Académique Documents
Professionnel Documents
Culture Documents
For the academic journal of statistics in biology, see The biometrics market was expected to be worth $13.8
Biometrics (journal). For the application of statistics to billion in 2015.[7]
topics in biology, see Biostatistics.
Biometrics refers to metrics related to human
1 Biometric functionality
Many dierent aspects of human physiology, chemistry
or behavior can be used for biometric authentication. The
selection of a particular biometric for use in a specic application involves a weighting of several factors. Jain et al.
(1999)[8] identied seven such factors to be used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using
a system should possess the trait. Uniqueness means the
trait should be suciently dierent for individuals in the
relevant population such that they can be distinguished
from one another. Permanence relates to the manner
in which a trait varies over time. More specically, a
trait with 'good' permanence will be reasonably invariant
over time with respect to the specic matching algorithm.
Measurability (collectability) relates to the ease of acquisition or measurement of the trait. In addition, acquired
data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of
technology used (see performance section for more details). Acceptability relates to how well individuals in the
relevant population accept the technology such that they
are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a
trait might be imitated using an artifact or substitute.
Proper biometric use is very application dependent. Certain biometrics will be better than others based on the
required levels of convenience and security.[9] No single
biometric will meet all the requirements of every possible
application.[8]
More traditional means of access control include tokenbased identication systems, such as a drivers license
or passport, and knowledge-based identication systems,
such as a password or personal identication number.[2]
Since biometric identiers are unique to individuals, they
are more reliable in verifying identity than token and
knowledge-based methods; however, the collection of
biometric identiers raises privacy concerns about the ultimate use of this information.[2][6]
1
2
The block diagram illustrates the two basic modes of a
biometric system.[3] First, in verication (or authentication) mode the system performs a one-to-one comparison
of a captured biometric with a specic template stored
in a biometric database in order to verify the individual
is the person they claim to be. Three steps are involved
in the verication of a person.[10] In the rst step, reference models for all the users are generated and stored
in the model database. In the second step, some samples are matched with reference models to generate the
genuine and impostor scores and calculate the threshold.
Third step is the testing step. This process may use a
smart card, username or ID number (e.g. PIN) to indicate which template should be used for comparison.[note 3]
'Positive recognition' is a common use of the verication
mode, where the aim is to prevent multiple people from
using the same identity.[3]
Second, in identication mode the system performs a
one-to-many comparison against a biometric database in
an attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to
a template in the database falls within a previously set
threshold. Identication mode can be used either for 'positive recognition' (so that the user does not have to provide any information about the template to be used) or
for 'negative recognition' of the person where the system establishes whether the person is who she (implicitly
or explicitly) denies to be.[3] The latter function can only
be achieved through biometrics since other methods of
personal recognition such as passwords, PINs or keys are
ineective.
3
can be evaded by spoong even a single biometric trait.
4 History of biometrics
Performance
7.1
Operator signatures
7.2
Proposed requirement for certain pub- surveillance scholar Simone Browne formulates a similar
critique as Agamben, citing a recent study[35] relating to
lic networks
John Michael (Mike) McConnell, a former vice admiral in the United States Navy, a former Director of U.S.
National Intelligence, and Senior Vice President of Booz
Allen Hamilton promoted the development of a future
capability to require biometric authentication to access
certain public networks in his keynote speech[27] at the
2009 Biometric Consortium Conference.
8.3
8.2
It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented. For example, most biometric
features could disclose physiological and/or pathological
medical conditions (e.g., some ngerprint patterns are related to chromosomal diseases, iris patterns could reveal
genetic sex, hand vein patterns could reveal vascular diseases, most behavioral biometrics could reveal neurological diseases, etc.).[42] Moreover, second generation biometrics, notably behavioral and electro-physiologic biometrics (e.g., based on electrocardiography, electroencephalography, electromyography), could be also used
for emotion detection.[43]
Several methods for generating new exclusive biometrics have been proposed. The rst ngerprint-based cancelable biometric system was designed and developed
by Tulyakov et al.[49] Essentially, cancelable biometrics
perform a distortion of the biometric image or features
before matching. The variability in the distortion parameters provides the cancelable nature of the scheme.
