You are on page 1of 7

BIOMETRICS AND THE PREVAILING USE OF FINGERPRINTS

Ankita Domadia Nidhi Jha


5th sem, I.T., SSCET, Bhilai 5th sem, I.T., SSCET, Bhilai
Email: ankita_domadia@yahoo.com Email: nidhi.jha.41189@gmail.com

Abstract - Positive and reliable automatic identification of Identification is determining who a person is. It
humans is a very important topic in a number of law involves taking the measured characteristic and trying to
enforcement (e.g., criminal investigation), government find a match in a database containing records of people and
(e.g., border control), and commercial (e.g., logical and that characteristic. This method requires a large amount of
physical access control) applications. Surrogate processing power and some time if the database is very
representations of identity such as passwords and physical large. It is often used in determining the identity of a
tokens fail to provide satisfactory level of security in the suspect from crime scene information.
current electronic era. Biometrics-based authentication Verification is determining if a person is who they
techniques utilize physical and behavioral characteristics say they are. It involves taking the measured characteristic
(e.g., fingerprint, iris, voice, gait, and face) to either verify and comparing it to the previously recorded data for that
a claimed identity (biometric verification) or establish the person. This method requires less processing power and
identity of an individual (biometric identification). time, and is often used for accessing places or information.
With increased emphasis on security, there is a growing The use of biometrics is not limited to a particular
and urgent need to automatically identify humans both field, but it is widely used in various platforms. Some of
locally and remotely on a routine basis. them are enlisted below:

Index Terms: Biometrics, Ear Patterns, Gait Technology • ATM, and ticketing machines that recognize an
, Face, Fingerprint, Iris, Signature, Voice Recognition. authorized valid user (with or without card or PIN)
• Integrated personal identifiers for credit card
I .INTRODUCTION verification at point-of-sale or identification of a
Definition: customer without a credit card
Biometrics refers to the automatic identification of a • Stationary and mobile platforms for licensing,
person based on his/her physiological or behavioral registration, and border security programs
characteristics. This method of identification is preferred • Travel security systems with passport, ticket, and
over current methods involving passwords and PIN baggage verification
numbers for various reasons: the person to be identified is • Business, residence, and vehicle security with
required to be physically present at the point-of- access and operator authentication
identification; identification based on biometric techniques • Processing and circulation control in the
obviates the need to remember a password or carry a token. corrections (prison) environment, and
With the increased use of computers as vehicles of • Portable systems for on-scene recognition of
information technology, it is necessary to restrict access to individuals for police and military use.
sensitive/personal data. By replacing PINs, biometric
techniques can potentially prevent unauthorized access to How It Works:
or fraudulent use of ATMs, cellular phones, smart cards,
desktop PCs, workstations, and computer networks. PINs Biometric devices consist of a reader or scanning device,
and passwords may be forgotten, and token based methods software that converts the gathered information into digital
of identification like passports and driver's licenses may be form, and a database that stores the biometric data for
forged, stolen, or lost. Thus biometric systems of comparison with previous records. When converting the
identification are enjoying a renewed interest. biometric input, the software identifies specific points of
data as match points. The match points are processed using
Why we need biometrics? an algorithm into a value that can be compared with
biometric data in the database.
In order to avoid the problems of forgetting passwords and
ID codes, Biometrics based authentication helps us in III. . TYPES OF BIOMETRICS SYSTEM
verifying your finger prints, iris pattern and voice for your
identity at A.T.M’s, Airports etc.., you can unlock your
houses, withdrawing money from a bank with just a blink
of an eye, a tap of your finger or by just showing your face.

II.USE OF BIOMETRICS

Biometrics is used in two major ways: Identification


and Verification.
COMPARISION OF BIOMETRICS TECHNIQUES Advantages: Non-invasive procedure.

