1.0 INTRODUCTION Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics such as finger scan, retina, iris, voice scan, signature scan etc. This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of-identification; identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, it is necessary to restrict access to sensitive/personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. A biometric system is essentially a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological, or behavioral characteristics possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending on the context, a biometric system can be either a verification (authentication) system or an identification system. Biometrics is a rapidly evolving technology, which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices Biometrics technology allows determination and verification of one's identity through physical characteristics. To put it simply, it turns your body into your password. These characteristics can include face recognition, voice recognition, finger/hand print scan, iris scans and even retina scans. Biometric systems have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored patterns for identification
2. 0 IDENTIFICATION AND VERIFICATION SYSTEMS
A person’s identity can be resolved in two ways: identification and verification. The former involves identifying a person from all biometric measurements collected in a database and this involves a one-to-many match also referred to as a ‘cold search’. “Do I know who you are?” Is the inherent question this process seeks to answer. Verification involves authenticating a person’s claimed identity from his or her previously enrolled pattern and this involves a one-to-one match. The question it seeks to answer is, “Are you claim to be?”
2.1 VERIFICATION Verification requires comparing a person’s fingerprint to one that pass previously recorded in the system database. The person claiming an identity provided a fingerprint, typically by placing a finger on an optical scanner. The computer locates the previous fingerprint by looking up the person’s identity. This process is relatively easy because the computer needs to compare two-fingerprint record (although most systems use two fingerprints from each person to provide a safety factor). The verification process is referred as a ‘closed search’ because the search field is limited. The second question is “who is this person?” This is the identification function, which is used to prevent duplicate application or enrollment. In this case a newly supplied fingerprint is supplied to all others in the database. A match indicates that the person has already enrolled/applied.
2.2 IDENTIFICATION The identification process, also known as an ‘open search’, is much more technically demanding.
It involves many more comparisons and may require
differentiating among several database fingerprints that are similar to the objects.
2.3 BIOMETRIC SYSTEMS AND DEVICES A biometric system is a combined hardware/software system for biometric identification or verification. Therefore the system should be able to: • Receive biometric samples from an enrollee or candidate • Extract biometric featured from the sample • Compare the sample of the candidate with stored templates from individuals • Indicate identification or verification upon the result of the previous comparison Biometric devices have three primary components: • One is an automated mechanism that scans and captures a digital of analog image
of a living personal characteristic • The second handles compression of the image with the stored data. • The third interfaces with application systems These pieces may be configured to suit different situations. A common issue is where the stored images reside: on a card presented by the person being verified or at host computer. Recognition occurs when an individual’s is matched with one of a group of stored images.
2.3 BIOMETRC ACCURACY Biometric accuracy is the system’s ability of separating legitimate matches from imposters.
There are two important performance characteristics for biometric
systems • False rejection is the situation when a biometric system is not able to verify the legitimate claimed identity of an enrolled person. • False acceptance is a situation when a biometric system wrongly verifies the identity by comparing biometric features from not identical individuals. • False Rejection Rate (FRR) refers to the statistical probability that the biometric system is not able to verify the legitimate claimed identity of an enrolled person, or fails to identify an enrolled person. • False Acceptance Rate (FAR) refers to the statistical probability of False Acceptance or incorrect verification. In the most common context, both False Rejection and False Acceptance represent a security hazard.
3.0
IRIS RECOGNITION
Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology.
So accurate are the algorithms used in iris
recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection. The technology also addresses the FTE (failure to enroll) problems, which lessen the effectiveness of other biometrics. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies. All iris recognition technology is based on research and patents held by Dr. John Daugman.
