NECESSITIES FOR BIOMETRIC SECURITY SYSTEM







Biometrics is the automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the individual. Many biological characteristics, such as fingerprints, and behavioral characteristics, such as voice patterns, are distinctive to each person. Therefore, biometrics is more reliable and more capable in distinguishing between a specific individual and an impostor than any technique based on identification document or a password. The word biometrics comes from the Greek bios (life) and metrikos (measure) [Jain, 2008]. A biometric characteristic is a general term used to describe a measurable physiological and/or behavioral characteristic that can be used for automated recognition. A biometric system provides an automated method of recognizing an individual based on the individual's biometric characteristics. Biometric modalities commonly implemented or studied include fingerprint, face, iris, voice, signature, vein pattern, and hand geometry. Many other modalities are in various stages of development and assessment [Carlisle and Carlisle, 2009].

In computer technology, biometrics relates to identity-confirmation and security techniques that rely on measurable, individual biological characteristics. For example, fingerprints, palmprints, or voice patterns might be used to enable access to a computer, to a room, or to an electronic commerce account. In general, there are three levels of computer security schemes. Level 1 relies on something a person carries, such as an ID badge with a photograph or a computer cardkey. Level 2 relies on something a person knows, such as a password or a code number. Level 3, the highest level, relies on something that is a part of a person’s biological makeup or behavior, such as a fingerprint, a facial image, or a signature [Teoh et al.,2006]. Biometric systems are commonly used to control access to physical assets (laboratories, buildings, cash from ATMs, etc.) or logical information (personal computer accounts, secure electronic documents, etc). Biometric systems can also be used to determine whether or not a person is already in a database, such as for social service or national ID applications. [Jain, Hong, and Pankanti, 2000]

Measurement of physical features such as height, eye colour, scars, etc, as a method of personal identity is known to date back to the ancient Egyptians. Archaeological evidence of fingerprints being used to at least associate a person with some event or transaction is also said to date back to ancient China, Babylonia and Assyria. But it was not until the end of the 19th century that the study of biometrics entered the realm of crime detection [Rattani, 2010]. Alphonse Bertillon, a French police clerk and anthropologist, pioneered a method of recording multiple body (anthropometric) measurements for criminal identification purposes. Known as ‘Bertillonage’ it was adopted by many police authorities worldwide during the 1890s, but soon became obsolete once it was recognized that people could indeed share the same physical measurements [Jain et al., 1999]. Meanwhile, the quest for a physical identifier that was unique to each individual gained significant ground when British anthropologist, Sir Francis Galton, worked on the principle that fingerprints were permanent throughout life, and that no two people had identical fingerprints. Galton calculated the odds of prints from two people being identical to be 1 in 64 billion and also identified characteristics – known as ‘minutiae’ – that are still used today to demonstrate that two impressions made by the same finger match. Minutiae are points of interest formed by the endings or forking of the friction skin ridges on each finger and are defined as one of the following:
• Ridge ending – the point at which a ridge terminates
• Bifurcation – the point at which a single ridge splits into two ridges
Arrangement of all the minutiae in terms of their location, orientation of ridge flow and type (i.e. ridge ending or bifurcation) that make an individual’s fingerprints unique. The flow of the friction skin ridges also form the patterns – the whorl, arch and loop of each finger – that were identified by Galton. Galton’s patterns provided the basis of the first fingerprint file established in 1891 by Juan Vucetich, an Argentine police officer, who became the first to use a bloody fingerprint to prove the identity of a murderer during a criminal investigation. In 1897, Sir Edward Henry, a British police officer serving as Inspector General of the Bengal Police in India, also developed an interest in the use of fingerprints for identifying criminals, even though the Bengal Police was at that time using Bertillonage. Based on Galton’s observations, Henry and colleagues established a modified classification system allowing fingerprints captured on paper forms using an ink pad to be classified, filed and referenced for comparison against thousands of others. By 1901, Henry’s fingerprinting system had been adopted in the UK by Scotland Yard and its use then spread through most of the world (the exception being South America, where the Vucetich system was used) to become a standard method of identity detection and verification in criminal investigations. [Rattani, 2010]

As reported by [Kent, 2005], advent of computers and digital technology in the 1970s, gave fingerprinting took on a new dimension. As a result, the UK’s fingerprint service now records 120,000 sets of fingerprints each year – a volume of records that was simply untenable before computerization.

