Through the theoretical adaptation of biometric technologies to people of variable abilities


Image 11: Depiction of Retina Scan Biometric



Download 2.12 Mb.
Page10/17
Date28.05.2018
Size2.12 Mb.
#50553
1   ...   6   7   8   9   10   11   12   13   ...   17

Image 11: Depiction of Retina Scan Biometric




Source: http://www.retinaltech.com/Twin2l.jpg

Voiceprint Verification

With existing voice-transmission technology, voice recognition can work over long distances via ordinary telephones. A well-conceived and properly implemented voice-based security system could provide major enhancements to the safety of financial transactions conducted over the telephone (Voice Security Systems).



Image 12: Depiction of Voiceprint Verification Biometric




Source: http://www.cnn.com/1999/TECH/computing/12/27/

wap.voice.idg/story.voice.cellphone.jpg

Accuracy


Accuracy of a biometric is measured in the terms of FR (False Rejection), FAR (False Acceptance Rate), FRR (False Rejection Rate), FMR (False Match Rate), FNMR (False Non-match Rate), FTA (Failure to Acquire), FTE (Failure to Enroll), EER (Equal Error Rate), ATV (Ability to Verify) (Woodward, Orlans, & Higgins, 2003).

Noting that for each biometric the interpretation of accuracy is variable. But, even if a legitimate biometric characteristic is presented to a biometric-based authentication system correctly, authentication cannot be guaranteed. This could be because the sensor(s) are subjected background noises, limitations of the processing methods, changes in the environment, faulty liveness test, and more importantly, the variability of both the biometric characteristic as well as its presentation. And then it could be that the biometric system was not correctly implemented or the user was not correctly enrolled (Nanavati et al, 2002).


Liveness Test


There is not one standardized liveness test in existence today. The reason for this is that manufactures of biometric technologies tend to keep the details of a liveness test confidential. Some consider liveness test to be the most critical step in both the accuracy of the biometric and the well being of the user.

A liveness test that is correct applied can avail itself as another method of ensuring accuracy and security, by eliminating the potential use of faked biometric characteristics (i.e. the gummy finger). The liveness test addresses the urban myth that someone can steal another’s identity by using the severed finger to gain access to personal assets, financial or otherwise. Once a finger or any body part is severed from the body the presence of oxygen, heat, and melanin in the body part rapidly fall towards depletion or unacceptable levels.


Advantages


Biometric technologies can be applied to areas requiring logical access solutions, and it can be used to access applications, personal computers, networks, financial accounts, human resource records, the telephone system, and invoke customized profiles to enhance the mobility of the disabled (Nanavati et al.).

In a business-to-business scenario, the biometric authentication system can be linked to the business processes of a company to increase accountability of financial systems, vendors, and supplier transactions; the results can be extremely beneficial (Ashbourn, 2000).

The global reach of the Internet has made the services and products of a company available 24/7, provided the consumer has a user name and password to login. In many cases the consumer may have forgotten his/her user name, password, or both. The consumer must then take steps to retrieve or reset his/her lost or forgotten login information. By implementing a biometric authentication system consumers can op to register their biometric trait or smart card with a company’s business-to-consumer e-commerce environment, which will allow a consumer to access their account and pay for goods and services (e-commerce). The benefit is that a consumer will never lose or forget his/her user name or password, and will be able to conduct business at their convenience (Nanavati et al.).

A biometric authentications system can be applied to areas requiring physical access solutions, such as entry into a building, a room, a safe or it may be used to start a motorized vehicle. Additionally, a biometric authentication system can easily be linked to a computer-based application used to monitor time and attendance of employees as they enter and leave company facilities (Nanavati et al.).



In short, contactless biometrics can and do lend themselves to people of all ability levels.

Disadvantages


Some people, especially those with disabilities may have problems with contact biometrics. Not because they do not want to use it, but because they endure a disability that either prevents them from maneuvering into a position that will allow them to make use the biometric or because the biometric authentication system (solution) is not adaptable to the user. For example, if the user is blind a voice biometric may be more appropriate.

Existing Standards


As with any ascendant computer technology, standards and software must precede ubiquitous deployment. The biometric standards were sourced from Woodward, Orlans, & Higgins (2003) pp. 173-179, National Institute of Standards and Technology, and Information Technology Laboratory web sites:

ANSI/NIST-CSL 1-1993: Specifies a common data format for the interchange of fingerprint information. Published by the American National Standard for Information Systems/National Institute of Standards and Technology – Computer System Laboratory.

