StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Survey of Advances in Biometric Security - Research Paper Example

Cite this document
Summary
The primary purpose this particular research paper is to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years. An insight is also drawn about the current trend and the historical context of security approaches. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
A Survey of Advances in Biometric Security
Read Text Preview

Extract of sample "A Survey of Advances in Biometric Security"

A Survey of Advances in Biometric Security The primary purpose of this particular research was to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years of its existence. Contextually, from the analysis of various secondary research articles and journals, it has also been learned that biometric solutions have a prominent presence in numerous domains of the society owing to its effectiveness as a security control measure. It is also seen to be one of the most updated forms of security control systems in the present day scenario. However, there are certain specific issues associated with the use of biometric security system within any network. These issues mainly involve violation of basic privacy rights of individuals during the process of identification and analysis along with errors of accurate identification in certain scenarios. Hence, it can be concluded that biometric solutions are indeed an important part of the modern day security control measures and will most definitely be more prominent in years to come. Keywords: biometric security system, DNA recognition, biometric tests, biometric tools and techniques, biometric technology 1. Introduction 1.1. Background With the advent of technology and its advancement, considerable changes have been noticed in terms of its application in various domains of the society (Pise, 2011). It has been comprehended that in the presence of advanced technologies, conducting any particular activity has become more easy and interesting. In this context, it can be stated that the use of technology is extensively apparent in almost each and every domain of the society which includes education, business, healthcare and security sector among others (Gates, 2011). The use of technology for the purpose of information security has also become quite prevalent in the recent time. There are numerous technologies that are implemented for the purpose of security control in the present day with biometric security being the most extensively implemented one. Biometric security primarily refers to the approach of analyzing or evaluating an individual with the purpose of examining their identification for accessing a secured areas or network with the help of biometric tools and techniques (Mordin & Tzovaras, 2012). Biometric security works on the principle of analyzing patterns and physiological and biological structure of individuals towards validating their identification (Cole, 2011). 1.2. Structure of the Paper This research intends to provide a comprehensive understanding about the aspect of biometric security solutions along with an evaluation of its performance efficacy in the present day context. Likewise, the research will be conducted in a systematic manner through depicting the functionality as well as the forms of existing biometric security network. Subsequently, an insight will also be drawn about the current trend and the historical context of such security approaches. 2.0. Biometric Security Functionality As discussed, Biometrics security solutions are a particular program that is used for the purpose of identification as well as authentication of individuals while providing access to a secured network. It is one of the modern day approaches that are being used for the purpose of securing highly confidential areas (Gizmag, 2014). 2.1. Fundamentals of Biometrics Biometrics solutions generally work on human generated patterns that primarily resembles with physiological or behavioral aspects of an individual. As per the study of Rathgeb & Uhl (2011), in usual scenario biometric solutions take into consideration both the physiological and behavioral components of individuals while functioning. Some of the forms of biometric solutions in security control include voice recognition, handwriting analysis and fingerprint examination among others. It is regarded as one of the notable approaches that are being incorporated in the process of securing network through classifying, analyzing as well as evaluating individual’s identity prior to granting them access to a particular secured network (Rathgeb & Uhl, 2011). According to Lai et al. (2011), biometric mainly acquires data in raw and convert the same accordingly to analyze and evaluate a particular individual for security purposes. The data that is being acquired during the process of biometric metric are not stored for any future purposes (Lai et al., 2011). It has been learned that under the biometric technology, data is first gathered from the source which is then further arranged in the form of computable data. In the next stage of the process, the acquired and arranged data is further processed with the assistance of computers through utilizing both hardware and software. It will also be worth mentioning in this regard that biometric solutions work in numerous ways and the data or the