Biometric security systems use unique human characteristics to authenticate identity. There are two main categories of biometrics - physiological (fingerprint, facial recognition, iris scan) and behavioral (signature, keystroke dynamics). The biometric process involves enrollment by collecting samples, generating a template, and then matching live samples to stored templates. Emerging biometrics still in development include DNA identification, brainwave patterns, and body odor recognition. Biometric systems provide highly secure authentication without reliance on passwords but must balance security with user convenience.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
42 views5 pages
Biometric Security Systems
Biometric security systems use unique human characteristics to authenticate identity. There are two main categories of biometrics - physiological (fingerprint, facial recognition, iris scan) and behavioral (signature, keystroke dynamics). The biometric process involves enrollment by collecting samples, generating a template, and then matching live samples to stored templates. Emerging biometrics still in development include DNA identification, brainwave patterns, and body odor recognition. Biometric systems provide highly secure authentication without reliance on passwords but must balance security with user convenience.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Biometric Security Systems
Abstract- The word biometric can be
defined as "Life - Measure". A well orchestrated biometric authentication solution not only prevents and detects an imposter but also keeps a secure log of transaction activities for prosecution of imposters. This paper provides an overview of the various types of Biometric Classification biometric technologies present in civilian and military domains, their Biometric characteristics can be divided applications, advantages and in two main categories physiological and disadvantages. The paper also describes behavioral. The biometric systems the future prospects of biometric security consist of three basic elements: systems. Enrollment is the process of collecting Keywords-Identification, Verification, biometric samples from an individual False Accept Rate (FAR), False Reject known as enrollee and subsequent Rate (FRR). generation of his template. Template is the data representing the Introduction- The present day world is enrollee’s biometric. obsessed with security. It is easy to Matching is the process of comparing understand the need for biometrics if the live biometric sample against one or you've ever forgot or left your network many templates in the system’s database. password on your computer. There is an increasing need to find a way to solve Characteristics for identification- user identification issues and cut costs 1. The physical characteristic should for password administration. There are not change over the course of the many reasons to consider this form of person's lifetime personal identification. For each reason, 2. The physical characteristics must authenticating ourselves by who we are identify the individual person and not what we know, what we carry, uniquely. or how we choose to identify ourselves 3. The characteristic needs to be easily (i.e. PINs, passwords, smart card scanned with immediate results. security token) solves and simplifies 4. The data must be simply checked in these issues. Biometrics combined with an automated way. other automation can eliminate our sole 5. Ease of use by system operators and reliance on a paper trail for a given individuals. transaction or event. While there are many possible The biometric authentication system biometrics, at least eight mainstream cannot fall prey to hackers; it can’t be biometric technologies have been shared, lost or guessed. Therefore it is an deployed which are classified into two efficient way to replace the traditional major categories Contact and non password based authentication system. Contact biometric. Contact Biometric can be sub classified as Fingerprint, hand/ finger geometry, Dynamic signature verification, Keystroke dynamics. The non contact biometric technologies may be sub classified as Facial Recognition, Voice recognition, identify individuals using a pass phrase Iris scan, Retinal Scan. (password).Iris recognition combines Fingerprint biometric takes an image of computer vision, pattern recognition, a person's fingertips and records its statistical inference, and optics. Its characteristics. This information may purpose is real-time, high confidence then be processed or stored as an image recognition of a person's identity by or as an encoded computer algorithm to mathematical analysis of the random be compared with other fingerprint patterns that are visible within the iris of records. This Technique finds an eye from some distance. Iris scans are applications in Law enforcement, fraud extremely accurate. Retinal scanning prevention and Computer access. Hand analyses the layer of blood vessels at the geometry involves the measurement and back of the eye. analysis of the shape of one's hand. It is a fairly simple procedure and is surprisingly accurate. Though it requires special hardware to use, it can be easily integrated into other devices or systems. Unlike fingerprints, the human hand isn't unique. Individual hand features are not descriptive enough for identification. Retina Scan However, it is possible to devise a It involves using a low-intensity light method by combining various individual source and an optical coupler and can features and measurements of fingers read the patterns at a great level of and hands for verification purposes. accuracy. It does require the user to Signature verification is the process used remove glasses, place their eye close to to recognize an individual’s hand- the device, and focus on a certain point. written signature. It uses the behavioral Retina scan devices are great long-term, biometrics of a hand written signature to high-security options. confirm the identity of a computer user. Emerging Biometric Technologies- An This is done by analyzing the shape, emerging biometric is in infancy stage of speed, stroke, pen pressure and timing technological maturation. Once proven, information during the act of signing. an emerging biometric will evolve into In Keystroke Dynamics the manner and an established biometric. Some rhythm in which an individual types examples include Brainwave biometric, characters is analyzed to develop a DNA identification, Vascular pattern unique biometric template of the users recognition, Body Odour recognition, typing pattern for future authentication. Fingernail bed recognition, Gait It is used to verify or even try to recognition, Handgrip recognition, Ear determine the identity of the person who pattern recognition, Body salinity is producing those keystrokes. Facial identification, Infrared fingertip imaging recognition system is a computer-driven and pattern recognition. application for automatically identifying or verifying a person from a digital still Brainwave biometric Brainwaves or video images by comparing selected resolve into nothing more then facial features in the live image and a recognizable patterns. If we could facial database.Voice recognition is the identify at least one pattern that was process of determining which registered unique, unchanging, and monotonous, speaker provides a given utterance or then we would have a security protocol "voiceprint". Voice or speaker of peerless supremacy. Such a solution recognition uses vocal characteristics to could not be stolen or easily duplicated and could theoretical be applied to all tissues, blood vessel patterns, veins, people, to include mobility challenged arteries and fatty tissues of a hand in a individuals. gripped position.