[44]
There are three categories of privacy concerns:
Some of the proposed techniques operate using their
own recognition engines, such as Teoh et al.[50] and Savet al.,[51] whereas other methods, such as Dabbah
1. Unintended functional scope: The authentication vides [52]
take the advantage of the advancement of the
goes further than authentication, such as nding a et al.,
well-established
biometric research for their recognition
tumor.
front-end to conduct recognition. Although this increases
the restrictions on the protection system, it makes the
2. Unintended application scope: The authentication cancellable templates more accessible for available bioprocess correctly identies the subject when the sub- metric technologies
ject did not wish to be identied.
10
10 See also
Aadhaar
Access control
8.6
AFIS
AssureSign
BioAPI
Biometric passport
Biometrics in schools
BioSlimDisk
Facial recognition system
Fingerprint recognition
Fuzzy extractor
Gait analysis
Government database
Hand geometry
8.7
SEE ALSO
7
Signature recognition
Smart city
Speaker recognition
Surveillance
Vein matching
Voice analysis
11
Notes
12
References
12
REFERENCES
[25] R. Palaniappan, and S. M. Krishnan, Identifying individuals using ECG signals, Proceedings of International
Conference on Signal Processing and Communications,
Bangalore, India, pp. 569572, 1114 December 2004.
DOI:10.1109/SPCOM.2004.1458524]
[42] Mordini E, Ashton H,(2012), The Transparent Body Medical Information, Physical Privacy and Respect for
Body Integrity, in Mordini E, Tzovaras D (eds), Second Generation Biometrics: the Ethical and Social Context.
Springer-Verlag: Berlin
[43] Mordini E, Tzovaras D,(2012), Second Generation Biometrics: the Ethical and Social Context. Springer-Verlag:
Berlin
[27] McConnell, Mike (January 2009). KeyNote Address. Biometric Consortium Conference. Tampa Convention Center, Tampa, Florida. Retrieved 20 February 2010.
[28] Schneier, Bruce. The Internet: Anonymous Forever.
Retrieved 1 October 2011.
[29] Breckenridge K. (2005). The Biometric State: The
Promise and Peril of Digital Government in the New
South Africa. Journal of Southern African Studies, 31:2,
26782
[30] Epstein C. (2007), Guilty Bodies, Productive Bodies,
Destructive Bodies: Crossing the Biometric Borders. International Political Sociology, 1:2, 14964
[31] Pugliese J. (2010), Biometrics: Bodies, Technologies,
Biopolitics. New York: Routledge
[32] French National Consultative Ethics Committee for
Health and Life Sciences (2007), Opinion N 98,
Biometrics, identifying data and human rights
[33] Agamben, G. (2008). No to bio-political tattooing.
Communication and Critical/Cultural Studies, 5(2), 201
202. Reproduced from Le Monde (10 January 2004).
[34] Agamben G.(1998), Homo Sacer: Sovereign Power and
Bare Life. Trans. Daniel Heller-Roazen. Stanford: Stanford University Press
[35] Gao, Wei; Ai, Haizhou. Face Gender Classication on
Consumer Images in a Multiethnic Environment. pp. 169
178. doi:10.1007/978-3-642-01793-3_18.
[36] Walker, Elizabeth (2015). [Lexisnexis.com Biometric
Boom: How the private sector Commodies Human characteristics"] Check |url= value (help). Fordham Intellectual Property, Media & Entertainment Law Journal.
[37] Browne, Simone (2015). Dark Matters: On the Surveillance of Blackness. Duke University Press. p. 116.
[38] Mordini, E; Massari, S. (2008), Body, Biometrics and
Identity Bioethics, 22, 9:488
[39] UNICEF, Birth Registration
[40] Dahan M., Gelb A. (2015) The Role of Identication
in the Post-2015 Development Agenda - World Bank
Working Paper No. 98294 08/2015;
[41] Mordini E, Rebera A (2011) No Identication Without Representation: Constraints on the Use of Biometric
Identication Systems. Review of Policy Research, 29, 1:
520
[44] Peeger, Charles; Peeger, Shari (2007). Security in Computing (4th ed.). Boston: Pearson Education. p. 220.
ISBN 978-0-13-239077-4.
[45] Kent, Jonathan (31 March 2005). Malaysia car thieves
steal nger. BBC Online. Kuala Lumpur. Retrieved 11
December 2010.
[46] N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40, pp. 614634,
2001.
[47] Cancelable
biometrics
Scholarpedia.
www.scholarpedia.org. Retrieved 2015-11-05.
[48] Feng, Y. C.; Yuen, P. C.; Jain, A. K. (2010-03-01).