individual’s identity can be evaluated on visible light, infrared and acoustic among others. It is often regarded as one of the most secure forms of security control in the present day context (Yanushkevich, 2014). Figure – Benefits of using biometrics [Babich, 2012] 2.2. Types and forms of Biometrics There are numerous forms of biometric solution, which are prevalent in the present day scenario. Some of the basic forms of biometric solutions include DNA matching, iris recognition, retina recognition, face recognition, fingerprint recognition, and finger geometry recognition among others. DNA recognition deals with analyzing the identification of any individual based upon the evaluation of their DNA. It is considered quite secure and effective and involves less error. However, the process is regarded as a bit complex in comparison to the other forms of biometric solutions. Iris recognition is a visual biometric approach that deals with identifying a particular individual for security purposes based upon their iris features (Biometrics Institute, 2014). Subsequently, retina recognition involves the analysis of any individual on the basis of their retinal features. It is one of the most common forms of biometric tests applied in the current era (Pohlmann et al., 2011). Face recognition techniques are deemed to be quite prominent for the purpose of security and it involves the evaluation of human eyesight to determine their identification. Fingerprint recognition, which is seen as one of the most common form of visual biometric techniques is often used for the purpose of securing a particular area through identifying ridges and valleys that can be found on the surface of fingers of any individual. Finger geometry recognition, which is quite a unique process of all the biometric process, is used for examining the identity of a particular individual through analyzing his/her fingers with the process of 3D geometry. All the aforementioned types or forms of biometric solutions have their own significance and relevancy, thus, are extensively used in the domain security control in the present day scenario (Yanushkevich, 2014). Figure - Illustration Of Face Scan In Biometric Security System [Le, 2011] 3.0. Biometric Security Performances It has been depicted that biometric security solutions are used in various domains within the society to ensure high level of security and authenticity in confidential areas and secured networks. However, similar to any other technological development, biometric security solutions have their own loopholes and issues which must be discussed to ensure a better understanding about the concept in the present day context. 3.1. Error Risks The risk of error is nominal to medium in biometric solutions. It has been ascertained that biometric solutions does not assure perfect identification of an individual through the analysis of data. The matching processes that are usually conducted in biometric solutions are done in a probabilistic manner and they could not be considered as accurate by any means (Scientific American, 2014). Thus, it is evident that the chance of statistical error is quite considerable within the entire process. Any mistaken identification through the biometric security procedure will certainly result in utmost risks for the data or the area that is being protected. However, there are also instances when failed identification of an individual had resulted into false rejection thus preserving the confidentiality of the data stored. In this regard, it would be essential to mention that these sort of errors in the process of biometric solutions is not always the fault of technology, but at-times the surrounding environment also has a key role to depict. Some of the specific factors that can impact the performance of biometric solutions include the uniqueness of the features of the technology, the installed algorithm, behavior and expertise of the users and the influence of the surrounding environment including light and noise among others. All these factors can result in an inappropriate functioning of the biometric solutions. There are certain errors relevant to the false acceptance of individuals while evaluation through the biometric technique. This aspect is largely influenced by the strength of the False Acceptance Rate (FAR) installed within the security system. In such security error, the threat can be mainly related to the password of the areas that are protected (Campisi, 2013). Hence, the chances of errors are quite apparent with biometric solutions. Figure – Biometric system vulnerabilities [Jain & Nandakumar, 2012] 3.2. Privacy Right Issues and Concerns There are certain issues of biometric solutions relevant to the privacy rights of individuals. It is often argued that privacy rights of people are hindered on grounds of security while using biometric solutions (Kumar & Zhang, 2010). There are individuals who are reluctant towards losing their privacy to a degree during biometric security analysis. This aspect further raises issues that impact the performance and efficacy of biometric solutions (Campisi, 2013). It is comprehended that unlike Personal Identification Number (PIN) or passwords, biometric solution analyzes the entire body of an individual, which can cause serious issues relevant to personal rights and privacy. However, considering a different point of view, biometric solutions are regarded as effective owing to the aspect that it is involved in a through analysis of an individual identity, which further minimizes security threats to a greater extent. On the contrary, one can also consider this particular approach of biometric solutions as negative, owing to the aspect that it compromises dignity and self-prestige of an individual on several occasions (Nandakumar, 2014). Hence, these particular aspects can be regarded as a major concern in the domain of biometric security implementation. 