This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Similar documents
CPSC 467b: Cryptography and Computer Security

Research Article. ISSN (Print)

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Introduction-cont Pattern classification

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Opinion 3/2012 on developments in biometric technologies

SUMMARY INTRODUCTION. xiii

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics & Accessibility

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

International Biometrics & Identification Association

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

The Open Biometrics Initiative and World Card

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

International Journal of Research and Review E-ISSN: ; P-ISSN:

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

Case Study. MegaMatcher Accelerator

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

BIOMETRICS - WHY NOW?

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Recommended Practice 1701 l

Background and Status of the Tanzania National ID System

Biometric Technology for DLID

SECURE REMOTE VOTER REGISTRATION

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

Biometric Authentication

Biometrics Technology for Human Recognition

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

The problems with a paper based voting

Implementation of aadhar based voting machine using

Emerging Biometric Data Risks

COUNCIL OF THE EUROPEAN UNION. Brussels, 11 November /04 LIMITE VISA 203 COMIX 684 NOTE

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

Here s our nickel tour of biometrics well, okay, that d be a dollar or

Biometrics from a legal perspective dr. Ronald Leenes

BIOMETRICS 101. Facial Recognition in Oregon

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Smart Voting System using UIDAI

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Biometrics Glossary. Introduction. Glossary Terms

Policy Framework for the Regional Biometric Data Exchange Solution

Biometrics how to put to use and how not at all?

Subpart A General Provisions

Biometrics: New Laws and Potential Litigation Implications

Prepared by Space and Naval Warfare Systems Center Atlantic

Secured Electronic Voting Protocol Using Biometric Authentication

SMS based Voting System

EFFICACIOUS ELECTRONIC VOTING USING BIOMETRY

Biometrics: primed for business use

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

IMPORTANT PLEASE READ CAREFULLY PORTFOLIO END USER AGREEMENT

Biometrics how to put to use and how not at all?

E- Voting System [2016]

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

(Approved December 30, 2010) AN ACT

The Angola National ID Card

The Upcoming International Biometric Vocabulary Standard

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Singapore's Automated Clearance using Biometrics

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics

MoneyPad, The Future Wallet

INTRODUCTION BACKGROUND. Chapter One

Addressing the Challenges of e-voting Through Crypto Design

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Government of Pakistan NADRA Headquarters, Islamabad

M-Vote (Online Voting System)

Additional Case study UK electoral system

TWIC IMPLEMENTATION TALKING POINTS April 26, 2007

CRS Report for Congress

The Biometric Devil's in the Details

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

EVIDENCE OF IDENTIFICATION

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Marc R. Rosenblum. MPI Webinar July 30, E-Verify: Analysis and Recommendations for Reform

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Biometrics in the Workplace. The Promise and Peril of It s Use

DTIq felect, AD-A NAVAL POSTGRADUATE SCHOOL THESIS Monterey, California. % C - AM 1 r9 D SIGNATURE VERIFICATION FOR ACCESS CONTROL

Processing for Security Systems

European Biometrics Portal. Biometrics in Europe. Trend Report

MARYLAND Maryland MVA Real ID Act - Impact Analysis

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

BIOMETRIC AUTHENTICATION SYSTEMS AND SERVICE DELIVERY IN HEALTHCARE SECTOR IN KENYA

Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

Assess the awareness level of people on Aadhaar Card as public wellbeing

Voting Corruption, or is it? A White Paper by:

Smarter European borders through an increased use of biometric recognition

News Release May 11, 2010

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

EMN FOCUSSED STUDY Establishing Identity for International Protection: Challenges and Practices. National Contribution from Sweden

Biometrics. Version Prepared by: Michael Davis- Hannibal. Softcon Software Control Services (Pty) Ltd.

