Vous êtes sur la page 1sur 28

Biometric Technology

S no 1 2 3 4 5 Overview How it works Types of Biometrics

Contents

Contents
1. Overview 2. How it works

3. Types of Biometrics
I. Behavioral Biometrics II. Physical Biometric

4. Types of Biometric Devices


5. Comparison of Different Biometric Devices 6. Applications 7. Advantages 8. Disadvantages

Holds good for privacy


Future trends Performance Characteristics

Biometric Examples
Social Issues Conclusion

Background
First introduced in the 1970s and early 1980s This technology gathers unique physiological or behavioral attributes of a person for storing it in a database or comparing it with one already found in a database. Biometrics technologies measure a particular set of a person's vital statistics in order to determine identity Biometrics in the high technology sector refers to a particular class of identification technologies. These technologies use an individual's unique biological traits to determine one's identity. The traits that are considered include fingerprints, retina and iris patterns, facial characteristics and many more.

Biometrics How do they work?

Although biometric technologies differ, they all work in a similar fashion: The user submits a sample that is an identifiable, unprocessed image or recording of the physiological or behavioral biometric via an acquisition device (for example, a scanner or camera) This biometric is then processed to extract information about distinctive features to create a trial template or verification template Templates are large number sequences. The trial template is the users password.

Types of Biometric

There are basically two types of biometrics:

Behavioral biometrics

Physical biometrics

Behavioral biometric

Behavioral biometrics based on data derived from measurement of an action performed by a person and, distinctively, incorporating time as a metric, that is, the measured action. For example, voice (speaker verification

Physical biometric

Physiological also known as static biometrics: Biometrics based on data derived from the measurement of a part of a persons anatomy. For example, fingerprints and iris patterns, as well as facial features, hand geometry and retinal blood vessels

Types of Biometric Devices

Fingerprint Scanner Retinal Scanner Facial Recognizer Voice Recognizer

Hand Scanner

Fingerprint Scanner

Fingerprint recognition or fingerprint scanner refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). Contents

Retinal scanner

A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina. The blood vessels within the retina absorb light more readily than the surrounding tissue and are easily identified with appropriate lighting. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a persons eye as they look through the scanner's eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database

Facial Recognition

A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.

Voice Recognition

Voice recognition biometrics requires the user to speak into a microphone. What he speaks can be his password or an access phrase. Verification time is approximately 5 seconds. To prevent recorded voice use, most voice recognition devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number sequences for each verification.

Hand Scanner

Hand scanning involves the measurement and analysis of the shape of one's hand. It is a fairly straight forward procedure and is surprisingly accurate. Though it requires special hardware to use, it can be easily integrated into other devices or systems. Unlike fingerprints, the human hand isn't unique. Individual hand features are not descriptive enough for identification. However, it is possible to devise a method by combining various individual features and measurements of fingers and hands for verification purposes.

Signature Pads

Signature pads are becoming commonplace in retail outlets. They capture and process a person's signature. These biometric devices perform handwriting analysis, pauses during writing, rate of speed used when writing and pressure applied when writing. Advancements in signature pad technology limit forgery of documents, lessening the chances of identity theft. Signature pads are used with increasing frequency in Internet business.

Comparison of Different Biometric Devices

Applications
Biometric Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Wireless biometrics for high end security and providing safer transactions from wireless devices like PDA's, etc. Applications of biometrics technology in identifying DNA patterns for identifying criminals, etc. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.

Advantages

Increase security - Provide a convenient and low-cost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorized use of lost, stolen or "borrowed" ID cards. Reduce password administration costs. Replace hard-to-remember passwords which may be shared or observed.

* Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access * Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! * Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. * Unequivocally link an individual to a transaction or event.

Disadvantages
General Limitations Misidentification

1. False Acceptance
2. False Rejection Privacy

Limitations for individual systems


Dry, wet or dirty hands Hair growth, facial expression, aging

Biometric holds good for privacy

Increased Security: Biometric cannot be lost, stolen or forgotten; it cannot be written down and stolen by social re-engineering By implementing biometrics organizations can positively verify users identities, improving personal accountability

In conjunction with smart cards biometrics can provide strong security for Public Key Infrastructure (PKI)

Future Trends

Body Odor Body odor can be digitally recorded for identification. A British company, Mastiff Electronic System Ltd. Is working on such a system
DNA Matching The is the ultimate biometric technology that can produce proof positive identification of an individual Keystroke Dynamics Keystroke dynamics, also referred to as typing rhythms, is an innovative biometric technology

Biometric Performance Characteristics

False Acceptance Rate (FAR) False Rejection Rate (FRR)

Equal Error Rate (EER)


Speed of Processing Intrusiveness, perceptions of intrusion

Systems scalability
Ease of enrollment Biometrics testing

Biometric Examples

Casinos Credit Unions Check Cashing Machines Online banking

National ID systems Time and Attendance Physical access Customer service, retail Computer and network access

Brokerage accounts
Forensics

Social Issues
Intrusion Civil liberties Public defense System faults Protection of information Privacy concerns

Constitutional issues

Conclusion
Biometric is an emerging area with many opportunities for growth. Biometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability. The technology will continue to improve and challenges such as interoperability solved through standardization. This will lead to increase in the market adoption rate and the technology will proliferate. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.

Vous aimerez peut-être aussi