3.3. Other Forms of Legal Risks There is also certain legal risk associated with the use of biometric solutions for the purpose of security control in any domain. In this context, it can be determined that most of the biometric security solutions have an unclear and uncertain legal coherence. This is because of the fact that no specific laws have been developed with regard to the functioning of biometric solutions (Scientific American, 2014). It has also been noted that there are numerous aspects associated with the functioning of biometric solutions that can be considered illegal. Notably, biometric solutions work on templates to gather data and execute the process of identification of a person. Furthermore, with the use of biometric solutions, concerned authorities can gain access to personal data of others, which again can be regarded as a breach of privacy for which legal obligation can arise (Jain et al., 2007). Figure – Disadvantages of using biometrics security [Babich, 2012] 4.0. Historic and Current Trends 4.1. Evolution of Biometric Security System The application of biometrics solutions has a long history associated with it. Even though, the technology has been available for quite a long now, its extensive use has been mainly seen in the past two decades. Owing to the prominent advancement in the domain of technology as well as computer processing, biometric solutions have become more efficient in the past few years. Biometric solutions work on the most fundamental security measures, i.e. face recognition and finger print examination. It is evident that more than 3000 or more years ago, handprints of humans have been found in caves. Again in 500 B. C, it is believed that Babylonians used fingerprints that were recorded on clay tablets during business transactions. Again in similar regard, a famous scholar Joao de Barros portrayed that most of the Chinese merchants incorporated the use of fingerprints to settle most of the business transaction in a safe and secure manner. Furthermore, Egyptian merchants were deemed to use physical descriptors for the purpose of identifying amid trusted and untrusted traders. Hence, it is quite apparent that biometrics has its roots associated with the past civilization and human history (Mayhew, 2012). 4.2. Social Acceptance of the System It is evident that biometric security control has been in extensive use over the past few years in various sectors (Le, 2011). However, owing to the presence of certain negative aspects associated with the system, its social acceptance and wider implementation has often been under scrutiny. Notably, in the present context biometric solutions have been aligned with radio frequency identification (RFID), which make the system more efficient, but at the same time, it raises an issue of privacy and security of personal data along with the probability of system to be used for illegal purposes. In addition, it has also been studied that people in the society are aware of the fact that biometric security solutions and its integration with other technologies such as RFID will be an effective step towards dealing with terrorism, frauds and other crime right from the grassroots level. This aspect further encourages people towards accepting the technology despite of its numerous implications that can be negative. Social factors that mainly influence the acceptance of biometric solutions are their behavior and perceptions. As per a survey conducted in Germany, a large percentage of the people were aware of the importance of biometric solutions and at the same time, a large group of people depicted their acceptance towards the same. However, people of a younger age group were seen to be appreciative towards the prevalence of the technology while others are determined to hold mixed perceptions about it (Krupp et al., 2014). 4.3. Regulations Applicable Notably, the use of biometric solutions has certain key legal implications, which must be mentioned in a clear and precise manner. The first legal aspect is associated with the privacy of individuals in the process of executing biometric security. It directly aligns with the global human rights law. In the US, the use of biometric solutions in any domain will be under the governance of Biometric Information Privacy Act (Illinois General Assembly, 2014). Furthermore, it has also been comprehended that in many parts of the US, the use of biometric security measures is governed under the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act (HIPAA) (LegalMatch, 2014). However, in the UK the use of biometric solutions must abide by the regulatory norms presented within the European Convention on Human Rights and Data Protection Act. 5.0. Summary The paper primarily emphasizes upon the analysis of the advancement that has been seen in the field of biometrics over