HOME

TheInfoList



OR:

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.


History

Biometric devices have been in use for thousands of years. Non-automated biometric devices have in use since 500 BC, when ancient
Babylonians Babylonia (; Akkadian: , ''māt Akkadī'') was an ancient Akkadian-speaking state and cultural area based in the city of Babylon in central-southern Mesopotamia (present-day Iraq and parts of Syria). It emerged as an Amorite-ruled state c. ...
would sign their business transactions by pressing their fingertips into clay tablets. Automation in biometric devices was first seen in the 1960s. The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI) in the 1960s, introduced the Indentimat, which started checking for fingerprints to maintain criminal records. The first systems measured the shape of the hand and the length of the fingers. Although discontinued in the 1980s, the system set a precedent for future Biometric Devices.


Types of biometric devices

There are two categories of biometric devices, # Contact Devices - These types of devices need contact of body part of live persons. They are mainly fingerprint scanners, either single fingerprint, dual fingerprint or slap (4+4+2) fingerprint scanners, and hand geometry scanners. # Contactless Devices - These devices don't need any type of contact. The main examples of these are face, iris, retina and palm vein scanners and voice identification devices.


Subgroups

The characteristic of the human body is used to access information by the users. According to these characteristics, the sub-divided groups are * Chemical biometric devices: Analyses the segments of the DNA to grant access to the users. * Visual biometric devices: Analyses the visual features of the humans to grant access which includes
iris recognition Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can b ...
,
face recognition A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and wo ...
, Finger recognition, and Retina Recognition. * Behavioral biometric devices: Analyses the Walking Ability and Signatures (velocity of sign, width of sign, pressure of sign) distinct to every human. * Olfactory biometric devices: Analyses the odor to distinguish between varied users. * Auditory biometric devices: Analyses the voice to determine the identity of a speaker for accessing control.


Uses


Workplace

Biometrics are being used to establish better and accessible records of the hour's employee's work. With the increase in "Buddy Punching" (a case where employees clocked out coworkers and fraudulently inflated their work hours) employers have looked towards new technology like fingerprint recognition to reduce such fraud. Additionally, employers are also faced with the task of proper collection of data such as entry and exit times. Biometric devices make for largely fool proof and reliable ways of enabling to collect data as employees have to be present to enter biometric details which are unique to them.


Immigration

As the demand for
air travel Air travel is a form of travel in vehicles such as airplanes, jet aircraft, helicopters, hot air balloons, blimps, gliders, hang gliders, parachutes, or anything else that can sustain flight.
grows and more people travel, modern-day airports have to implement technology in such a way that there are no long queues. Biometrics are being implemented in more and more airports as they enable quick recognition of passengers and hence lead to lower volume of people standing in queues. One such example is of the
Dubai International Airport Dubai International Airport ( ar, مطار دبي الدولي) is the primary international airport serving Dubai, United Arab Emirates, and is the world's busiest airport by international passenger traffic. It is also the nineteenth-busies ...
which plans to make immigration counters a relic of the past as they implement IRIS on the move technology (IOM) which should help the seamless departures and arrivals of passengers at the airport.


Handheld and personal devices

Fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
sensors can be found on mobile devices. The fingerprint sensor is used to unlock the device and authorize actions, like money and file transfers, for example. It can be used to prevent a device from being used by an unauthorized person.


Present day biometric devices


Personal signature verification systems

This is one of the most highly recognised and acceptable biometrics in corporate surroundings. This verification has been taken one step further by capturing the signature while taking into account many parameters revolving around this like the pressure applied while signing, the speed of the hand movement and the angle made between the surface and the pen used to make the signature. This system also has the ability to learn from users as signature styles vary for the same user. Hence by taking a sample of data, this system is able to increase its own accuracy.


