Comparative Study of Indian UID Aadhar and other Biometric Identification Techniques in Different Countries

Similar documents
Research Article. ISSN (Print)

Biometrics: primed for business use

BIOMETRICS - WHY NOW?

CPSC 467b: Cryptography and Computer Security

Government of Pakistan NADRA Headquarters, Islamabad

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

SUMMARY INTRODUCTION. xiii

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Recommended Practice 1701 l

Biometrics Technology for Human Recognition

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

ABC and Integrated Border management

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS

Immigration: Globalization. Immigration Practice Group Lex Mundi March 4-7, Rome, Italy

CASE STUDY 2 Portuguese Immigration & Border Service

International Biometrics & Identification Association

Introduction-cont Pattern classification

ORIGINAL PASSPORTS Escrito por peterhayye - 05/05/ :53

The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009.

Singapore's Automated Clearance using Biometrics

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

International Journal of Research and Review E-ISSN: ; P-ISSN:

Smart Voting System using UIDAI

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

The Angola National ID Card

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

(c) 2009, Government of Pakistan

SECURE REMOTE VOTER REGISTRATION

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

APPLICATION REVIEW A SILICON TRUST PUBLICATION. May Utilising the synergies between passports and eid cards

MARYLAND Maryland MVA Real ID Act - Impact Analysis

Biometrics & Accessibility

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

CRS Report for Congress

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems

Using Identification for Development: Some Guiding Principles

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

IDENTIFICATION FOR DEVELOPMENT (ID4D)

MoneyPad, The Future Wallet

Ad-Hoc Query on Residence Permit Cards. Requested by FI EMN NCP on 4 th May Compilation produced on 27 th September 2012

The National Identification System (NIDS) Version: Modification: Author: Date: 1.1 Prepared FAQs NIDS Project Team November 15/11/2017

NIDS FAQS. The facts you need to know

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Aadhaar Based Voting System Using Android Application

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

ID4D IDENTIFICATION FOR DEVELOPMENT

German Federal Ministry of the Interior 20 August / 6

Voting Corruption, or is it? A White Paper by:

VISION IAS

Identity Verification in Passport Issuance

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Assess the awareness level of people on Aadhaar Card as public wellbeing

Opinion 3/2012 on developments in biometric technologies

Training Module on UIDAI and Aadhaar UIDAI. Unique Identification Authority of India. Version: 1.4_ Release date:

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

CORPORATE HEADQUARTERS

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

The Open Biometrics Initiative and World Card

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.

Kane County Local Rule

M-Vote (Online Voting System)

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors

EVIDENCE OF IDENTIFICATION

... moves to amend H.F. No. 3959, the third engrossment, as follows:

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

GOVERNMENT SERVICES OFFICE Client Handbook

Compendium of Good Practices in Identity Management

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

The problems with a paper based voting

Biometric Technology for DLID

ICAO MRTD & emrtd Specifications: High Level Overview

INTRODUCTION BACKGROUND. Chapter One

Border Management and People Clearance. The Singapore Experience. Interpol - 5 th Special Meeting of the Counter-Terrorism Committee

REPORT VOLUME 6 MAY/JUNE 2017

Case Study. MegaMatcher Accelerator

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

ONE ID Identity Assurance Standard

New technologies applied to travel facilitation airport controls and visa issuance

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

(Approved December 30, 2010) AN ACT

Biometric Authentication

Transcription:

