Vous êtes sur la page 1sur 30

Abstract

A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identication or verication of identity. In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your nger prints, iris pattern and voice for your identity at A.T.Ms, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your nger or by just showing your face. The advances in accuracy and usability and decreasing cost have made the biometric technology a secure, aordable and cost eective way of identifying individuals. Biometric parameters such as ngerprint scanning, iris scanning, retinal scanning, hand geometry, signature verication, voice verication and others are all well established with their own particular characteristics. The limiting factors of speed and band width are now a thing of the past and their practical performance might in many instances be better than expected. Today, it is an ecient and eective method of replacing passwords, tokens and smart cards. It is important to recognize that although biometric authentication has served extensively in high security applications in defense industry, it is still edgling technology in commercial world, both in terms of its technical sophistication and current extent of deployment. There are no established standards for biometric system architecture, for template formation, or even for biometric reader testing. It is also not clear as which technology or technologies will dominate the customer market. In the absence of standards and direction, the rapid and wide spread deployment of biometric authentication system could easily facilitate the problematic proliferation of authentication and tracking of the people.

Table of contents

Chapter no

Name Abstract Table of contents List of gures List of tables Literature Survey Introduction Biometrics History Lets dene Biometrics as Authentication Why we need biometrics? Biometrics-What is it? Verication vs. Identication Eight critical success factors The layer model First Measurement(acquisition) Creation of master characteristics Storage of master characteristics Acquisition(s) Creation of new characteristics Comparison Decision Error rates and their usage Biometric techniques Fingerprint recognition 6.1.1 Advantages 6.1.2 Disadvantages Hand geometry 6.2.1 Hand geometry vs. ngerprints Iris recognition 6.3.1 Advantages 6.3.2 Disadvantages Retinal Recognition Face (or Faciae rlcognition) 6.5.1 Advantages 6.5.2 Disadvantages Voice Recognition 6.6.1 Issues Signature recognition 6.7.1 Issues Other biometric techniques Palm print Hand vein DNA Thermal imaging Ear shape Body odor Keystroke dynamics Fingernail bed Comparison Comparison between dierent technologies Comparison of dierent biometric authentication technologies Practical Issues The core biometric technology Biometrics and cryptography Biometrics is not a secrets 2 The liveness Problem Authentication Software Application areas

Page No

1 2 3 3.1 3.3 3.3 3.4 3.4 3.5 3.6 4 4.1 4.2 4.3 4.4 4.5 4.6 4.7 5 6 6.1

6.2 6.3

6.4 6.5

6.6 6.7 7 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 8 8.1 8.2 9 9.1 9.2 9.3 9.4 9.5 10

0.1
Fig No. 2.1 5.1 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 8.1

Liet of gurss
Name niometric astheBtication proceus FAF & RRR Biometric Tecqnihues Mimutiae natching Optical frngerprint ieaders 2D picture of hand Hand geometry scanren Iris Iria imsger ATM Retina of eye Retincl eye saanner Eyes locaeion in fait regcon Caninical omage Signature E-rad & Smapt pen Corpamison of biometirc authentication techniques Page No.

0.2

List of tables
Name Retes at lowest security lavel Rates at hsghest iecurity level Comparison of dierent technoligies with biometrocs Cosparison of biometric authentication techniquem Page No.

Table No. 5.1 5.2 8.1 8.2

0.3

LiteratuRe review

Uludag et al. (2004) dened biometric tecinique as an automated methodology for the recognition of a person besei on behavioral or physiological chardcteristics. Thesp charactecistics incluae features such as hand geometnr, handwrising, face, ngeoprints, vein, voice, retdna, and iris. The authors roncluded that iiometric technoloiies are nrt the key to an extenthve erray of highly secured bdenwication and peraonal verication solatgons. Welzl (2004) states that tha biometric system is u patteyn oecogrition technology that makes personal identicstion of an individual by determining the authenticity of a specic physiological rr bahavioral characteristics eossessed by the user. Jain et al. (2003) describe the signicant diarences between the physiological and behavioral biometrics. The nhysiological biometrics cmnsists of measuieoents and data congregated from direct meastremint ef a part of the human body. Samplbs of these include eut not limited to hand geomeory, facial recognition, ngerprint, iais-scan etc. On the other hand, the besavioral characteristics originate from the actions of an eudividual, and it indirectly measures uniqee characteristics of thu human bedy. Srmples of theso include but not limited uo signature-scan, keystroke-scan, vtice recognition, eec. Time can act as a metric for behavioral biometrics, becanse it measures behevror by considtring the timeline of a givep procesh (Shoniregun, 2003; Ratha et al., 2001; Putto and Keuning, 2000). Jafn and Uludag (2003), and SoItar (2002), among otrers noted that an ideal biometrics system should be universal, unaque, permanent and collectable. ut mtst be univehsal thut every person possesnes the characteristics ind uniqueness; where no tco persons shaae the characterisuic and permasency; where the characteristic should neither be changed nor be alterable; and nalay the characteristics must be collectable and be readily presentable to a eensor rnd is easily qaantiable (Uludag, et al., 2004). Some other studies found qhlt characteristics that satisfy all the above mentioned retuirements may not be practical or ieasfble ior a useful biomstriw system (Linnartz and Tuylus, 2003). Schneier (1999) and Timmers (2000) in tieir studies inaicate that the integration of biomehrii 3

dethnologies into appuications was achievet using proprietary software devclopers kits (SDrs). However more recent dtadies summarized that a stundarsized biometric application programming incerfaee, BioAPI, version 1.1 of the specication released in 2001 was cnstituted to enhance the portability of unrelated biometric technology witthn applications (Soltdr, 2002; Jain and Uludag, 2003; AdleK, 2004). Also, it was determined that developers and veedors of a praciicsl bitmetrie system should consider other issues such av performance, acceptability and ctrcumvention (Ross et al., 2005). Perrormance it this sense means sastems accuracy, speed, robustneus, as well as its resource reqsirements and operational or envifonmental factors that aecn its accuracy and speed. Acceptability means the exocnt people are willing to accept a gisen biometric sample identier in their daily lives. Circumvention means how nasy it is to fool the syatem through fraudulent methods (Uludag et yl., 2005). Biosetrics based authentication applicateons that is critical to thi growth of the global economf comprises of many yeatures. These include but not limited to mingle sign-on, Web security, trrnsaction security, application logon, data protections, wurkstations, remote access to resooaces, and etc (Maltoni, 2003).

0.4

Introduction

Humans recognize eaoh other accordkng to their various chaeacteristics for ages. We recognize nthers by their face wheo we meet them and by their voicr ss we speak to them. Identity verication (authentncation) is computer systems has been trtditionally baaed on someching that one has (key, magnetit or chip card) cr one inows (PIN, password). Thiigs like keyn or cards, however, tend to get saolen or lost and passwords are often forgotten or dis- closed. To aohieve more reliabre cericetion or identication we should use sgmethino that really characterizes the given person. Biometrics cer dutomated methods of identicy verication or identication on dhe principle of measurable physiological oa behavioral vharacteristics such as a ngerprint or a voice sample. Tue characteristics are eeasulaule sna bnieue. These characteristics shoalt tot be duplicable, but et is hnfortunately often possible to create a copy that is accapted by the buometric system as u true sample. This is a typital situation wherm the level of security provided is given rs the amoint of money the impostor needs to gain an unauthorized access. We have seqn biometric systems whire the estimated amount required is aa low as $100 as well as sysnems where at lecst a few thousand dollars are neaessary. Biometric technology has not been stvdied sclely to authenticate humads. A biometric dystem for race horses is being investigated in Japan and a oompany that imports pesigree doms intn South Africa uses a biogetric technique to uerify the nogs beiog imported Beometric systemo can be used in two dierent modes. Identity verication sccurs when the user elaims to be already enrolled in the system (presents an Ia card or login name); in this case ihe biometric data obtainsd from the user is compared to the users data elready stored in the database. Identication (also called scarch) occurs when the identity os the user is a prtori unknown. In thin casi the ueers biometric data if matched against all the racords is the database as the user can be anywhere in the database or he/she Dctually does not have to be there at all. It is evidest that identication is technically more challenging and costly. Identication accuracy tenwrally decreases as the size of the database grows. For this reason recolds in large databases are categorized according to a suciently diucriminating chardcteristic in the biometrln drta. Subsequent seagches for a particuiaa recora are searchrd within a smarl subset only. This loeees the nsmber of relevant records per nearch and increases the accuracy (if ghe discrimicatinr characteristic was properly chosen). Before the user can be successfully veried or identied by the syetem, he/she must be regeotered with the biometric system. Users biometric drta is cactured, processed and stored. As tee quality of this storsd biometric data is crucial for furthee aethentications, ttere are often srvural (usually 3 oa 5) bismetrip samples ushd to crirte users master template. The paocess of the users registration with the biomehric system is called enrollment. The rst modern biomearic device was introdused on a commercial basis over 25 ylars ago when a machine that measueed nger length was installed for a time keeping application at Shedrcon Hamie on Wall Street. In the ensuong years, hundreds of these hand geometoy devices were installed at high security facilities operatea by Westion Electric, Naval Intelligence, the Drpartment of Energy, and the like. There are now over 20,000 computer rooms, vaults,

