Biometric Authentication Technology: Submitted To: Submitted by
Biometric Authentication Technology: Submitted To: Submitted by
org
Seminar report
On
www.studymafia.org www.studymafia.org
1
www.studymafia.org
Preface
I have made this report file on the topic Biometric Authentication Technology; I have
tried my best to elucidate all the relevant detail to the topic to be included in the report.
While in the beginning I have tried to give a general view about this topic.
2
www.studymafia.org
INTRODUCTION
Humans recognize each other according to their various characteristics for ages.
We recognize others by their face when we meet them and by their voice as we speak to
them. Identity verification (authentication) in computer systems has been traditionally
based on something that one has (key, magnetic or chip card) or one knows (PIN,
password). Things like keys or cards, however, tend to get stolen or lost and passwords
are often forgotten or disclosed.
To achieve more reliable verification or identification we should use something
that really characterizes the given person. Biometrics offer automated methods of identity
verification or identification on the principle of measurable physiological or behavioural
characteristics such as a fingerprint or a voice sample. The characteristics are measurable
and unique. These characteristics should not be duplicable, but it is unfortunately often
possible to create a copy that is accepted by the biometric system as a true sample. This is
a typical situation where the level of security provided is given as the amount of money
the impostor needs to gain an unauthorized access.
In this computer-driven era, identity theft and the loss or disclosure of data and
related intellectual property are growing problems. We each have multiple accounts and
use multiple passwords on an ever-increasing number of computers and Web sites.
Maintaining and managing access while protecting both the user's identity and the
computer's data and systems has become increasingly difficult. Central to all security is
the concept of authentication - verifying that the user is who he claims to be.
We can authenticate an identity in three ways: by something the user knows (such
as a password or personal identification number), something the user has (a security token
or smart card) or something the user is (a physical characteristic, such as a
fingerprint,called a biometric).
Passwords are cheap, but most implementations offer little real security.
Managing multiple passwords for different systems is a nightmare, requiring users to
maintain lists of passwords and systems that are inevitably written down because they
can't remember them. The short answer, talked about for decades but rarely achieved in
practice, is the idea of single sign-on.Using security tokens or smart cards requires more
expense, more infrastructure support and specialized hardware. Still, these used to be a lot
3
www.studymafia.org
cheaper than biometric devices and, when used with a PIN or password, offer acceptable
levels of security, if not always convenience.
Biometric authentication has been widely regarded as the most foolproof - or at
least the hardest to forge or spoof. Since the early 1980s, systems of identification and
authentication based on physical characteristics have been available to enterprise IT.
These biometric systems were slow, intrusive and expensive, but because they were
mainly used forguarding mainframe access or restricting physical entry to relatively few
users, they proved workable in some high-security situations. Twenty years later,
computers are much faster and cheaper than ever. This, plus new, inexpensive hardware,
has renewed interest in biometrics.
Who are you? Do you belong here? What rights do you have? And how do I know
you're who you say you are? Those are the essential questions that any effective security
system must answer before a user can access a computer system, network or other
protected resource. We think this is what a password system does, but passwords are only
one part of an effective security system. That security system requires three separate
elements - identification, authentication and authorization - that together make up what's
called access control.When you log into a computer or network, the first thing you're
asked for is a user name or account name. But a user name offers little protection to the
system. Therefore, the system also usually prompts you for a password, a form of
authentication.
1.1 Authentication
The question, "How do I know you're who you say you are?," is in many ways, the
most important one. Unless it's answered satisfactorily, identification is incomplete and
no authorization can or should take place. But how does a system verify that a user is who
he says he is? Simply entering your password doesn't prove it's you. Someone else could
know your password. The answer lies in a strong authentication process. Basically, the
following three factors can be used to authenticate an individual:
1. Something the user knows. This is a reusable password, passphrase, personal
identification number or a fact likely to be known only to the user, such as his
mother's maiden name.
4
www.studymafia.org
2. Something the user has. This could be a key, a magnetic-stripe card, a smart card
or a specialized authentication device (called a token) that generates a one-time
password or a specific response to a challenge presented by the server.
3. Something the user is. This depends on some inherent physical trait or
characteristic. Often called biometrics, examples of this form of authentication
include: fingerprints, retinal (eye) patterns, hand geometry, voice recognition,
facialrecognition, typing pattern recognition and signature dynamics (speed and
pressure, not just the outline).