A Hybrid Approach for Generating Secure and Discriminating Face Template. IEEE Transactions on Information Forensics and Security. 5 (1): 103117.
doi:10.1109/TIFS.2009.2038760. ISSN 1556-6013.
[49] S. Tulyakov, F. Farooq, and V. Govindaraju, Symmetric Hash Functions for Fingerprint Minutiae, Proc. Int'l
Workshop Pattern Recognition for Crime Prevention, Security, and Surveillance, pp. 3038, 2005
[50] A. B. J. Teoh, A. Goh, and D. C. L. Ngo, Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs, Pattern Analysis and Machine Intelligence, IEEE Transactions
on, vol. 28, pp. 18921901, 2006.
[51] M. Savvides, B. V. K. V. Kumar, and P. K. Khosla,
"'Corefaces Robust Shift-Invariant PCA based Correlation Filter for Illumination Tolerant Face Recognition, presented at IEEE Computer Society Conference
on Computer Vision and Pattern Recognition (CVPR'04),
2004.
[52] M. A. Dabbah, W. L. Woo, and S. S. Dlay, Secure Authentication for Face Recognition, presented at Computational Intelligence in Image and Signal Processing,
2007. CIISP 2007. IEEE Symposium on, 2007.
[53] Ratha, N. K., J. H. Connell, and R. M. Bolle. (2001). Enhancing security and privacy in biometrics based authentication systems. IBM Systems Journal 40(3): 614634.
[54] Mordini E, Ashton H (2012), The Transparent Body Medical Information, Physical Privacy and Respect for
Body Integrity'". In Mordini E, Tzovaras D (eds), Second
Generation Biometrics: the Ethical and Social Context.
Berlin: Springer-Verlag, 205783
Ulrich Hottelet: Hidden champion Biometrics between boom and big brother, German Times, January 2007.
[57] Magnuson, S (January 2009). Defense department under pressure to share biometric data.. NationalDefenseMagazine.org. Retrieved 20 February 2010.
13
Further reading
Mordini E., Green M. (eds) (2008), Identity, Security, and Democracy, IOS Press NATO Series, Brussels
Mordini E, Tzovaras D (ads) (2012), Second Generation Biometrics: the Ethical and Social Context,
Springer, The International Library of Ethics, Law
and Technology, Berlin: Springer-Verlag
Marcelo Luiz Brocardo, Issa Traore, and Isaac
Woungang. 2015. Authorship verication of e-mail
and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 81, 8 (December 2015), 1429-1440. DOI=http://dx.doi.org/10.
1016/j.jcss.2014.12.019
14 External links
The dictionary denition of biometrics at Wiktionary
10
15
15
15.1
Biometrics Source: https://en.wikipedia.org/wiki/Biometrics?oldid=749556401 Contributors: Derek Ross, Malcolm Farmer, Andre Engels, Youssefsan, Ant, Heron, Michael Hardy, Pnm, Kku, Tregoweth, Ronz, J-Wiki, Snoyes, Den fjttrade ankan~enwiki, Kingturtle,
Nerd~enwiki, Julesd, Cimon Avaro, Cherkash, Feedmecereal, M0mms, Dcoetzee, RickK, Daniel Quinlan, Dbabbitt, Raul654, Pakaran,
Bweer, Robbot, Chealer, Fredrik, Kizor, Chris 73, Pingveno, Auric, Hadal, Giftlite, DocWatson42, Dinomite, Oberiko, Mintleaf~enwiki,
Jonathan O'Donnell, Dmmaus, Khalid hassani, Neilc, Utcursch, Antandrus, Stonor, Starx, Micahbales, Coderanger, Anirvan, Neale
