Biometrics is the technique of studying the physical characteristics of a person
such
as
fingerprints,
hand
Biometric theft
geometry, eye structure or voice pattern.
Uses
Biometrics is an ancient greek word
Conclusion
‘bios’=life, ‘metron’=measure. Biometrics
ABSTRACT
is used for uniquely recognizing humans
This paper basically gives the meaning and origin of the biometrics. It also
merely
deals
with
the
identification,
operation and the types of biometrics and
based on physical traits or behavior traits. Performance of biometric systems is measured in terms of False Accept Rate (FAR), False Reject Rate (FRR).
the fields in which they are used in. It also discusses about the threats and the
BIOMETRIC
problems that may be encountered in the
IDENTIFICATION
due course. Biometric fingerprints are specially discussed here.
INTRODUCTION
Research on biometrics began at San Jose State University under the auspices of the College of Engineering in 1994. This study was completed in
Among many other instances in the animal world, mice and penguins are capable of using their factory senses, aided to some extent by other cues, to very reliably recognize their parents and their progeny, even among large populations
1997.The
Biometric
established the National Biometric Test Center at San Jose State University in the Spring of 1997. The Test Center has also been carrying out applied research using currently available biometric technologies.
packed into a small space. Humans with such capabilities appear to be limited to those whose other senses are severely
Consortium
OPERATION
Biometric applications depend on
The identification of vehicles
comparing a new measure against a
Te identification of animals
previously captured measure. In order to
Forms of identification which
establish the necessary reference-point,
show a category to which a person
some aspect of a person is measured; the
belongs, rather than specifying the
measure may be processed; and the
individual
resulting data is stored. At a subsequent
Te
gathering
and
time, the same aspect of a person is
information
measured, and compared against the stored
individuals; and
data. If it is being used for authentication, the new data is compared against the data
Restrictions movements,
already in storage for that person. If it is
or more individuals that are a close fit to the new data. Most biometrics technologies do not seek exact equality between the new and the stored measures. Instead they have a pre-set tolerance range within which the two are deemed to be sufficiently close. The biometric measure itself may be stored.
on
identified
individuals'
actions
and
Alternatively the data may be subjected to processing of some kind, and the results of that processing stored instead. The kinds of processing include: •
Compression, in order to reduce transmission time and costs and/or to require less storage space. Compression algorithms are of several different kinds, involving: o
The arbitrary removal of data;
Data-storage may be in a central location, or may be local to the place
about
of
behavior.
being used for identification, the entire database is searched, in order to locate one
use
o
The selective removal of
where it is used (e.g. in a particular
data
building where the person works), or it
determined
may be on a device carried by the person
limited
themselves (such as a smartcard, a watch
matching process between
or a ring), or in two of the above, or even
new and stored measures;
all three.
and/or o
The various forms of identification are: The identification of products and packaging
that
has to
value
been be to
of the
Te selective inclusion of data
that
determined
has to
been be
of
•
considerable value to the
biometrics are used to restrict access to the
matching process;
critical systems.
Encryption, in order to make the data inaccessible to someone who
Types of Biometrics
intercepts it in transmission, or •
accesses it in storage.
Fingerprint
Hashing by which is meant a
Biometric The use of the ridges and
mathematical
that
valleys (minutiae) found on the surface
protects the measure from being
tips of a human finger to identify an
meaningful
individual.
conversion to
someone
who
Recognition
-
Visual
intercepts it in transit. Hashing algorithms are of two kinds: o
Reversible processes, such that the original measure can
be
recovered
by
someone who knows what hashing
algorithm
was
used and o
Finger
Geometry
Recognition
-
Visual/Spatial Biometric The use of 3D
'One-way
hash'
algorithms, for which
geometry of the finger to determine identity.
no inverse algorithm is known, with the result that
the
measure
original cannot
be
from
the
recovered hashed data.
Where can biometrics be used? Biometrics can be used in almost any application that requires the accurate identification of an individual. This ranges from computers where a fingerprint scan on the mouse can verify the identity of a user to nuclear power plants where various
Face Recognition - Visual Biometric The analysis of facial features or patterns for the authentication or recognition of an individual’s
identity.
Most
face
recognition systems either use eigenfaces or local feature analysis. Eyes
-
Iris
Recognition
-
Visual
Biometric The use of the features found in the iris to identify an individual.
Typing
Recognition
Biometric
The
use
of
Behavioral the
unique
characteristics of a persons typing for establishing identity. DNA Matching - Chemical Biometric The identification of an individual using the analysis of segments from DNA. Ear - Visual Biometric The identification of an individual using the shape of the ear.
Eyes - Retina Recognition - Visual Biometric The use of patterns of veins in the back of the eye to accomplish recognition
Odour - Olfactory Biometric The use of an individual’s odor to determine identity. Gait - Behavioral Biometric The use of an individuals walking style or gait to
Voice - Speaker Verification - Auditory Biometric The use of the voice as a method of determining the identity of a speaker for access control.
determine identity.
BIOMTERIC FINGERPRINTS The electronic data from the two fingerprints is stored in a database and is
Voice - Speaker Recognition - Auditory
made available at necessary Department of
Biometric The determination of identity of
Homeland
a speaker use the characteristics of their
inspectors. The electronic fingerprint data
voice.
is associated with an issued visa for
Hand Geometry Recognition - The use
verification and the privacy of the data is
of geometric features of the hand such as
protected by storage in the database.
Security
immigration
the lengths of fingers and the width of the The Department of State makes
hand to identify an individual. Signature
-
data available in accordance with the law
The
governing the use of visa records, to
authentication of an individual by the
agencies that require the information for
analysis of handwriting style, in particular
law enforcement purposes.