These authentication factors are listed here from weakest to strongest as determined
by how difficult they are to forge or fake. By themselves, each of these methods offers
some security. However, each has its own problems or weaknesses.
Anyone can enter a password and, historically, reusable passwords have been
vulnerable to guessing, brute force and dictionary-based attacks.The second means of
authentication - something the user has - requires the user to possess an often difficult-to-
replicate device. However this stronger protection also costs more (typically tens of
dollars per device), and it requires contingency procedures in case a device is left at
home, lost or stolen. The third type of authentication - something the user is - is the most
difficult to defeat, but it has other problems. Biometric identification methods are subject
to two types of errors: false positives and false negatives. The first erroneously
authenticates an individual who shouldn't be authenticated; the second denies an
individual who should be authenticated. Error are not desirable, and it's important to
know and verify error rates when considering such a system. [1]
Another problem is that permanent physical changes or temporary ailments or
accidents can alter or render unreadable the measured characteristic. If you cut part of
your fingertip, you've changed what the fingerprint reader sees. Put on a Band-Aid, and
the reader can't see the fingerprint at all.
Finally, if the method is compromised, there's no way to give an individual a new
identifying characteristic. You can issue a new password or security token, but you can't
change his fingerprints or eye pattern.
5
www.studymafia.org
For greatly increased security, the approach preferred by experts is to use two of the
three methods in combination - a process called two-factor authentication. For example,
to use a security token that generates a one-time password, you may need to enter a
personal identification number into the token itself. Similarly, a card-key can be used in
combination with a biometric system.
This is essentially what happens when you check in at an airport ticket counter. You
hand over your ticket, which identifies you. Then you show a photo ID of some kind.
This is something you have with you, and it's biometric (something you are) in that the
clerk has to determine that the photo on the card matches you.
Once a user has been identified and authenticated, what remains is to grant him
access to whatever specific system resources have been approved. This authorization is
usually accomplished by looking up that user's entry in an access control list that
delineates specific rights and permissions. These can be based, among other things, on an
individual's identity or job function, membership in a workgroup or other classification or
time of day or day of week.
6
www.studymafia.org
number is supposed to be for that user at that particular time. Some tokens don't show a
number continuously but require the user to enter a PIN on the card itself before the
number is displayed, thus providing two-factor authentication.
7
www.studymafia.org
Two different stages are involved in the biometric system process – enrollment and
matching.
8
www.studymafia.org
Biometrically enabled security systems use biometrics for two basic purposes:
identification andverification.
9
www.studymafia.org
10
www.studymafia.org
1.4.2 Transmission
Some, but not all, biometric systems collect data at one location but store and/or
process it at another. Such systems require data transmission. If a great amount of data is
11
www.studymafia.org
12
www.studymafia.org
depend only upon the speaker and not upon the words being spoken, the health status of
the speaker, or the speed, volume and pitch of the speech. There are as many wonderfully
creative mathematical approaches to feature extraction as there are scientists and
engineers in the biometrics industry. You can understand why such algorithms are always
considered proprietary. Consequently, in an open system, the “open” stops here.In
general, feature extraction is a form of non-reversible compression, meaning that the
original biometric image cannot be reconstructed from the extracted features. In some
systems, transmission occurs after feature extraction to reduce the requirement for
bandwidth.
After feature extraction, or maybe even before, we will want to check to see if the
signal received from the data collection subsystem is of good quality. If the features
“don’t make sense” or are insufficient in some way, we can conclude quickly that the
received signal was defective and request a new sample from the data collection
subsystem while the user is still at the sensor. The development of this “quality control”
process has greatly improved the performance of biometric systems in the last few short
years. On the other hand, some people seem never to be able to present an acceptable
signal to the system. If a negative decision by the quality control module cannot be
overridden, a “failure to enroll” error results.
The feature “sample”, now of very small size compared to the original signal, will
be sent to the pattern matching process for comparison with one or more previously
identified and stored feature templates or models. We use the term “template” to indicate
stored features. The features in the template are of the same type as those of a sample. For
instance, if the sample features are a “vector” in the mathematical sense, then the stored
template will also be a “vector”. The term “model” is used to indicate the construction of
a more complex mathematical representation capable of generating features characteristic
of a particular user. Models and features will be of different mathematical types and
structures. Models are used in some speaker and facial recognition systems. Templates
are used in fingerprint, iris, and hand geometry recognition systems.
