Welcome to the fascinating world of biometrics. With the ever-changing advancements of technology, biometrics is currently at the forefront. A biometric system is essentially a pattern recognition system which recognizes a user by confirming the authenticity of a specific anatomical or behavior attribute of the user. The biometric system has the potential of being a far more secure method of authentication in comparison to traditional methods such as keycards and passwords. With computers now integrated into nearly every aspect of our lives, it is imperative that we protect data that is personal and sensitive.
In a biometric system, the basic process includes four steps. The user must be enrolled in the system in order. The system will capture a physical or behavioral characteristic. The feature extraction process creates a template of this captured data and stored in a database. When a system requires verification or authentication, the user submits a new scan and this new template is compared with the stored template to produce a matching score. When comparing templates, the confidence level is never greater than 99% thus a score system is used.
The selection of a particular biometric for use in a specific application involves weighing of several factors:
• “Universality” Every person using a system should possess the trait.
• “Uniqueness” The trait should be sufficiently different for individuals in order that they are distinguishable from one another.
• “Permanence” The manner in which a trait varies over times.
• “Measurability” The easiness of the trait being measured.
• “Performance” The accuracy, speed, and robustness of technology used.
• “Acceptability” How well individuals in the relevant population accept the technology.
• “Circumvention” The ease with which a trait might be imitated using an artifact or substitute.
No individual biometric will meet all the requirements of every possible application and therefore it, like other currently used authentication methods, is not a perfect form of user identification.
Biometrics use is peppered throughout history. Those in ancient Babylon actually used fingerprinting on clay tablets for business transactions. Archeologists have found thumbprints on ancient clay tablets in China, as well…although many theorists believe this was used more for spiritual purposes. From fourteenth-century Persia, there are surviving government papers that have fingerprints on them. Centuries ago China was using inked fingerprints on official documents for identification. In 1892 biometrics became a distinct field of study when a man name, Alphonse Bertillon developed a method that used eleven (11) body measurements to identifying a person. Alphonse Bertillon was a police clerk in Paris and saw the need to develop a way of identifying a person other than using photographic memory. His method, called the Beritillonage method, was accepted and used worldwide. This method, however, had its issues as many people possessed the same eleven body measurements. Because of this fingerprinting (which was the method of identification in China), became the acceptable method.
Fingerprinting continued to be the only biometric method used in first half of the twentieth century. With the advent of computers and the drastic advancements of technology thereafter, multiple methods of biometrics have become feasible. In the 1960’s, the first facial recognition system was developed. Signature recognition was introduced in the 1960’s as well. The first hand geometry and voice recognition systems were introduced commercially in the 1970’s. When the 1980’s came along, eye analysis technology was the latest trend of study. In the 1990’s, DNA indexing system was released by the FBI. After the millennium, Biometrics study has accelerated greatly.
There are more physiological biometrics systems than behavioral systems in use today. Physiological Biometrics includes
recent decade, improvement of technology has brought new tools to solve social issues such as murder, burglary or robbery. The biometric security system including fingerprint, face recognition, DNA, hand geometry and iris recognition, spread out worldwide given the increasing demand of it’s in both commercial sector as well as government involvement (Willis 2009 cited in Fletcher, 2012). To illustrate in commercial and consumers, many businesses start to invest on the biometric security system to prevent…
Introduction The world of security is rapidly changing due to the growth in technology. In an attempt to make technological systems more secure, biometric security measures are being established. There are two types of biometrics, physiological, such as fingerprints or facial recognition, and behavioral, such as keystrokes or signatures (BiometricSolutions, 2013). Many organizations are placing systems that rely on biometrics rather than passwords to allow access to databases, physical areas, or just…
History and uses of Biometrics HISTORY AND USES OF BIOMETRICS By Marie C. Smith Gerard Beatty SEC310 March 10, 2014 1 Table of Contents I. First uses of Biometrics Handprint recognition---------------------------------------------------------------------------3 Facial recognition-------------------------------------------------------------------------------3 Ancient finger prints-----------------------------------------------------------------------------4 II. Types of Biometrics A. Physiologica…
SPEIRS Andrew The Individual and the Stereotype: From Lavater to the War on Terror Abstract This paper examines the technologies of surveillance and biometrics and the resultant slippage between the individual, the type and the stereotype. The stereotype emerges from between the general and the individual as a coherent, simplified, easily readable idea. There have been many attempts to find a particular characteristic that is unique to an individual that enables absolute identification.…
of a server. An identification card is a card giving identifying data about a person, as full name, address, age, and color of hair and eyes, and often containing a photograph: for use as identification at a place of employment, school, club, etc. There are various types of identification systems available and implemented across the globe. These are Biometric (finger, hand or iris recognition), Voice Identification, Optical Character Recognition (OCR), Radio-Frequency Identification, and Bar code…
Abstract Face recognition is an important security application for automatically identifying and verifying a person from image or video source. Face recognition under partial occlusion is a challenge in the field of image analysis and computer vision. Although face recognition has been encouraging, the task turned out to be difficult when illumination,…
different technologies involved with airport security, as well as examine the components of airport security. In addition I will also discuss the Transportation Security Administration's role in our nation's airport security. Airport Security Airport Security is a necessity of Life both in America and through…
The Effectiveness of the Department of Homeland Security and the Transportation Security Administration The Effectiveness of the Department of Homeland Security and the Transportation Security Administration 2011 10/17/2011 Abstract The purpose of this research paper is to give an unbiased look at the effectiveness of the Department of Homeland Security and the Transportation Security Administration. Using references from various but creditable sources I plan to exhibit both arguments…
intellectual property misuse Software sabotage (malw are- including worms, viruses, Trojan horses, e tc.) Hacking and electronic trespassing. The computer crime dossier Computer crime: any crime accomplished through knowledge or use of computer technology Businesses and government institutions lose billions of dollars every year to computer criminals The majority of crimes is committed by company insiders Typically covered up or not reported to authorities to avoid embarrassment According…