Visual/Behavioral
the signature.
Recognition Biometric
are
many
thousands
deployments
around
of the
biometric world
too
numerous to list here.
IS BIOMETRICS A THREAT TO PRIVACY? This is a main barrier to wider use Where
are
biometric
technologies
currently deployed?
of biometric systems. If a person's biometric information is stolen, then their privacy has definitely been breached.
Passports:
However,
if
certain
standards
in
Research into the use of face
information collection and protection are
recognition for inclusion in passports.
met, then biometrics can be a privacy
Includes
the
enhancing tool. It is the aim of the
development of the new international
Biometrics Institute to see these standards
biometric data standards. From 26 October
and procedures put in place.
significant
input
into
2005 all newly issued New Zealand and Australian passports used a biometric
IS THEFT OF A BIOMETRIC
identifier to continue to meet visa waiver
POSSIBLE?
requirements for travel to or through the USA.
A user's biometric cannot be
Australian
Customs
Service
- Smart Gate System:
changed like a password. A behavioural biometric such as signature or handwriting cannot be 'stolen' but someone can learn to sign or write like you to a certain extent. A
face
physiological biometric such as fingerprint
recognition system for border control in
or face or iris image can be 'stolen' - a
the world. Processes aircrew at Sydney
copy of raw biometric data (or a feature
Airport,
template) obtained by illegal means.
First
has
fully
now
operational
been
operating
successfully for over a year.
Ideally a biometric is what an individual
Others:
possesses and another individual should not be able to possess the same. What they
Biometrics is currently being used in the national identification card schemes of both Hong Kong and Malaysia. There
have is only a copy of the sensed or measured form of it.
However, merely obtaining the
chosen from a large enough vocabulary
data is not enough. The impostor will have
will make it harder because the impostor
to present the biometric to the system as
will need to learn all the phrases in the
well and fool the system in this regard.
vocabulary (which may not even be
Some systems have "liveness" tests which
public). Such systems are referred to as
can
"pseudo-multimodal".
reject
presentations
such
as
fingerprints copied on plastic material or faces shown as photographs. Clever ways
USES OF BIOMETRICS
of circumventing such checks have also Biometrics may be used for
been devised and there is no completely
identification. An example of this is the
secure method.
comparison by police investigators of One cannot change a fingerprint if
fingerprints from the scene of a crime
the fingerprint data is stolen - unlike a
against a collection of prints from persons
password. One way to prevent such theft
previously convicted of serious criminal
for biometrics such as iris or retinal scans
offences.
(which cannot be as easily obtained as
government agencies are permitted to
fingerprints or faces) would be to not
collect biometrics without a conviction, or
supply them in raw form to anyone, but in
even a charge; and there are increasing
an encrypted form - what is being referred
attempts to compulsorily or pseudo-
to as 'cancellable' biometrics. Keys used
voluntarily acquire biometrics from many
for encryption and decryption can be
categories
changed. It just makes it harder for the
associated with crime (such as visitors to
thief to get a useful form of the data.
prisons, and people in geographical and/or
In
of
some
people
jurisdictions,
only
remotely
temporal proximity to the scene of a Multimodal systems can have an
crime).
advantage in this regard. It is more difficult to present the face as well as a fingerprint and sign like another person.
Biometrics may be used for authentication. A new measurement that
behavioural
purports to belong to a particular entity is
biometrics are like a combination of
compared against the data stored in
password and biometric in this regard. For
relation to that entity. If the measurements
example, the way you write or speak
match, the assertion that the person is who
particular phrases. If someone learns to
they say they are is regarded as being
write like you or mimic your voice for
authenticated.
these phrases well, you can change the
schemes work this way, with the system
Text-dependent
phrases being used. A random phrase
Some
building
access
comparing the new measure against the
transactions
to
be
undertaken
company's employee database.
anonymously,
or
using
pseudonyms.
Organizations must appreciate that, in
CONCLUSIONS
many cases, it is entirely feasible for them to protect their interests without knowing
Biometrics is one of the most
their clients' identities.
serious among the many technologies of surveillance that are threatening the
Government agencies, and some
freedom of individuals and of societies in
corporations, are seeking to exercise
one possible future, biometrics will fall
tighter control over individuals using
into ill-repute in relatively free countries.
various
But in authoritarian countries, biometrics
underpinned by effective identification
will be successfully imposed on the
schemes.
population, resulting in freedoms being
world may passively process bills put
reduced even further. Biometrics providers
before them to facilitate such schemes.
will flourish by selling their technology to
Alternatively, they may choose to actively
repressive
achieve
seek a balance between the organizational
footholds in relatively free countries by
and collective interests on the one hand,
looking for soft targets, starting in some
and the individual interests on the other. If
cases with animals and in others with
they adopt this course, then they must
captive populations like the frail aged,
proscribe unjustifiably intrusive schemes,
prisoners,
promote the use of anonymous and
governments,
and
employees,
insurance
forms
of
data
Parliaments
surveillance,
throughout
consumers, and welfare recipients. All
pseudonymous
relatively free countries will become more
practicable, and, except in carefully
repressive.
justified and regulated cases, deny the
Public
confidence
in
corporations and government agencies will
transactions
the
multiple uses of identification schemes.
spiral much lower. This scenario leads away
from
freedoms
and
towards
REFERENCES:
subjugation of the individual to powerful organizations. It
www.anu.edu. was
concluded
that
www.google.com
organizations should consider whether the nature
of
their
relationships
with
individuals really requires identification, or whether appropriate design can enable