the years, which has widened its implementation and popularity in the recent time. Contextually, it has been learnt that biometric solutions have become quite popular amid various sectors of the society with regard to its importance as a security control measures. The technology mainly works for analyzing and evaluating the identification of any individual through examining their physical and biological elements. It is believed that the technology assure utmost accuracy while executing the process of data accumulation and data analysis further ensuring the proper and accurate identification of any individuals. This aspect further aids in assuring protection of any secured areas or confidential networks. There are several forms of biometric security solutions, which include: DNA identification, fingerprint analysis, face recognition and Iris recognition among others. However, it is believed that there are certain errors that can take place in the process of executing security measures through the use of biometric solutions. This particular aspect, impact the social acceptance of the system. It is known that use of biometric solutions has its origination since the early civilization where many of the approaches currently used by biometric solutions were used for various purposes. It can be concluded that biometric security solutions has developed rapidly over the years and recently has gained widespread acceptance as one of the most reliable security measures. 6.0. References Babich, A. (2012). Biometric Authentication. Types of biometric identifiers. Degree Programme in Business. Biometrics Institute. (2014). Types of biometrics. Retrieved from http://www.biometricsinstitute.org/pages/types-of-biometrics.html Campisi, P. (2013). Security and privacy in biometrics. US: Springer Science & Business Media. Cole, E. (2011). Network Security Bible. US: John Wiley & Sons. Gates, K. A. (2011). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. US: NYU Press. Gizmag. (2014). Advancements in vein scanning biometrics brings added security. Retrieved from http://www.gizmag.com/go/2998/ Illinois General Assembly. (2014). Illinois compiled statutes. Retrieved from http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&ChapterID=57 Jain, A. K. & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. IEEE Computer Society, 87-92. Jain, A. K., Flynn, P., & Ross, A. A. (2007). Handbook of Biometrics. US: Springer Science & Business Media. Kumar, A., & Zhang, D. (2010). Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing. US: Springer Science & Business Media. Krupp, A., Rathgeb, C., & Busch, C. (2014). Social Acceptance of Biometric Technologies in Germany: A Survey. University of Applied Sciences Darmstadt, 193-200. Lai, L., Ho, S. W., & Poor, H. V. (2011). Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case. IEEE Transactions on Information Forensics and Security, 6(1), 140-151. LegalMatch. (2014). Biometrics laws. Retrieved from http://www.legalmatch.com/law-library/article/biometrics-laws.html Le, C. (2011). A Survey of Biometrics Security Systems. Retrieved from http://www.cse.wustl.edu/~jain/cse571-11/ftp/biomet.pdf Mayhew, S. (2012). History of biometrics. Retrieved from http://www.biometricupdate.com/201211/history-of-biometrics Mordin, E., & Tzovaras, D. (2012). Second generation biometrics: the ethical, legal and social context: the ethical, legal and social context. US: Springer Science & Business Media. Nandakumar, V. (2014). An analysis of issues in biometric finger identification. International Journal of Engineering & Technology, 3(3), 391-395. Pohlmann, N., Reimer, H., & Schneider, W. (2011). ISSE 2010 securing electronic business processes: highlights of the information security solutions Europe 2010 conference. US: Springer Science & Business Media. Pise, S. J. (2011). ThinkQuest 2010: Proceedings of the first international conference on contours of computing technology. US: Springer Science & Business Media. Rathgeb, C., & Andreas, U. (2011). A survey on biometric cryptosystems and cancelable biometrics. Journal on Information Security. Scientific American. (2014). Biometric security poses huge privacy risks. Retrieved from http://www.scientificamerican.com/article/biometric-security-poses-huge-privacy-risks/ Yanushkevich, S. N. (2014). Fundamentals of biometric system design. Retrieved from http://www.ucalgary.ca/btlab/files/btlab/ch1.pdf List of Acronyms used PIN: Personal Identification Number RFID: Radio Frequency Identification FAR: False Acceptance Rate DNA: Deoxyribonucleic Acid HIPAA: Health Insurance Portability and Accountability Act Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A Survey of Advances in Biometric Security Research Paper”, n.d.)
A Survey of Advances in Biometric Security Research Paper. Retrieved from https://studentshare.org/information-technology/1662827-a-survey-of-advances-in-biometric-security
(A Survey of Advances in Biometric Security Research Paper)
A Survey of Advances in Biometric Security Research Paper. https://studentshare.org/information-technology/1662827-a-survey-of-advances-in-biometric-security.
“A Survey of Advances in Biometric Security Research Paper”, n.d. https://studentshare.org/information-technology/1662827-a-survey-of-advances-in-biometric-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Survey of Advances in Biometric Security