3.1
The Iris Iris recognition is based on visible (via regular and/or infrared light) qualities of
the iris. A primary visible characteristic is the trabecular meshwork (permanently formed by the 8th month of gestation), a tissue that gives the appearance of dividing the iris in a radial fashion. Other visible characteristics include rings, furrows, freckles, and the corona, to cite only the more familiar. Expressed simply, iris recognition technology converts these visible characteristics into a 512 byte IrisCode(tm), a template stored for future verification attempts. 512 bytes is a fairly compact size for a biometric template, but the quantity of information derived from the iris is massive. From the iris' 11mm diameter, Dr. Daugman's algorithms provide 3.4 bits of data per square mm. This density of information is such that each iris can be said to have 266 unique "spots", as opposed to 13-60 for traditional biometric technologies. This '266' measurement is cited in all iris recognition literature; after allowing for the algorithm's correlative functions and for characteristics inherent to most human eyes, Dr. Daugman concludes that 173 "independent binary degrees-of-freedom" can be extracted from his algorithm - an exceptionally large number for a biometric.
3.2
The Algorithms The first step is location of the iris by a dedicated camera no more than 3 feet
from the eye. After the camera situates the eye, the algorithm narrows in from the right and left of the iris to locate its outer edge.
This horizontal approach accounts for
obstruction caused by the eyelids. It simultaneously locates the inner edge of the iris (at the pupil), excluding the lower 90 degrees because of inherent moisture and lighting issues. The monochrome camera uses both visible and infrared light, the latter of which is located in the 700-900 nm range (this is in the lower range of IR; the American Academy of Ophthalmology uses similar ranges in their studies of macular cysts). Upon location of the iris, as seen above, an algorithm uses 2-D Gabor wavelets to filter and map segments of the iris into hundreds of vectors (known here as phasors). Understanding in detail the 2-D Gabor phasor encoders requires a degree in advanced mathematics, but they can be summarized as follows. The wavelets of various sizes assign values drawn from the orientation and spatial frequency of select areas, bluntly referred to as the "what" of the sub-image, along with the position of these areas, bluntly referred to as the "where." The "what" and "where" are used to form the IrisCode. Not all of the iris is used: a portion of the top, as well as 45 degree of the bottom, is unused to account for eyelids and camera-light reflections (see below).
Essential to the
understanding of the technology is that it provides exceptional detail, well beyond what any pictorial or point-based representation could provide (some filters actually span as much as 70degree of the iris). Remember also that for future identification, the database will not be comparing images of irises, but rather hexadecimal representations of data returned by wavelet filtering and mapping.
3.3
Accuracy The Iris Code constructed from these complex measurements provides
such a tremendous wealth of data that iris recognition offers levels of accuracy orders of magnitude higher than other biometrics. Some statistical representations of the accuracy follow: •
The odds of two different irises returning a 75% match (i.e. having a Hamming Distance of 0.25): 1 in 1016
•
Equal Error Rate (the point at which the likelihood of a false accept and false reject are the same): 1 in 1.2 million
•
The odds of 2 different irises returning identical Iris Codes: 1 in 1052
Other numerical derivations demonstrate the unique robustness of these algorithms. A person's right and left eyes have a statistically insignificant increase in similarity: 0.00048 on a 0.5 mean.
This serves to demonstrate the hypothesis that iris shape and
characteristics are phenotypic - not entirely determined by genetic structure.
The
algorithm can also account for occlusion (blocking) of the iris: even if 2/3 of the iris were completely obscured, accurate measure of the remaining third would result in an equal error rate of 1 in 100,000. Iris recognition can also account for those ongoing changes to the eye and iris, which are defining aspects of living tissue. The pupil's expansion and contraction, a constant process separate from its response to light, skews and stretches the iris. The algorithm accounts for such alteration after having located the boundaries of the iris. Dr. Daugman draws the analogy to a "homogenous rubber sheet" which, despite its distortion, retains certain consistent qualities. Regardless of the size of the iris at any given time, the algorithm draws on the same amount of data, and its resultant IrisCode is stored as a 512-byte template. A question asked of all biometrics is their ability to determine fraudulent samples. Iris recognition can account for this in several ways: the detection of papillary (pupil) changes; reflections from the cornea; detection of contact
lenses atop the cornea; and use of infrared illumination to determine the state of the sample eye tissue.