Charact Finger Sign


Retina Iris Face Voice Disadvantages: People who look alike can fool scanner;
eristic prints ature
people can alter their appearance and facial hair can fool
Ease of Med Medi
Use
High Low
ium um
High High device.
Lighti
Chang Noise,
Error Dryness,
Poor ng,
ing colds, Voice verification or recognition (acoustic signal of
Glasses Ligh age, voice converted into digital code)
incidence dirt, age signat weathe
ting glasse
ures r
s, hair
Very Very Advantages: Works well over the telephone.
Accuracy High High High High
High High
User
Medium Medium
Med Medi Mediu
High Disadvantages: Requires large amount of computer
acceptance ium um m storage; people's voices can change; background noises can
Required interfere.
Very Medi Mediu Mediu
security High High
High um m m
level
Long-term
High High High
Medi Mediu Mediu Signature recognition (computer record of pen/stylus
stability um m m speed, pressure, direction and other characteristics of
signature)

IV. ADVANTAGES / DISADVANTAGES OF Advantages: People are used to providing a signature.


BIOMETRIC SYSTEMS
Disadvantages: Poor long-term reliability; accuracy
Here are some of the advantages and disadvantages of fully difficult to ensure.
developed biometric systems that are fairly accurate:
V. APPLICATION AREAS
Retinal scans (electronic scan of the innermost layer of the
eyeball's wall)

Advantages: Retina generally remains stable through life,


ensuring accuracy.

Disadvantages: Requires close physical contact MW


scanning device; may not be generally accepted by public.

Iris recognition (recording of iris using standard video


technology)
The uses for biometric security are varied and growing. It
Advantages: Non-invasive procedure (close physical was developed in response to a need to associate human
contact not required). action with identity – whether conducting a transaction,
accessing a computer or a critical information system, or
Disadvantages: Relatively expensive; requires large entering secure physical area. Some of the existing and
amount of computer storage; may not be generally accepted proposed applications in general we use are described
by public. below:

Finger printing (recording of fingerprint using optical Computer/Network security:


scanner) Many stand-alone and network computer systems carry
valuable and sensitive information. Controlling access to
these systems is another major use of biometric
Advantages: Widely accepted by public and law
authentication systems.
enforcement communities as reliable identification.
Internet transactions:
Disadvantages: Requires close physical contact with Due to growing security requirements that results from the
scanning device; residue on finger may cause recognition boom in e-commerce, many think of on-line transactions as
problems; has criminal overtones. being an obvious area for biometrics. The biometric
authentication generates a greater degree of vendor
Face or imaging (photograph of face converted into confidence because he knows that the person at the
digital code) terminal is he who he claims to be.
Physical area security: biometric samples. For example, a given set of
Military, Government, and Commercial installations have fingerprints will match only one individual, as
sufficiently strong confidentiality concerns. The biometric they are extremely distinctive.
identifiers play a major role in controlling physical access • Permanence: The chosen biometric should not
to these installations. change over time. This must be considered when
designing biometric systems which may have
Banking: long-range goals of being able to authenticate
Many leading banks have been experimenting with individuals (such as criminal purposes).This is
biometrics for ATM use as a means of combating card because many physical traits may change over
fraud. Beginning 2002, some companies will being issuing time due to age, illness, or injury. The iris, DNA
smart credits cards, with customer’s fingerprint information and fingerprint are said to rate high in permanence.
embedded. • Collectability: The biometric attribute being used
should be easily collectable. For example, DNA is
Voting: highly universal, distinctive and permanent, but
A logical use of biometrics is in voting process where collecting and developing DNA samples require
eligible politicians are required to verify their identity. This specialized equipments and trained personnel. In
is intended to stop “proxy” voting. comparison, visual traits such as a face (facial
recognition) are very easily collectable.
Prisons: • Performance: Depending on the design and
An interesting use of biometrics is in prisons where the application of the biometric system, performance
visitors to a prisoner are subjected to verification can also be an issue. Depending on the design of
procedures in order that identities may not be swapped the system, available bandwidth, availability of
during the visit. indexing mechanisms, and the requirement of the
speed of the identification – the chosen biometric
Leading products in biometrics: Biometric is a new but can present performance issues that may or may
promising technology and therefore a number of companies not be acceptable. Waiting 20 – 30 minutes to be
have appeared in the market in a very short period of time. verified by a biometric system may be acceptable
Some of those products are: for boarding an aircraft, but would be
unacceptable for using an ATM at a bank.
• Acceptability: The given biometric chosen for a
system must be generally acceptable to users in
terms of its invasiveness of collection, its
distinctiveness, and potential privacy or health
related issues involve with the given biometric.
Even if these issues are resolved the chosen
biometric must also be accepted by the population
as being distinctive in relation to the application or
the context it is used. All of these issues can make
user acceptance slow for new biometric types and
methods.
VI. BIOMETRIC REQUIREMENTS AND FACTORS OF • Circumvention: If a chosen biometric can be
GOOD BIOMETRICS easily circumvented (how easy is it to fool the
biometric system being used into either identifying
Good biometric systems tend to use traits or behaviors that or not identifying an individual) its acceptability
rate high in several of the following criteria: among users and reliability in applications will
likely to be low.
• Universality: It is as large as possible subset of
the population should possess the trait or attribute VII. FINGERPRINT TECHNOLOGY
that will be measured. For example not everyone
will have certain physical traits that could be Everyone is known to have
measured due to illness/disease, injury, age, sex or unique, immutable fingerprints. A
other factors. On the other hand, every living thing fingerprint is made of a series of
has DNA, therefore DNA could be said to be more ridges and furrows on the surface of
universal. the finger. The uniqueness of a
• Distinctiveness: The trait or attribute being fingerprint can be determined by the
measured, must vary enough from one individual pattern of ridges and furrows as well
to another to allow for identification between them. as the minutiae points. Minutiae
Although largely dependent on the method(s) used points are local ridge characteristics
to measure to some extent, distinctiveness is a that occur at either a ridge
major factor in systems which may need to bifurcation or a ridge ending.
identify the individual from a large group of
Fingerprints found by criminal investigators on objects are characteristics for identification purposes. This allows the
often referred to as ‘latent fingerprints’. This is because recognition of a person through quantifiable physiological
they are not normally easily visible, and must be developed characteristics that verify the identity of an individual.
by using special powders or chemicals. The actual print left There are basically two different types of finger-scanning
by the finger is comprised of fatty acids secreted as sweat technology that make this possible. One is an optical
from the human skin. These prints are left as residue in the method, which starts with a visual image of a finger. The
pattern of the friction ridges which are most pronounced on other uses a semiconductor-generated electric field to
the contact services or ‘Volar pads’ (palm and sole areas of image a finger.
the hands and feet) of the human body. It is this residual
print (s) left behind at crime scenes that are normally
collected by investigators through various manual and
chemical process, and (recently) digitized for computer
matching.

