recognition
The two eye-based systems, iris and retina,
are generally considered to offer the best
security, because of tbe distinctiveness of the
patterns and the quality of tbe capture devices.
Further, the structure of the iris and the retina
rarely change over the lifetime of an individual.
There has been some confusion between iris
and retinal recognition, in tbat tbe two are
apparently similar. However, the two technologies are very much different.
TTie pattern of the iris (the band of tissue that
surrounds tbe pupil of the eye) is complex, with
a variety of characteristics unique in each person. Iris-based biometric involves analysing
features found in the colored ring of tissue that
surrounds tbe pupil. Iris scanning, undoubtedly
the less intrusive of the eye-related biometrics,
uses a fairly conventional camera element and
requires no close contact between the user and
tbe reader. In addition, it has the potential for
higher than average template matching performance. Iris biometrics work with glasses in
place and is one of the few devices that can
work well in identification mode. On the other
hand, ease of use and system integration have
not traditionally been strong points with iris
scanning devices, but you can expect improvements in tbese areas as new products emerge.
Some popular applications for ihs scanning
are verifying employees, and expediting the
immigration process for incoming passengers
Palm Recognition
Similar to fingerprint recognition, palm biometrics (not to be confused with hand geome-
Examples of biometric characteristics that are or could be used for biometric systems: a) DNA, b) ear, c) face,
d) facial thermograph, e) hand thermograph, f) hand vein, g) fingerprint, h) gait, i) hand geometry, j) iris, k) palmprint, I) retina, m) signature,
and n) voice.
(Source: lAEE)
24
Voice Recognition
The voice recognttion method captures the
sound of the speaker's voice as well as the linguistic behaviour. Its primary use is in teiephone-based security applications, but its
accuracy can be affected by such things as
extraneous noises and the effects of illness or
fatigue on the voice. One obvious problem with
voice recognition is fraud: The system can be
fooled by a tape of someone's voice. For this
reason, advanced voice systems can extend
the verification process by giving the user longer and more difficult phrases to read aioud, or
requesting a different phrase to be read each
time. This does increase the time needed for
verification, however, and thus cuts into the
system's overall usability.
Bkxnvtrtc Acc*ss
Control Cofwol*
Keyboard Dynamics
Keyboard dynamics is a
specific biometric technology for computer access
security. It measures the
dwell time (the length of time you hold down
each key) as well as flight time (the time it takes
you to move between keys). Taken over the
course of several login sessions, these two
metrics produce a measurement of rhythm
unique to each user. Once the biometric data is
collected, it is encrypted and stored (locally In
the case of the desktop-only products, or in a
central database for the netvi/ork solutions).
When a user tries to log on, the software compares the incoming biometric data against the
stored data. Biometrics template can also be
stored in a smart card which offers "personal
confidentiality" as the template need not be
stored in a central server (or service providers).
Other Technologies
There are other biometric technologies that
are being examined today, but there are no
commercial applications available yet. Researchers are developing or examining the feasibility of systems based on the analysis of
DNA (currently too slow to be of real use), vein
patterns, thermograms (facial, hand or hand
veins), gait recognition (the way people walk),
earlobe recognition, brain mapping, and even
bodily odours.
Limitations of Biometrics
QuatMh ESE-100O,
8 Port RS-232 Strtal Ovtc
Ethmt
Military Technology
MILTECH
7/2005
25
Vulnerability
The dots represent the main measurement
points for a facial recognition system.
(Photo: Automa)
crypts
radial furrowi
pigment frill
pupilary area
ciliary area
collarette
26
MILTECH
7/2005
Retina recognition
systems are arguably
the most secure
of all biometrics.
However, they are not
immune from user's
acceptance problems.
(Photo: biometricwatch)
mitted to a processor for analysis. Data security in this context refers to the interception and
subsequent misuse of this data to circurTivent
the system;
- Physical. The manner in which an unattended
device is installed may render it vulnerable to a
physical attack in an effort to defeat it. Some
devices used in access control applications
have built-in relays that unlock portals, so
opening the device and shorting these contacts vi/ouid be one way to defeat the system.
The Retina
Vnw
I Input data
#11
I