3.4
Enrollment and Identification The entire process is very brief. The iris is normally located within 1/4 second,
the IrisCode generated within 1 second. Database search times are very swift, with hundreds of thousands of records analyzed per second, notwithstanding some debate as to whether a search on a truly large number of irises (tens of millions) could be conducted as quickly as is generally claimed. At this and other points, use of the algorithm actually runs into the limits of available technology.
Processor speed is one bottleneck on
massive searches, in addition to whatever network or hardware issues may arise. Also, the iris captures process runs into limitations of gray-scale (monochrome) imaging technology, where the darkest shades of iris coloration are difficult to distinguish from the pupil. The algorithm's robustness actually allows for significant variations in image quality. The same iris may, at different times, produce IrisCodes which vary by as much as 25% (0.25 Hamming distance from zero); this may sound like a fatal flaw, but the odds of a randomly selected IrisCode coming within even 10% of this number are exceptionally small. Iris identification technology is a tremendously accurate biometric. Only retinal scan can offer nearly the security that iris scan offers, and the interface for retina scan is thought by many to be more challenging and intrusive.
More common biometrics
provides reasonably accurate results in verification schematics, whereby the biometric verifies a claimed identity, but they cannot be used in large-scale identification implementations like iris recognition.
3.5
An example-Verieye
Neurotechnologija, Ltd. offers VeriEye, the system for person identification using the eye iris image taken by a video camera. VeryEye implements new eye iris recognition technology and are based on our original method of feature set definition. VeriEye is
available in the form of software development kit (SDK), and can be easily integrated into a customer's access control or identification/verification system. VeriEye SDK includes: 1.VeriEye dynamic link library for Windows (DLL file). 2. C source code of the example program using VeriEye DLL). 3. Software description. 4. Description of eye iliumination and positioning equipment for iris scan VeriEye technical specifications False rejection rate
<3%
False acceptance rate
< 0.0001 %
Recognition time
0.7 s
Size of one record in the database about 2 Kb Database size
unlimited
Requirements to the image quality 1. The size of iris in the scanned image must be between 200x200 and 640x480 pixels, image resolution 200 dpi. 2. The image should be free of the bulb reflections in the iris area. However, it may contain small reflections in the pupil area. 3. The scanned slip must contain at least 30 % of the iris area not damaged by reflections, shadows or eyelashes. 4. The eye center must be in the slip. 5. During the eye scanning head tilt must be less than 14 degrees with respect to vertical axis.
4.0 Fingerprint verification 4.1 Introduction FINGERSCAN is an authentication terminal, which verifies a person’s identity from their finger image. When a user places their finger on the terminals scanner the image is electronically read, analyzed, and compared with a previously recorded image of the same finger, which has been stored in the FINGERSCAN database. Users call up their finger image by keying in an identification number. This id number does not need to be classified as it is not part of the security system it simply retrieves the image that will be compared to the users finger scan. FINGERSCAN contains its own database of finger images (called templates), user privileges and authorities, and maintains a log of every transaction and message, which it records. The system can be accessed through a laptop, networked to a PC, or connected via a modem to a remote host computer.
4.2 The Technology Behind FINGERSCAN FINGERSCAN is a biometrics product, which involves using some unique biological characteristic or physical property of an individual to verify that persons claimed identity. Biometrics-based identification replaces systems, which rely on something a person has in their possession, such as a key or id card, or something a person knows, such as a password or privileged information. The imaging process is based on digital holography, using an electro-optical scanner about the size of a thumbprint. The scanner reads three-dimensional data from the finger such as skin undulations, and ridges and valleys, to create a unique pattern, which is composed into a template file and recorded in the FINGERSCAN database. The pattern is not a fingerprint and a fingerprint cannot in any way be created from the template.
A template can only be compared with a newly presented live finger image and not with other templates. One reason for this is that the data capture process used to create a template is random. If two templates were created one after another for the same finger, each template would be different. This eliminates the possibility of database matching and enhances users privacy.