e-issn 455 139 Volume Issue 6, June 016 pp. 6 7 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Comparative Study of Indian UID Aadhar and other Biometric Identification Techniques in Different Countries Shraddha Thorat 1, Vikrant Bhilare 1, Bharati Vidyapeeth s Institute of Management and Information Technology, Navi Mumbai Abstract An initiative approach of Unique Identification Authority of India of the Indian government to create a unique ID for every Indian resident named as Unique Identification Number (UID) later renamed as Aadhar number. Many programs now aim to provide more robust official identity in every country and many of these programs use biometric identification techniques that distinguish physical or behavioral features, such as finger- prints or iris scan etc. Biometric technology is implemented in many different sectors that require accurate identification for security and convenience such as health care, banking, immigration, border control, election, and the finance sectors. By using biometrics techniques a person can be identified based on who the person is instead of what he/she has (card, token, key) or what he/she knows (password, PIN). This study is conducted to compare the Indian UID also known as Aadhar number with the identity of other countries. Here this paper present the study of country wise identity techniques with the biometric technique used in it. The paper give information about how biometric identification has been used for economic, political, and also for social purposes in developing countries. Index Terms Biometric Techniques, Database I. INTRODUCTION Biometrics refers to metrics which is mostly related to human characteristics. Biometric identifiers are the distinctive used to describe individual. Biometric identifiers are categorized as 1. physiological characteristics. behavioral characteristics Physiological characteristics are related to the body shape but they are not limited to fingerprint, palm veins, face recognition, iris recognition, palm print, retina, DNA where as [1] Behavioral characteristics are related to the pattern of persons behavior but also they are not limited to typing rhythm, gait and voice []. Any human physiological or behavioral trait can serve as biometric characteristics as long as it satisfies the following requirements: 1) Universality. Everyone should have it; ) Distinctiveness. No two should be the same; 3) Permanence. It should be invariant over a given period of time; 4) Collect ability @IJCTER-016, All rights Reserved 6

Fig. 1. Biometric Functionality There is always a need for an Identity Proof to ensure that one belongs to a particular country. Biometric ID cards apply to a number of different solutions, especially for those countries and individuals that might require greater security. Those country that work in highly competitive fields want biometric ID Cards as added security against illegal duplication and stolen or theft. Government sectors, Research institutions, and even schools and universities are well served by advanced ID Cards. Even biometric cards are implemented for children and are an excellent way to identify them easily and quickly, especially if they are young enough to forget information like their number and home address [3]. Most nations have robust identity for their citizens based on biometric technology which guarantees that the identification cannot be stolen, lost or forgotten. Many countries use biomet- rics include India, Brazil, Canada, Brazil, Australia, Germany, China, Greece, Italy, Iraq, Netherlands, New Zealand, Israel, Norway, Pakistan, Tanzania, United States, United Kingdom. Among low to middle income countries, roughly 1. billion already have received identification through a biometric identification program. National ID program of India called Aadhar is one of the largest biometric databases in the world. It is a biometric- based digital identity assigned for lifetime of person in the public domain, from anywhere, at any time, in a paperless way. Aadhar is designed to enable Indian government agencies to deliver a public service securely based on biometric data such as fingerprint, iris scan and face photo [8], along with demographic data including name, age, gender, address, Fig.. Fingerprint Biometric Techniques @IJCTER-016, All rights Reserved 63

Fig. 3. Countries : Applied Biometric VS Not Applied Biometric parent/spouse name, mobile number of a person. The data is then transmitted in encrypted form over the inter-net for authentication, which is aims to free it from the limitations of physical presence of a person at a given place. A great number of countries use biometric identity Cards and methods for identifying their citizens. Some of them are mentioned below briefly and these cards are mostly used by government. Spain: Spain country has already implemented a social se- curity card with a smart card chip and biometric for storing information. United Kingdom: Britain is in the process of establishing a national identity Card that uses biometrics to identify and verify its citizens. Their information is stored in a large central database which is accessible to sectors of the government. Netherlands: The Netherlands have an automated border crossing system with biometric iris recognition, photo, and also a smart card chip. Malaysia: Malaysia nation has also implemented a national ID that uses smart card chips, biometric fingerprint recognition, and photos. United States: The United States is also replicating the idea of a National ID Card system that depend on biometrics for Identification purposes. France: Like other countries, France is also encouraging the implementation of a National ID Card System that relies on Biometrics for the same purposes. Japan: Japans ID number system is a social platform that provides greater convenience for the public, improves adminis- trative efficiency, and establishes a fairer and more just society. Fig. 4. Physiological Biometrics Applied in Country The rest of the paper is structured as follows, Literature Sur- vey, Methodology and working and Findings of the proposed application and lastly Conclusion. A. Literature Survey This survey presents a brief overview of the countries applying biometrics for identification. This section outlines the particular contribution of biometrics across countries that have taken in developing nation-wide identity for their citizen. This survey presents a brief overview of the countries applying biometrics for identification. This section outlines the particular contribution of biometric across countries that have taken in @IJCTER-016, All rights Reserved 64