ABC and Integrated Border management

Achieving Interoperability

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa

Transcription:

Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities such as physiological, behavioral, and combination of both modalities. This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Audience This tutorial is prepared for the students at beginner level who aspire to understand biometrics and various biometric systems. It would also be useful for enthusiasts in the fields of Electronics, IT security, and Biology. Prerequisites Biometrics is an advanced concept and we cannot claim that a reader can sail through this tutorial without having any grip over some basic knowledge of Computer Science, and Mathematics. Disclaimer &Copyright Copyright 2015 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at contact@tutorialspoint.com. i

TableofContents About the Tutorial...i Audience...i Prerequisites...i Disclaimer & Copyright...i Table of Contents...ii 1. BIOMETRICS OVERVIEW... 1 What is Biometrics?...1 What is a Biometric System?...1 Evolution of Biometrics...1 Why Biometrics is Required?...2 Basic Components of a Biometric System...3 General Working of a Biometric System...4 Biometrics Terminology...5 Application Areas of Biometrics...5 2. BIOMETRIC MODALITIES... 6 Types of Biometric Modalities...6 3. PHYSIOLOGICAL MODALITIES... 8 Fingerprint Recognition System...8 Facial Recognition System...9 Iris Recognition System...10 Hand Geometry Recognition System...11 Retinal Scanning System...12 DNA Recognition System...13 4. BEHAVIORAL MODALITIES... 15 Gait Recognition...15 ii

Signature Recognition System...16 Keystroke Recognition System...17 5. VOICE RECOGNITION... 19 Voice Recognition System...19 Difference between Voice and Speech Recognition...20 6. MULTIMODAL BIOMETRIC SYSTEMS... 21 Why Multimodal Biometrics is Required?...21 Working of Multimodal Biometric System...21 Design Issues with Multimodal Biometric Systems...22 7. BIOMETRIC MODALITY SELECTION... 23 Criteria for Effective Biometric System...23 Comparison of Various Biometric Modalities...24 8. BIOMETRIC SYSTEM PERFORMANCE... 25 Performance Measurements...25 9. PATTERN RECOGNITION AND BIOMETRICS... 26 Pattern Recognition in Biometrics...26 Components of Pattern Recognition...26 Popular Algorithms in Pattern Recognition...27 10. SIGNAL PROCESSING AND BIOMETRICS... 28 What is a Signal?...28 Signal Processing in Biometrics...28 Digital Signal Processing Systems (DSPs)...28 DSP in Biometrics...29 11. BIOMETRICS AND IMAGE PROCESSING... 30 Requirement of Image Processing in Biometrics...30 iii

12. BIOMETRIC SYSTEM SECURITY... 32 Biometric System Vulnerability...32 Risks with Biometric System Security...32 Biometric System Security...33 Criteria for Generating Biometric Templates...34 iv

1. BIOMETRICS OVERVIEW The term Biometrics is composed of two words: Bio (Greek word for Life) and Metrics (Measurements). Biometrics is a branch of information technology that aims towards establishing one s identity based on personal traits. Biometrics is presently a buzzword in the domain of information security as it provides high degree of accuracy in identifying an individual. Whatis Biometrics? Biometrics is a technology used to identify, analyze, and measure an individual s physical and behavioral characteristics. Each human being is unique in terms of characteristics, which make him or her different from all others. The physical attributes such as finger prints, color of iris, color of hair, hand geometry, and behavioral characteristics such as tone and accent of speech, signature, or the way of typing keys of computer keyboard etc., make a person stand separate from the rest. This uniqueness of a person is then used by the biometric systems to: Identify and verify a person. Authenticate a person to give appropriate rights of system operations. Keep the system safe from unethical handling. Whatis a Biometric System? A biometric system is a technology which takes an individual s physiological, behavioral, or both traits as input, analyzes it, and identifies the individual as a genuine or malicious user. EvolutionofBiometrics The idea of biometrics was present since few years from now. In 14 th century, China practiced taking finger prints of merchants and their children to separate them from all others. Fingerprinting is still used today. In the 19 th century, an Anthropologist named Alphonse Bertillion developed a method (named Bertillionage) of taking body measurements of persons to identify them. He had realized that even if some features of human body are changed, such as length of hair, weight, etc., some physical traits of body remain unchanged, such as length of fingers. This method diminished quickly as it was found that the persons with same body measurements alone can be falsely taken as one. Subsequently, Richard Edward Henry from Scotland Yard developed a method for fingerprinting. The idea of retinal identification was conceived by Dr. Carleton Simon and Dr. Isadore Goldstein in 1935. In 1976, a research and development effort was put in at EyeDentify Inc. The first commercial retina scanning system was made available in 1981. 1

