Professional Documents
Culture Documents
(BIOMETRICS
networks. It can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices
Biometrics technology allows determination and verification of one's identity through physical characteristics. To put it simply, it turns your body into your password. These characteristics can include face recognition, voice recognition, finger/hand print scan, iris scans and even retina scans. Biometric systems have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored patterns for identification.
(BIOMETRICS
2.0
A person's identity can be resolved in two ways: identification and verification. The former involves identifying a person from all biometric measurements collected in a database and this involves a one-to-many match also referred to as a 'cold search". "Do
I know
who you are?" Is the inherent question this process seeks to answer. Verification involves authenticating a person's claimed identity from his or her previously enrolled pattern and this involves a one-to-one match. The .question it seeks to answer is, "Are you claim to be?"
2.1
VERIFICATION
Verification requires comparing a person's fingerprint to one that pass previously recorded in the system database. The person claiming an identity provided a fingerprint, typically by placing a finger on an optical scanner. The computer locates the previous fingerprint by looking up the person's identity. This process is relatively easy because the computer needs to compare two-
(BIOMETRICS
fingerprint record (although most systems use two fingerprints from each person to provide a safety factor). The verification process is referred as a 'closed search' because the search field is limited. The second question is "who is this person?" This is the identification function, which is used to prevent duplicate application or
enrollment. In this Case a newly supplied fingerprint is supplied to all others in the database. A match indicates that the person has already enrolled/applied.
SNqCE, %adayiruppu
2.2 IDENTIFICATION
The identification process, also known as an 'open search', is much more technically demanding. It involves many more comparisons and may require differentiating among several database fingerprints that are similar to the objects.
(BIOMETRICS
(Dept. of Computer Science and Engg. 4 SNgCE, "Kadayiruppu 3.0 BIOMETRIC SYSTEMS AND DEVICES
A biometric system is a combined hardware/software system for biometric identification or verification. Therefore the system should be able to:
Receive biometric samples from an enrollee or candidate. Extract biometric featured from the sample. Compare the sample of the candidate with stored templates
from individuals.
(BIOMETRICS
Recognition occurs when an individual's is matched with one of a group of stored images.
SNgCE, 'Kadayiruppu
identical individuals.
In the most common context, both False Rejection and False Acceptance represent a security hazard.
(BIOMETRICS
S5VgC% Kadayiruppu
Signature recognition.
Speaker recognition.
Keystroke dynamics
(BIOMETRICS
(BIOMETRICS
Ma tell scor e
=> Data collection subsystem It is also called data acquisition system. It comprises of input device or sensor that reads the biometric information from the user. It then converts biometric information into a suitable form for processing by the remainder of the biometric system. Examples of data collection subsystems are video camera, fingerprint scanner, microphone, etc. Various requirements for data collection involves the following
(BIOMETRICS
" Sampled biometric characteristic must be similar to the user's enrolled template. The users may require training. <Deft. of Computer Science aruffcngg.
8
SNQCE, 'Kfldayiruppu
Adaptation of the user's template or reenrollment may be necessary to accommodate changes in physiological characteristics.
Sensors must be similar, so that biometric features are measured consistently at other sensors.
Various changes that can happen in the biometric system are the following:
The biometric feature may change. The presentation of the biometric feature at the sensor may change. The performance of the sensor itself may change. The surrounding environmental conditions may change. => Signal processing subsystem
This subsystem is used mainly for feature extraction. It receives the biometric data from the data collection subsystem and transforms the data into the form required by the matching subsystem. It is in this subsystem the discriminating features are extracted from the raw biometric data and also filtering may be applied to remove noise.
=> Matchingsubsystem
The matching subsystem plays the key role in the biometrics system. It receives processed biometric data from signal processing subsystem and biometric template from the storage subsystem. It then measures the similarity of the claimant's sample with the reference template. The result is a number known as match score.
(BIOMETRICS
The decision subsystem interprets the match score from the matching subsystem. A threshold is defined. If the score is above the threshold,
SNgCE, Kadayiruppu
(BIOMETRICS
the user is authenticated. If it is below, the user is rejected. Typically a binary decision yes or no may require more than one submitted samples to reach a decision. The subsystem may reject a legitimate claimant or accept an imposter.
*
=> Storage subsystem The storage subsystem maintains the templates for enrolled users. There will be one or more templates for each user. The templates may be stored in physically protected storage within the biometric device or conventional database or portable tokens such as a smartcard. => Transmission subsystem Subsystems are logically separate units. Some subsystems may be physically integrated. Usually, there are separate physical entities in a biometric system. The biometric data has to be transmitted between the different physical entities as the biometric data is vulnerable during transmission. => Enrolment Enrolment involves data collection and feature extraction. It is the process through which the user's identity is bound with biometric template data. Biometric template is stored in a database or an appropriate portable token. There may be several iterations of this process to refine biometric template. => Security 6f enrolment Requirements for enrolment: Secure enrolment procedure. Binding of the biometric template to the enrollee. Check of template quality and matchability.