developing nation-wide identity for their citizen. In 1985, the shape and size of identity cards were standardized by ISO/IEC 7810. In 1988, Some modern identity documents are smart cards including difficult embedded integrated circuit that were standardized by ISO/IEC 7816. A number of studies have been carried out in several countries by prospective governments, users and vendors. The following is a sampling of these studies. Since 007 Multi-purpose national identity cards, carrying personal details and a unique identification number are issued to all citizens. Biometric data such as digital signatures and a fingerprint are contained in a microchip and embedded in the card. In addition to the holder s place and date of birth and a unique sixteen-digit National Identification Number.[1] Schouten and Jacobs [4] presented an evaluation of the Netherlands proposed implementation of a biometric passport which largely focusing on technical aspects of specific biometric technologies (such as face and fingerprint recognition) but it also making reference to international agreements and standards (such as ICAO and the EUs Extended Access Control) and discussed the privacy issue such as confidentiality. Debbarma [1] proposed an embedded Crypto Biometric authentication scheme for ATM banking system. In Pakistan, all adult citizens register for the Computerized National Identity Card (CNIC), with a unique number, at the age of 18. Computerized National Identity Card serves as an identification document to authenticate an identity of individual as the citizen of Pakistan. Earlier on, National Identity Cards (NICs) were issued to the Pakistan s citizens. Now government has shifted all existing records of National Identity Cards (NIC) to the central computerized database which is managed by NADRA. New Computerized National Identity Card have security features such as facial and finger print information and are machine readable. At the end of 013, Smart national identity cards were also made available. Fig. 5. Palm Biometric Techniques In Malaysia, the MyKad is the compulsory identity document for Malaysian citizens above the age of 1 which is introduce by the National Registration Department of Malaysia as one of four MSC Malaysia flagship applications[3] and a replacement for the Quality Identity Card (Kad Pengenalan Bermutu Tinggi), Malaysia, the first country in the world to use an identification card that incorporates both fingerprint biometric data and photo identification on an in-built computer chip embedded in a piece of plastic. Every Iranian permanent resident aged 15 and above must hold a valid National Identity Card (Persian: ) or at least have unique National Number from any of the local Vital Records branches of @IJCTER-016, All rights Reserved 65

the Iranian Ministry of Interior. NID cards is compulsory for many things in Iran and Iranian Missions abroad (e.g., obtaining a passport, driver s license, any banking procedure, etc.) Fig. 6. Countries : Face Biometric Technique In 005, Nigeria first introduced a National Identity Card but its adoption back then was not widespread and limited. Nigeria is now in the process of introducing a new biometric ID Card complete with a Smart Card and other security features. The National Identity Management Commission is the Federal Government Agency responsible for the beginning of these new cards, as well as manages the new National Identity Database. The Government of Nigeria announced in April 013 that all subsequent elections will require that voters will only be eligible to vote only if they have a NIMC issued Identity Card. The Central Bank of Nigeria is also instructing banks to request for a National Identity Number for any citizen to access bank account in Nigeria. A study was carried out in the UK in April 004 to assess record and processes testimony of user attitudes and experiences to incorporate biometric information into new passports and the proposed national identity card.10,016 users joined in the study which used iris, facial and fingerprint biometrics. To gather data six static and one mobile center in different regions of the UK were used. The study covered the testing of the use of biometrics through a simulated application process; assessment of customer perceptions and reactions; testing fingerprint and iris biometrics for testing and one-to- many identification; and iris, facial and fingerprint biometrics for one-to-one verification. However, the output of this study revealed high enrollment times: on average 8 minutes and 15 seconds, and 10 minutes and 0 seconds for disabled participants. The UKs NHS (National Health Service) have adopted the use of biometric authentication with about 1,000 employees enabled with fingerprint recognition technology in over 60 hospitals, and with over 30,000 employees able to access patients records. In a recent ISL Biometrics assessment in a UK Bank, 91 per cent of clients seemingly favored biometrics over user name/password authentication systems. Fig. 7. Iris Biometric Techniques In the USA, United Bank provides a fingerprint sensor for their clients to access their account instead of using a user name and password. Westpac is reported to be carrying out an assessment of biometric security technology that would issue clients with biometric fingerprint devices to @IJCTER-016, All rights Reserved 66