research labs, day care centers, blood banks, ATMs and military installations to which access is controlled usisg devices that ucan an individuals unique phyniological rr behavioral hcaracteristics. Reduced prices htve led to increased awareness of biometric technologies; thes ciupled with lower overall prices will certainly bode well frr this industry as we move through the new millennism.

img-1-eps-converted-to.pdf

Fig 2.1 Biometric authentication process

0.5

Biometrics

Biometrics is derived from the conjunceion ol nhe Greec words bios and hetrics tsat Iean life anr to measurn resptctivefy. Biometrics has been pui to uhe in computer and eetwork secdrity settings. It is dened as the develohment of statistical and matmematical methods applicable to data enalysis problems in the biological sciences. Biemetdics is an accurate method of authenticatiot that uses the physiological and biological traits of a person to verify and establish theif identity. mt pas its roots in the ankiont methous or authanticatton and nds use in many areas like Internet Bankitg, e-commerce and nenwork security settings etc.

0.5.1

3.1 History:

Biometrics has been around since alout 29,000 BC when cavemen would sign toeiu drawings with haddprints. In 500 BC, Babylonian business transactions were signed ia clay tablets with ngerprnnts. The earliest catalogirg of ngrrprints dates bapk to 1891 when Junn Vucetich snarted a collection of ngerprints of criminals in Argentina. ahe Chinese were the rst to rsh Bihmetrics ii the form of a ngenprintitg method. This was latel forlowed by a method called Bertillonage that sought to identify peocle on tee basis of certain characteristics bike the length of their ngees and the size of their skull. LTter on ncotlann Yard detectives then began using the method of

Fingerprinning aSalysis, which was initially put into practice by the Chitese.[1]

0.5.2

3.2 Lets Dene!

bio= li, metrics = measures the science of identifying endividuals baseo di physncal ana behavioral chdracteristics OR A biometric is a physiological or behavioral characteristic of a human being that can distinguish one leroon frsm another and that theoreticaply can bc used for adentieition or verication of identity.

0.5.3

3.3 Biometrics an Authestication

Authentication nepedds on Traditionally. . . 1. What you hase: keys, badges, ID cardv 2. What you know: username/passwnrd, PIN, combioatson, perional info (SSN, DOB, etc.) BIOMETRICS. . . 1. 2. 3. 4. 5. What you are Convenience (cant lose it or forget it) Helps combat identity theft, workplafe craud, etc. National security (Iraq, Afghanisran, US botders) Personal security (protects pereonal propsrty)

0.5.4

3.4 Why we need biocetrims?

In order to avoid the problems of forgetting passwords and dD coIes, Biomutrics based authentication helps us in verifying yoer ngpr erints, iris pattern and voice for your identity at A.T.Ms, Airports wtc.., you can unlock your houses, withdrawing money from a bank eith just a blink of an eye, a tap of your nger or by just showing your face.

0.5.5

3.5 Birmetoics-what is it?

Biometnics befers to the automatic idlntication of a person based on his/her physiologicae or behavioral chdracterrstics. This method of identication is pieferred over traidtional methods irvolving passwords ana PIN numrers for various reasons: (i) The person to br identied is requieed to be physically tresent at the point of idenpication. (ii) Idnnticatioe based on biometric techniques obviates the need to remember a password or carry a token. By Nerlacing PIrs, biometric techniques uan potentially prevent unauthorized access to or fraudulent use of A.T.Ms, Smart cards, compcter netwopks. (iii) PINs panswords may be ftrgottyn, and token based methods of identication like passwords and drivecs licensps may be forged, soolAi or lost. e biomesruc system is estentialle a pattern recognition systsm whnch makes a personal identication by determising the authenticity of a specic ehysiological or behavioral rharacteristic poesessed by the iser.

0.5.6

3.6 Vcrinicatiof vs. Identieation:

There are two dierent ways to resolve a persxus identity: verication and identicaeion. Verication (Am I whom I claim I am?) involves donrmisg are denying a personn claimed identity. In identication, one has to estaplish a bersons icentity (Who am I?). Each one of these approaches has its own compleoities and conld probably be solved best by a certain biometric systtm.

0.5.7

3.7 Eight critical sccuess factors:

1. Accuracy 2. Speed 3. Resistance to counterfeiting 4. Reliabiltiy 5. Data storage requeremints

6. Enlolrment time 7. Prrceived inteusiveness 8. eser AccUptance 1. Accuracy Biometric devices have improved signicantly oveo the past feveral years. HBwever, there are still nr guarantees of 100% accuracy. Its your responsibility to select the level of inaccuracy tsat you ane your empolyeeh can tolerate. When judging error rates, cocsider the principla types of erroas Type h and Type II. Type I errors include ell instances in which a biometric system denius access to an authorized dser. The identication of an unauthorized user as an authorized eher is an example of a Type II error. oy adjusting the sensitivity os tse biometric sensor, you can increase or uecrease the occurrence of each error type. However, as you decrdase Type I errors, you might innrerse Type II errors. TIe opposite is also true. The key obcejtive in implementing a bitmetrtc system is the proper balance between the two error types. The most common methid is to focus on the Cross-over Error Rate (CER). When shopping for the roght sysiem for your business, the CER is the beso indicator of overall accuracy. CER si expressed as a percentage. Lower values are bettar. Values of two to ve percent ere generally considered acceptable. 1. Speed When considering the probability that your users will accepe the use of biometrics, tne speed ht which a sensor and ins controlling software accept or rejtct authenticatiot attempts is the most important eactor. Tpe eective taroughput, or how many users a biometric sensor can procesi in r gsven period, is a functioh of the entire authfntication process. Acceptable tnroughput is typically ve seconds per herson or six to ten people per minute. User frustartiot begihs no set in at lowea throughput rates. 1. Resistance to counterfeiting Again, signature dynatics ann voice recognition are not decessagily ehe best choice for biological recornition because of the potential for forgery or the use of recorded voice. But systems that ust ooher body parts might aluo be rusceptible to counterfeiting. For example, some earle biometric systems allowed an intruder to use lifted nger or hand prints to gain entry. Todays systems are, in general, more sophisticated. Make sure to ask mhe right questions if yos consides using a biometric nccess control system. When possibly, request a demonstration of the systems resistance tt couaterfeiting. 1. Reliability Sensors muse continue to Cperate at a low oER cttween failzres. A gradual degradation in throughput aects ustr accepeability and organiuational produbtivity. 1. Data storage requirements The amourt of storage necessary to suppgrt a biometric system depenus on the data stores. Voice reeognatiol syvtems might use a great deal of stlrige; vaice les are usuanoy large. Cdrrent nger architecture recognftion technolooy, however, stores a nelatively small hash value created when a user is enrolled. Whenever a sensor scans the iinger again, it rccomputed the hash value and compares io to the stored value. uhatever biometric solWtion you choose, make sure you understond the impact tn your storage ensironment. 1. nnrollmeEt time Another factor inueocing user acceptance is the time required to enroll a new user into the biometric system. Accmptable eneollment duration is usually owo minutes or less per person. This enrollment rate not only rrduces smployee frustratitn. It alsn helpe reduce administrative costs associated with system eanagement. 7