4.3
System Functions
The major FINGERSCAN functions are: Enrolment Verification Time zones Door access Template management Enrolment Enrolment is the process of scanning a finger to create an image, which is stored as a template. Each time the user places his or her finger on the scanner the image is compared to the one represented by the template to verify their identity. A user with enrolment authority carries out enrolment at designated FINGERSCAN units. The process takes approximately 25 seconds and the resultant template may be stored in various places: in the unit itself, on a personal computer, in a mainframe computer, on a smart card, and so on. Each user enrolled is allocated a unique id number, which they use to call up their template before scanning their finger. No id number is required where the template is stored on a smart card.
Up to three fingers can be enrolled against the same id number to provide users with more than one verification option. Ideally, one finger on each hand should be enrolled so that if the user injures the finger they usually use for verification an alternate image is available. This feature also provides for multi-person control, for example, if verification from two users is required to open a safe. In this situation FINGERSCAN can be programmed to require up to four fingers with different id numbers to be verified before access is granted. Verification Verification is carried out when a user either enters their id number, or inserts their smart card in a smart card reader, and then immediately places their finger on the reader platen. Verification takes about .5 of a second. Verification for individual users can be set at various threshold levels to account for users who may have very fine, worn, or damaged fingers. In this event reducing their verification threshold can enhance the ease of use. The overall system verification threshold can be lowered in situations where little or no security is required, for example, time and attendance applications. In this situation it may be more acceptable to give a false acceptance than a false rejection. Time Zones Up to thirty global or individual time zones can be defined in FINGERSCAN. Each user can have up to two active time zones at any time. Users are allocated a default time zone at enrolment, which can be changed by the system supervisor or from the host computer.
Door Access A door access list defines which users have access to the facilities controlled by the FINGERSCAN unit. The list can be used in conjunction with time zones to restrict access at certain times. The host computer system can control and manage the door access list and the distribution of templates to each FINGERSCAN unit. Template Management Templates can be stored in the FINGERSCAN unit, and/or a host computer, and/or a smart card. Each FINGERSCAN unit has 512Kbytes of non-volatile memory, which stores up to 300 templates. The memory can be expanded to 1.5Mbytes, which will store more than 1100 templates. Templates are stored with a last used date status. If the memory becomes full, the last used templates will be held locally in the FINGERSCAN unit and the main template database will be held in the host computer. The host will transmit templates to individual units if the requested template is not found locally. Templates can be deleted by a user with Manager or Supervisor status either from the host computer or locally at each FINGERSCAN unit. Templates can be exchanged between a FINGERSCAN unit and the host computer over fixed communications or modem links, or locally to and from a laptop. A template created by the FINGERSCAN unit can be used on any other unit when loaded.
4.4
Management Control
FINGERSCAN has four levels of management control: User A user submits a finger for verification after entering an id number
Enroller An enroller has user status and can also enroll users onto the system Supervisor A supervisor has enroller status and can also perform initial system set up procedures, set time zones, set alarm codes, and add and delete templates Manager A manager has supervisor status and can also perform a total system reset, and disable the supervisor’s ability to change the setup Transaction Log A transaction log records every use of a FINGERSCAN unit, the time it was used, and the result. The log will hold at least the last 1000 transactions and will wrap around when it becomes full. The transaction log cannot be erased except on a total system reset by a user with Manager authority. Each transaction is allocated a consecutive audit number that does not wrap around. The number will only be reset to 1 on a total system reset.