Iris recognition was invented by John Daugman in 1993 at Cambridge University. In 2001, Biometrics Automated Toolset (BAT) was introduced in Kosovo, which provided a concrete identification means. Today, biometric has come up as an independent field of study with precise technologies of establishing personal identities. WhyBiometrics isrequired? With increasing use of Information Technology in the field of banking, science, medication, etc., there is an immense need to protect the systems and data from unauthorized users. Biometrics is used for authenticating and authorizing a person. Though these terms are often coupled; they mean different. Authentication (Identification) This process tries to find out answer of question, Are you the same who you are claiming to be?, or, Do I know you? This is one-to-many matching and comparison of a person s biometrics with the whole database. Verification This is the one-to-one process of matching where live sample entered by the candidate is compared with a previously stored template in the database. If both are matching with more than 70% agreeable similarity, then the verification is successful. Authorization It is the process of assigning access rights to the authenticated or verified users. It tries to find out the answer for the question, Are you eligible to have certain rights to access this resource? Shortcomings of Conventional Security Aids The conventional methods of information system security used ID cards, passwords, Personal Identification Numbers (PINs), etc. They come with the following disadvantages: They all mean recognizing some code associated with the person rather than recognizing the person who actually produced it. They can be forgotten, lost, or stolen. They can be bypassed or easily compromised. They are not precise. In such cases, the security of the system is threatened. When the systems need high level of reliable protection, biometrics comes to help by binding the identity more oriented to individual. 2

BasicComponents ofabiometricsystem In general, a biometric system can be divided into four basic components. Let us see them briefly: Input Interface (Sensors) It is the sensing component of a biometrics system that converts human biological data into digital form. For example, A Metal Oxide Semiconductor (CMOS) imager or a Charge Coupled Device (CCD) in the case of face recognition, handprint recognition, or iris/retinal recognition systems. An optical sensor in case of fingerprint systems. A microphone in case of voice recognition systems. Processing Unit The processing component is a microprocessor, Digital Signal Processor (DSP), or computer that processes the data captured from the sensors. The processing of the biometric sample involves: Sample image enhancement Sample image normalization Feature extraction Comparison of the biometric sample with all stored samples in database. Database Store The database stores the enrolled sample, which is recalled to perform a match at the time of authentication. For identification, there can be any memory from Random Access Memory (RAM), flash EPROM, or a data server. For verification, a removable storage element like a contact or contactless smart card is used. 3

Output Interface The output interface communicates the decision of the biometric system to enable the access to the user. This can be a simple serial communication protocol RS232, or the higher bandwidth USB protocol. It could also be TCP/IP protocol, Radio Frequency Identification (RFID), Bluetooth, or one of the many cellular protocols. GeneralWorking of a BiometricSystem There are four general steps a biometric system takes to perform identification and verification: 1. Acquire live sample from candidate. (using sensors) 2. Extract prominent features from sample. (using processing unit) 3. Compare live sample with samples stored in database. (using algorithms) 4. Present the decision. (Accept or reject the candidate.) The biometric sample is acquired from candidate user. The prominent features are extracted from the sample and it is then compared with all the samples stored in the database. When the input sample matches with one of the samples in the database, the biometric system allows the person to access the resources; otherwise prohibits. 4

Biometrics Terminology Biometric Template: It is a digital reference of the distinct characteristics that are extracted from a biometric sample. Candidate/Subject: A person who enters his biometric sample. Closed-Set Identification: The person is known to be existing in the database. Enrollment: It is when a candidate uses a biometric system for the first time, it records the basic information such as name, address, etc. and then records the candidate s biometric trait. False Acceptance Rate (FAR): It is the measure of possibility that a biometric system will incorrectly identify an unauthorized user as a valid user. FAR = Number of False Acceptances Number of Identification Attempts A biometric system providing low FAR ensures high security. False Reject Rate (FRR): It is the measure of possibility that the biometric system will incorrectly reject an authorized user as an invalid user. FRR = Number of False Rejections Number of Identification Attempts Open-Set Identification: The person is not guaranteed to be existing in the database. Task: It is when the biometric system searches the database for matching sample. ApplicationAreas of Biometrics There are a number of applications where biometric systems are useful. Few of them are given below: 5

End of ebook preview If you liked what you saw Buy it from our store @ https://store.tutorialspoint.com 6