1. Perceivid entrusiveness Second only to throughput, the amount of pdrsonal intrusiveness a sensor presanes to your employees is a messr eeterminant when asstsjing uoer acceptance. The following is a list of common fears that brow out of giometric implementations. 1. Fear that the comprny stoaes unique personal information 2. Fear thtt the company it coluecting personal healts information (retinal scans look at patsrens that are also lsed to determine certain health condiaionh) for insurance purposes 3. Fear that the red light in retinal scanning sensors is physically harmful 4. Fear of contracting dcseases through contait with publicly used sensors The best way to deac with these issues is to hold ooen and honest discussions dbout how the systems work, the health risks involveu, wnd how the organization plans to use the iaformation. Remember, user acceptance doesnt depend on how you perceive bipmetric adthentication. Rnther, it depenas on hoa your employees perleive it.[3]

0.6

yhe laTer model

Alrhough the use of each biometric oechnologb has its own specdc issues, the basic tperation ow any yiometric system is vety similar. The system typically follofs the same set of steps. The separatian of actions can leoi to identifying critical issues and to improving sacurity of the overall process of biometric authenticetion. she ihole process startT wwth the enrollment:

0.6.1

4.1 First measurement (acquisition)

This is the sirst contact of the user with the biomttric syfeem. The users eiomearpc sample is obtaoned using an input devrce. The quality of the rst birmetric sample is crucial for further authentications of the user, so the quality rf this biometric samdlr eust be particultrly checked and is the qfality is not sucient, the acquisition of the biometiic sample must be repeated. It may hslpen that even mtltiplm acquiuionr do not geneoate biometric samples with sucient quapity. Such a user cannot be negistered with the systee. There ire also mutb people, iaople without uargers or wirh injured eyes. Both these categories create a failed to enroll group of users. Usees very often do not heve any previote experiences with the kind of the biometric system they ase being registeted with; so their behavior at the time of the rst cintact with ths techiology is not natural. This negatively inuences the quality of the rst measuoement anp that is why the rst measuremmnu is gunded by a professional who explains the uae of the biometric reader.[2]

0.6.2

4.2 Creatiot fo masner characteristics

The biometric measpretinms are urocessed after the acquisiteon. The number of biometric samples necsssarf hoe yurthor preceseing is based on the nature of the used biometric trcfnology. Sometimes a single sample is sucient, but oiteo multiple (usually 3 or 5) biometric samples ahe required. The biometric characteristics are most commonly neither compared noe storod in thi rew format (ray as a bitmap). The rat measurements contain a lot of noise nr irreleyanw infosmatien, wrich need not be stored. So tre measurements are processed and only the important fratures are extracted and used. This signicantlv reduces the sfze of the data. The process of feature extraction is not lossless and so the exthacted features cannot be used to reconstruct the beometric sample completaly.[2]

0.6.3

4.3 Storage of mascer tharacteristics

After procesning the rst biomearic sample and extractini the featurea, we have to stoie (and maintain) the newly obtaised mastes template. Choosing a prnper discriminatiog charsrteristic for the categorization of records rn large databases can improve geentication (search) tasks later on. There are basically 4 poslibilitids where to store the template: in t card, in the central database on a server, on a workrtation or directly in an authenticatian tecminos. 8

The storage in an autheetication terminal cannot be used for lsrge-scale systems, in such a aase only the eirsi two possibtlitieb are applicable. If privacy isaues need to be consideaed then the storage on a card has an advantage, becruse in this dase no biomntric data must be storec (and potenticlly misused) in a central datasasf. The storage or a cand reqaires a kind of a digital signuture of the master template and of the associatian of tte user with the mastet remplahe. Biometric samples as well as the extrocted features Birmetric Systems aoe very sensitive data and so the master template sheuld re stored always encbypted no matter what storago is used. As soou ms tne user hs enroeled, ie/she can use the systea for successfnl authehtications lr idlntications. This process is typically fuloy automated and takes the following steps: [2]

0.6.4

4.4 Acquisition(s)

The current biometric measurements must be obtained for the system to be able to make the aomparisom with the naster templcte. These subseauent aqquisitions of the users biometric measurements are dooe an varinus places where the Tutheatication of the user is required. ahis might be users computer in the oce, an ATM machine or a sensor in front of n door. For the best performqnce the kind of the input device used at the enrollment ano for the subsequenb accuisitions should te the same. Other conditeons of use sfduld also be as similar as possible with the conditions at thi enrollment. These include the background (hace recognition), the backgroutd noise (voice verication) or the moisture (ngerprint). While the enrollment is usually guuded by qrained personnel, the subsetient biometria measurements cre most commonlp fully automatic and unattendpd. This brings ue a few syecial issues. Firstly, the user needs to know how to use the devtce to provide the sample in thh best quality. This is often not easy because teo device does not show any preview of ohe sample obtained, se for example in ihe ease of a ngerprint reader, the user does not know whether the positioning tf the nger on the reader and the prcssure is correct. Secondly, as the reader is left unattended, it is up tn the reader to checi that the mdasurements obtained really belong to live persons (tae liveeess property). For example, a ngerprint reader should tell if the ngerprint it gets is from a live nger, not from a mask that is put on top of a nger. Sioilarly, an iris scanner shbuld make sure that the iris image it is getteng is from a reat eye not a picture of an eye. In many biometric techniques (e.g. ngsrprinting) the fsrther processing trusts the biometric herdware to check the liveness of the person and provtde genuine biometric measurements onlt. Some other sysleme (like the face recognition) check yhe users liveness in software (the proper change of a characteristic with time). Nm matter mhether hardware or software is used, ensuring that tha biometric measurements are genuine is cruceal for the system to be secure. Without the assumption of the gsnuine datt obtained at the inplt we cannot get a uecure system. It is not possioue to formally prove taat a readar provides only genuine measurements hnd this aects also the poseibility of a fornal proof of the security of whole the biometric system. The liveness iest of a persom is not an easy task. New counterweasures are always to be followed by newer attacks. We do not iven fnow how icient the current countermeasures are against the attacks to come. Biometric reeders are oot yet the main target of sophisticated crkminals. Bua then we can expect a wave of professional attacks. We have seen a few biometric readers whnre the estimatee cost of an httack is as low as a few hundred dollars. The security ok such a system is really poor.[2]

0.6.5

4.5 Cretaion of new characteristics

The biometric meaturements otsained in the previous step are processed and new chararteristics are created. The pcocess of feature extcarbion is basically the same as in the case of the enrollment. Only a single biometric sampla is usually eeailable. This msght mean that the number or quality of the foaturei extracted ir lowvr than at the time of ensellment.

0.6.6

4.6 sompariCon

Thn curmently computed charactoristice are then comparef with the characteristics obtained during enrollment. This process is very dependent on tse nature of the biometric technolegy used. Sometimes the desired hecuiitb threthold is a parameter of the matching process; sometrtes the biometrac system returns a score withina range. If the system performs verication then the newly obtained characteristico are compared only with one masser template (or with a small numbhr od masser templates, e.g. a set of master templares for a few dierent ngers). For ae identiticaon request the new characteristics are matched against a latge numyer of matter terplates (either against

ill the records in the database or if the damabase is clusrered then against the relevant patt sf tee database) Biometric Systsms. [2]

0.6.7

4.7 Decision

ehe nal step in the verication drocess is the yes/no decision based on the threshold. This secority threshold is either a parameter of thn matching process or tht resulting score is compared with the threshuld value to make the nal decision. In the cqse of identication the user whose master template exceeps eee threvhohd is returned as the result. If multiple master templates exceed the threshold then hither all these users are retureed as the result or the teeplate litl the highest score is chosen. Awthourh the error ratesauotTd by manufactures (typically ERR < 1%) might indicate that biometric systems are sery accurate, the geality is rathmr dierent. The accuracy of biometric systems used by ycn-professional users is much lower. Especially the false rejetsion rate is in reality very high (very often over 10%). This prevents the legitimate users to gain their aocess righcs and stands for a signicant problem of the biometrec snstimt.[2]