ANSI/NIST-ITL 1a-1997: Specifies a common data format for the interchange of fingerprint, facial, scars, mark, and tattoo information. Published by the American National Standard for Information Systems/National Institute of Standards and Technology – Information Technology Laboratory.

ANSI/INCITS 358-2002: Is the BioAPI Specification Version 1.1. It defines an open source standard API that provides a set of high-level abstractions for software applications to communicate across-platforms (for example, Enroll, Verify, Identify), a set of primitive functions, (for example, Capture, Process, Match, Create Template) and a common data structure called the Biometric Information Record (BIR) used by an application as the input and output to the Biometric Service Provider (BSP). The BioAPI V1.1 was developed by the BioAPI Consortium (www.bioapi.org) and published by the American National Standard for Information Systems/International Committee for Information Technology Standards.

NISTIR 6529-2001: Is the Common Biometric Exchange File Format (CBEFF) describes a set of data elements necessary to support biometric technologies in a common way independently of the application and the domain of use (e.g., mobile devices, smart cards, protection of digital data, biometric data storage). CBEFF facilitates biometric data interchange between different system components or between systems, promotes interoperability of biometric-based application programs and systems, provides forward compatibility for technology improvements, and simplifies the software and hardware integration process. Published by the National Institute of Standards and Technology – Information Technology Laboratory.

Emerging Biometric Technologies


Many inventors, companies, and universities continue to search the frontier for the next biometric that shows potential of becoming the ‘one’ (to borrow a cliché from ‘The Matrix’). An emerging biometric is a biometric that is in the infancy stages of proven technological maturation. Once proven, an emerging biometric will evolve in to that of an established biometric.

Brainwave Biometric

Keep in mind that brainwaves resolve into nothing more then recognizable patterns. If we could identify at least one pattern that was unique, unchanging, and monotonous, then we would have a security protocol of peerless supremacy (J. Gunkleman, personal communication, May 1, 2002). Such a solution could not be stolen or easily duplicated and could theoretical be applied to all people, to include mobility challenged individuals (i.e. amputees, paraplegics, quadriplegics).



While it is true that a person has the ability to alter most of their own brain wave patterns, through the use of drugs or other external elements. It is hypothesized that they cannot alter what is referred to as their baseline brain-wave pattern (Woodward, Orlans, & Higgins, 2003).

Image 13: Depiction of EEG Brain waveforms


Source: www.eegspectrum.com

There are major privacy and perceived mind reading concerns about using brainwaves as a biometric that must be addressed (H. Boitel, personal communication, March 29 and August 7, 2002).



DNA Identification

DNA is an abbreviation of deoxyribonucleic acid. DNA is a unique and measurable human characteristic that is accepted by society as absolute evidence of one’s identity. In reality DNA identification is not absolute but it has come to be considered as the best method of confirming someone’s identity with a near perfect probability of 99.999% accuracy (http://genetic-identity.com).

The chemical structure of everyone's DNA is the same. The only difference between people (or any animal) is the order of the base pairs, which there are many millions of base pairs in each person's DNA. Using these sequences, every person can be identified based on the sequence of their base pairs.

However, because there are so many millions of base pairs, the task of analyzing them all would be extremely time-consuming. Hence scientists use a small number of sequences of DNA that are known to greatly vary among individuals in order to ascertain the probability of a match.

The major issues with DNA identification revolve around the realistic ability of capturing and process the sample of a person in a controlled and lawful manner that does not violate civil rights.

Vascular Pattern Recognition

The system identifies a person using the patterns of veins in the back of the hand, face, or for that matter any body part with visible veins. A persons vein patterns are in fact highly stable throughout their life. They are developed before birth and even differ between twins of all types.



Vascular pattern recognition technology has been developed to minimize the disadvantages of commercially available biometric systems and to provide users with impeccable security, usability, reliability, accuracy, and user acquiescence.

Image 14: Delineation of Vascular Scan Pattern

Source: www.neusciences.com/biometrics/images/Techno9.gif
A note of speculative caution, this is an emerging biometric technology and as such there is not a great deal of factual data that speaks to the prospect of shifting veins from their original path. With the advancing growth of laser technologies and procedures it may be possible today or in the near future to alter the path of veins. Doing so may render a vein recognition based biometrics as void of physical mutability and hence nullify the validity of this technology.