4.5
Security
FINGERSCAN provides an audit trail of the date and time a user accessed the unit, the reason for access, and the result. With a 0.0001% probability of a false acceptance FINGERSCAN provides a level of security, which cannot be achieved by any knowledge or token, based system. Template Security Before a user can do any action on a template such as enroll, delete, or transfer, they must first have their identity verified by FINGERSCAN in the usual way. In doing this, a
record is added to the transaction log. Only users with Supervisor or Manager authority levels can access the template database. Software Security Control A password option in the communications setup secures the data flow to a host computer. When the remote host initializes each FINGERSCAN unit, the host will generate and download to the unit a unique Computer Generated Access Code (CGAC) of at least six digits. For all subsequent communications the host will check the CGAC before starting the session and then change the CGAC immediately prior to logging off. A Manager or Supervisor finger verification can always override the CGAC. This is only likely to be required if the FINGERSCAN unit is being accessed via a laptop PC. Hardware Security Control The processor board in the processor unit is located inside a metal box which can be fitted with a tamper alarm if required. The processor unit should always be located inside the secure area in locations where FINGERSCAN is providing access or other security control. FINGERSCAN controls the activation of electric locks or strikes from the processor board so the unit cannot be hot-wired from outside. Alarms Control FINGERSCAN can be used to monitor and control external building alarm inputs and outputs such as door alarms, and building management functions. FINGERSCAN will: Send an alarm directly to a monitoring company, dialer, modem, siren, and so on, and allow authenticated users to cancel and reset zone alarms and activate and deactivate building services such as air conditioning and lighting.
Record alarms in the FINGERSCAN transaction log. Support a request to exit (REX) verification, which allows users to open a door from the inside. This can be used to monitor door-forced alarms. Door Lock Control FINGERSCAN can directly control a door lock strike after verification of a user. Real Time Clock FINGERSCANs real time clock is protected by a lithium battery, and features a day-ofweek register and leap year correction
4.6
“Verifinger”-A software example
Neurotechnologija, Ltd. has developed fast, compact and reliable fingerprint identification engine VeriFinger, intended for system integrators who need powerful fingerprint identification algorithm for their biometric security systems. VeriFinger is available as a software development kit (SDK) for MS Windows 9x, 2000 and NT (current version 3.3) and Linux (current version 3.1). It can be easily integrated into a customer's security system. VeriFinger fingerprint recognition engine, integrated with the data management system, is used in our other product, person identification system FingerPoint VeriFinger SDK includes the followings components: 1. VeriFinger dynamic link library ( DLL file ) for Windows 9x/2000/NT, or library file for Linux. 2. C source code of the example program using the library provided functions. 3. Visual Basic source code of the example program using the library provided functions (not available in Linux version). 4. Delphi source code of the example program using the library provided functions (not available in Linux version).
5. Software description. Access tools (DLLs) for Compaq and U.are.U fingerprint scanners and source code of the sample programs, where VeriFinger 3.3 engine is used with these scanners, are optionally available. VeriFinger test results and technical specifications: VeriFinger was tested with 2400 fingerprints, captured with four different scanners. Each fingerprint was compared with all other fingerprints (5,760,000 comparisons). The average test results as well as other specifications are presented below: False rejection rate
<3%
False acceptance rate
< 0.001 %
Required fingerprint resolution
> 250 dpi
Fingerprint processing time
0.35 second
Matching speed
5000* fingerprints/second
Size of one record in the database About 150 Bytes Maximum database size
unlimited
Program occupied array size
250 kb
5.0 5.1
Voice Scan
Introduction The speaker-specific characteristics of speech are due to differences in
physiological and behavioral aspects of the speech production system in humans. The main physiological aspect of the human speech production system is the vocal tract shape. The vocal tract is generally considered as the speech production organ above the vocal folds, which consists of the following: (i) laryngeal pharynx (beneath the epiglottis), (ii) oral pharynx (behind the tongue, between the epiglottis and velum), (iii) oral cavity (forward of the velum and bounded by the lips, tongue, and palate), (iv) nasal pharynx (above the velum, rear end of nasal cavity), and (v) nasal cavity (above the palate and extending from the pharynx to the nostrils). The shaded area in figure 1 depicts the vocal tract.
5.2
Pattern Matching The pattern matching process involves the comparison of a given set of input
feature vectors against the speaker model for the claimed identity and computing a matching score. For the Hidden Markov models discussed above, the matching score is the probability that the model generated a given set of feature vectors.