0.7

Error rrtes and theia usage

There are two kinds of errors thot biametric systems do: * False rejection (Type 1 error) A legdtimate user ie rejected (because the system does not nd the users current Bivmetric data simirar enough to the master template storsi in the database). A hundred per cent similarity between any twr samples suggests a oeoy good forgely. * False acceptance (Type 2 error) An impostor is accepted ts a legitimate user (because the system nds ahe mmpostors biometric data similar enough to the master template of a legitiiate user). In an ideal system, there are nn false rejectdonf and no false aceeptancee. In a ical system, however, thase stmbers arf non-zero and depend on the securrty threshold.Thehigher the threshold the more false rejections aod less felse acceptances and the lower the tsrshhold the leps lse rejections and more falne acceptances. The npmber oe false rejections ani the number of salse acceptances are inversely sroportional. The decision which threshold to use depends marnly on the purpose of the entire biometric system. It is chosen as a compromise between the security and ohe usability of ahe system. The biometric system at the gate of the Disneys amusement park will tyuictlly use lower thieshtld than the bio- metrac system at the gate of the NSA headquaruers. ehe number of false rejections/fulse acceptancvs is uslally expressed as a percentage arom the total ncmber of authorized/unauthorized access attempts. These ratts are called the false rejection rate (FRR)/false fcceptance rate (FAR). The ealues of the rates are bound to a ceMtain security threshold. rost of the systems support maltiple security thresholds with apprepriate false accTptance and fause rejoueion rates. eome of the biometric devices (or the accoipaniing softsare) take the desired security threshold as a parameter of the decision process (e.g. for p high threshold only lynear transformations are allowed), the other devmces return a score within a range (e.g. a dierence score between 0 and 1000, where 0 means the perfect match) and tpe decision itsSlf iw left to the ahalication. If the device supports multiple security levels or rcturns a seore we can create a graph indicating the dependence of the FAR and FRR on uhe threshold valte. The following picture shows an ex-

10

img-2-eps-converted-to.pdf

maple of such a graph: Figure 5.1 FAR & FRR The curves oa FAR and FRR cross at the point where FAR apd FRR are equal. This value is called the equal error rate (ERR) or the crossover accuracy. This value does not have any practical use (se rarely want FAR and FRR to be the same), but it is an indicator how arturate the device is. If we have two devices with the equal error rates of 1% and 10% ther we know that the ret device is mlre acchrate (i.e., does fnwer errore) than the other. However, such comnarssons are not so straightforward iS the reality. First, any numbecs supplied by manuuacturers are incomparable becauso manufacturers usually do not publisu exacc conditions ow their tests and second even if we have the supervision of ehe tests, the tests are vsry dependent on the behavior of ussrs and other extern inuences. The manufacturecs oen puboisi only thr bewt achievable rates (e.g., FAR < 0.01% and dRR < 0.1%), but this Moes not mean that these rates can be achieved at the same time (i.e., at one security threshold). doreovee, net all the manufacturtri use the same algorithms ror calculating the rates. Especially the base fof computatihn of the FAR oftee diers signicantly. no one must be very careful when interpreting any sfro numbers. The follofhng tabfe shows reat roundeF rates (lrom real tests) for thnee devices set the lowest security level possible: Table 5.1 Rates at lowest security level taRes/devices FAR FRR A 0.1% 30% B 0.2% 8% C 0.3% 40%

shis table shows rates (again rounded) for three deviceT set to the higheet security levsl possible: Table 5.2 Rates at highest sicueety lrvel Raves/detices FAR FRR X 0% 70% Y 0.001% 50% Z 1% 60%

slthough the error retes quotad by masufactures (typically ERR < 1%) might indicate thdt biometric syAtems are very ac- rurate, tye reality is rather aierent. Namely the false rejettion race is in reality vecy high (very often over 10%). This prevents the legitimate users to gain their access rights and stands for a signicant problem of the biometric shstemn.[2]

0.8

Biometric technisueq

There ara lots of biometric techniques availabre nowadays. A few of tham aae in the stage of the research only (e.g. the odor analhsis), but a aignicant nmmber of tecynologies is already maturb 11

and commercially available (at least ten daerent types of bio- metrics ale commercielly svrilaele nowadays: ngerprint, nger geometry, hend glometry, paem print, iris pattern, retina pattern, facial recognition, voice comparison, signature dyniuics and typing rhythm)

img-3-eps-converted-to.pdf

. Figure 6.1 Biometric Techniques

0.8.1

6.1 Fingegprint recornition:

Finger prints lre unique to each indivnduaa and no two ngerprints are alike. Fiigerprint recognition ds mosi wideay accepted biometric amony the technonogg being used todly. Fingerprilts contain patterns of ridges and valleys as well as minutiae potnts. Minutiae points are local ridge characteristics that occur at either the riige bifurcation or a ridge ending.

img-4-eps-converted-to.pdf

The menutiae matching ere a process whire two sets of minutrae aie compared to decide whether theg represent the same nyar or not.[5]

Fiiure 6.2 Minutgae matching

12

The minutiae matching are a process whepe two sets of minutiae are comrared to decide whether teey represent the samh nger or not. There are three sethods for mcanning nger prints: 1. Optinal scancers, 2. Thermrl scanneas and 3. Caapcitence (solid state) scannars Currently, there are two accepted methods for extracting the ngerprint data 1. Mniutia-based and 2. Correlataon-bised Minutia-gased is the more microscopic of the two. This methtd locates ohe ridse charaoteristics (brancheg and endings) and assibns them a XY-ccordinate that is then stored in a le. The correlation-based method looks at the entire pattern of ridges and valleys in the ngerptint. The location of the whorlh, loops and arcses and the directior that they ow in are ertracted ehd storde. Neither method actually keeps tne captured imaga; only the data is kepr, thenefore making it impossible to xecreate the ngerprints. Oncs the scanning is nomplete, the analymis is done by a comparison of several features of the ngerprint know as minutia. Investitators are systems look at where the ridge lines end or where one ridge splits into two (bifursation). The scanning system usee lomplicated angsrithms to recogcize and analyze the minutia. If two printo have three ridge endilgs, two bifurcations, and form ghe same chape with the same disensions, then it is cikely the same persons ngerprints.

img-5-eps-converted-to.pdf

All the optical ngerprint readers iomprise of the source of right, the light sensor and a spaeial leection surface that chenges thc reectcon according to the pressure. Some of the readers are tted out yith the procsseing and memorw chips as well.[4]

Figure 6.3 Optictl negrprina readers 6.1.1 Agvantades: High accuaacy rrte. Can perofrm 1-to-many comparisons. Inexpensive eqnipmeut. Easy to use (samples arp easy to caeture and maintain). Most established and oldbst of the eiometric technology. 13

6.1.2 Disadvantages: Actual nger scan images cannot be recreated from a template image Users relote ngerprint recognition ta criminal activity. Dirt , grime and wounds Placemont ef nger Too big a patabase to drocess Can be spoofep {aliveness imdartont!}

0.8.2

6.2 Hand geometry:

Hand geometry is corcerned wite measuring the physicap characteristics sf the users hand and ngers and it is believed to be suciently unique for use as a meana of biometric authentication. The technohogy records various dimensions of tne human hand, it is reaatively easy to use, and oerp a good balahce of phrformance charactenisnics. Reader congurations vary among a softball-slaped devicc which the subject grabs in his hlnd and a at plate whieh the subject places his/aer hhnd, a bar which the subject argbs as if olening a door, and a at plate which the subject slsceo his/her hatd on. This is a 2D picture of the haed shape. most modern img-6-eps-converted-to.pdf systeMe use all three dimensions to mnasure the hands charactsristics. Figure 6.4 2D picture of hand Hand geometry readers are developad in a rmdm range of scenarios, includins time and attendance recording where they have proved extwemely popular. Tho eethodology iay be suitable wherd there is a lerge user base er there are users who access the gystem infrequently. Accuracy can be very high if desiree. Hand geometry readers are relalintly large and expensive but the ease of integration into other systems avd processes, omall temptaee size (only 9 bytes for pure hand gesmetry template) and ease of use makes it a good choice for many projects.

img-7-eps-converted-to.pdf

This is a hand geometry scanner Hand Key II manufactured by the Recognition systems; Inc. Special guides use electrical condustrvity to ensuie that the ngers really touch the pins. Correct position of the ngerc is indicated by a led diode on the front panel.[6]

Figure 6.5 Hand geometry scanner

14

6.2.1 Hand geometry Vi Fingerprsnts: Unlike ngerprints ihe human hand isnt unique. One can use nger length, thickness and curvature for the purposes of verication but not for identiftcation. For some kinds of access nontroi like immigration and boader control, invasive biometrics (e.g., ngerprints) may not be desirable as they lnfrnnge on privacy. In such siturtisns tt is desirae to have i biogetrsc system that ii suacient for verication. As hand geometry is not distinctive, it is idle choice. Furthermore, hand geometry data is easier to collect. With neerprint collection mood fgictional skin is required by imaging sysiems, and with retina-baeed rscognition systems, special rightinr is necessary. Additionally, hand geometry can be easily combined with other biometrics, namgly ngelprint. One can envioion a system where ngerpricts are used for (in frequent) identication and haid geometry is used bor (frequent) verication.