Fingerprints are distinctive and therefore identifiable due to


the fact they are naturally (biologically) occurring features
having nearly an infinite set of possible formations and
combinations of identifiable characteristics. Fingerprints
are formed around the seventh month of fetal development.
Fingerprints are thought to be uniquely developed based
upon amniotic fluid flow around a fetus during the
development process. This randomness of position and
fluid flow partially explains their differentiation, while
genetics may also play a part, as it has been noted that
identical twins have up to 95% similar fingerprints – but Practical Applications for Fingerprint Scanning:
never identical fingerprints. Fingerprint scanning has a high accuracy rate when users
are sufficiently educated. Fingerprint authentication is a
History of Fingerprint Identification: good choice for in-house systems where enough training
can be provided to users and where the device is operated
The use of fingerprints as a realistic means of identification in a controlled environment. The small size of the
came at the end of the 1980’s, when a gentleman by the fingerprint scanner, ease of integration - can be easily
name of Edward Henry established a system of adapted to keyboards, and most significantly the relatively
classification of fingerprints. It is this system which forms low costs make it an affordable, simple choice for
the basis for modern classification systems used today. workplace access security.
Henry identified that although individual fingerprints
appeared unique, there are certain recognizable patterns Fingerprint Matching:
(loops, whorls, arches, etc.) to fingerprints, which they may
all be grouped .This classification and grouping system Fingerprint matching techniques can be placed into two
further lead to the ability to quickly sort and match categories: minutiae-based and correlation based.
fingerprints by hand - which prior to the invention of the Minutiae-based techniques first find minutiae points and
computers was the only available method. then map their relative placement on the finger. However,
there are some difficulties when using this approach. It is
In 1864, English plant morphologist, Nehemiah Grew, difficult to extract the minutiae points accurately when the
published the first scientific paper reporting his systematic fingerprint is of low quality. Also this method does not take
study on the ridge, furrow, and pore structure in into account the global pattern of ridges and furrows. The
fingerprints. Since then, a large number of researchers have correlation-based method is able to overcome some of the
invested huge amount of effort on fingerprint studies. difficulties of the minutiae-based approach. Correlation-
Recently, due to the raising demand in our increasing based techniques require the precise location of a
electronically inter-connected society for automatic registration point and are affected by image translation and
personal identification and the success of various AFIS rotation. Fingerprint matching based on minutiae has
installations in forensics, automatic fingerprint problems in matching different sized (unregistered)
identification technology has rapidly grown beyond minutiae patterns. Local ridge structures can not be
forensic applications into civilian applications. In fact, completely characterized by minutiae. We are trying an
fingerprint based biometric systems are so popular that they alternate representation of fingerprints which will capture
have almost become the synonym of biometric systems. more local information and yield a fixed length code for the
fingerprint. The matching will then hopefully become a
Fingerprint Analysis: relatively simple task of calculating the Euclidean distance
will between the two codes.
Fingerprint Scanning: Fingerprint scanning is the
acquisition and recognition of a person’s fingerprint
Sample devices for fingerprinting biometrics:

