StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Authentication Systems - Essay Example

Cite this document
Summary
The paper "Biometric Authentication Systems" tells about new technologies that are highly accurate, reliable, and not intrusive to the users. Biometric systems whether chemical, visual, or behavioral offer reliability in user identification and minimizes time wastages…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Biometric Authentication Systems
Read Text Preview

Extract of sample "Biometric Authentication Systems"

Insert Biometrics Advancement in technology and especially electronic technology has brought about great demand for accurate, fast and reliable user authentication and identification systems. Systems require a personal recognition scheme that ensures that services are only accessed by legitimate users. Systems and applications that require such authentication include computer systems, gaining access to buildings, personal computers, laptops, cellular phones and ATMs. Need for reliability has led to heightened concerns about security increased advancements in communication, mobility, and networking. Biometrics recognition is, therefore, the automatic recognition of users based on behavioral and physiological characteristics. Biometrics seeks to establish a users identity based on who she is rather what she possesses like an ID card or what she remembers like passwords. Biometrics gained popularity when body measurements were used by Alphonse Bertillon to identify criminals in the 19th century. It prompted law enforcer to take criminals fingerprints and store them in a database. The stored fingerprints could then be compared with fingerprints lifted from crime scenes. Biometrics are extensively used to identify criminals but has also gained use in employee clearance for sensitive jobs, determining fatherhood, forensics, identification of prisoners. The whole physical body cannot be used as a biometric. For the body part to be used as a biometric then, it has to satisfy several characteristics. Universality – each person in the world possesses the characteristics. Distinctiveness – any two people should be sufficiently different in terms of the characteristic of the body part. Permanence – the characteristic should be sufficiently invariant over a period. Collect-ability – the body characteristic can be,measured quantitatively. A practical biometric system should consider the following before it can be effected. Performance – refers to the achievable recognition speed and accuracy, the resources to be used in achieving the desired recognition accuracy and speed and the environmental and operational factors that affect the accuracy and speed. Acceptability – this is the extent to which users and people are willing to accept the use of the biometric body part in their daily lives. Circumvention – it refers to the ease with which the biometric system can be fraudulently accessed or altered. Types of Biometrics Different body parts are being used as a form of biometric recognition. Biometrics ranges from DNA matching, chemical biometric, visual biometric, eyes biometrics ( iris recognition, retina recognition ), finger geometry recognition, Hand geometry recognition, signature recognition and behavioral biometrics (typing recognition), vein recognition and gait. Chemical Biometrics Chemical biometrics involves the use of and measuring chemical cues such as the order and chemical composition of the human perspiration. DNA matching Deoxyribonucleic acid (DNA) matching is the process used in the identification of persons by their DNA profiles. DNA profiles are hidden sets of numbers that reflect an individuals DNA composition, which can also be used as a persons identifier. DNA profiling is different from a full genome sequencing that is used in parental testing and criminal investigation. Even though 99.9% of human DNA sequences are similar in every person, unless they are identical (monozygotic) twins. DNA matching uses repetitive sequences that are highly variable, known as variable number tandem repeats (VNTRs), particularly short tandem repeats (STRs). In 1984 Sir Alec Jeffreys started research work on the DNA profiling technique at the University of Leicester in England. Advantages They are highly accurate. They can be used to identify both dead and living human beings. Disadvantages It is very easy to steal a piece of DNA from a person, and the piece can be creating contamination and sensitivity issues. There are no real-time recognition technologies as DNA matching requires complex chemical methods and experts. DNA matching is not geared towards on-line noninvasive recognition. Information from DNA patterns of people can be abused resulting in user discriminations especially in workplaces. It creates privacy concerns. Visual Biometrics Visual biometrics uses body parts that can be viewed from the outside body. Advantages They are inexpensive to set up. The body parts used in visual biometrics are very distinct to a person even twins. Most body parts used do not change in an entire lifetime of a person that increases accuracy. Disadvantages Visual biometrics are intrusive and cause user rejections Cannot be effectively used for physically impaired people. People using glasses, broken limbs. Iris Recognition The idea that no two irises are alike, even in twins, was proposed by Dr. Leonard Flom and Dr. Aran Safir in the 1980s. The iris contains many features that are used to distinguish one iris from another. The trabecular meshwork tissue is the primary visible character of the iris and is permanently formed by the eighth month of gestation. The iris is a good biometric because; the iris does no undergo any genetic process ( chaotic morphogenesis), which means that identical twins cannot have same irises. The iris has 266 degrees of freedom that allow large variations thus making the iris distinct from another. The iris is also protected by the eyelid, cornea, and the aqueous humor, and this reduces the chances of damage. Finally, the iris is not subject