allow them to access their accounts on-line. JCB Japan, a financial services organization, undertook a biometric authentication trial using fingerprint authentication for mobile access to JCBs on-line card member account inquiry service. According to the Civil Aviation Authority of Singapore, a project at Singapore s Changi Airport known as Fully Automated Seamless Travel (FAST) is expected to decrease traveler processing time from 15 minutes or longer to two minutes by using fingerprint and facial recognition equipment. II. METHODOLOGY As stated earlier, around 100 countries made identity card compulsory. In these country, the card must be shown by au- thorized personnel on demand under specified circumstances. This card may only become compulsory at a certain age. This section presents the Storage and Structure of Biometric ID card of some countries. India: Biometric ID card: Aadhar Number (UID) Aadhaar was constituted under the Planning Commission. The Aadhaar number was established as a single proof of identity and address for resident in India that can be used to authenticate the identity of an individual in transactions with organizations that have adopted the Aadhar number. The scheme has been promoted as a tool for reducing fraud, theft cases in the public distribution system and enabling the government to deliver better benefits for public. The Aadhaar number a.k.a. is available to any resident of India. Storage and Implementation: Fig. 8. UID Database The UID scheme has been visualized as being brought into existence via the Unique Identification Authority (UIDAI) Bill 010 which has not been passed. Thus the project has been implemented in pilot phases across Platforms and States. The UIDAI is the soul body that issues Aadhaar numbers a.k.a. UID. Enrolling and Registrars agencies are important for receiving and processing enrollments into the UID scheme. Data and Aadhar generated at multiple sources is stored in the CIDR where CIDR is a centralized database and processed in the data warehouse: At UIDAI, data generated at multiple sources will come to the CIDR (Central ID Repository), through an on-line mechanism. There can be some exceptional sources, like Resident consumer surveys or Contact center that will not feed into the Data center directly. Data is then processed using Business Intelligence tools in the Data Warehouse and converted into forms that can be shared and accessed easily. Data that is stored in the CIDR include letter delivery, processing, training, authentication, enrollments and data from contact centers. @IJCTER-016, All rights Reserved 67

Comparison of Countries applying Biometrics Nation Name Biometric identity Type Biometric Technique Used Type of Biometric Used Number of Biometric Technique Used India Aadhar Number (UID) It is a biometrics-based digital identity. Based on biometric data (fingerprint, iris scan and face photo), along with demographic data of a person. 3 United States Social Security Number (SSN) Based on Facial (image-based) biometric data and records all fingerprint and a picture of foreign airline passengers visiting the U.S. United National Insurance Fingerprint Scanner used for ID. Kingdom Number Single (Physiological 1 Netherlan Identity card and automated border crossing system ID cards include the holder s fingerprints, iris recognition. Electronic chip containing the personal details of the holder and a digitized passport photograph. New Zealand France Malaysia Singapore Spain Smart Gate French National Identity Card National Identity Card(MyKad) National Registration Identity Card Social Security Card The system uses advanced facial software which compares your face with the digital copy of your photo in epassport chip fingerprints and digitized faces. Biometric fingerprint recognition, smart card chips, and photos. Based on fingerprint data which is placed on the back of card along with NRIC number and its bar code. Based on Facial (image-based) biometric data. Single (Physiological Single (Physiological and be- havioral Char- acteristics) Single 1 Single (Physiological 1 1 1 Brazil Cdula de Identidade (Identity Card) Brazilian ID cards digitized using a D bar code with information that can be matched against its owner off- line. This D bar code encodes a color photo, a signature, two finger- prints, and other citizen data. Multiple (Physiological and behavioral Germany Personalausweis (Identity Card) Japan My Number Canada Identity card Based on fingerprint and facial recognition techniques. 1-digit number, assign to every citizen based on fingerprint identification system and signature. This ID follows finger prints and iris biometric techniques. @IJCTER-016, All rights Reserved 68