Advantages and disadvantages of fingerprint technique

Advantages:
Fingerprint Classification: Fingerprint classification is a
• High accuracy rate.
technique to assign a fingerprint into one of the several pre-
specified types already established in the literature which • Can perform 1-to-many comparisons.
can provide an indexing mechanism. Fingerprint • Inexpensive equipment.
classification can be viewed as a coarse level matching of • Easy to use (samples are easy to
the fingerprints. An input fingerprint is first matched at a capture and maintain).
coarse level to one of the pre-specified types and then, at a • Most established and oldest of the
finer level, it is compared to the subset of the database biometric technology.
containing that type of fingerprints only.
Disadvantages:
• Actual finger scan images cannot be
recreated from a template image
• Users relate fingerprint recognition to
criminal activity.

VIII. IMPLEMENTATION OF BIOMETRICS

Following the September 11 terrorist attacks, security


concerns sparked increased interest in using biometric
technologies to identify individuals. SAIC scientists are
playing a leading role in developing and deploying
biometric technologies and access control solutions for the
Department of Defense, the New York City Police
Department, the National Science Foundation, and others.
Biometrics uses an individual's unique physical
characteristics - such as a fingerprint, face, or iris - for
Fingerprint Image Enhancement: A critical step in personal identification. These biometric identifiers can be
automatic fingerprint matching is to automatically and converted to digital form and embedded into "smart"
reliably extract minutiae from the input fingerprint images. credentials, ID cards. The key component is an integrated
However, the performance of a minutiae extraction circuit chip that performs advanced cryptographic
algorithm relies heavily on the quality of the input functions and stores biometric templates tied to the user's
fingerprint images. In order to ensure that the performance unique biometric information.
of an automatic fingerprint identification/verification For the NYPD, SAIC is helping issue smart ID badges to
system will be robust with respect to the quality of the thousands of uniformed and civilian workers. The project
fingerprint images, it is essential to incorporate a includes implementation of an enhanced access control
fingerprint enhancement algorithm in the minutiae system using smart cards for police headquarters.
extraction module.
This smart card is designed to do many things, including
controlling physical access, logical access, encryption,
identification, time and attendance. Once it is printed and
loaded, it is expected that the card will be one of the most
sophisticated identification cards in the country.
For an important homeland defense initiative, SAIC The Immigration and Naturalization Service is letting a
researchers are helping the Defense Advanced Research select group of travelers bypass lengthy lines at New York's
Projects Agency (DARPA) develop automated biometric John F. Kennedy International Airport and Newark
identification technologies to detect, recognize and identify international Airport by sticking their bands and special
humans at a distance. cards the service has issued into an automated turnstile.
SAIC has been investigating numerous approaches for International Business Machines Corp. is working on a
discovering new biometric techniques for DARPA's Human project called FastGate to commercialize the service,
possibly having airline frequent-flier programs and
Identification at a Distance (Human ID) program. The goal:
develop technologies to provide critical early warning businesses pay for the program.
support for force protection and homeland defense against
terrorist, criminal, and other threats.
X. OTHER APPLICATIONS OF BIOMETRICS
SAIC's research has shown that new biometric methods are
viable for human identification based on medically verified
Biometrics is a rapidly evolving technology which is being
features of a person's heartbeat and pulse. Analyses indicate
widely used in forensics such as criminal identification and
that features can be extracted from standard medical
sensors, such as electrocardiograms, that provide good prison security, and has the potential to be used in a large
identification of individuals across a range of mental and range of civilian application areas. Biometrics can be used