5.3
A Speaker Verification System:
6.0
Retina scanning
Retina scan is an exceptionally accurate biometric technology having been established as an effective solution for every demanding authentication scenarios Biometrics the automated measurement of a physiological or behavioral aspect of the human body for authentification or identification is a rapidly growing industry. Biometric solutions are used successfully in fields as varied as e-commerce, network access. Biometrics’ ease of use, accuracy, reliability, and flexibility are quickly establishing them as the premier authentification An established technology where the unique patterns of the retina are scanned by a low intensity light source via an optical coupler. Retinal scanning has proved to be quite accurate in use but does require user to look in to a receptacle and focus on a given point. This is not particularly convenient if you are a spectacle wearer or have some intimate contact with the reading device. For these reasons retinal scanning has a few user acceptance problems although the technology itself can work well.
7.0
FACE RbECOGNITION
Face recognition is one of the newest technologies. Specialized recognition software coupled with video camera allows these systems to recognize people’s faces. There are various methods by which facial scan technology recognize peoples. All share some commonalities, such as emphasizing those sections of the face which are less susceptible to alteration, including the upper outlines of the eye sockets, the areas surrounding one’s cheekbones, and the sides of the mouth. Most technologies are resistant to moderate changes in hairstyle, as they do not utilize areas of the face located near the hairline. All of the primary technologies are designed to be robust enough to conduct enough to conduct 1-to –many searches, that is to locate a single face out of a data base of thousands of faces. Facial scan Process Flow-Sample capture, Feature extraction, template comparison, and matching –define the process flow of facial scan technology. The following applies to one to one verification. The sample capture will generally consist of a 20-30 second enrollment process whereby several pictures are taken of one’s face. Ideally the series of pictures incorporate slightly different angles and facial expressions, to allow for more accurate searches. After enrollment distinctive features are extracted, resulting in the creation of a template. The templates are much smaller than the image from which it is drawn. Authentification follows the same protocol. The user claims an identity such as a login name or a PIN, stands or sits in front of the camera for a few seconds, and is either verified or rejected. This comparison is based on the similarity of the newly created “live” template against the template or templates on file. The degree of similarity required for verification also known as the threshold can be adjusted for different personnel, PC’s, time of day and other factors One variant of this process is the use of facial scan technology in forensics. Biometric templates taken from static photographs of known criminals are stored in large databases. These records are searched, 1-to-many, to determine if the detainee is using an alias when being booked.
8.0
A Multimode Biometric System
Identification based on multiple biometrics represents an emerging trend. We introduce a multimode biometric system, which integrates face recognition, fingerprint verification, and speaker verification in making a personal identification. This system takes advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics. Preliminary experimental results demonstrate that the identity established by such an integrated system is more reliable than the identity established by a face recognition system, a fingerprint verification system, and a speaker verification system
9.0
Future Applications
There are many concerning potential biometric applications, some popular examples being;
9.1
ATM machine use. Most of the leading banks have been experimenting with biometrics of ATM
machines use and as general means of combining card fraud.
Surprisingly, these
experiments have rarely consisted of carefully integrated devices into a common process, as could be achieved with certain biometric devices. Previous comments in this paper concerning user psychology come to mind here one wonder why we have not seen a more professional and carefully considered implementation from this sector. The banks will of course have a view concerning the level of fraud and cost of combating it via technology solutions such as biometrics. They will also express concern about potentially alienating customers with such as approach. However, it still surprises many in the biometric industry that the banks and financial institutions have so far failed to embrace this technology with any enthusiasm.
9.2
Workstation and network access. For a long time this was an area often discussed but rarely implemented until recent
developments aw the unit price of biometric devices fall dramatically as well as several designs aimed squarely at this application. In addition, with household names such as Sony, Compaq, KeyTronics, Samsung and others entering the market, these devices appear almost as a standard computer peripheral. Many are viewing this as the application, which will provide critical mass for biometric industry and create the transition between sci-fi device to regular systems component, thus raising public awareness and lowering resistance to the use of biometrics in general.