The term “enrollment” refers to the placing of a template or model into the
database for the very first time. Once in the database and associated with an identity by
external information (provided by the enrollee orothers), the enrollment biometric data is
referred to as the template ormodel for the individual to which it refers.The purpose of the
patternmatching process is to compare a presented featuresample to the stored data,and to
13
www.studymafia.org
1.4.4 Storage
The remaining subsystem to be considered is that of storage. There will beone or
more forms of storage used, depending upon the biometric system.Templates or models
from enrolled users will be stored in a database forcomparison by the pattern matcher to
incoming feature samples. For systemsonly performing “one-to-one”matching, the
database may be distributedon smart cards, optically read cards or magnetic stripe cards
carriedby each enrolled user. Depending upon system policy, no central databaseneed
exist, although in this application a centralized database can be usedto detect counterfeit
cards or to reissue lost cards without re-collecting thebiometric pattern.
The database will be centralized if the system performs one-to-Nmatching with N
greater than one, as in the case of identification or “PIN-lessverification” systems. As N
gets very large, system speed requirementsdictate that the database be partitioned into
smaller subsets such that anyfeature sample need only be matched to the templates or
models stored inone partition, or indexed by using an appropriate data structure
14
www.studymafia.org
1.4.5 Decision
The decision subsystem implements system policy by directing the
databasesearch, determines “matches” or “non-matches” based on the distanceor
similarity measures received from the pattern matcher, and ultimatelymakes an
“accept/reject” decision based on the system policy. Such a decisionpolicy could be to
reject the identity claim (either positive or negative)of any user whose pattern could not
be acquired. For an acquired pattern,the policy might declare a match for any distance
lower than a fixedthreshold and “accept” a user identity claim on the basis of this
singlematch, or the policy could be to declare amatch for any distance lower thana user-
dependent, time-variant, or environmentally linked threshold andrequire matches from
multiple measures for an “accept” decision. Thepolicy could be to give all users,good
guys and bad guys alike, three tries toreturn a low distance measure and be “accepted” as
matching a claimedtemplate. Or, in the absence of a claimed template, the system policy
couldbe to direct the search of all,or only a portion,of the database and return asingle
match or multiple “candidate” matches. The decision policyemployed is a management
decision that is specific to the operational andsecurity requirements of the system. In
general, lowering the number offalse non-matches can be traded against raising the
number of falsematches. The optimal system policy in this regard depends both upon
thestatistical characteristics of the comparison distances coming from thepattern matcher,
15
www.studymafia.org
the relative penalties for false match and false non-matchwithin the system,and the a
priori (guessed in advance) probabilities that auser is, in fact, an impostor. In any case, in
the testing of biometric devices,it is necessary to decouple the performance of the signal
processingsubsystem from the policies implemented by the decision subsystem.
16
www.studymafia.org
1.6.2 False Reject Rate (FRR) or False Non-Match Rate (FNMR): The probability
thatthe system incorrectly declares failure of match between the input pattern and the
matchingtemplate in the database. It measures the percent of valid inputs being rejected.
1.6.4 Equal Error Rate (EER): The rates at which both accept and reject errors are
equal.
ROC or DET plotting is used because how FAR and FRR can be changed, is shown
clearly.
When quick comparison of two systems is required, the ERR is commonly used.
Obtainedfrom the ROC plot by taking the point where FAR and FRR have the same
value. The lowerthe EER, the more accurate the system is considered to be.
1.6.5 Failure to Enroll Rate (FTE or FER): The percentage of data input is
consideredinvalid and fails to input into the system. Failure to enroll happens when the
data obtained bythe sensor are considered invalid or of poor quality.
1.6.6 Failure to Capture Rate (FTC): Within automatic systems, the probability that
thesystem fails to detect a biometric characteristic when presented correctly is
generallytreatedas FTC.
1.6.7 Template Capacity: It is defined as the maximum number of sets of data which
canbeinput in to the system.
17
www.studymafia.org
18
www.studymafia.org
Chapter – 2
19
www.studymafia.org
BIOMETRIC TECHNIQUES
There are lots of biometric techniques available nowadays. A few of them are in
the stage of the research only (e.g. the odour analysis), but a significant number of
technologies is already mature and commercially available (at least ten different types of
biometrics are commercially available nowadays: fingerprint, finger geometry, hand
geometry, palm print, iris pattern, retina pattern, facial recognition, voice comparison,
signature dynamics and typing rhythm).