Iris recognition system

Iris Iris most often refers to: *Iris (anatomy), part of the eye *Iris (mythology), a Greek goddess * ''Iris'' (plant), a genus of flowering plants * Iris (color), an ambiguous color term Iris or IRIS may also refer to: Arts and media Fictional ent ...
recognition involves the device scanning the pupil of the subject and then cross referencing that to data stored on the
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
. It is one of the most secure forms of authentication, as while fingerprints can be left behind on surfaces, iris prints are extremely hard to be stolen. Iris recognition is widely applied by organisations dealing with the masses, one being the
Aadhaar Aadhaar ( hi, आधार, ādhār, lit=base, foundation, bn, আধার) is a 12-digit unique identity number that can be obtained voluntarily by the citizens of India and resident foreign nationals who have spent over 182 days in twelve ...
identification carried out by the
Government of India The Government of India (ISO: ; often abbreviated as GoI), known as the Union Government or Central Government but often simply as the Centre, is the national government of the Republic of India, a federal democracy located in South Asia, c ...
to keep records of its population. The reason for this is that iris recognition makes use of iris prints of humans, which hardly evolve during one's lifetime and are extremely stable.


Problems with present day biometric devices


Biometric spoofing

Biometric spoofing is a method of fooling a biometric identification management system, where a counterfeit mold is presented in front of the biometric scanner. This counterfeit mold emulates the unique biometric attributes of an individual so as to confuse the system between the artifact and the real biological target and gain access to sensitive data/materials. One such high-profile case of Biometric spoofing came to the limelight when it was found that German Defence Minister,
Ursula von der Leyen Ursula Gertrud von der Leyen (; Albrecht, born 8 October 1958) is a German politician who has been serving as the president of the European Commission since 2019. She served in the Cabinet of Germany, German federal government between 2005 an ...
's fingerprint had been successfully replicated by
Chaos Computer Club The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters (called ''Erfa-Kreise'') in ...
. The group used high quality camera lenses and shot images from 6 feet away. They used a professional finger software and mapped the contours of the Ministers thumbprint. Although progress has been made to stop spoofing. Using the principle of pulse oximetry- the liveliness of the test subject is taken into account by measure of blood oxygenation and the heart rate. This reduces attacks like the ones mentioned above, although these methods aren't commercially applicable as costs of implementation are high. This reduces their real world application and hence makes biometrics insecure until these methods are commercially viable.


Accuracy

Accuracy is a major issue with biometric recognition.
Password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
s are still extremely popular, because a password is static in nature, while biometric data can be subject to change (such as one's voice becoming heavier due to puberty, or an accident to the face, which could lead to improper reading of facial scan data). When testing voice recognition as a substitute to
PIN A pin is a device used for fastening objects or material together. Pin or PIN may also refer to: Computers and technology * Personal identification number (PIN), to access a secured system ** PIN pad, a PIN entry device * PIN, a former Dutch de ...
-based systems,
Barclays Barclays () is a British multinational universal bank, headquartered in London, England. Barclays operates as two divisions, Barclays UK and Barclays International, supported by a service company, Barclays Execution Services. Barclays traces ...
reported that their voice recognition system is 95 percent accurate. This statistic means that many of its customers' voices might still not be recognised even when correct. This uncertainty revolving around the system could lead to slower adoption of biometric devices, continuing the reliance of traditional password-based methods.


Benefits of biometric devices over traditional methods of authentication

* Biometric data cannot be lent and hacking of Biometric data is complicated hence it makes it safer to use than traditional methods of authentication like passwords which can be lent and shared. Passwords do not have the ability to judge the user but rely only on the data provided by the user, which can easily be stolen while Biometrics work on the uniqueness of each individual. * Passwords can be forgotten and recovering them can take time, whereas Biometric devices rely on biometric data which tends to be unique to a person, hence there is no risk of forgetting the authentication data. A study conducted among
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Man ...
users found that at least 1.5 percent of Yahoo users forgot their passwords every month, hence this makes accessing services more lengthy for consumers as the process of recovering passwords is lengthy. These shortcomings make Biometric devices more efficient and reduces effort for the end user.