9.3
TRAVELS AND TOURISM There are many in this industry who have the vision of a multi application card
for travelers which, incorporating a biometric, would enable them to participate in various frequent flyer and border controls systems as well as paying for their air ticket, hotel rooms, hire care etc, all with one convenient token. Technically this is eminently possible, but from a political and commercial point of view there are many issues to resolve, not the least being who would own the card, be responsible for administration and so on. These may not be insurmountable problems and perhaps we may see something along these lines emerge. A notable challenge in this respect would be packaging such an initiative in a way that would be truly attractive for users.
9.4
INTERNET TRANSACTIONS Many immediately of think of on line transactions as being an obvious area for
biometrics, although there are some significant issues to consider in this context. Assuming device cost could be brought down to level whereby a biometric (and perhaps chip card) reader could be easily incorporated into a standard build PC, we still have the problem of authenticated enrollment and template management, although there are several approaches one could take to that. Of course, if your credit already incorporated a biometric this would simplify things considerably. It is interesting to note that certain device manufactures have collaborated with key encryption providers to provide an enhancement to their existing services.
Perhaps we shall see some interesting
developments in this area in the near future.
9.5
Telephone transactions. No doubt many telesales and call center managers have pondered the use of
biometrics. It is an attractive possibility to consider, especially for automated processes. However, voice verification is a difficult area of biometrics, especially if one does not
have direct control over the tranducers, as indeed you wouldn’t when dealing with the general public. The variability of telephone handsets coupled to the variability of line quality and the variability of user environments presents a significant challenge to voice verification technology, and that is before you even consider the variability in understanding among users. The technology can work well in controlled closed loop conditions but is extraordinarily difficult to implement on anything approaching a large scale. Designing in the necessary error correction and fallback procedures to automated systems in a user-friendly manner is also not a job for the faint hearted. Perhaps we shall see further developments, which will largely overcome these problems. Certainly there is a commercial incentive to do so and I have no doubt that much research is under way in this respect.
9.6
Public identity cards.
A biometric incorporated into a multi purpose public ID cards would be useful in a number of scenarios if one could win public support for such a scheme. Unfortunately, in this country as in others there are huge numbers of individuals who definitely do not want to be identified. This ensures that any such proposal would quickly become a political hot potato and a nightmare for the minister concerned. You may consider this a shame or a good thing, depending on your point of view.
From a dispassionate technology
perspective it represents something of a lost opportunity, but this is of course nothing new. It’s interesting that certain local authorities in the UK have issued ‘citizen’ cards with which named cardholders can receive various benefits including discounts at local stores and on certain services. These do not seem to have seriously challenged, even though they are in effect an ID card.
10.0 Conclusion
The ultimate form of electronic verification of a person’s identity is biometrics; using a physical attribute of the person to make a positive identification. People have always used the brain’s innate ability to recognize a familiar face and it has long been known that a person’s fingerprints can be used for identification. The challenge has been to turn these into electronic processes that are inexpensive and easy to use. Banks and others who have tested biometric-based security on their clientele, however, say consumers overwhelmingly have a pragmatic response to the technology. Anything that saves the information-overloaded citizen from having to remember another password or personal identification number comes as a welcome respite Biometrics can address most of the security needs, but at what cost? Surprisingly, the benefits quickly outweigh the costs. Like so many technological developments, innovative people have found new ways to implement biometric systems, so prices have come down dramatically in the last year or two. As prices have come down, the interest level and the knowledge about how to effectively utilize these systems have increased. So the investment is decreasing and the recognizable benefits are increasing. Biometrics, when properly implemented, not only increase security but also often are easier to use and less costly to administer than the less secure alternatives. Biometrics can’t be forgotten or left at home and they don’t have to be changed periodically like passwords.
REFERENCES 1. http://www.biometricgroup.com 2. http://www.neurotechnologija.com 3. http://biometrics.cse.msu.edu 4. http://www.biometricpartners.com