10
SNgCE, Kadayiruppu
(BIOMETRICS
5.3 ERRORS
I
There are mainly two types of errors. They are:
11
SNgCE, Kadayiruppu
(BIOMETRICS
There are several components to a system that uses fingerprints to identify or verify the identity of an Individual. Figure 1 illustrates the most common basic model for use of fingerprints In government-based the five identification and utilize applications, fingerprint flies, incorporating An Individual
functions performed by information systems to manage submits fingerprint samples either through a live scan or card scan system. The fingerprint images are processed into digital data files, These files are transmitted to a centralized database, where they are compared to a stored database of Images also processed into digital data files. In order to the explain finger the print finger print identification system, identification
system used for border security is explained below. Figure 1: Fingerprint processing model.
6.1 CAPTURE There are several methods to capture fingerprint images, and the choice has typically been determined by the specific requirements of the application and the constraints of a particular environment. In government applications, where collection of a fingerprint sample is sometimes a step in the legal process, the priority is collecting as much (Dept. of Computer Science anfQZngg. SNQCE, %pJdyiruppu
12
data from the fingers as possible, and processing time is rarely a factor. This is why the FBI takes full ten print, rolled fingerprints, despite the longer time it
(BIOMETRICS
takes to collect these prints. Such a large sample also increases accuracy, as each individual fingerprint increases the amount of data collected.
Alternatively, where the INS is required to process large volumes of individuals quickly, they have traditionally placed a greater priority on speed of process. This is why in the past the INS has collected impressions of only two index fingers.
For either application, storage of biometric images in WSQ format is crucial to preserving the interoperability of the biometric system. This is important in ensuring the usability of the fingerprints by new systems and techniques as they are developed in the future. The extractions of features and patterns from a fingerprint image rely on proprietary methods, making true interoperability between different systems difficult. Capturing and storing a high quality image ensures that any system or technology can make use of all images in a database perpetually.
Two ways to capture fingerprints are live scan and card scan. A live scan approach involves the use of optical scanners designed specifically for capture of fingerprints. They are used by placing and/or rolling the fingers onto'a glass platen. Scanning technology below the platen creates an image of the finger(s), and the image is processed using software residing on an associated PC or local computer network.
A card scan approach involves the use of consumer-grade scanners designed for document and photograph scanning. These can be used by first impressing fingers onto a card, using ink or inkless paper, and then placing the card in the scanner. The scanner then takes the image of the
13
SWQCE, Kjidayiruppu
card, and software residing on an associated PC or local computer network processes the image. For state and federal system usage, the FBI maintains a rigorous image quality testing and certification program that every live scan and card scan system must pass before a particular make and model can be used.
6.2 PROCESS:
Minutiae Extraction
(BIOMETRICS
Ridge Ending
Bifurcatio n
Minutiae extraction is the process of converting an image of a fingerprint to a set of data points that can be subsequently compared numerically to other
14
SNgCE, Kadayiruppu
data sets. These data "points of interest" are called minutiae, and are comprised of two primary features of fingerprints: ridge endings and ridge bifurcations. (See
Figure 2)
(BIOMETRICS
Minutiae files are smaller than image files and are ideal for storage at the point of application, but are not typically interoperable between equipment from different vendors. To ensure future usability of the biometric, the image must be stored. It remains to be seen whether a standardized minutiae template model will be widely adopted.
In a typical system, type, location, and angle are recorded for each point of interest. Proposed standards specify that a Cartesian coordinate system is used to represent the location of a minutia, in units of pixels. Image resolution is also required. Also specified by the proposal, the origin of the coordinate system is located in the upper left, with values increasing in value to the right and downward.
An important area of work for standards groups such as INCITS M1 and ISO JTC 1 SC37 is to standardize the definition of minutiae locations and angles. Only then will biometric data extracted by different equipment be effectively compared and matched.
6.3 MATCHING Matching of fingerprints lies at the heart of a fingerprint system. It is the process by which mathematical algorithms are used to compare a data set of minutiae of a single fingerprint to another or several others. These matching algorithms typically generate a match "score", and then compare this score to a threshold that is associated with some level of confidence that the two prints belong to the same finger.
6.4 STORING (compressing) WSQ (wavelet scalar quantization) is the fingerprint image compression algorithm that is the standard for the exchange of fingerprint images across government biometric systems, as defined in the ANSI/NIST
The Interchange O f Fingerprint, Facial, and Scar/Mark/Tattoo (Dept. of Computer Science and (Engg.
15
SNgCE, %adayiruppu.
(BIOMETRICS
standard from law enforcement agencies in July of 1S9S and from civilian agencies shortly thereafter.
16
SNgCE, Kadayiruppu
(BIOMETRICS
[Fingerprint
Identification
UnitFIU-001/500 by Sony]
17
SNgCE, Kadayiruppu
(BIOMETRICS
Capacitive Sensor
Thermal Sensor
(BIOMETRICS
BioMouse
18
(BIOMETRICS
integrated into a customer's security system. VeriFinger fingerprint recognition engine, integrated with the data management system, is used in our other product, person identification system Finger Point.
Delphi* source code of the exampre program using the library provided functions (not available in Linux version).
s Software description.
