Source: http://www.jyhoriba.co.uk/jy/forensic/images/6pointsm.jpg
Just like fingerprint or palm prints, footprints can be scanned using the same techniques as fingerprints or palm prints. The obvious draw back is that the use of footprints as an identification method is not sanitary, convenient or practical for public use.
Hand Geometry
Hand geometry was bestowed to the populace at the Shearson Hamill investment bank on Wall Street nearly 20 years ago. The biometric is essentially based on the fact that every individual's hand is shaped differently than another and over the course of time the shape of the person's hand does not significantly change. Unlike fingerprint imaging systems, hand geometry readers are not affected by natural and environmental surface details, such as lines, scars, dirt, and fingernails. The basic operating principle is to measure and/or record the physical geometric characteristics of an individual's hand.
There are numerous hand geometry scanning devices in existence and they all (currently) fall into one of two detection categories, mechanical or image-edge detection. Both methods are used to take over 90 measurements of the length, width, thickness, depth of fingers/thumb, and the surface area of a person’s hand and fingers. With the technology of today all 90 measurements of a subject’s hand can be processed within one second.
To capture the measurements of a person’s hand, a charge-coupled device (CCD) digital camera is used to record the hand's three-dimensional shape (Zunkel, 1998).
Image 4: Depiction of Hand Geometry Recognition Process
Step 1 (Place Hand) Step 2 (Scanning)
Step 3 (Measurements are processed)
Source: http://bias.csr.unibo.it/research/biolab/graphics/hand1.gif
Dynamic Keystroke Authentication
Dynamic keystroke authentication technologies is a behavioral biometric that can provide a strong security and cost-effective access solution to users. Additionally, dynamic keystroke authentication technologies are easy to deploy and maintain. This is because dynamic keystroke authentication technologies only require the purchase of proprietary software, as the required equipment, the keyboard already exist as part the users system.
Keystroke authentication technologies look at the way a person types at a keyboard (typing rhythms) and measures the "dwell time", which is the amount of time a user holds down a particular key and "flight time", which is the amount of time it takes a user to transition between keys. Refer to Image X below for an example of how the calculations transpire:
Image 5: Example of the Dynamic Keystroke Authentication Process
Source: http://globalservices.fujitsu.com/fj/CATALOG/AD05/05-00023/IMAGE
As with any biometric there are advocates and antagonists, and dynamic keystroke authentication technologies are no different. Other than the realism that a dynamic keystroke biometric is one of verification and not of identification; it is nevertheless the fundamental claim advocates that both enrollment as well as authentication can occur without being detected by the user that has antagonists concern.
One of the foremost advocates of the dynamic keystroke recognition is Net Nanny (http://www.netnanny.com). Net Nanny advocates the use of dynamic keystroke recognition as a method of exacting Internet parental control in order to protect children from Internet predators.
Dynamic Signature Recognition
No personal attribute is as common for identification as the use of a signature. Unfortunately, a signature is one of the least reliable methods of identification. Forgers have a myriad of ways to reproduce a signature that looks similar to the owner. Dynamic signature recognition technologies can foil the forgers. When a biometric sensor captures a signature, it captures more than just the appearance of the signature. A biometric signature capture device measures such variables as the speed and direction of your hand movements as a signature is formed. Some units also measure the force with which you press the pen against the paper and the angle at which you hold the pen. The devices often consist of a pad that contains a resistive grid or a 2-D array of ultrasonic sensors. Signature-capture units can't validate a signature already affixed to a document that was received by mail or fax.
Share with your friends: |