Future

Researchers are targeting the drawbacks of present-day biometric devices and developing to reduce problems like biometric spoofing and inaccurate intake of data. Technologies which are being developed are- * The
United States Military Academy The United States Military Academy (USMA), also known metonymically as West Point or simply as Army, is a United States service academy in West Point, New York. It was originally established as a fort, since it sits on strategic high groun ...
are developing an algorithm that allows identification through the ways each individual interacts with their own computers; this algorithm considers unique traits like
typing speed Words per minute, commonly abbreviated wpm (sometimes uppercased WPM), is a measure of words processed in a minute, often used as a measurement of the speed of typing, reading or Morse code sending and receiving. Alphanumeric entry Since words ...
, rhythm of writing and common spelling mistakes. This data allows the algorithm to create a unique profile for each user by combining their multiple behavioral and
stylometric Stylometry is the application of the study of linguistic style, usually to written language. It has also been applied successfully to music and to fine-art paintings as well. Argamon, Shlomo, Kevin Burns, and Shlomo Dubnov, eds. The structure of ...
information. This can be very difficult to replicate collectively. * A recent innovation by Kenneth Okereafor and, presented an optimized and secure design of applying biometric liveness detection technique using a trait randomization approach. This novel concept potentially opens up new ways of mitigating biometric spoofing more accurately, and making impostor predictions intractable or very difficult in future biometric devices. A simulation of Kenneth Okereafor's biometric liveness detection algorithm using a 3D multi-biometric framework consisting of 15 liveness parameters from facial print, finger print and iris pattern traits resulted in a system efficiency of the 99.2% over a cardinality of 125 distinct randomization combinations. The uniqueness of Okereafor's innovation lies in the application of uncorrelated biometric trait parameters including intrinsic and involuntary biomedical properties from eye blinking pattern, pulse oxymetry, finger
spectroscopy Spectroscopy is the field of study that measures and interprets the electromagnetic spectra that result from the interaction between electromagnetic radiation and matter as a function of the wavelength or frequency of the radiation. Matter wa ...
, electrocardiogram, perspiration, etc. *A group of Japanese Researchers have created a system which uses 400 sensors in a chair to identify the contours and unique pressure points of a person. This derrière
authenticator An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system or application by demonstrating that he or she has possession and control of an authenticator. I ...
, still undergoing massive improvements and modifications, is claimed to be 98% accurate and is seen to have application in anti theft device mechanisms in cars. *Inventor Lawrence F. Glaser has developed and patented technology which appears at first to be a high definition display. However, unlike displays with 2 dimensional pixel arrays, this technology incorporates pixel stacks, accomplishing a series of goals leading to the capture of a multi-biometric. It is believed to be the first man-made device which can capture 2 or more distinct biometrics from the same region of pixel stacks (forming a surface) at the same instant, allowing for the data to form a third biometric, which is a more complex pattern inclusive as to how the data aligns. An example would be to capture the finger print and the capillary pattern at precisely the same moment. Other opportunities exist with this technology, such as to capture kirlean data which assures the finger was alive during an event, or capture of bone details forming another biometric used with the others previously mentioned. The concept of stacking pixels to achieve increased functionality from less surface area is combined with the ability to emit any color from a single pixel, eliminating the need for RGB (RED GREEN BLUE) surface emissions. Lastly, the technology was tested with high power cadmium magnetics to check for distortion or other anomalies, as the inventor wanted to also embed magnetic emission and magnetic collection with this same surface technology, but without exhibiting any magnetic stripes on the surface. Devices, such as smart cards, can pass magnetic data from any orientation by automatically sensing what the user has done, and using data about where the card is when "swiped" or inserted into a reader. This technology can detect touch or read gestures at distance, without a user side camera and with no active electronics on its surface. The use of Multibiometrics hardens automated identity acquisition by a factor of 800,000,000 and will prove to be very difficult to hack or emulate.


References

{{Reflist Computer security Security Perimeter security