to aging making it stable in the entire life of a human being. The process of iris recognition involves capturing an image using standard or infrared light, defining the location of the iris and optimizing the captured image. The optimized image is the stored for comparisons. Despite the physiological characteristics of the iris being the major advantage of using iris, iris scanning is also not intrusive to users body. The factors make the scalability and speed of iris-scanning technologies a big advantage. Iris recognition technologies are mostly used in the computing environments to secure personal computers and networks. It is also used in physical security to sensitive data centers by mounting eye scanners on their doors. Iris recognition has also been used in ATMs, border clearance, air travel, airport security and in the transportation sector. Retina Recognition Retina is still the most reliable form of biometric despite its lack of extensive use in most commercial applications. The retina is made up of multiple layers of sensory tissues and millions of photoreceptors that transform light rays into electrical impulses. The blood vessel pattern in the retina forms the foundation for retinal recognition . The retina is not usually or mostly exposed to the external environment due to its back position within the eye making it a very stable biometric. Retinal scanning process has three steps. Signal acquisition and processing ‐ it involves capturing an image of the retina and converting it to a digital format. Matching using a computer system to verify And identify the user. Lastly, the unique features of the retina are represented as a template. The strengths of using retina as a biometric method are; the blood vessel patterns in the retina rarely change in a lifetime, the template size created is only 96 bytes, many data points can be created from the blood vessels and finally the retina is not exposed to external environmental threats due to its location inside the eye. Despite the many strengths, the notable weaknesses of retinal recognition mostly arise from a users perspective. Users perceive retinal scanning as a health threat People also are very uneasy when positioning the eyes very close to the retina scanner. Retinal scanning devices are also very expensive to procure and do not accommodate people wearing glasses. Retina recognition has not been extensively used in the application due to its user invasiveness. Retina recognition is being used at high security facilities like military installations, nuclear facilities, and laboratories to monitor access controls. Face Recognition A facial biometric and recognition system is used to automatically verifying and identify a person from an image or a video. The images are then compared with selected facial features from the database image. There are two approaches to the face recognition problem: geometric that is based on the feature of the face and photometric that is a view based. Face recognition also uses eyebrows, lips, physical shape and locational position of the eyes, chin and nose. Face recognition also uses the overall study of the face image that represent an individuals face as a number of similar recognized faces to distinguish different faces. Facial recognition process has to detect a face in the image taken; the face is then normalized into standard terms of pose, size, and illumination. The features of the face are then extracted and then recognized and identified by comparing with other sources and a facial database. Facial recognition algorithms like principal component analysis (PCA), elastic bunch graph matching (EBGM) and linear discriminant analysis (LDA) are widely used to achieve facial recognition. Face recognition is an uncertain way of clearly verifying the identity of a person because; it is very hard to match face images taken from two different views and those that are under different illumination conditions . Another challenge to face recognition is that, people faces tend to change with time, and other people may alter their face intentionally. Finger Geometry Recognition Finger geometry involves his study of ridge patterns and Valleys on the fingertips. The first seven months of fetal development determine formation of ridge patterns. Fingerprints are effective because they are different, Finger geometry also involves vein recognition that recognizes patterns using images of human hand finger vein and veins found below the skin surface. The vein patterns are acquired by inserting fingers into a verification terminal that has infrared LED light and a monochrome CCD camera. Blood hemoglobin absorbs LED light. The vein system will be made to appear as a dark sequence of lines. Finger vein ID system are harder to manipulate because they only verify the finger of a life human being. Finger geometry recognition are not expensive to implement but face challenges from factors that alter the shape of fingers like genetic factors, aging, environmental, or occupational reasons (manual work ). Hand Geometry Recognition Hand geometry biometrics is based on several measurements taken from the human hand that includes size of palm, shape, width and length of the fingers. Hand geometry recognition is is very simple, relatively easy to use, and inexpensive leading to installations in many places for commercial use. The limitations are that they are not very distinctive and hand geometry-based Recognition systems cannot be used for systems requiring identification of an individual from a large group of people. Other challenges include the constant change of hand properties during the growth of a child, presence of jewelry can alter the properties and limitations in dexterity from diseases like arthritis. Behavioral Biometrics Behavioral biometrics is reliant on skills, style, liking, knowledge, vehicle-skills or different plans used by human beings while completing different every day tasks such as writing, driving an automobile, talking on the phone or using a computer. Advantages They can be collected without the