Biometrics & Accessibility

Similar documents
BIOMETRICS - WHY NOW?

Introduction-cont Pattern classification

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

CPSC 467b: Cryptography and Computer Security

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Biometrics: primed for business use

Biometric Technology for DLID

Research Article. ISSN (Print)

Biometrics Technology for Human Recognition

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Biometric Authentication

International Journal of Research and Review E-ISSN: ; P-ISSN:

Recommended Practice 1701 l

The Angola National ID Card

SUMMARY INTRODUCTION. xiii

International Biometrics & Identification Association

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Background and Status of the Tanzania National ID System

Consumer Attitudes About Biometric Authentication

Opinion 3/2012 on developments in biometric technologies

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

CASE STUDY 2 Portuguese Immigration & Border Service

BIOMETRICS IN A HUMANITARIAN CONTEXT

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

Prepared by Space and Naval Warfare Systems Center Atlantic

Here s our nickel tour of biometrics well, okay, that d be a dollar or

(Approved December 30, 2010) AN ACT

Smart Voting System using UIDAI

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

Case Study. MegaMatcher Accelerator

The Open Biometrics Initiative and World Card

The Perception of Biometric Technology: A Survey

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

The Biometric Devil's in the Details

INTRODUCTION BACKGROUND. Chapter One

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

ABC and Integrated Border management

International Organization for Migration (IOM) Identity Management and Biometrics

Child Check In Quick Start Guide. v 9.5. Local: (706) Atlanta: (404) Toll Free: (866)

CRS Report for Congress

Biometrics from a legal perspective dr. Ronald Leenes

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

BIOMETRICS 101. Facial Recognition in Oregon

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

TABLE OF CONTENTS. Executive Summary. Introduction. Public Safety Border Control & Law Enforcement

Position Paper IDENT Implementation for U.S. VISIT

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa

European Biometrics Portal. Biometrics in Europe. Trend Report

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards

E-gate case study: The German EasyPASS Project

fraud prevention done right

Data Breach Charts. November 2017

Marc R. Rosenblum. MPI Webinar July 30, E-Verify: Analysis and Recommendations for Reform

Council of the European Union Brussels, 30 January 2017 (OR. en)

German Federal Ministry of the Interior 20 August / 6

Biometrics in the Workplace. The Promise and Peril of It s Use

Voting Corruption, or is it? A White Paper by:

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead

Ten Years of Reforms Structural impact

New York State Photo Identification Guidelines

SECURE REMOTE VOTER REGISTRATION

Biometrics how to put to use and how not at all?

Government of Pakistan NADRA Headquarters, Islamabad

REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN HEIDI GILERT AND LOIS AUSTIN. The Cash Learning Partnership

Cross-Border & Regional Identity Management

NC General Statutes - Chapter 14 Article 60 1

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

CITY OF LAKE WORTH, TEXAS APPLICATION FOR EMPLOYMENT An Equal Opportunity Employer

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Singapore's Automated Clearance using Biometrics

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim

MoneyPad, The Future Wallet

Biometrics how to put to use and how not at all?

1. Electronic means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.

Biometrics How to Put to Use and How Not at All?

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS

Young Adult Perception and Acceptance of Biometric Technology

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

The problems with a paper based voting

Identity Documents Act

NASS Support for the Revised National Electronic Notarization Standards

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal

Policy Framework for the Regional Biometric Data Exchange Solution

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI)

The United Nations study on fraud and the criminal misuse and falsification of identity

Transcription:

Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com

Biometrics Research Group, Inc. Biometrics Research Group is a leading research vendor and publisher.

What are Biometrics? Biometrics are measurable physical and behavioral characteristics that enable the establishment and verification of an individual s identity.

Biometric Modalities Fingerprint Recognition Iris Recognition Hand Geometry Voice Recognition Retinal Scan Technology Facial Thermography Rapid DNA & DNA Profiling Gait Recognition Gesture Recognition

Biometric Marketplace Global biometrics market will grow to US$15 billion by 2015 from its 2012 estimated value of US$7 billion.