Monks, Ukexpat, Mike Rosoft, Mormegil, Econrad, Rich Farmbrough, ArnoldReinhold, Fleung, Notinasnaid, Xezbeth, Bender235, Mateo SA, Loren36, Shanes, Cohesion, ToastieIL, Zr40, Sanmartin, Alansohn, Neonumbers, Adequate~enwiki, Gregmcpherson, Sjschen,
InShaneee, Velella, Tocksin, Ceyockey, Inarius, Demiurg, Stemonitis, Simetrical, Mindmatrix, Lgallindo, SDC, Elenthalion, Waldir,
Bruno Unna, Rjwilmsi, Kinu, Vegaswikian, Haya shiloh, XLerate, Kjhebert, Vickatespence, Peripatetic, Ttwaring, Alejo2083, FlaBot,
SchuminWeb, Old Moonraker, Michael.R.Crusoe, Slant, TheDJ, Jrtayloriv, Intgr, Shaile, Peterl, Whosasking, UkPaolo, Albanaco, Wavelength, SpikeJones, RussBot, Hede2000, Pigman, Bergsten, Stephenb, Gaius Cornelius, Shaddack, Chaos, Standarshy, Anomalocaris,
NawlinWiki, Szenti, Welsh, Matticus78, Larry laptop, Gujamin, DeadEyeArrow, Everyguy, Phaedrus86, AramPerez, FF2010, Bobstopper, Open2universe, Nikkimaria, Theda, Closedmouth, Toddgee, Nothlit, JLaTondre, GoodSirJava, M.A.Dabbah, JDspeeder1, Pschearer, Xiaojeng~enwiki, DVD R W, Luk, SmackBot, Elonka, IddoGenuth, EJVargas, Hftf, Melchoir, Unyoyega, VarunRajendran,
KocjoBot~enwiki, Ultramandk, PJM, Canthusus, Apers0n, Evano, Valley2city, Bluebot, Lord of the Left Hand, Iain.dalton, EncMstr,
Deli nk, WETaylor, Octahedron80, Reaper X, Chendy, Mike hayes, Kotra, Jacob Poon, OrphanBot, KevM, LouScheer, UU, Digitize,
Krich, Teehee123, MichaelBillington, Suvablee0506, John wesley, G716, Takowl, Ronaz, Ohconfucius, JGF Wilks, JaeRae, SashatoBot, Calvados~enwiki, Khazar, Tazmaniacs, Natarajuab, Epingchris, Shadowlynk, Minna Sora no Shita, Ben Moore, QDE-can, Martinp23, Dicklyon, Ryulong, Locutus, Nabeth, Kvng, Dl2000, BananaFiend, Shoeofdeath, IvanLanin, Igoldste, Hikui87~enwiki, Lucymarie, Chickenmonkey, Nhgaudreau, KimChee, Dan1679, Wikifarzin, Little Grabbi, Tedmarynicz, CmdrObot, Zshortman, ShelfSkewed,
Neelix, Bmk, Equendil, Phatom87, Cahk, Miguel.lima, Cyhawk, Jose.canedo, Kevin23, Dancter, Tawkerbot4, David Moss, Hontogaichiban, Synetech, Ixchup, SummonerMarc, Gvrdoc, Thijs!bot, ConceptExp, Melissa123~enwiki, Mojo Hand, Lotte Monz, Marek69,
Risingjsun, Reswobslc, SusanLesch, Dawnseeker2000, Escarbot, BualoChip97, AntiVandalBot, Gioto, MelissaRichard, Djechelon,
AWoodside-LElliott, Alphachimpbot, Spartaz, AndreasWittenstein, JAnDbot, Husond, TomChatt, BenjaminGittins, MER-C, Instinct,
Merkwuerdiglichlieber, Steveprutz, Z22, Bongwarrior, VoABot II, T@nn, JamesBWatson, Eugene Cuprin, Crabbi, Recurring dreams,
JaGa, Estesce, CliC, The Almighty Cornholio, Jim.henderson, Rettetast, DrRisk13, PrestonH, J.delanoy, Littledaniel 93, Herbythyme,
Javawizard, Pgilmon, Ncmvocalist, NewEnglandYankee, KylieTastic, STBotD, Homer Landskirty, FloydRTurbo, VolkovBot, ABF, Je
G., Linnartz, Philip Trueman, TXiKiBoT, Oshwah, Kiranwashindkar, Vipinhari, Liko81, Salvar, Wiikipedian, JWinTX, LeaveSleaves,
Everything counts, Wasted Sapience, Falcon8765, A Raider Like Indiana, Vid2vid, Monty845, Nagy, Ltka, Andypdavis, Hypersubtext,
Double Dickel, SieBot, Jsc83, Caltas, Triwbe, Nitelken, Joe3600, Sicarii3, Vodnokon4e, NiteSensor23, Free Software Knight, Brankow,