knowledge of the user. They can be collected non-obstructively. It is cost effective because it does not require ant special technologies to collect. They show relatively high accuracy in identity verification. Disadvantages Behaviors of people can change due to emotional changes. People engaging into multiple activities or behaviors being studied might lead to altering the other behaviors leading to behavior distortion. Signature Recognition Signatures are part of behavioral biometric that involves the way human beings sign their names. The sign is then made the characteristic of that person. Signatures can be operated in several ways. Static is group called off-line where users write it on paper, the signature is then digitized using a camera or optical scanner, the biometric system then identifies the signature by studying its shape. Dynamic is an on-line mode where people write their signature in a digitizing tablet or stylus-operated PDAs, which acquires the signature in real time. Techniques used for recognition of the signatures are(DTW) Dynamic Time Warping, Hidden Markov Models (HMM) and Vector Quantization (VQ). Signatures have been adopted in legal, government and business transactions as a Verification method. Challenges to using signatures are that they change over a certain time due to physical and emotional conditions of people, some peoples signatures vary substantially even if written successively and finally, forgers may produce signatures that can fool the recognition systems. Typing Recognition Typing recognition is used in the verification and even sometimes identification of persons. It involves the study of keystrokes while typing using the touch typing method for experienced users and the hunt and peck method that uses two fingers. The features of interest in typing recognition include time spent between hitting different keystrokes, dwell times and strokes in inter-keys.Dwell time is the time a key remains down when it is pressed, total typing speed, rate of using backspace that studies frequency of errors, use of Numpad, the sequence in which user hits the shift key in order to capitalize letters. The force of hitting the keys can also be used for keyboards with special equipment (Ilonen 1999). Typing recognition has also been used to study finger motions of skilled pianists while playing a musical keyboard. Vein Recognition Vein recognition is the process of identifying a person based on behavioral traits and unique physical features. Vein recognition mostly studies the vein patterns in the human fingers. Vein recognition produces higher accuracy than other biometrics like fingerprints because vein patterns are impossible to alter or forge. Vein recognition has gained acceptance due to very low false acceptance and false rejection frequency rates, patterns of the vein only change when a body size changes, thus are relatively reliable and vein recognition devices can be used to read a variety of veins at specific finger or even at the back of the palm. It, therefore, gives a wide selection choice thus ensuring reliability. Gait Gait is the study of people walking patterns in order to acquire biometric information Such as identity, gender, ethnicity and age. The features analyzed in gait include arm swing, rhythm of the walker, bounce, length of steps, the distance ( vertical )between the foot and the head, the utmost total distance between the right foot the left leg and the distance between the head pelvis (Kalyanaraman, 2006) . Advantages Can recognize a user from a distance. It is effectively used in cases where there is low image resolution like those available in CCTV cameras. It is a non-invasive type of biometric. Disadvantages It is not effective in scenarios where users have worn clothes that affect the walking style of a person. Walking surfaces (downhill or uphill ) could alter the walking style of a person leading to wrong results. Conclusion Advancement of technologies today have made reliable biometric systems an important requirement in critical businesses. Biometric systems whether chemical, visual or behavioral offer reliability in user identification and minimizes time wastages. Despite the reliability of older identification systems like fingerprints, new biometric like DNA, iris recognition, body odor, vein and ear recognition are gaining acceptance. The newer technologies are highly accurate, reliable and not intrusive to the users. In order to implement a reliable biometric system, a business should consider the development of that is cost/effective, reliable, accurate and is not user intrusive. Works Cited P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, W. Worek, “Overview of the face recognition grand challenge,” Computer Vision and Pattern Recognition (CVPR), 1 (2005): 947-954. Detlef Borchers and Robert W. Smith, “Mixed reactions to the facial features recognition technology project of the BKA,” Heise Online, 16 July 2007. http://www.heise.de/english/newsticker/news/92722. F. Jean, A. B. Album, and R. Bergevin, “Towards view-invariant gait modeling: Computing view-normalized body part trajectories,” Pattern Recog., vol. 42, November 2009. Kalyanaraman, S (2006) ‘Biometric authentication systems: a report’, retrieved July 26, 2006 from http://netlab.cs.iitm.ernet.in/cs650/2006/TermPapers/sriramk.pdf. J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds., Biometric Systems: Technology, Design, and Performance Evaluation. New York: Springer-Verlag, 2005. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometrics Research Paper Example | Topics and Well Written Essays - 2500 words”, n.d.)
Biometrics Research Paper Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/information-technology/1667106-biometrics
(Biometrics Research Paper Example | Topics and Well Written Essays - 2500 Words)
Biometrics Research Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1667106-biometrics.
“Biometrics Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1667106-biometrics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Authentication Systems

