ROLE OF BIOMETRICS IN SECURITY TECHNOLOGY
WHAT IS BIOMETRICS? These are automated methods of recognizing a person based on its physiological characteristics. These are foundation of an extensive array of highly secure identification and personal verification solutions. Biometric security technologies are used to accurately identify individuals on a unique trait.
BIOMETRICS ROLE IN PERSONAL IDENTIFICATION One of the most important ways that biometric technology is impacting security lies within the confines of computer information systems. Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them
HOW BIOMETRICS WORKS ? Enrollmemt Authenticate/Identify Accuracy
TYPES OF BIOMETRICS Fingerprint recognition. Iris scanning. Smart card security. Face recognition.
FINGERPRINT RECOGNITION Fingerprint matching Fingerprint classification Fingerprint image Enhancement Fingerprint recognition demonstration
FINGERPRINT RECOGNITION ALGORITHM
The Authentication Fingerprint is captured. The user will be advised to accurately position his finger on the device. The quality is measured and only good images will be accepted. Once an image is accepted, its relevant information will be extracted and stored into a database. The extraction of information starts with the color reduction to black and white. Several filters reduce the noise in the relevant image areas without destroying required information.
ALGORITHM CONT.... Ridge width is reduced to
one pixel based on the image.A mask is computed to be able to exclude noisy, unsharp or blank areas from the recognition process.
This mask is also used to determine the overall image quality.
ALGORITHM CONT.... Minutiae locations are extracted. False Minutiae are rejected by the quality mask (Step 3) Various Features are extracted from each Minutia
Once taught in, the user may now authenticate himself by putting the finger on the device.
ALGORITHM
CONT....
The so extracted data is compared to the training data in the database. The finger of the user has been shifted to the right and was slightly rotated. Corresponding minutiae data is connected with a line in this illustration. Dots are unmatched minutiae. • T he user has been accepted. The extracted data is compared to the training data in the database. There is only lo correlation between some minutiae. Additional matching criteria checks fail. • T he user has been r ejected.
IRIS SCANNING
Iris scans analyze the features that exist in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video camera style and can be done from further away than a retinal scan. It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not much verification.
HOW IRIS SCANNING WORKS ?
The user’s eye is positioned near the camera of the iris recognition device. The camera automatically zooms in and focuses. The camera captures image of the iris. This can be done through eyeglasses, contact lenses or at night.
HOW IRIS SCANNING WORKS ? A computer program analyzes the patterns within each circular grid and transforms them into a data file, which is like a personal bar code. The code from the iris is compared against a database of previously recorded irises to confirm the Identification of the user.
SMART CARD SECURITY
CARD SECURITY
BIOMETRICS IDENTIFICATION PHYSICAL STRUCTURE LIFE CYCLE OF A SMART CARD LOGICAL STRUCTURE AND ACCESS CONTROLS SMART CARD SOFTWARE
SMART CARD SOFTWARE • It has been established that any secure transaction involves 6 generic functions as followed:
Data Protection Identification of the cardholder Mutual authentication Secure writing Certification or signature Encryption
FACIAL RECOGNITION Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. This biometric has ben widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has been unproven in high-level usage. It is currently used in verification only systems with a good deal of success.
HOW FACIAL RECOGNITION WORKS ? User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and reattempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds. To prevent a fake face or mold from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying.
HOW THE SOFTWARE WORKS ? Detection Normalization Matching Representation
WHERE BIOMETRICS ARE BEEN USED ? Panasonic sells an iris reader for desktop computers that does log-ons and videoconferencing. ADT Security Services now uses Visionics face-recognition systems at the airports they protect. Some new PC models use desktop fingerscanners on their mouse or keyboards. The Los Angleles Firemen's Credit Union spent $40,000 on a fingerprint-.scanning system. Its 90 employees no longer need to remember up to 10 passwords to use networks and applications. They just touch the finger pad and they're ready to go. St. Vincent Hospitals and Health Care Center uses a fingerprint reader system and biometric software in its facilities of up to 3,000 staff and physicians to access computers.
ADVANTAGES OF BIOMETRICS SECURITY First, unlike passwords or PIN numbers, biometrics looks at a person’s unique trait, which cannot be replicated by others. Thus, when a user scans their retina for access to a computer’s resources, biometrics links the event to a certain individual. Second, Users do not need to remember their password or carry around other identification forms (like a driver’s license). Third, biometrics offers better, more accurate authentication compared to current password/PIN systems (2002).
LIMITATIONS AND DISADVANTAGES First, biometric technology can be relatively intrusive on users, especially if computers are using fingerprints and retina scans to identify users. The issue of personal privacy comes into play when such delicate information is being recorded. Second, many of the biometric techniques for identifying users are expensive and difficult to implement on current computer systems. Third, many of the biometric techniques take a lot of effort to use and can be complicated for those who are unfamiliar with the technology. Fourth, biometric security techniques are not equally accurate and dependable.
CONCLUSION
Biometric security technology cannot be overplayed. Even with its disadvantages and upfront costs, biometric technology is simply the best route to preventing identity theft and securing computers from unwanted users. As the technology works its way into corporate computers and home PCs, the demand for the product will increase and the uneasiness towards the technology will decrease. Biometrics are quickly becoming more socially acceptable, more accurate, and less expensive. Their place in the future: assured. Their impact on security: profound.
REFERENCES An Introduction to Biometrics” The Biometric Consortiume”
http://www.biometrics.org/html/introduction.htm, 23 June 2004 About Biometrics” Information Technology Laboratory” http://www.itl.nist.gov/div893/biometrics/about.html,2 3 June 2004. Bertolucci, James” Products for the Paranoid” http://www.pcwor ld.com/news/ar ticle/0,aid,116573,00 .asp23 June 2004. Mace, Scott.”Gates Previews Security Projects” http://www.pcwor ld.com/news/ar ticle/0,aid,114916,00 .asp 23 June O’Brien, James A.Management Information Systems” Managing Information Technology in the Business Enterprise "New York: McGraw-Hill, 2004c Newell, Adrienne.Is Biometrics Coming to a PC Near You? http://www.pcwor ld.com/news/ar ticle/0,aid,115289,00 .asp 2004d, March 19