Biometric Marketplace

Biometric Marketplace Fingerprint recognition was valued at US$5 billion in 2012 and is expected to reach nearly US$10 billion in 2015.

Biometric Marketplace Face, iris, vein, and voice recognition biometric technologies together form the second largest segment. This sector is worth an estimated US$2 billion in 2010 and is expected to reach US$5 billion in 2015.

Biometric Marketplace Face, iris, vein, and voice recognition biometric technologies together form the second largest segment. This sector is worth an estimated US$2 billion in 2010 and is expected to reach US$5 billion in 2015.

Biometric Marketplace Biometrics has mainly be used by government for security and border control applications. Traditional use of biometric technologies by government have been a contributing factor to myths about biometric technology. General skepticism about government can be considered a major factor that drives skepticism and myths about biometrics.

Biometric Myths Biometrics are a new concept. Myth. Physical size, face shape, complexion and other noticeable features have been used to identify people for thousands of years.

Biometric Myths Use of biometrics can lead to injury. Myth. Eye scan technology and hardware do not use organ-damaging lasers.

Biometric Myths Biometrics authenticates identity. Myth. Biometrics do not authenticate a specific identity, but only the person "enrolled" in a system.

Biometric Myths Biometric data is ubiquitous. Myth. The world as depicted in the movie "Minority Report" simply does not exist. Fingerprint data captured by a commercial fingerprint system does not automatically and instantaneously end up in law enforcement databases.

Biometric Myths Stolen body parts can be used for biometric authentication. Myth. With most biometric technologies, an element of "aliveness" detection is required.

Biometric Myths Biometrics are infallible. Myth. Biometric technologies are subject to error. i.e., Smaller fingerprint sensors can be inaccurate. i.e., Skin conditions and ageing can affect performance. i.e., Certain biometric modalities will perform poorly or not at all for people with disabilities.

Biometric Reality Biometrics, like all other technologies, can fail. Academic Shoshana Magnet notes that technical literature often points out that biometric technology frequently malfunction. Magnet argues that biometric system fail because rendering human bodies in biometric code falsely assumes that people s bodies are always the same and unchanging over time. By focusing on moments when biometrics fail, Magnet demonstrates that they fail more often when women, people of color and people with disabilities are subjected to their use.

Biometric Reality Magnet has argued in previous academic articles with colleagues that despite biometrics and other security systems being marketed as objective and neutral, they in fact, only reinforce existing social inequalities. Such social inequalities include physical and mental disabilities. For example, certain eye-based biometrics will not work with the blind.

Accessibility Considerations It should be a fundamental tenet of the design, engineering and manufacture of all the components of the enrolment process that consideration should be given at each stage of the development to the accessibility requirements of disabled people.

Accessibility Considerations Consideration should be taken to make the processes of enrolment and verification barrier free, in order to make processes accessible, especially to disabled persons.

Accessibility Considerations In regard to facial, iris or fingerprint scanning, the pattern recognition software or optical scanner should be capable of compensating for distortion caused by a disabled person, i.e., keeping their head or hands high still in one position for long enough. The equipment should compensate to be able to produce an acceptable recognition of the intended biometric of the individual.

Accessibility Considerations Instead of using a single biometric modality for disabled persons, use multi biometric solutions such as two Factor Authentication (2FA)

What is 2FA? Two-factor authentication adds a second level of authentication to an account log-in. 2FA requires the user to have two out of three types of credentials before being able to access an account: Something you know, such as a Personal Identification Number (PIN), password, or a pattern Something you have, such as an ATM card, phone, or fob Something you are, such as a biometric like a fingerprint or voice print

2FA: Emerging security approach Two-factor authentication allows for either replacement or augmentation of passwords.

2FA Market Size The global multi-factor authentication market is expected to reach US$5.45 billion by 2017, at a compound annual growth rate (CAGR) of 17.3 percent from 2012 to 2017. Arguably, a portion of 2FA market growth will be driven by technological innovation seeking to make biometric modalities more accessible. Such changes will be initiated by legislation and regulation in North America and European Union member states.