The conjecture of this theory was derived from the manifested data and images found via the Ideal Image website (www.idealimage.com). Images 15 and 16 are graphical depictions of both the before and after results of a spider vein and a varicose vein procedure.



Image 15: Before and After Pictures of Spider Vein Procedure

Source: http://www.idealimage.com/photos/veins.htm
Image 16: Before and After Pictures of Varicose Vein Procedure

Source: http://www.idealimage.com/photos/veins_varicose.htm
This hypothesis is further substantiated by a personal communication with Joe Rice (CEO Brite-Sparks Engineering Ltd.). Who had this to say (J. Rice, personal communication, March 27, 2003):

Yes I think you can, one could certainly shut down some small capillary structures, however shutting down too much may lead to circulation problems and gangrene. However, I bet it's possible to alter most physical biometrics with laser surgery including, irises, retinas, fingerprints, faces, voice etc.


In fact laser surgery would probably have an impact on a behavioral trait as well, depends how radical the surgery is!

Laser surgery could be used to add or remove (write or erase) information but it's likely to have more impact on surface feature biometrics, interior feature biometrics may be more difficult to write to.


Body Odor Recognition

Body odor recognition is a contactless physical biometric that attempts too confirm a person’s identity by analyzing the olfactory properties of the human body scent. According to the University of Cambridge (http://www.cam.ac.uk) the sensors that they have developed are capable of capturing the body scent from non-intrusive body parts, such as the hand. Each chemical of the human scent is extracted by the biometric system and converted into a unique data string.



Fingernail Bed Recognition

AIMS (http://www.nail-id.com) is a U.S. based company that has been developing a system which scans the dermal structure under the fingernail. The human nail bed is a unique longitudinal structure that is made up of nearly parallel rows of vascular rich skin with parallel dermal structures in between narrow channels.



Image 17: Magnification of Human Nail Bed

Source: http://www.nail-id.com/Media/nailgroves.gif
Gait Recognition

Is a behavior biometric that attempts to recognize people by the manner in which they walk and/or run. Gait recognition or gait signature as it is sometime referred to; it uses a radar system to capture the subject in motion (gait cycle).

An explanation to the gait cycle can be found via the ISIS research group at the Department of Electronics and Computer Science at the University of South Hampton (http://www.gait.ecs.soton.ac.uk). The gait cycle refers to angles of the rotation formed by the thigh and lower leg rotation while the subject is in motion. The gait cycle is divided into three phases, stance, swing, and float. The period of time that the foot is in contact with terra firma is the stance phase, the swing phase is the period of time the foot is in forward motion while off the ground, and the float phase during which time that neither foot is on the ground. The final step is to perform a canonical analysis using the Fourier algorithm to produce the gait signature.

Georgia Tech Research Institute (GTRI) is considered to have in their mist some of the foremost experts of this technology. GTRI claim that they are building a new radar system that can identify people from up to 500 feet away during the day, night, and all-weather conditions.



Handgrip Recognition

Advanced Biometrics Incorporated invented this technology, with hope of it one day being used to prevent unauthorized use of handguns. Many handgun manufactures like Smith & Wesson and Colt have invested millions in the exploration and adaptation of this technology. It is the hope of handgun manufactures to create a smart handgun that will only recognize authorized users (JUSTNET).

Handgrip technology does not take measurements, nor does it rely on external features of the hand. It focuses on the internal part of the hand by analyzing the unique subcutaneous tissues, blood vessel patterns, veins, arteries and fatty tissues of a hand in a gripped position.

Ear Pattern Recognition

The shape of the outer ear, lobes, bone structure and the size are unique to each person. Ear pattern recognition is employed as a physical contactless biometric (Carreira-Perpinan & Sanchez-Calle, 1995) and uses an Optophone to verify the shape of the ear. A French company, ART Techniques, developed the Optophone and the process. It is a telephone type handset, which is comprised of two components (lighting source and cameras).



Much like the minutiae points of a palm print or fingerprint the outer ear has many detailed features that can be measured and compared to a biometric template.


Download 2.12 Mb.

Share with your friends:
1   ...   6   7   8   9   10   11   12   13   ...   17




The database is protected by copyright ©ininet.org 2024
send message

    Main page