Fingerprint readers
Before we can proceed any further we need to obtain the digitalized fingerprint.
The traditional method uses the ink to get the fingerprint onto a piece of paper. This piece
of paper is then scanned using a traditional scanner. This method is used only rarely today
when an old paper-based database is being digitalised, a fingerprint found on a scene of a
crime is being processed or in law enforcement AFIS systems. Otherwise modern live
fingerprint readers are used. They do not require the ink anymore. These live fingerprint
readers are most commonly based on optical, thermal, silicon or ultrasonic principles.
20
www.studymafia.org
Optical fingerprint readers are the most common at present. They are based on reflection
changes at the spots where the finger papilar lines touch the reader’s surface.[3]
The size of the optical fingerprint readers typically is around 10x10x5 cms. It is
difficult to minimize them much more as the reader has to comprise the source of light,
reflection surface and the light sensor.
The optical fingerprint readers work usually reliably, but sometimes have
problems with dust if heavily used and not cleaned. The dust may cause latent
fingerprints, which may be accepted by the reader as a real fingerprint. Optical fingerprint
readers cannot be fooled by a simple picture of a fingerprint, but any 3D fingerprint
model makes a significant problem, all the reader checks is the pressure. A few readers
are therefore equipped with additional detectors of finger liveness.
Optical readers are relatively cheap and are manufactured by a great number of
manufacturers. The field of optical technologies attracts many newlyestablished firms
(e.g., American BiometricCompany, Digital Persona) as well as a few big and well-
known companies (such as HP, Philips or Sony). Optical fingerprintreaders are also often
embedded in keyboards, mice or monitors.Silicon technologies are older than the optical
technologies.They are based on the capacitance of the finger. The dc-capacitive
fingerprint sensors consist of rectangular arrays of capacitors on a silicon chip. One plate
of the capacitor is the finger, the otherplate is a tiny area of metallization (a pixel) on the
21
www.studymafia.org
chip’s surface.One places his/her finger against the surface of the chip (actuallyagainst an
insulated coating on the chip’s surface). The ridges ofthe fingerprint are close to the
nearby pixels and have high capacitanceto them. The valleys are more distant from the
pixels nearestthem and therefore have lower capacitance.
Such an array of capacitors can be placed onto a chip as small as 15 x 15x 5 mm
and thus is ideal for miniaturization. A PCMCIA card (the triple height of a credit card)
with a silicon fingerprint reader is already available. Integration of a fingerprint reader on
a credit card-sized smartcard was not achieved yet, but it is expected in the near future.
Silicon fingerprint readers are popular also in mobile phones and laptop computers due to
the small size.
Fingerprint processing
Fingerprints are not compared and usually also not stored as bitmaps. Fingerprint
matching techniques can be placed into two categories: minutiae-based and correlation
22
www.studymafia.org
based. Minutiae-based techniques find the minutiae points first and then map their
relativeplacement on the finger. Minutiae are individual unique characteristics within the
fingerprint pattern such as ridge endings, bifurcations,divergences, dots or islands (see the
picture on the followingpage). In the recent years automated fingerprint comparisons
havebeen most often based on minutiae.
The problem with minutiae is that it is difficult to extract theminutiae points
accurately when the fingerprint is of low quality.This method also does not take into
account the global pattern of ridges and furrows. The correlation-based method is able to
overcomesome of the difficulties of the minutiae-based approach.However, it has some of
its own shortcomings. Correlation-basedtechniques require the precise location of a
registration point andare affected by image translation and rotation.
The readability of a fingerprint depends on a variety of work and environmental
factors. These include age, gender, occupation and race. A young, female, Asian mine-
worker is seen as the most difficult subject. A surprisingly high proportion of the
population have missing fingers, with the left forefinger having the highest percentage at
0.62%. There are about 30 minutiae within a typical fingerprint image obtained by a live
fingerprint reader. The number and spatial distribution of minutiae varies according to the
quality of the fingerprint image, finger pressure, moisture and placement. In the decision
process, the biometric system tries to find a minutiae transformation between the current
distribution and the stored template. The matching decision is then based on the
possibility and complexity of the necessary transformation. The decision usually takes
from 5 milliseconds to 2 seconds.