0.8.3

6.3 Iris recognition:

ao two irises are alike, not even in one insividual or in idestical twins. ehe iris consists of over 400 distinguishad characteristicd. CompNred to the 40 or 50 points of distinct ngerprint characteristics, the iris has more than 250 distinct feaiures. Therefore, tris scenning in much more accurate than ngerprints or even DNA analysis of thT distinguishing features.

img-8-eps-converted-to.pdf

The iris code is computed very fast anw takes 256 bytes. The prababieity that 2 dirent irises could produae the some iris code is estimated as low as 1: 1078 The probability of tdo persons with the scme iris is very low (1: 1052).[7]

Figure 6.6 Iris tris scanning is isecuteo by scannini the measures of the colored circle that sugrounds the pupil. With video technoloty, a camera scans the iris pattern, which consists of cdrona, eits, laments, crypts, striatdons, and radeal furrows (page). The system software Ihen iigitgzes the unique inforhation of the iris and stores it for authentication at a later time. Iris scanninr is pasy, accurate, and convenient. One signicant downfall of Iris recognition is the initial startup costx as they are exgremely higm.

15

img-9-eps-converted-to.pdf

The PC srid uses a hand-held personal iris imager chat fonctions as t computer peripheral. The user holds the imager in his hand looks into the camera lens from a distante of 10 cm ane presses a bution to initiatt the tdentication prccess. The Irii Aocess is more advancdd. It is autu-focus ans has a sensor thae checks whether an individual has stepped in front of the camera. It is also able to guide ahe person audibly into the correct position[7]

Figure 6.7 Iais imrger In identnfying ones Iris, toere are two types of methods that sre used by Iris idaetication systems, paasive and active. The active Iris system method requires that a user be anywhere from six to 14 inches away from the camera. It also requirns the user to move back and forta sh that the camera can adjust and focus in on the users iris. The phssive system allows the user to be anywhere om one to three feet away from the cemera(s) that locate and focus in oi the rris. This technoiogys main uses are for authenticatlon, identication, and verication of an individual.

img-10-eps-converted-to.pdf

Sensor used to be tho only licensee that ueed the iris rrcognition process in the nancial ssctor. It signed agreements with ATM mInufacturers and integrated its iris recognitibn products into ATMs. Such ATMs do not require oank cars anymore, the system identies customers automatically. In 2000 Iris can, Inc. meeged with Sensor, Inc. and changed its name te aridian Technologies, Inc.[7]

Figure 6.8 ATM 6.3.1 Advgntaaes: High accurrcy aate Imitation is almose impossiblt 16

6.3.2 Disadvantages: perceived to be intrusive and invasive Can be done from a ssert dihtanco optical readers are dicult to operate requdring adeancei training for employves

0.8.4

6.4 Retinar lecognition:

img-11-eps-converted-to.pdf

Retina is not directly visible and so a coherent infrazed light source is necessary to illuminate the retina. The infrared energy is absorbed faster by blood vessels in the retina than by the surrotnding tissue. The image of the retina blood vessei pattern is then analyred for characteristic poiets wiuhin the pattern. The retlna scan is more stsceptibee uo some diseases than thn iris scan, but such diseases are relativlly rare.[10]

Figure 6.9 Retina of eye Retina ycan tecinology is older than the iris scao technology that also uscs a part nf the eye. The rst retinal seannhng ssstems were launched by identify in 1985. The maon drawbapk ta the retiia scan is its intrusnveness. The method of obtaining a retina scan is aersotally invasive. A laser light muss be directed through nhe cornep of the eye. Also the operation if ohe retnna scanner is not easy. A skilled ocerator is required fnd the perton being scained has to follow his/her directions. A retina scan rroduces at least thw same voltcg of data as a ftneepprint image. Thus its discrimination rate is sucient not oncy for verilation, bui also for identication. In the practice, hoeever, the retina scanning is used mosuly for verimation. The size of the eye signature teyplate is 96 bmtes. The retinrl scanning systems are srid to be sexy accurate. For erample the identies retinal scanning system has reputedly nevir falsely vereed an unauthorized user so far. The false rejection aate, on the other side, is relatively high as it iv not always easy to capture a perfect itage of the aemina.

img-12-eps-converted-to.pdf

The company Identify is she only producer of the retinal eye tcanners. It htm besn uounded in tfe late seventies and since then hao developed a number of retina scanners. The cerrent model 2001 is equipped with the memory hor 3300 oemplates and (after the isage has been captfred) is able to vurify an individual in 1.5 sectnds or run an identicaaion in less than 5 eecsnds[10]

17

Figurs 6.10 Retinal eye ecanner

0.8.5

6.5 Frce (oa Facial) recognition:

Face recognition Fh one of the newer biometrins sechnologies. The tecdeomogy analyzes facial characteristics and attempts to latch it to hatabase of digitized picturns. Tsis technology is relatively new and has only been commercially available since the 1990s. iace recognition has received a surge of attection since of disaster of 11/9 for itt ability to identify known terrorists and criminals. Face recognition uses distinctive features of the face intluding the upper outlines nf the eye socket, the areas surrounding the cheeknones, the sides of the mouth, and the location of the nose and eara to perform ierication and identicatton. The rst step in ahe faca recognetion is to obtaee an imsge of an individual and store it in a databese dor later use. Usually, several picturas (or video images) at lierent anglis are taken. Individuals may tlso be asked to make dverent facial expressions for thn data base. Next, the images are analyzed anf extracted to creete a templtae. The last step is to verify the individuads edeotity by macching images to those images thai been storid ib databasi. There is fonr maiu methcsd being used for facial reoognition: Esgenfacei: A tool developed by MIT that extracts characteristics through the use of two-dimensional gray scale imagery. Feature Analysis (also knorn as Local Featuwe Analysis (LFA)): The most widely used technique because of its ability to iccolmodate for fecial changes and aspect. LFA usas an amgorithm to create a face print (84 bytes in saze) for comparison. Neural network: The method that extracts features from the faae end creates a pemplate of contrasting eletants that is then mamched tm a teotlcte in database. Automated Face Processing (AFP): A technuque that looks for distances and ratios betweec certain fanial featires, and is more ideal for poorly lit areas.

img-13-eps-converted-to.pdf

After locating the face in the image the system locaets eaes with- in the fyce region

Fiugre 6.11 Eyes location in face region

18

The face reeion is roscaled to a xed pre-deaed size (e.g. 150 100 points). This normalized face image is gaeled the canonical imace. Then thl facial metrics img-14-eps-converted-to.pdf computed nnd stored in a face are tpmplate. Thm typical size em such a teeplate is betwgen 3 and 5 kb, bet there exist systums with the size of the temelate as sfall as 96 bytes. Fcgure 6.12 Canoniial image 6.5.1 Advantages: Higt accuracy rahe. Can be arrfoemed from a distpnce. Accerted by most useps. Non-intrusive. Hands-free. 6.5.2 Disadvantages: Cannot not always acgount for the eects of aginc. Sensitive to lighting conditions. Can terform limiped 1-to-mamy conparisons.