Nboavida, Manway, Sanya3, Torinfo, Hariva, Abihana, Precious Roy, Loren.wilton, Westmanm, ClueBot, Anjith2006, Kamalswami, Tabsys, The Thing That Should Not Be, EoGuy, Unbuttered Parsnip, Niceguyedc, Tmazhindu, Sravee294, Heshwa, Anon lynx, Repat, Iner22,
Leonard^Bloom, Southern Forester, Predator47, Mcado2dm, SomeAssemblyRequired, Iohannes Animosus, Amsaim, Thingg, Pcheesman,
MEGAC1pher, Qwfp, SoxBot III, DumZiBoT, XLinkBot, SHAH7424, Funya445, Chazmoney3, Izzy67, TFOWR, WikHead, ZooFari,
Toshtrent, Michaeljthieme, Viper10003, Addbot, Some jerk on the Internet, JayMangat, Acolin f, DaughterofSun, Nikomis, Gizziiusa,
Download, Subverted, Favonian, West.andrew.g, Tassedethe, 84user, Eragon22125, Mr.Xp, Chidicon, Xario, Tide rolls, Bguras puppy,
Verbal, OlEnglish, , Michael.micha.shar, , Luckas-bot, Yobot, Themfromspace, Aljpeters, THEN WHO WAS
PHONE?, Greyrobe, KamikazeBot, AnomieBOT, DemocraticLuntz, Cmcginni, 1exec1, Exsybaser, Jim1138, JackieBot, Piano non troppo,
Gompa~enwiki, Flewis, Materialscientist, Wikibob777, Citation bot, Ap aravind, Zaasaa, Dithridge, Addihockey10, Capricorn42, TheCuriousGnome, Jgeorge60, GrouchoBot, Andriusval, Daivesh, SCRECROW, Philshinn~enwiki, MerlLinkBot, Shadowjams, Jenolds,
Dougofborg, Frozenevolution, FrescoBot, P.amitsingh, Anthillharry, HJ Mitchell, PeterEastern, Eccso, Citation bot 1, ANDROBETA,
Pinethicket, Jonesey95, A8UDI, Tri7megi7tu7, Barenholtz, Reconsider the static, Trappist the monk, Amandallene3, Fama Clamosa,
Saponniah, Biospecialist, DARTH SIDIOUS 2, Mean as custard, RjwilmsiBot, Ripchip Bot, Noommos, Saftorangen, EmausBot, WikitanvirBot, Fandraltastic, Princesspeople123, Paulguckian, Primefac, GoingBatty, Tommy2010, VillemVillemVillem, Wikipelli, Dcirovic,
K6ka, Sciprecision, SentinelAlpha, Abhinavcambridge, Ingjaimehdz, F, Denytrendy, Jahub, Rpalanisenthi, Msraia, AManWithNoPlan,
Ocaasi, Photojack50, BrownRock, Milostewart, Donner60, SBaker43, Sven Manguard, DASHBotAV, Bundawda, Spicemix, Jrsage, ClueBot NG, Jack Greenmaven, MelbourneStar, Raghith, Gilderien, Movses-bot, Architypist2, Awareinc, YuMaNuMa, Cntras, J349, Widr,
WikiMSL, Sephalon1, Ngilchr, Helpful Pixie Bot, Martin Berka, Brabantois, BG19bot, Northamerica1000, Mcic2011, MusikAnimal,
Konullu, AwamerT, RoshanJadhav, Vatr5, Nawalani, Chmarkine, Meatsgains, Alyxzandrea, Snow Blizzard, Klilidiplomus, Rutviksutrave,
Crticialthought74, AjitaR, David.moreno72, Octavius SV, Brie721, Lwam99, Total-MAdMaN, Deberhardt1988, JYBot, Txhoney, Enterprisey, EagerToddler39, Biernat2, CuriousMind01, NNWikipedia, Lugia2453, MFZBCN, FaradayLupin, Mennowitteveen, Hyphod76,
Spencer.mccormick, Ams3nf, Crsini, DavidLeighEllis, Lgnlint, Quenhitran, KathleenErickson80004, Mdfahimshaikh, TheArtMaster,
Ravishyam Bangalore, Melcous, Monkbot, Scarlettail, AMResearchNext1, Bingomadangle, CherryCoke027, Pblowry, KasparBot, Ibernesi, Blue rose red, BushelCandle, Allwi.in.oz, Wwjd12x, InternetArchiveBot, Minecraftpsyco, Windowwiper96, Zcarrot, Frederick Ehiagwina and Anonymous: 718
15.2
Images
15.3
Content license