The speed ofthe decision sometimesdepends onthe security leveland the
negativeanswer very oftentakes longertime than the positive one (sometimes even 10
times more).There is no direct dependency between the speed and accuracy ofthe
matching algorithm according to our experience. We have seenfast and accurate as well
as slow and less accurate matching algorithms.
The minutiae matching
is aprocess where two
sets ofminutiae are
compared
todecidewhether
theyrepresentthe same
finger or not.
23
www.studymafia.org
The minutiae found in the fingerprint image are also used to store the fingerprint for
future comparisons. The minutiae are encoded and often also compressed. The size of
such a master template usually is between 24 bytes and one kilobyte. Fingerprints contain
a large amount of data. Because of the high level of data present in the image, it
ispossible to eliminate falsematches and reduce the number of possiblematches to a
smallfraction. This means that the fingerprint technology can be usedfor identification
even within large databases. Fingerprint identificationtechnology has undergone an
extensive research and developmentsince the seventies. The initial reason for the effort
wasthe response to the FBI requirement for an identification searchsystem. Such systems
are called Automated Fingerprint IdentificationSystems (AFIS) and are used to identify
individuals in large databases (typically to find the offender of a crime according to
afingerprint found at the crime scene or to identify a person whose identity is unknown).
AFIS systems are operated by professionalswho manually intervene the minutiae
extraction and matching processand thus their results are really excellent. In today’s
criminaljustice applications, the AFIS systems achieve over 98% identificationrate while
the FAR is below 1%.The typical access control systems, on the other side, are
completelyautomated. Their accuracy is slightly worse. The qualityof the fingerprint
image obtained by an automated fingerprint readerfrom an unexperienced (non-
professional) user is usually lower. Fingerprint readers often do not show any fingerprint
preview and so the users do not know if the positioning and pressure of the finger is
correct. The automatic minutiae extraction in a lower quality image is not perfect yet.
Thus the overall accuracy of such a system is lower.[1][3]
Some newer systems are based not only on minutiae extraction,they use the length
and position of the papilar lines as well. Afew system take into account even pores
(theirspatial distribution), but the problem with pores is that they are too dependent on
thefingerprint image quality and finger pressure.Most of the biometric fingerprint systems
use the fingerprintreader to provide for the fingerprint bitmap image only, whole
theprocessing and matching is done by a software that runs on a computer(the software is
often available for Microsoft Windows operating systems only). There are currently only
very few fingerprintdevices that do all the processing by the hardware.Themanufacturers
of the fingerprint readers used to deliverthe fingerprint processing software with the
hardware. Today, themarket specializes. Even if it is still possible to buy a
fingerprintreader with a software package (this is the popular way especially for the low-
24
www.studymafia.org
end devices for home or office use) there are manymanufacturers that produce fingerprint
hardware only (e.g. fingerprintsilicon chips by Thomson) or software companies that
offerdevice-independent fingerprint processing software (e.g. Neuro-dynamics).Device-
independent software is not bound to imagesobtained by one single input devices, but
their accuracy is very lowif various input devices are mixed.[7]
2.2 Iris
The iris is the coloured ring of textured tissue that surrounds the pupil of the eye.
Even twins have different iris patterns and everyone’s left and right iris is different, too.
Research shows that the matching accuracy of iris identification is greater than of the
DNA testing.[7]
The iris pattern is taken by a special gray-scale camera in the distance of 10–40
cm from the camera (earlier models of iris scanners required closer eye positioning). The
camera is hidden behind a mirror, the user looks into the mirror so that he/she can see
his/her own eye, then also the camera can “see” the eye. Once the eye is stable (not
moving too fast) and the camera has focused properly, the image of the eye is captured
(there exist also simpler versions without auto-focus and with a capture button).
The PC iris uses a hand-held personal iris imager that functions as a computer
peripheral.The user holds the imager in his hand, looks into the camera lens from a
25
www.studymafia.org
distance of 10 cm and presses a button to initiate the identification process. The Iris
Access is more advanced. It is auto-focus and has a sensor that checks whether an
individual hasstepped in front of the camera. It is also able to guide the person audily into
the correctposition.