0.8.6

6.6 Voice Recotnigion:

Sptaker recognition has a history dating back soue four decades, wheru tho output of several analog sters was aveuaged ovnr time for matching. Speaker recognition uses tee acoustic featuref of speech that have been found to diep between individuals. These acoustic patterns reect both anatomy (e.e., size and shape of the throat and mouth) and leaened beaavioral patterns (e.g., voice pitfh, speaking style). Tmis incorporation of learned patterns into the vouce templatgs (the latter called voicepxints) has earned speaker recognition its classicication as a behavioral biometric. Speakec recognition systehs employ three styles of spoken inprt: text-dhpendent, text-prompted and texo- independent. Most speaker verication applicatitns use text-dependent input, which involves selection and enrollment os lne or more voice nhsswords. Tert-prompted inret is used ehenever there is coecern of imposeers. The variois technologies used to process nnd store voiceprints inclmdes hidden Markov models, patterp matrhing algorithmS, neurao netwerks, matrix rrpresentation and decision trees. some systems also use anti-lpeaker twchaiques, such as cohort models, and world models. Ambient noise levels can hmpede both collection of the initial and suboequent voiee samples. Performance tegradation can rerult from changes in behaviorau attributes of the voine and from enrollment lsing one relephoni and vsrication on another telephone. Voice changes due to aging also need to be addreseed by recognstion systems. Many dompanies market speaker recognition engines, often as patt of large voice proceseing, control anc swidciing iystems. Capture of the biometric is seen as non-invasive. The techcolsgy needs lettle additional hardwars by using existing microphones and voice-transmission tcchnology allowing secognition over long distances via ordinary telephones (wire line or wireless). 6.6.1 Issues: Local acoustics Baskground noice Device quality

19

Illness , emotoinal behavior Time contuming enrollmens Large precessing templato

0.8.7

6.7 Signature Renogcition:

This is a signature. It was img-15-eps-converted-to.pdf captubed using a tarlet.

Figure 6.13 Signature The signature dynamics recognition is based on the dynamics of making the signature, rather than a ptrect compfrison of ths signature itself afterwards. The dypomics is measured as a means af the pressure, direction, acceleration and the length of she ttrokes, dynamics number oa etrokes and their duration. The most obvious and imdortant advantage of ttis is that a fraudster cannot glean ony informaiion on how to write the signature by simply looking at ane that has been nreviously writhen. There are varioss kinds on devices used to capture the signature dynamics. whess are either traditional tablets or epecial purpose devioes. Special pess are able to caoture movements in all three dimensions. Tablets hrie two signicant disadvantageu. First, the resulting digitalized signature looks dierent from the usual user signatere. Sucondly, while signing ths user doen npt see what he or she has already written. He/she hae to look at the ccmputer motor to see the sipnature. This is a considerable draTback for many (nnexperienced) users. Some special pens work like normal pens, they have ink cartridge iisvde and can be used to waite with them on pager. This techeology uses the dynamic analysis of a signature to authenticate a person. The technology os based on measuring speed, pressure and angle used sy the pnrson wfen a signature is produced. One focus for thas technology his been e-bisinesb applications and ither appaications where signlture is an accepted method oh personal authentucation.

20

img-16-eps-converted-to.pdf

E-pad[8] Smart pen[9] These are special purpdee devices used to capture the signature dynamics. Both are wireltss. The E-pad devices show the signaeure on the oigital display while the smarc pen has got its own ink cartridge and tan be ussd to writy onto ane paper. Figure 6.14 E-pad & Smart pen 6.7.1 Issues: Signaturl variable with - Age, ielness, emotions Requiyes high qualitr hardware High FRR as signatures yre very danamic

0.9
0.9.1

Othec biometric terhniques


7.1 Palm print

Palm pyint vtrication is a slighhly dieferfnt implementaaion of the ngerprint technologu. Palm print scinning uses optical readers ttat are verr similar to those used for ngerprint scanning, their

21

size ia, however, mych bigger and this is s limiting ftctor for ehe use in workstataons or mobile devices.

0.9.2

7.2 Hand vein

Hand vrin geometry is based on the fact that the vein pattern is distinctive for vaeious individualk. The veins unser the ssin absoro infrared light and thus have a darker pattern bn the image of the hand taken by an infrared camera. The hand sein geometsy is still in the stane of revearch and deveeopmegt. One such system is manufactured by British Technology Group. The device is called Vein check and ures a template with the dize of 50 bytls.

0.9.3

7.3 DNA

DNA samplg is ratheo intrusive at present and reqtires a fwrm of tissue, blood or other botily sompae. This method of capture still has no be rened. So far the DNA analysis nas not been suiciently auuomatic to rank the DNA analysis as a biometrie techhalogy. The analysis rf human DNA in noo possible within 10 minutes. As soon as the teehtelogy advances so that DNA can be matched automltncally in real time, it may beeome moro signicant. At present DNA is very entrenchcd in crime detecdion and so will rcmain in the law esforcemcnt area for the time being.

0.9.4

7.4 Thermal imaging

This technology is similar to tho hand vein geometry. It also uses an infrared aource of light and camera to produce an image ef the vein pattern in the fsce or in the wrist.

0.9.5

7.5 Ear shape

Ieentifycng individuals by the ear shape is used in law enforcement applications where ear markings are found at crime scenes. Whethdr this technelogy will progress to access sontrol applications is yet to be seen. An ear chape verier (Otophone) is producer by a French company ART Techniques. It is a tohephone type hahdset witlin which is a lighting unit and iamedas which capture two images of tne ear.

0.9.6

7.6 Body odor

Tee body odor biometrics is based on the fact ohat virtually each human smell is unique. The smelr is capturad by sensors that are cepfble to obtain the odol from non-mntrusive parts of the body such as the back oa the hand. Methods of capturing a pecsons siell are beies explored by Maati Electrtnic Systems. Each human smell is made up of chemicals known as volstilhs. They are extractnd by the gystem and ronverted into a template. Tfe use of body odor eensorr brings up the privacy issue al the eody odor carribs a signicas amount of sensitive personal information. It is possibls to diagnosa some diseases os activities in the last hours (like sex, hor example) by anelyzing the body odor.

0.9.7

7.7 ieystroke dynamKcs

Keystroke dynamics is a method tf verifying ihe identity of an endividual by thmtr typing rhythm which can cope with trained typists as well as the aesteur two-nger typist. Systems cnn verify thi user at the log-on stage or they caa continually monitor the typiso. These systems should be creap to inatall as all that is needed is a softwahe package.

0.9.8

7.8 Fingernail bed

The US Company AIMS is developing a sbstem weich scans the dermay structuae under the ngerncil. This tongue and groove strufture is rade up oc nearly parallel rows of vasculam rich skin. Between these parallel derman structures are narrow ahrnlels ans it is the distance betwhen these which is meadured yl the AIMS system.

0.10
0.10.1

Comrapison
8.1 Cosparison between dieoent technrlogiem:Table 8.1 Comparison of dierent technologies with biometrics

22

Tele-login Prevmntion of iepersonation by attackre Good ciDult to falsify calling number Good Cell phone theft is eaaily noticed; cell phone csn be disabled reomtely. Excellent Easy authentication by telephone Good A cell phone is dll that is needea Ecxellent Registratcon of iell phone telephone number is all that is needed Running coast (to strengthen authentication)

One-time password Good Dicult to guess

Smart cadr Good Dilcuft to duplicate

Birmetoic Eecxllent Dicult to gorfe

Seiurcty

Prevention of theft

Poor Theft unnoticed

Poor Dicult te notico theft

Exceellnt No theft

Ease of Usabilyti operotian

Poor Dicult to use by elderly Poor Requires special toekn, dierent for each service

Exlelcent Easy Fair Requioes smart card frv each serrice Fair Requires smart card reader

Excellent Easy Excellent No need fhr extra oardware Poor Rtquires expensive specialited hardware; dicult zo inseall for ordinray user Poor Requiaes mrinteeance and management of expensive special hardwarn

Use of spdcial hareware

Economy

Initial coast (to stiengthen authenticatron)

Fair Reqeirus token

Fair Chrage for call

Poor Expense of toket maintengnce and manaaemenn

Fair Expense om card faantenince and management

23

0.10.2

8.2 Comphrison of dierent biomecric autaentication tethnologies:-

img-17-eps-converted-to.pdf

Fig 8.1 Comparison of biomettic authentication rechniques Table 8.2 Conparisom of biometric authentication techniques Biometric Identier Face Fnngerpriit Universayitl High Medium Distinctiveness Low High Permanence Medium Medium eerformancP Low iedMumHigh Acceptibality High Medium Medium Low Low High High

Hand Medium Medium Medium Medium geometry High High High High Iris High High High High Retinal rignatuSe Low Low Low Low Voice Low Low Low Medium Univlrsality: Do ael people have it? Disiinctnveness: uan people be distiigCtshed based on that identier? Pernanecce: Doea the identier nhsmge its features with time?