to prevent unauthorized access to ATMs, cellular phones,
emotional states. These approaches can be fused with
conventional biometrics, such as fingerprints or facial smart cards, desktop PCs, workstations, and computer
recognition, for more accurate identification. networks. It can be used during transactions conducted via
telephone and internet (electronic commerce and electronic
In addition, SAIC is helping DARPA identify and banking). In automobiles, biometrics can replace keys with
implement facial recognition algorithms from scientific key-less entry devices.
documentation.
SAIC's efforts on the Human ID program also will aid the
development, integration, and deployment of additional • Travel and transportation
biometric systems and advanced database management • Border control
systems such as a face-recognition system and associated • Homeland security
database currently being developed for another government • Healthcare
customer. • Banking and finance
• Access control
• Airport security
• Law enforcement
IX. CURRENT USE OF BIOMETRICS
• Automotive
• Cyber security
There are many uses that biometrics is being used today • Biometrics in government: e-authentication
and the future holds more advances. At Coca-Cola Co., • Encryption and watermarking.
hand-scanning machines recently replaced the venerable
time card for many workers. In New Jersey and six other X. CONCLUSION
states, fingerprint scanners are now used to crack down on
people claiming welfare benefits under two different
Current electronic security systems, which rely primarily
names. In Cook County, Illinois, a sophisticated camera
on passwords, personal identification numbers, and
that analyzes the iris patterns of an individual's eyeball is
authentication tokens (smart cards) to ensure that a client is
helping ensure that the right people are released from jail.
an authorized user of a system, all have a common
At Purdue University in Indiana, the campus credit union is
vulnerability, the verification can be lost, stolen,
installing automated teller machines with a finger scanner
duplicated, or guessed. With the use of biometric
that will eliminate the need for plastic bankcards and
technology, this vulnerability can be nearly eliminated.
personal identification numbers.
The advances in accuracy and usability and decreasing cost
MasterCard International Inc. and Visa USA Inc., the
have made the biometric technology a secure, affordable
world's two largest credit card companies, have begun to
and cost effective way of identifying individuals. Biometric
study the feasibility of using finger-scanning devices at the
parameters such as fingerprint scanning, iris scanning,
point of sale to verify that the card user is really the card
retinal scanning, hand geometry, signature verification,
holder. The scanners would compare fingerprints with
voice verification and others are all well established with
biometric information stored on a microchip embedded in
their own particular characteristics. The limiting factors of
the credit card.
speed and band width are now a thing of the past and their
practical performance might in many instances be better
Walt Disney World in Orlando has started taking hand than expected.
scans of people who purchase yearly passes. These visitors
now must pass through a scanner when entering the park
preventing them from lending their passes to other people.
Different organizations place different value on information
protection. Pharmaceutical companies and technology
companies will get great lengths to protect against security
threats to protect their data and patents. These types of
companies may wish to use biometrics to increase security
levels.

While too possibilities for biometrics are great, biometric


technology may not be the answer for everyone. The costs
per user for some solutions may still be too high. Also to be
considered, are the legal considerations of using biometrics,
specifically privacy issues. However, for some, biometrics
may be the answer.

XI. REFERENCES

[1] www.bioenabletech.com/

[2]www.eyenetwatch.com/biometric_technology/technolo
gies.html

[3]www.ravirajtech.com/biometrics_fingerprint_technolo
gy.html

[4]www.biometrics.gov/Documents/biointro.pdf
[5] www.blackhat.com/presentations/bh.../bh-us-02-smith-
biometric.ppt

[6]cracs.fc.up.pt/~mcoimbra/lectures/PSI.../PSI_2007_
PCorreia.pdf

[7] http://www.cbel.com/biometrics_security/

You might also like