Within a century, biometrics had evolved from tape measure, ink and pad techniques requiring vast manual filing and archiving resources, to an automated biometric digital scanning process using computerized storage, automated search and find/match techniques, plus extensive archiving and access systems with worldwide links. Such technology now provides for the capture and processing of biometrics information and has transformed fingerprinting techniques and procedures. [Dabbah et al. 2007] Explained that in the mid-1960s, the Royal Canadian Mounted Police (RCMP) adopted an automated video tape-based filing system allowing identification officers to make fingerprint comparisons on-screen. A similar ‘Video file System’ was installed at New Scotland Yard in 1977. Around the same time, the USA’s Federal Bureau of Investigation (FBI) was working with industry to build the first automated fingerprint card reader, which was implemented in 1974. Over the next five years, the FBI and other organizations in Canada, Japan and the UK, developed further core technologies including fingerprint matching hardware, plus automated classification software and hardware. By the early 1980s, this culminated in the automatic fingerprint identification system (AFIS), which allowed the automatic matching of one or many unknown fingerprints against an electronic database of known prints; another major forward step in the world of crime detection and international security. Such systems have since reduced the manual capture, store, search and match processes for fingerprints from weeks and months, to hours and minutes, and have led to AFIS being deployed by law enforcement agencies in Europe and worldwide. [Pfleeger et al., 2007]

Whenever biometric identification is discussed, people always want to know about its implications on personal privacy. If a biometric system is used, will the government, or some other group, be able to get personal information about the users? Biometric measures themselves contain no personal information. Hand shape, fingerprints or eye scans do not reveal name, age, race, gender, and health or immigration status. Although voice patterns can give a good estimation of gender, no other biometric identification technology currently used reveals anything about the person being measured. More common identification methods, such as a driver’s license, reveal name, address, age, gender, vision impairment, height and even weight! Driver’s licenses, however, may be easier to steal or counterfeit than biometric measures [Ratha et al., 2000].

Biometric measures can be used in place of a name, Social Security number or other form of identification to secure anonymous transactions. Walt Disney World sells season passes to buyers anonymously, then uses finger geometry to verify that the passes are not being transferred. Use of iris or fingerprint recognition for anonymous health care screening has also been proposed. A patient would use an anonymous biometric measure, not a name or Social Security number, when registering at a clinic. All records held at the clinic for that patient would be identified, linked and retrieved only by the measure. No one at the clinic, not even the doctors, would know the patient’s “real” (publicly recognized) identity [Derakhshani et al., 2003]. The real fear is that biometric measures will link people to personal data, or allow movements to be tracked. After all, credit card and phone records can be used in court to establish a person’s activities and movements. There are several important points to be made on this issue [Cole, 2001].

Databases of biometric images, and the numerical models or templates derived from them, are often encrypted with the intention of inhibiting their compromise in bulk. But compromise of individual measures cannot always be prevented by protecting databases and transmission channels because biometric measures, although privately owned, are sometimes publicly observable (e.g. a photo of a person’s face can be taken with a camera or downloaded from a web page). In general, biometric measures are not secret, even if it might be quite complicated to acquire usable copies (e.g. a retinal map) without the cooperation of the owner. When used for security, biometric characteristics are more like public keys than private keys. Unlike public keys, however, biometric measures cannot be revoked if stolen or mimicked. The industry is currently working on methods for “live-ness testing” and revocation, hoping to ameliorate these problems [Beaven, 2001].

With increase in the use of information technology and need to protect data, we have multiple accounts and passwords. We cannot remember so many passwords, so we end up using things we know to create them e.g. birthdays, wife/girlfriends name, dog, cat. e.t.c. It is easy to crack passwords, because most of our passwords are weak! If we create strong passwords (it might be meaningless to us) we will forget them! And there is no way to remember such multiple passwords, in the financial sectors, so many fraudulent transactions have been noticed, likewise so many life and properties have been tampered with by unauthorized personnel. Due to this fact, biometric security system is highly essential.

Comments

Post a Comment

Thanks for your comments.

Popular posts from this blog

CONCEPT OF INTELLIGENCE AS IT RELATE TO IFA DIVINATION

C++ Code that uses a do..while loop to compute and print the sum of the squares of a number obtained from the operator.

C++ Code that uses a while loop to compute and print the sum of the squares of a number obtained from the operator.