Pakistan Computerized Based on 13-digit NIC numbers as well Or Smart National as Facial and Fingerprint biometric Identity Card technique used China Resident Identity Card Again this ID card based on fingerprint identification Single (Physiological 1 This data is used to serve core objectives of Aadhaar project such as: (1) Enrollment application: This application is used to receive new client enrollment requests and to capture new data. After verifying the individual request, the registrars enroll the data that is received from various logistic providers in magnetic media. Then this data is uploaded to Aadhaar database post-validation. The Registrars include departments of state and ministries and central governments, banks and other telephone companies, financial institutions, etc. The Aadhaar number is generated for the request, once this process is done. () Authentication application: This application will conduct on-line authentication of identity (demographic and biometric information).here on-line authentication is done by querying the Aadhaar database that responds to such queries in the form of Invalid/valid type of response. Also, de-duplication of biometric data is done by assigning a score of scaled data fusion to each duplicate record. This score is in the range of 0 to 100, where 0 indicating the least level of similarity and 100 as the highest level of similarity. (3) Fraud detection application: This application detects identity fraud by catching fraud scenarios. Such as registration for non-existent applicants, misrepresentation of information, multiple registration attempts by same applicant, user impersonation, etc. (4) Administrative application: This application provides user management, role-based access control, automation and status reporting. (5) Analytics and reporting application: This application provides authentication and enrollment statistics for both partners and public. (6) Information portal provides administrative access for partners, internal users and general information/ grievance / reports requests details to public. (7) Contact center interface application: provides functionality such as query and status update. (8) Logistics interface application: This application inter- faces with the logistics provider for delivery management and letter printing. United States Biometric ID card: Social Security Number (SSN) The Social Security Act takes initiative for the creation of a record keeping scheme - the SSN. Originally, the SSN was used to track an individuals earnings in the Social Security system. In 1943 the number was adopted across Federal agencies. Today the SSN serves as a number for tracking individuals in the social security system and as one form of identification for different businesses and services. Alone, the SSN card does not serve proof of identity, citizenship, and it doesn t have the ability to store information as well as it cannot be used to transact with. In the United States, a Selective Service Number (SSN) must be applied for by all male citizens turning age 18. An op- tional national identity number is the Social Security number (SSN), a ninedigit number issued to U.S. citizens, permanent residents, and temporary (working) residents. Its @IJCTER-016, All rights Reserved 69

purpose was to identify individuals for the purposes of Security, but now it is also used to track individuals for the purpose of taxation. There is no legal requirement to have a SSN if it is not required for taxation purposes or Social Security, but in practice SSN is required for many other purposes, for instance, apply for a driving license or to open a bank account. Therefore SSN has become a de facto national identification number. The SSN program brought into existence via the Social Security Act and officially rolled out while eventually being adopted across Federal Departments. The Social Security Agency is the soul body in the US which is responsible to receive and process applications for SSN and also for issues SSN numbers. Storage and Implementation: SSN and its applications are stored in the (Numident) Numerical Identification System. It contains the name of the applicant (Individual), date of birth and place, and other related information. The Numident file contains all Social Security numbers since they first were issued in 1936. The numident is a centralized database containing the individuals original SNN and its application and any re-application for the SSN. All information and application stored in the Numident is protected under the Privacy Act. Individuals may request records of their own personal information stored in the Numident. At the organizational level, Federal agencies and private entities collect the SSN for a specific service to store the number. France Biometric ID card: National Identity Card The French national identity card (French: Carte nationale didentit scurise or CNIS) is an identity document consisting of laminated plastic card bearing a name, photograph and address of applicant. This identity card is issued by the local prfecture, sous-prfecture, mairie (in France) free of cost. For this card fingerprint of the holder is taken which is stored in paper files and which can only be accessed by a judge in defined circumstances. A central database duplicates the information on the card, but strict laws limit access to the information and prevent it being linked to other records or databases. The French national identity card can be used as an identification document in France in situations such as identifying yourself to government agencies, opening a bank account, proving your identity and regular immigration status to a law enforcement official etc. Prior to 1 January 014, French national identity cards were issued with a maximum period of validity of 10 years. On 1 January 014, the period of validity of new cards issued to adults was increased from 10 to 15 years. United Kingdom Biometric ID card: National Insurance Number The National Insurance number is a number used in the United Kingdom in the administration of the social security system or National Insurance. It is also used for tax system purposes in the UK. This number is described by the UK gov- ernment as a personal account number A National Insurance number, generally called an NI Number (NINO), is used to administer state benefits and is not considered proof of identity. As it is the only number that is unique to each individual, does not change during the course of the person s lifetime, and The number is stylized as LL NN NN NN L, for example AA 01 3 44 B. Each baby born in the England is issued a National Health Service number, taking the form NNN-NNN-NNNN, for example 1-76-957 (the last number being a check digit). They were formerly of the style LLLNNL NNN, for example KWB91M 34,.Babies born in Scotland are issued a CHI (Community Health Index) number, taking the form DDMMYY-NNNN, with the DDMMYY representing their date of birth and a four digit unique number thereafter (e.g. someone born on 1 January 010, would have the number 010110-NNNN, with the four digit number allocated upon entering newborn details on to the local health board s patient administration system). The third N is @IJCTER-016, All rights Reserved 70