Fraud Fears in Internet Banking 1.Introduction

Computer technology has intervened in all walks of life; the field of education has been revolutionized by the advent of e-learning and virtual learning management systems, businesses have become more structured and organized due to the adoption of information management systems, medicine has witnessed remarkable inventions that have made medical procedures more accurate and reliable....
9 Pages (2250 words) Dissertation

Biometric Authentication, an Overview of the Telecom System Security

From the paper "biometric authentication, an Overview of the Telecom System Security" it is clear that the password estimation patterns are observed when a network security attacker tries to get access to an official modem; however, the system deletes the attacker's link after a small time period.... In fact, the biometric authentication is expected that this technology will become more persistent in every business as well as personal lives.... At present, the implementation of biometric authentication technology can be seen all around our lives for example at homes where normally an active biometric authentication sensor is used....
5 Pages (1250 words) Assignment

Biometric Authentication

This assignment "biometric authentication" presents biometric authentication in the context of the Ministry of Defense and its necessities, alternatives, weaknesses, and strengths among other pertinent issues.... Ministries of defense in various developed countries have therefore employed biometric authentication in their military bases to restrict access to only authorized personnel and not just anyone.... l, 2007), there are four sequential approaches to role-based authentication....
8 Pages (2000 words) Assignment

Biometric Authentication

Voice / Whispered biometric authentication ABSTRACT Smartphones contain a collection of personal data, and also provide access to even more data that is stored on the internet.... hellip; Recent advances in biometric authentication make it a viable alternative to password authentication, and voice biometric is one of them.... However, voice biometric authentication still present weakness when the user presents changes on the voice.... Key Words- Voice, Phoneme, biometric authentication I....
8 Pages (2000 words) Research Paper

Security through Authentication and Encryption

The paper "Security through authentication and Encryption" states that authentication while encrypting the data allows any organization to get security over the network, thereby utilizing its resources without any hassle or threat of being attacked by the hacker.... Instead, there is a need for strong user authentication and encryption along with other techniques and policies that can help in creating user accountability and confidentiality so as to ensure the security of an e-business....
8 Pages (2000 words) Coursework

Efficiency of Cloud Computing Data Centers

Another name that is used for this concept is 'Infrastructure as a Service' (IaaS); it includes the dynamic usage of CPUs, virtual servers, network, storage, systems software, etc.... This work called "Efficiency of Cloud Computing Data Centers" focuses on the aspects in which the cloud computing data centers prove to be more efficient than the conventional data centers....
14 Pages (3500 words) Coursework

Biometric Authentication

These features are unique to individuals and readily available; hence, making them ideal for the development of dependable authentication systems.... This assignment "biometric authentication" presents leading-edge approaches to role-based authentication.... In order to provide Britain with protection from external threats, the Department of Defense (DoD) has to deploy systems that not only protect it from external threats but also internal ones....
6 Pages (1500 words) Assignment

Security Design for the Smith-Brooks Corporation

"Security Design for the Smith-Brooks Corporation" paper addresses how modern technologies can be equipped to develop more effective security systems.... The components that are used in the systems are keenly described, their functionalities, as well as their shortcomings.... The paper starts with and builds upon a set of well-established guidelines for designing the systems, characterization of the whole site, its facilities, and the threats that the site is likely to face....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us