Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Intrinsic Traits Computer Science Identity Access Management Access Control Surveillance

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Biometrics comprises methods for uniquely recognizing humans based upon one or more

intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a


form of identity access management and access control. It is also used to identify individuals in
groups that are under surveillance.

Biometric characteristics can be divided in two main classes:

 Physiological are related to the shape of the body. Examples include, but are not limited
to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which
has largely replaced retina, and odor/scent.
 Behavioral are related to the behavior of a person. Examples include, but are not limited
to typing rhythm, gait, and voice. Some researchers[1] have coined the term
behaviometrics for this class of biometrics.

It is possible to understand if a human characteristic can be used for biometrics in terms of the
following parameters:[2]

 Universality – each person should have the characteristic.


 Uniqueness – is how well the biometric separates individuals from another.
 Permanence – measures how well a biometric resists aging and other variance over time.
 Collectability – ease of acquisition for measurement.
 Performance – accuracy, speed, and robustness of technology used.
 Acceptability – degree of approval of a technology.
 Circumvention – ease of use of a substitute.

A biometric system can operate in the following two modes:

 Verification – A one to one comparison of a captured biometric with a stored template to


verify that the individual is who he claims to be. Can be done in conjunction with a smart
card, username or ID number.
 Identification – A one to many comparison of the captured biometric against a biometric
database in attempt to identify an unknown individual. The identification only succeeds
in identifying the individual if the comparison of the biometric sample to a template in
the database falls within a previously set threshold.
The basic block diagram of a biometric
system

The first time an individual uses a biometric system is called an enrollment. During the enrollment,
biometric information from an individual is stored. In subsequent uses, biometric information is
detected and compared with the information stored at the time of enrollment. Note that it is crucial
that storage and retrieval of such systems themselves be secure if the biometric system is to be robust.
The first block (sensor) is the interface between the real world and the system; it has to acquire all the
necessary data. Most of the times it is an image acquisition system, but it can change according to the
characteristics desired. The second block performs all the necessary pre-processing: it has to remove
artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of
normalization, etc. In the third block necessary features are extracted. This step is an important step as
the correct features need to be extracted in the optimal way.

Countries applying biometrics


[edit] United States

The United States government has become a strong advocate of biometrics with the increase in
fear of terrorism since September 11, 2001.

The FBI is currently spending $1 billion to create a new biometric database, which will store
DNA, fingerprints, and other biometric data. The computers running the database will be
contained in an underground facility about the size of a football field.

The biometrics market in Germany will experience enormous growth until 2009. “The market size will
increase from approximately 12 million € (2004) to 377 million €” (2009). “The federal government will
be a major contributor to this development”

India
India has planned an ambitious mega project. To provide a unique identification number to each
of its 1.25 billion people. The Identification number will be stored in a central databases.
consisting the biometric information of the individual. If implemented, this would be the biggest
implementation of the Biometrics in the world.

[edit] United Kingdom

Fingerprint scanners used in some schools to facilitate the subtraction of funds from an account
financed by parents for the payment of school dinners. By using such a system nutritional reports
can be produced for parents to surveil a child's intake.

Australia is the first country to introduce a Biometrics Privacy Code, which is established and
administered by the Biometrics Institute. The Biometrics Institute Privacy Code Biometrics Institute
forms part of Australian privacy legislation.

Canada

Canada has begun research into the use of biometric technology in the area of border security
and immigration. Citizenship and Immigration Canada and the Canada Border Services Agency
will probably be the first government institutions to fully implement the technology in Canada.

New Zealand

SmartGate was launched by the New Zealand government at Auckland International Airport on
Thursday December 3, 2009. It will begin operating in Wellington and Christchurch from next
year.

The kiosk and gate system will allow all New Zealand and Australian electronic passport holders
over 18 to clear passport control without needing to have their identity checked by a Customs
officer.

The advantages of biometrics are the person is the key so you need never remember your card or
key again. Each body part is unique and Biometrics uses your unique identity to enable a
purchase activate something or unlock something. Biometrics encompasses Voice, Vein, Eye,
Fingerprint, Facial recognition and more.

The disadvantages are numerous however: criminals have been known to remove fingers to open
biometric locks, Biometrics requires a lot of data to be kept on a person, these systems are not
always reliable as human beings change over time if you are ill; eyes puffy, voice hoarse or your
fingers are rough from laboring for example it maybe more difficult for the machinery to identify
you accurately. Every time you use Biometrics you are being tracked by a database bringing up a
range of privacy issues. The final disadvantage is the expense and technical complexity of such
systems.

Disadvantages of a biometric system.


 The finger print of those people working in Chemical industries are often affected.
Therefore these companies should not use the finger print mode of authentication.
 It is found that with age, the voice of a person differs. Also when the person has flu or
throat infection the voice changes or if there there are too much noise in the environment
this method maynot authenticate correctly. Therefore this method of verification is not
workable all the time
 For people affected with diabetes, the eyes get affected resulting in differences.
 Biometrics is an expensive security solution.
 Advantages of Biometrics :

* Increase security - Provide a convenient and low-cost additional tier of security.

* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise


the opportunity for ID fraud, buddy punching.

* Eliminate problems caused by lost IDs or forgotten passwords by using physiological


attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards.

* Reduce password administration costs.

* Replace hard-to-remember passwords which may be shared or observed.

* Integrate a wide range of biometric solutions and technologies, customer applications


and databases into a robust and scalable control solution for facility and network access

* Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!

* Offer significant cost savings or increasing ROI in areas such as Loss Prevention or
Time & Attendance.

* Unequivocally link an individual to a transaction or event.

You might also like