Access tools (DLLs) for Compaq and LLare.U fingerprint scanners and source code of the sample programs, where VeriFinger 3.3 engine is used with these scanners, are optionally available.
19
SNgCE, Kadayiruppu
(BIOMETRICS
False rejection rate False acceptance rate Required fingerprint resolution Fingerprint processing time Matching speed Size of one record in the database Maximum database size Program occupied array size
<3% < 0.001 % > 250 dpi 0.35 second 5000* fingerprints/second About 150 Bytes
SNgCE, Kadayiruppu
8.1
Most of the leading banks have been experimenting with biometrics of ATM machines use arid as general means of combining card fraud. Surprisingly, these experiments have rarely consisted of carefully integrated devices into a common process, as could be achieved with certain biometric devices. Previous comments in this paper
concerning user psychology come to mind here one wonder why we have not seen a more professional and carefully considered
implementation from this sector. The banks will of course have a view concerning the level of fraud and cost of combating it via technology solutions such as biometrics. They will also express concern about potentially alienating customers with such as approach. However, it still surprises many in the biometric industry that the banks and financial institutions have so far failed to embrace this technology with any enthusiasm,
8.2 WORKSTATION AND NETWORK ACCESS. For a long time this was an area often discussed but rarely implemented until recent developments aw the unit price of
biometric devices fall dramatically as well as several designs aimed squarely at this application. In addition, with household names such
(BIOMETRICS
as Sony, Compaq, KeyTronics, Samsung and others entering the market, these devices appear almost as a standard computer peripheral. Many are viewing this as the application, which will provide critical mass for biometric industry and create the transition between sci-fi device to regular systems component, thus raising public awareness and lowering resistance to the use of biometrics in general.
21
SNgCE, Kadayiruppu
(BIOMETRICS
would simplify things considerably. It is interesting to note that certain device manufactures have collaborated with key encryption providers to provide an enhancement to their existing services. Perhaps we shall see some interesting developments in this area in the near future.
SNgCE, 'Kadayiruppu
automated processes. However, voice verification is a difficult area of biometrics, especially if one does not have direct control over the transducers, as indeed you wouldn't when dealing with the general public. The variability of telephone handsets coupled to the variability of line quality and the variability of user environments presents a significant challenge to voice verification technology, and that is before you even consider the variability in understanding among users.
The technology can work well in controlled closed loop conditions but is extraordinarily difficult to implement on anything approaching a large scale. Designing in the necessary error correction and fallback procedures to automated systems in a user-friendly manner is also not a job for the faint hearted.
Perhaps we shall see further developments, which will largely overcome these problems. Certainly there is a commercial incentive to do so and I have no doubt that much research is under way in this respect.
8.6 PUBLIC
IDENTITY CARDS.
A biometric incorporated into a multi purpose public ID cards would be useful in a number of scenarios if one could win public support for such a scheme. Unfortunately, in this country as in others there are huge numbers of individuals who definitely do not want to be identified. This ensures that any such proposal would quickly become a political hot potato and a nightmare for the minister concerned. You may consider this a shame-or a good thing, depending on your point of view. From a dispassionate technology perspective it represents something of a lost opportunity, but this is of course nothing new. It's interesting that certain local authorities in the UK have issued 'citizen' cards with which named cardholders can receive various benefits including discounts
23
SN<jCE, Kadayiruppu
at local stores and on certain services. These do not seem to have seriously challenged, even though they are in effect an ID card.
24
S$fgC% %adayiruppu
9.0 CONCLUSION
The ultimate form of electronic verification of a person's identity is biometrics, using a physical attribute of the person to make a positive identification. People have always used the brain's innate ability to recognize a familiar face and it has long been known that a person's fingerprints can be used for identification. The challenge has been to turn these Into electronic processes that are inexpensive and easy to use.
Banks and others who have tested biometric-based security on their clientele, however, say consumers overwhelmingly have a pragmatic response to the technology. Anything that saves the informationoverloaded citizen from having to remember another password or personal identification number comes as a welcome respite.
Biometrics can address most of the security needs, but at what cost? Surprisingly, the benefits quickly outweigh the costs. Like so many technological developments, innovative people have found new ways to implement biometric systems, so prices have come down dramatically ;n the last year or two. As prices have come down, the interest level and the knowledge about how to effectively utilize these systems have increased. So the investment is decreasing and the recognizable benefits are increasing. Biometrics, when properly implemented, not only increase security but also often are easier to use and fess costly to administer than the less secure alternatives. Biometrics can't be forgotten or left at home and they don't have to be changed periodically like passwords.
SXgC% Kf&zyimppu
<BIOfflET$JCS
INDEX Chapter
1.
2. 3. 4, 5. 6. 7. 8. 9.
Contents
Introduction. Identification and Verification Systems. Biometric Systems and Devices. Biometric Methods. Biometric System Architecture. Fingerprint Technology, Fingerprint Recognition: Overview.
*
Page No.
1-2 3-4 5-6 7 8-11 12-16 17-20 21-24 25 26
S!N~gCE, XacCayiruppu
10.