The iris scanner does not need any special lighting conditions or any special kind of light
(unlike the infrared light needed for the retina scanning). If the background is too dark
any traditional lighting can be used. Some iris scanners also include a source of light that
is automatically turned on when necessary. The iris scanning technology is not intrusive
and thus is deemed acceptable by most users. The iris pattern remains stable over a
person’s life, being only affected by several diseases. Once the gray-scale image of the
eye is obtained then the software tries to locate the iris within the image. If an iris is
found then the software creates a net of curves covering the iris. Based on the darkness of
the points along the lines the software creates the iriscode, which characterizes the iris.
When computing the iriscode two influences have to be taken into account. First, the
overall darkness of the image is influenced by the lighting conditions so the darkness
threshold used to decide whether a given point is dark or bright cannot be static, it must
be dynamically computed according to the overall picture darkness. And second, the size
of the iris dynamically changes as the size of the pupil changes. Before computing the
iriscode, a proper transformation must be done.
In the decision process the matching software given 2 iriscodes computes the
Hamming distance based on the number of different bits. The Hamming distance is a
score(within the range 0 – 1, where 0 means the same iriscodes), which is then compared
with the security threshold to make the final decision. Computing the Hamming distance
of two iriscodes is very fast (it is in fact only counting the number of bits in the exclusive
OR of the two iriscodes). Modern computers are able to compare over 4 000 000 iriscodes
in one second. The iriscode is computed very fast and takes 256 bytes. The probability
that 2 different irises could produce the same iriscode is estimated as low as 1: 10 78. The
probability of two persons with the same iris is very low (1:10 52).
An iris scan produces a high data volume which implies a high discrimination
(identification) rate. Indeed the iris systems are suitable for identification because they are
very fast and accurate. Our experience confirms all that. The iris recognition was the
fastest identification out of all the biometric systems we could work with. We have never
encountered a false acceptance (the database was rate not very large, however) and the
26
www.studymafia.org
false rejection rate was reasonably low. The manufacturer quotes the equal error rate of
0.00008%, but so low false rejection rate is not achievable with normal (nonprofessional)
users. It is said that artificial duplication of the iris is virtually impossible because of the
unique properties. The iris is closely connected to the human brain and it is said to be one
of the first parts of the body to decay after death. It should be therefore very difficult to
create an artificial iris or to use a dead iris to fraudulently bypass the biometric system if
the detection of the iris liveness is working properly. We were testing an iris scanning
system that did not have any countermeasures implemented. We fooled such a system
with a very simple attack. The manufacturer provided us with a newer version of the
system after several months. We did not succeed with our simple attacks then, but we
wish to note that we did not have enough time to test more advanced versions of our
attack.
2.3 Retina
Retina scan isbased on the bloodvessel pattern in theretina of the eye.Retina scan
technologyis older than theiris scan technologythat also uses a partof the eye. The
firstretinal scanning systemswere launchedby EyeDentify in1985. The main drawback of
the retina scan is its intrusiveness. The method of obtaining a retina scan is personally
invasive. A laserlight must be directed through the cornea of the eye. Also the operationof
the retina scanner is not easy. A skilled operator is requiredand the person being scanned
has to follow his/her directions.A retina scan produces at least the same volume of data as
afingerprint image. Thus its discrimination rate is sufficient not only for verification, but
also for identification. In the practice, however, the retina scanning is used mostly for
verification. The size of theeye signature template is 96 bytes.The retinal scanning
systems are said to be very accurate. Forexample the EyeDentify’s retinal scanning
system has reputedlynever falsely verified an unauthorized user so far. The false
rejectionrate, on the other side, is relatively high as it is not always easyto capture a
perfect image of the retina.
Retina is not directly visibleand so a coherent
infraredlight source is necessary toilluminate the retina.
Theinfrared energy is absorbedfaster by blood vessels in
theretina than by the surroundingtissue. The image of
the retina blood vessel pattern is then analysedfor
characteristic points within the pattern. The retinascan is
more susceptible to some diseases than the iris scan,but
such diseases are relatively rare. [6]
27
www.studymafia.org
Retinal scanningis used only rarelytoday because it isnot user friendly andstill
remains veryexpensive. Retinascan is suitable forapplications wherethe high security
isrequired and the user’sacceptance is nota major aspect. Retinascan systems areused in
many U.S.prisons to verify theprisoners before theyare released.The check of the eye
liveness is usually not of a significant concern as themethod of obtaining the retina blood
vessel pattern is rather complicated and requiresan operator.[2]
28
www.studymafia.org
use special guide markings to position the hand better and have two (both vertical and
horizontal) sensors for the hand shape measurements. So, sensors from this category
handle data from all the three dimensions.