Vascular patterns: are best described as
a picture of the veins in a person's hand or face. The thickness and location of these veins are believed to be unique enough to an individual to be used to verify a person's identity. Depiction of EEG Brain waveforms
DNA Identification DNA is a unique and
measurable human characteristic that is accepted by society as absolute evidence of one’s identity with a near probability of 99.999% accuracy. Scientists use a small number of sequences of DNA that are known to greatly vary among individuals in order to ascertain the Vein scanners use near-infrared light probability of a match. to reveal the patterns in a person’s veins. Body odor recognition is a contact less Ear Pattern Recognition The shape of physical biometric that attempts too the outer ear, lobes, bone structure and confirm a person’s identity by analyzing the size are unique to each person. Ear the olfactory properties of the human pattern recognition is employed as a body scent. Each chemical of the human physical Contactless biometric and uses scent is extracted by the biometric an Optophone to verify the shape of the system and converted into a unique data ear. A French company, ART string which is analyzed by sensors. Techniques, developed the Optophone Gait Recognition Is a behavior biometric and the process. It is a telephone type that attempts to recognize people by the handset, which is comprised of two manner in which they walk and/or run. components (lighting source and Gait recognition or gait signature as it is cameras).Body salinity biometric an sometime referred to; it uses a radar individual’s salinity level of salt in the system to capture the subject in motion. body is believed to be unique. This Georgia Tech Research Institute are technology passing a tiny electrical building a new radar system that can current through the body in order to identify people from up to 500 feet away analysis the salt content. The more salt during the day, night, and all-weather in the body, the more conductive the conditions. Handgrip Recognition body becomes to electricity. As the Advanced Biometrics Incorporated electrical current passes through the invented this technology, with hope of it body it can also carry data at a transfer one day being used to prevent rates equivalent to a 2400-baud modem. unauthorized use of handguns. It is the This technology could be used to hope of handgun manufactures to create facilitate communication between cell a smart handgun that will only recognize phones, watches. Fingernail bed authorized users. Handgrip technology recognition The system scans the dermal focuses on the internal part of the hand structure under the fingernails. The by analyzing the unique subcutaneous human nail bed is a unique longitudinal False reject rate (FRR) or false non- structure that is made up of nearly match rate (FNMR): the probability that parallel rows of vascular rich skin with the system incorrectly declares failure of parallel dermal structures in between match between the input pattern and the narrow channel matching template in the database. It measures the percent of valid inputs being rejected.
Equal error rate (EER): The rates at
which both accept and reject errors are equal. Failure to capture rate (FTC): Within automatic systems, the probability that Magnification of Human Nail Bed the system fails to detect a biometric characteristic when presented correctly. Disadvantages of Biometric Systems: Verification: does the template match People with disability may have the input sample? (A 1:1 match) A pre- problems with contact biometrics. stored template is matched against a The truth is that the security codes and sample directly, e.g. a card or known the passwords used in the ATMs, Phone database entry. lock and credit and debit cards are a Identification: what is the input sample? supplement to the biometric security (A 1: N match) where N is the total systems. The biometric solutions are number of entries in the database. It is a going to play a very big role in near process of identifying from all the future. So it is best that one puts in a bit templates which one is the closest match of an effort to field test the various to the input sample. biometric solutions. Conclusion- Biometric Applications: Most biometric Biometrics can do a lot more than just applications fall into one of the nine determine whether someone has access general categories: to walk through a particular door. Some 1. Financial services ( ATM) hospitals use biometric systems to make 2. Immigration and border control sure mothers take home the right (passport and visa issuance) newborns. Experts have also advised 3. Social services(fraud detection) people to scan their vital documents, like 4. Health care birth certificates and social security 5. Physical access control cards, and store them in biometrically- 6. Time and attendance secured flash memory in the event of a 7. Computer security (e-commerce) national emergency. Here are some 8. Telecommunications (mobile) biometric technologies you might see in 9. Law enforcement (national ID) the future: New methods that use DNA, nail bed Performance Parameters structure, teeth, ear shapes, body odor, False accept rate (FAR) or false match skin patterns and blood pulses, More rate (FMR): the probability that the accurate home-use systems, Opt-in club system incorrectly declares a successful memberships, frequent buyer programs match between the input pattern and a and rapid checkout systems with non-matching pattern in the database. It biometric security, More prevalent measures the percent of invalid matches. biometric systems in place of passports at border crossings and airports. Nowadays Banks are contemplating putting Biometric Systems on the ATM cards to ensure no imposters are able to withdraw money even after knowing the password.
A biometric security smart Card
The United Kingdom has already started
the Distribution of Biometric Passports to prevent forgery and check imposters. A major use of biometrics can be in protecting the copyright privileges of music, movies, and software creators. A biometric algorithm could be employed to encrypt and decrypt media stored on a multitude of mediums (i.e. CD-R/RW, DVD-R/RW, flash memory). The end result would be that only the legitimate owner of might access the work of art. Think of biometrics as a key! Yes… A key, it can open doors for you and provides security to keep others out. It is a key that can be customized to an individual’s access needs. You can use a biometric to access your home, your account, or to invoke a customized setting for any secure area /application.