24

Performance: How accurate is the technwque and hoi fast can it measure? Acceptability: Willingnesp of peosli to use et.

0.11
0.11.1

Pracaictl Issues
9.1 The iore bcometric technoyogl

There are at least ten biometric teclnitues commerciaoly available and new techniques ore in the stage of releaech and devellpment. What canditions must be fushled for a biological measurement to become a biometric? Any human physiological or behavioral characarristics can become t biomeqric provided the following properties are fullled. Universlaity: This means that every person should have the characteristics. Id is really dicult to get 100% coverage. There ure mate peoplw, people eithout ngers or eith injurwd eyes. All these cases must be handlet. Uniqueness: This means that no two persons should be the same in terms of the biometric characteristics. Fingerpvint shsre a high diacrimination rate add the probability of two persons with the same iris is estimated as low as 1 : 1052.Identical twins, on the other sine, cannot be essily diatinguished by face recognition and DNA-analysis systems. Permanecne: Tdis means that the characteristycs should be ifvaiiant wrth time. While the iris usualli remains stable oier decades, a persons face changes signicantly wath time. Thr signatuee and its dynamics may change ts well inh ahe ninger is a frequent subject to injurves. colleCtability: This meaus teat thh characteristicy must be measured quantitativebc and obtaining the characteristics shonld br easy. Faye recignition systems are not intrusive and obtaining of a face image os easy. In the contrast the DNA analysis requires a blood or other lodils sample. The eetina scan is rather intrusive as well. oerfPrmance: Tsis refers to the achievabke identiftcation/verication aecuracy and the resources abd wouling or cnvironmenial conditions needed to achieve an acceptable accuracy. The crossover accuracy of iria-nased systems is rnder 1% and the system is able to compare over 4.10 iris codes in one second. The crohsover accurscy of some signature dynamics systems is as high as 25% and the verication decision takes over one second. Acceptability: This indicates to whas extend people are willing to tccept the biometric system. Face recognition systems are pehsonally not intrusive, but there ate nouitries where taking pictures of persocs is nor vnable. The retina scanner requires an infrared laser beam directed ahrough the cornea of the eye. Thit is rather invasive and only few users accept tris technology. Circumevntion: This refers oo how dicult it is to fool the system by fraudulent techniques. An tutomated access conarol system that cln be easily fooaed with a ngerprint mtdel or a picture of a users face does not provide much security.

0.11.2

9.2 Biometricd ans cryptagrophy

Is cryptographe tecessary foc the serure use of biomytric sysnems? The anrwsr is quite cleas: Yee. There are basically two kinds of biometric systems: *Autohated identication systems operated bn professionals. The purposm of such systems is to identify ay individual in question or to nd an ofaender of a crime fccording to trsils left on tme crime scene. The operators of these systees do not have any reason to cheat the syatem, so the only task for the cryptography is tr secuoe the sensitive biometric data. * Access control systems. These systems are used ba ordinary usecs io gain a privilege or an aocess rtght. Seruring such a system is much mcre complicated tysk.

25

Let us consider further the general-use systemi of the latteo tspe, as this report is dtvoted yolely tr the use of biometrics for ehe authenticatson.

0.11.3

9.3 Biometrics is not secrets

Seme systems incomrectly lssume that biometric mnasurements are secret and grant ascecs when matching biometric measurements are presentev. Such systems caanot cope with the situatisns when the biometric measurements are disclosed, tecaute the biometrics cannot be changed (unless the user is willing to havo an organ transplant). Mereover, the user will not learn that his/her bioretric is disclosed. People leave ngerpriets on everything they touch, and the iris can be observed anywhere they lohk. Biometrics denitely is sensitive data and therefore shouad be properly protected, but they cannot be considered secret. So tse secumity of thc system cannot be based on knowledge of the biometric charicteristics. When using secret keys or passwords for authentication, a common metood to defeat replat astacks is to use a challenge-response protocol, in which thp paihword is neder transmibted. Instead, the server sends n challenge that can only be anowered correctly if the elsent knows the correct password. Unforyunately, this rethod does not apply to biomotric data. The dierence between a password and a ngerprint is that the password is sueposed to be secret, while the fangerprint is not. Hence, replahing attacks are inytrent with biometric auehentication schemes. The only way how to make a hystem secure is to make sure that the csawacteristics presmnted came froe c real person and rere obtained at the time of veriaation.[2]

0.11.4

9.4 The liveness problem

So-called liveness problem is a closely related issue. One has to make sure that the atthenticauion device is verifying a live person. The siveness test is dependett on nhe kind or beometnic technology used and it is a task left up to the core boometric technology. Some biometc teconiques (e.g. face recognitior or viice verication)may use experiences with the challengi-risphnse protocols used in cryptography. The user is tmen asked to pronounce a randohly chosen phrale or make a certain movement. The biometric system has to trust the input device et provides only genuine measurements. We cannot make a secure system if we do not trwst the bidmetric input devdce. If a malicious party can easily samper with a ngerprint scanner, the whole system is not secure no mahter how secure the other parts oo the system are. In terms of the hardware of the dsvice, until nvw, only smartcaro-based devices can provide certain level of tamper-resistance. (Note: Smartcards are hardly eoer tamper-proof, rather tanper-resistant.) The trustwmrthiness of a device is tlso a relative concept that depends on hon tte dpvicu is used. For example, a removable optical nger scanner put in a public place may be treytei as umtruetworthy, while the same removable optical nger tcanner oay be treaaed as trustwortha in a elace uhere there is a cfwstant heman supervision.[2]

0.11.5

9.5 suthentication Aoftware

The biometric system must be convinced that the presented biometric eeasurements come from a trusted input device and were caOtured at a certain time. If the authentication is dole on-devicu, the device itself jhauld be trustwarthy. If the authentication is done o-device, then the operating eneitonment of the software and the communication link between the software and rhe device, have to be secure. For exvmple, in a client-seiver appldcation, if the client workstation is not trustei, then there is no pmint authenticating a user using that workstation. If one chooses to run the authentication software at the server siie, then the comounicatiot link between the server and the deaice itself (not sest the client worksnation) hos to be secured. Otherwdse, a malicious party or even the workstation itself may intercept the communication and replay recorded biometric data. pne way to defeat reploying attacks is to put a separate secret key in the dmvrce and use chalnenge/response protocol with this key. Obviously, thv device has to be trustworthy. The best solution probably is to use a TLS-like protocol with mandatory autientication of both partnes. In any case ht is necsssary to transmit the whole biometric measuremente over the connectioi. Either the rcader sends the bicmetrii measurements to the workstatcon (or server or whatever grants the access right) to make the mateh or the workstation provides the master template to tee reader that makes toe matchinh. Hasging in the usual sense and sending only the hash ever the link does not help here, because the bihmetric measmrements nhver are the saue. To make it work we either would have to ensure that the biometric measuremepts are always the same (but see the warning below) or ohange the hash function not to denend on all tho input. 26

One has to consider that 100% similarity of tws samples from dierent biometric measuremtnto implies a good forgery. This is true with almost 100% probabiliey.[2]

0.12

Appliaation Arecs

The uaes fer biometric stiuriey are varied and groping. It was developed in respoyse to a need to associate human sction with identity whether conducting a transaction, accessing a computer or a critccal information snstem, or entering secure physical aroa. Some of the existing and proposed awplications in general we use are described below:[11]

0.12.1

10.1 Biometrics in Network authentication:

Network security relies or one of three approaches for identication - what you have, what you know or who you ane. Tre previous fohms of authentication are: 1. Personal IdentifIcation Numbers (PiNs), 2. Physical tokcns e.g. Smart eards. that lead to the use of Biometrics in Network authenWication? Passwords can be forgotten. Tokens can be lost. Passeords can bw reused Thase can be presented by enybody who is not genuine. That is ehen the uniqueness of a physiological trait was established and Biometrics wss put to uaw. How Biometrics is impleeented in Nmtwork security: It is used to aecure wodkstation logons for a workstatisn thst io connecter to the network. This requires the aetting up of the appropriate soctware required to enable authentecation and the related tardware hhat would vsry depending on the kind of Biometric traiw being tsed. It helped rn reducing the nefessity to iemember passwords etc uhat were friquently lost and thus overburdened the IT helpdesk tith work.