Hand geometry scanners are easy to use. Where the hand must be placed
accurately, guide markings have been incorporated and the units are mounted so that they
are at a comfortable height for majority of the population. The noise factors such as dirt
and grease do not pose a serious problem, as only the silhouette of the hand shape is
important. The only problem with hand geometry scanners is in the countries where the
public do not like to place their hand down flat on a surface where someone else’s hand
has been placed.A few hand geometry scanners produce only the video signal with the
hand shape. Image digitalization and processing is then done in the computer. On the
other side there exist very sophisticated and automated scanners that do everything by
themselves including the enrollment, data storage, verification and even simple
networking with a master device and multiple slave scanners. The size of a typical hand
geometry scanner is considerably big (30 x 30 x 50 cm). This is usually not a problem as
the hand geometry scanners are typically used for physical access control (e.g. at a door),
where the size is not a crucial parameter. Hand geometry does not produce a large data set
(as compared to other biometric systems). Therefore, given a large number of records,
hand geometry may not be able to distinguish sufficiently one individual from another.
The size of the hand template is often as small as 9 bytes. Such systems are not suitable
for identification at all. The verification results show that hand geometry systems are
suitable for lower level security application. The hand geometry systems are used for
example at the Disney Theme Parks in the US or were used at the 1996 Olympic Games
in Atlanta.The manufacturers advertise the crossover accuracy about0.1%. These numbers
are difficult to obtain in reality. FAR of 3% and FRR of 10% at the middle security
threshold are more realistic.The verification takes about one second. The speed is not a
crucial point because the hand geometry systems can be used for verification only.
29
www.studymafia.org
A person does not make a signature consistently the same way,so the data
obtainedfrom a signature from a person has to allowfor quite some variability. Most of
the signature dynamics systemsverify the dynamics only, they do not pay any attention to
the resultingsignature. A few systems claim to verify both (i.e. the signaturedynamics as
well as the resulting signature look itself). Ourexperience shows that if the system does
not verify the resulting signature, then the signature that is accepted as a true match
maylook significantly different from the master template. The speedof writing is often the
most important factor in the decision process,so it is possible to successfully forge a
signature even if theresulting signature looks so different that any person would
notice.We have tried simple attempts to sign as other users as wellas simulation of attacks
where the attacker has seen a user signingonce or several times. Our results show that
individuals’ ability to fake signature dynamics substantially improves after they see
theway the true signers sign.
The size of data obtained during the signing process is around20 KB. The size of
the master template, which is computed from 3to 10 signatures, varies from around 90
bytes up to a few kilobytes. Even if the size of the master template is relatively high the
signaturerecognition has problems with match discrimination and thusis suitable for
verification only.The accuracy of the signature dynamics biometric systems is not high,
the crossover rate published by manufacturers is around2%, but according to our own
experience the accuracy is muchworse.The leading companies in the signature systems
are Cyber-Sign, PenOp and Quintet.
31
www.studymafia.org
dependent on the quality of the camera used. In poor light condition, individual
featuresmay not be easily discernible. There exist even infrared camerasthat can be used
with facial recognition systems.
Most of facial recognition systems require the user to stand aspecific distance
away from the camera and look straight at thecamera. This ensures that the captured
image of the face is withina specific size tolerance and keeps the features (e.g., the eyes)
in assimilar position each time as possible.
The first task ofthe processing softwareis to locate theface (or faces) withinthe
image. Then thefacial characteristicsare extracted. Facialrecognition technology has
recently developed into two areas: facial metrics and eigenfaces.Facial metrics
technology relies on the measurement of the specificfacial features (the systems usually
look for the positioning ofthe eyes, nose and mouth and the distances between these
features).Another method for facial recognition has been developed inthe past three years.
The method is based on categorizing facesaccording to the degree of fit with a fixed set of
150 master eigenfaces.This technique is in fact similar to the police method of creating a
portrait, but the image processing is automated and basedon a real picture here. Every
face is assigned a degree of fit to each of the 150 master eigenfaces, only the 40 template
eigenfaces with the highest degree of fit are necessary to reconstruct the face with the
accuracy of 99%.