Loss Prevention Program in Kumtor Operating Company

On the other hand, internal risk factors included security of the gold production and storage facilities, corruption, lack of insurance against loss and many such mitigating factors.... Our role as security managers was to prepare loss prevention techniques after applying critical risk assessment theories, and using the relevant ones to achieve the aim.... A situation exists today where the losses due to management of mining process have reduced unbelievably thereby directly benefiting the company both financially and security wise....
15 Pages (3750 words) Case Study

Interest And Property Insurance Policy

Fingerprint identification and analysis is used in high tech security applications and handheld devices for the immediate identification of the dead in mass fatalities.... Fingerprints are now used in security systems.... Rather than having to carry easily lost security cards, restricted areas recognize authorized personnel by their finger or palm print.... Furthermore, government entities use fingerprints (the inkless type) to monitor and admit immigrants into the country and as a result of the September 11th 2001 attacks, homeland security instituted the Integrated Automatic Fingerprint Identification System (IAFIS), which store and searches for fingerprint matches....
4 Pages (1000 words) Essay

Introduction to Biometric Identification Database

The recent advances in Information Technology and computing have provided newer dimension to this emerging field.... There are human rights groups and civil liberties advocates argue that increasing use of biometrics has resulted in trespassing into the privacy of all human beings, but the rise in terrorist activities in recent years has forced the defense and security experts to rely heavily on the biometrics for identifying the mischief makers.... ypes of Biometrics and their usageA biometric system is designed to test one out of the two possible hypotheses (Wayman et al....
11 Pages (2750 words) Essay

XYZ Corporation in the Field of Security Services

The paper "XYZ Corporation in the Field of security Services" states that XYZ is entering into Service Product domain.... It is believed that this product will pave a path towards projecting XYZ in a total security service provider.... With its long existence in market it has developed a very good insight of customer behavior, expected pattern of security breach and response actions.... In its course of business it has to use some gadgets and infrastructure for sensing and monitoring security breaches, which are normally sourced from third party at a cost and which many a times do not meet full requirement of client....
13 Pages (3250 words) Case Study

Upcoming Technological Advances in Nursing

The paper “Upcoming Technological advances in Nursing” looks how and when varieties of innovations are being incorporated by the health sector or the healthcare organizations so as to motivate nurses and other stakeholders perform their duties with a lot of ease and efficiency.... With all these related advances in technology, the professional culture of reflection, profound inquiries, and inter-professional collaborations will gear nursing as a whole towards success by the year 2025....
7 Pages (1750 words) Case Study

Biometric Technologies

The following paper states that time is of the essence in the field of health care.... Immediate actions may have a great effect on someone else's life.... It is the driving factor in emergency cases.... nbsp;If medical attention is not given during bad situations, a mishap could prove to be fatal....
15 Pages (3750 words) Research Paper

The Investigation of Wearable Technology Issues

… The paper "The Investigation of Wearable Technology Issues" is a wonderful example of a research paper on technology.... Wearable technology has generated significant attention in recent years, with most existing devices helping people to better understand their personal health and fitness by monitoring heart rate, sleep patterns, exercise, and so on....
9 Pages (2250 words) Research Paper

Access Control System Technology

Access control industry continues to evolve with introduction of adaptable, secure, and open security solutions.... This objective is critical as technological trend moves towards adoption of fully interoperable, multilayered access control security systems.... This ensures that security is independent of hardware and media (Ferraiolo, Kuhn, & Chandramouli, 2007).... Access control infrastructure can therefore evolve to meet future demands and security threats beyond the current capabilities....
10 Pages (2500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us