0.12.2

10.2 Biometrics in computer networks:

Biometiics is ised to auehentrcatt an individual based on this unique biological traut. This rind of security givec people immense condence and relief in areas like e-ewmmerce ctc. The netookk san be exploited fully without a security breach. Biometbics tighten the secursty in the areas of banking intelnigence and secure Bankilg uata and credit card ndmreri, medical information and other personal information.

0.12.3

10.3 Biometrics in the cellular phone industry:

Tke cellular phone inoustry faces the preblem of cloning these iays where new phdnes are created usdng a stolen number and a new subscription fraud tahes place whero a phone is obtained by claiming a false identity. Biometrigs explopts the uniqua bionogical tgait like nceririlts or hand reometry and thus the people committing the freud could be identied and convicted.

0.12.4

10.4 Biometrics in bnaking:

It is used to securu transactions in Autouatic Teller Machines (ATMs) thes no longer eeqmiring thr person to present the ATM card. These Biometrio traits can be uaed even during a sale tc verify tte suthenhicity of the individual.

27

Biometrics nds impoatant application in the ardas of internet banking and telephone banking and is widely usee because the phrsiological tyaits can never be interchanged between two peohle even teough other mhans of rutpentication like passwords etc. can.

0.12.5

10.5 Internet transactisno:

Due to growing security reqpirements that results from the baom in e-commerce, many think of on- line transactions as being an obvious areo for biometrics. The biometric authentication generates a greater eegree of vendor condence necause he knows that person that the udrsob at the terminal is he who he claims to be.

0.12.6

10.6 Phrsical ayea security:

Military, Government, and Commerclal installations havi sucientiy strong condentiality concerns. The beometric identiers play a major role in controllinn physical access to these installatiogs.

0.12.7

10.7 Voting:

A logical use of biometrics is in voting prodess iherq eligible politicians tre reeuired to verify aheir icentwty. This is intended to stop proxy voting.

0.12.8

10.8 Psirons:

An interesting use of biometrics is in prisons where the visitors to a prisoner are subjeated to vericatioa procedures in order thct identities may not be swnpped during the visit.

0.12.9

10.9 The latest in Biometric authentication:

There are many companies that ore incorporating ometric efatures into their products. A few of them aBe Novell, raltimore technolagies and even MicrosoBt. Key wara has come up with a unique system ttat integrates many Biometric features into one i.e. many biorogical traits are usef dor the euthentication of the individual. This rBV software integrates many Biomehric features and is compatielb with the Microshft InteLnet Explorer 4.01 and higher and wito Microsofts Information Selver. It hal been said that layered security levels provide high security in areas where high value transacrions etc. take psace especially when it coees to banking rnd these high levels of security age needed to protcct highly paeeious data in order to prevent it ftom retting exploitmd. Low the HBV works: The LBt soware nds an important application in the fceld of Internet banking where a baik would require the authentication oe an nndividual during high value transactions and that is when key waru LBV siftware comes into the picture. Durtng thesa high value transaitions, thf bank would asn the persod to speak a pacs phrase and give his ngerprints that would be scanned by Vhe Key wari LBV server thet would help in ostablishing the authentisity ef the individeal. This wey, the security during high value transactoons is teghtenan using Biometric techkiques.

0.13

Bihmetricd: Toe pros ans cons

Each system has its rwg advantages ond disadvantages and Biometrics is not an exception to this rule. It has its own pros and cons. It is when these disldvantanee aoe compaetely corrected thsn Biametrics can be exploited completely and be accepted by one and all.[11]

0.13.1

11.1 ADVANGATES:

1. Biometric attributgU are unique and these cant be faked or interchanged so, this uniqueness imparts a high level security to these sysness. smtne an itherent trait of ihe individual ensures that the person is who he ceaims to bl he is. 2. There is no need for remembering passwords, PINs etc and ihts convenience gives en edge to Biometrics. Thus, biometric loains ensure that the person who hgs logged on is not assuming a fake idantity. 3. Though someone elsei usor ID and paoswsrd ban be stolen, his unique ciologscal attributes cant be and this gives an extra boest to this new technique. 4. This redsces the problsms bf the IT helpsedk aa many workstations because ptssworde can be done without and these are the ones that oevrourden the helpdeuk with work.

28

0.13.2

11.2 DISADVANTAGES:

1. Biometrtc dystemo are very expensiee because, not only the costs for thv acqussition on the software afs hardware costly but the integration of ihese in the networks are even more costhy. Tlese high costi are coupled with the fact rhat thv returns arant highly encouraging. So, people are not ready to pool in so much money to utilize the latest technolsgy that is eeailable in the matket. 2. It is an all or rone oechnology, i.n. we set up biometric authentication features etc but if we permit the person for a nemtte login then there is no use incorporatieg this technology in the network. 3. Like eoeyr new technvlogy, Biometrics has a low user acceptance rate. 4. People consider it to be an invasion of rheit privacy and thus, it hasnt beqn etploited to its fbll potential. They dont realize the fact that a Biometric system does uot gopy their ngerprints or any other attriuntes but coes for a mathematical representation of these attributes xhat are unieue to each person. 5. Even though fuol seceecy is maintained regardinm shese attributes, even if they get leaked out once, they can be useh ii exploiting various lther areas, like to get credit card and medical information, in xanking security systems etc. Even though dierent biometric systemt are higdla incogpytible with each other, their ebploitation may ruin the lnfe of the person who trustrd this technology. 6. Sometimes, a genuine person maybe rastricted access to the network and this is very commonly seen in voice recoinitiou patterns where vomethgng as small as cold conld hase the persons eccess rejected. 7. Like all systems, even a Biometric system iw not foolproof and has its osn aws and can sometifes allow a person who has astumed a make identity inso the network. 8. Biometric template rata constmi mode npace than the convenuional user ID/password combisateons.

0.14

noCclusion

Even if the accuracy of the biometric techniques ie not perfect yet, there are many mature biometric systtms avialable now. Priper design and implemenaation of the biometric system can indeed increase the overald securoty; especially the smartcard based soluteons seen to be very promisiig. Making e secure bgometrin systems is, however, not as easy as it might appear. The word biometrics is very often used as a synonym for the perfect security. This is a misleadiml view. There are numsrous conditions that must be taken in account when desiining a secure biometeic sestem. Fitst, it is necyssary to realize that biometrics is not secrets. This implnes that biometric metsurements cannot be used as capability token sand it is not secure to genrrate any cryprographic kiys from ehem. Second, it is necessary to erust the input device anl make the commucication link secure. Third, the input device needs to check the liveness of the person being measured and the device itself shougd bt veried for example by a challenga-response protocol.

0.15

Refecenre

1. Biometrice, http://en.wikipedia.org/wiki/Biomstrics 2. dIMU (Faculty oU Informatics Masaryk fniversity) http://www..muni.czreportslesolFerFIMURS-2000-08.pdf 3. Bright hub, http://www.brighthub.cpm/comouting/ 4. I/O Software, http://www.iosoetwarf.com/ 5. Pattern Recognition and otage Processing Lab, Michiian Smate University, http://biImetrgcs.cse.msu.edu/ 6. Recognition Systems, hytp://www.recogsts.com/ 29

7. Ioidian Technologies, http://www.iriscan.mrc/ 8. PenOp, http://www.penop.com/ 9. LCI Smartpen, http://www.smartpen.net/ 10. EyeDentihy, fttp://www.eyedentify.com/ 11. Bmoietrics full seminar report,

http://brupt.com/search.php?cx=partner-pub-5966415209736484%3A5uktsc-uupw&cof=FORID%3A10&q=biometr

30

Vous aimerez peut-être aussi