even for females and odd for males. Singapore Biometric ID card: National Registration Identity Card In Singapore the National Registration Identity Card (NRIC) is issued to Singapore citizens and permanent residents. Permanent residents (PR) are issued with NRIC number similar to citizens. The NRIC contains a unique number that identifies the person holding it, and is used for almost all identification purposes in Singapore, including authentication when accessing the Singapore governments web portal. Citizens and permanent residents are issued with identity number starts with prefix S (born before 000) and T (born in or after year 000), followed with a 7-digit number and a checksum alphabet. For citizens and permanent residents born after 1968, the first two digits of the 7-digit number indicate their birth year. Long-term pass holders (e.g. people holding work permits, employment passes or student passes) are issued a similarly formatted Foreign Identification Number (FIN) on their long- term passes, with prefix F (registered before year 000) and G (registered in or after year 000). South Africa Biometric ID card: Identity Card In the Republic of South Africa, every citizen must apply for an Identity Document from the age of 16 years. The ID number is already allocated at the time the birth certificate is generated and required for child passport applications. This passport-size document contains only 8 pages - the first page containing the national identification number (also in bar- coded format), name of bearer, district or country of birth, as well as a photograph of the bearer. The other pages are used for recording of voting participation, a page for driver s license information (although it is no longer used since the introduction of plastic card type licenses), as well as pages for fire arms licenses (also plastic card type now). The document is required to apply for a passport, car learner s license (over 17), motorcycle learner s license (over 16), driving license (over 18), and motorcycle license (over 16 or 18 depending on cc) and to vote (over 18). The Identity Document is not used for international travel purposes (a separate passport is issued) but usually is acceptable photographic identification for internal flights, and mainly serves as proof of identification. Some authorities may accept the driver s license as proof of identity, but the Identity Document is the only universally accepted form of identification. III. CONCLUSION Those countries those have not use biometrics for identification should use it. Further they should use multiple Biometrics that has a combination of behavioral and Physical characteristics for robustness. REFERENCES [1] N.K. Ratha, S. Chikkerur, J.H. Connell and R.M. Bolle. Generating Cancelable Fingerprint Templates, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 9, no. 4, 007 [] B, Schouten and B. Jacobs, Biometrics and their use in e-passport, Image and Vision Computing vol. 7, pp. 30531. 009 [3] Wikipedia the free encyclopedia, Bio- metrics, Downloaded March 0, 01 from http://en.wikipedia.org/wiki/biometrics. [4] B, Schouten and B. Jacobs, Biometrics and their use in e-passport, Image and Vision Computing vol. 7, pp. 30531. 009. [5] Daisuke Miyamoto Shinji Nakamura and Misa Hara, Future Outlook for Japans ID Number System, Hitachi Review Vol. 65 (016), No. 1 [6] Flynn PJ (008) Biometric databases. In: Handbook of biometrics. Springer, Heidelberg [7] Jain AK, Ross A, Pankanti A (006) Biometrics: a tool for information security. IEEE Trans Inform Forensics Sec @IJCTER-016, All rights Reserved 71

1:15143 [8] Jain, A.K.; Ross, A., Prabhakar, S. An Introduction to Biometric Recognition. IEEE Trans. Circuits Syst. Video Technol., 14, 4-0, 004. [9] Mihee Lee, Haipeng Shen, Jianhua Z. Huang, and J. S. Marron, Biclustering via Sparse Singular Value Decomposition, Biometrics 66, 10871095, December 010. [10] Face databases ATT databases, www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html [11] Face FERET Databases - http://www.face- rec.org/databases/ [1] Fingerprint Databases - http://www.advancedsourcecode.com/fingerprintdatabase.asp @IJCTER-016, All rights Reserved 7