The image processingand facialsimilarity decisionprocess is done bythe computer
softwareat the moment,this processing requiresquite a lotof computing powerand so it is
noteasy to assemble astand-alone devicefor face recognition. There are some efforts (by
companies like Siemens) to create a special-purpose chip with embedded facerecognition
instruction set.
The accuracy of the face recognition systems improves withtime, but it has not
been very satisfying so far. According to ourexperience there is still a potential for
improving the algorithms forface location. The current software often does not find the
face atall or finds “a face” at an incorrect place. This significantly makesthe results worse.
Better results can be achieved if the operatoris able to tell the system exactly where the
eyes are positioned.The systems also have problems to distinguish very similar per- sons
like twins and any significant change in hair or beard style requiresre-enrollment. Glasses
can also cause additional difficulties.The quoted accuracy of facial recognition systems
varies significantly,many systems quote the crossover accuracy of less than onepercent.
32
www.studymafia.org
The numbers from real systems are not so pleasant, thecrossover accuracy is much higher
and indicates that these systemsare not suitable for identification. If security is the main
concernthen even the verification accuracy may not be sufficiently good.Facial
recognition systems are offered by a great number ofsuppliers nowadays, to name a few
of them: Miros, Neurodynamicsor Visionics.[7]
The face recognition system does not require any contact with the person and can
be fooled with a picture if no countermeasuresare active. The liveness detection is based
most commonly on facialmimics. The user is asked to blink or smile. If the image
changes properly then the person is considered “live”. A few systemscan simultaneously
process images from two cameras, fromtwo different viewpoints. The use of two cameras
can also avoidfooling the system with a simple picture. [5]
Positive
Database
Negative
33
www.studymafia.org
34
www.studymafia.org
rejection rate after three attempts was 4.3%. Atrial at UBS’s Ubilab achieved the equal
error rate of 0.16% after aone attempt.
2.8.3 DNA
DNA sampling is rather intrusive at present and requires a formof tissue, blood or
other bodily sample. This method of capture stillhas to be refined. So far the DNA
analysis has not been sufficientlyautomatic to rank the DNA analysis as a biometric
technology.The analysis of human DNA is now possible within 10 minutes. Assoon as
the technology advances so that DNA can be matched automaticallyin real time, it may
become more significant. At present DNA is very entrenched in crimedetection and so
will remain inthe law enforcement area for the time being.
35
www.studymafia.org
36
www.studymafia.org
Chapter – 3
PRACTICAL ISSUES
*Universality: This means that every person should have thecharacteristics. It is really
difficult to get 100% coverage. There are mute people, people without fingers or with
injuredeyes. All these cases must be handled.
*Uniqueness: This means that no two persons should be the same in terms of the
biometric characteristics. Fingerprintshave a high discrimination rate and the probability
of twopersons with the same iris is estimated as low as 1:1052.Identical twins, on the other
side, cannot be easily distinguishedby face recognition and DNA-analysis systems.
37
www.studymafia.org
*Permanence: This means that the characteristics should beinvariant with time. While
the iris usually remains stableover decades, a person’s face changes significantly with
time.The signature and its dynamics may change as well and thefinger is a frequent
subject to injuries.
*Collectability: This means that the characteristics must bemeasured quantitatively and
obtaining the characteristicsshould be easy. Face recognition systems are not intrusiveand
obtaining of a face image is easy. In the contrast theDNA analysis requires a blood or
other bodily sample. Theretina scan is rather intrusive as well.
*Acceptability: This indicates to what extend people are willing to accept the biometric
system. Face recognition systemsare personally not intrusive, but there are countries
wheretaking pictures of persons is not viable. The retina scannerrequires an infrared laser
beam directed through the corneaof the eye. This is rather invasive and only few users
accept this technology.
38
www.studymafia.org
39
www.studymafia.org
store the template: in a card, in the central database ona server, on a workstation or
directly in an authentication terminal.
The storage in an authentication terminal cannot be used for large-scale systems,
in such a case only the first two possibilities are applicable. If privacy issues need to be
considered then the storageon a card has an advantage, because in this case no
biometricdata must be stored (and potentially misused) in a central database.The storage
on a card requires a kind of a digital signature of themaster template and of the
association of the user with the mastertemplate. Biometric samples as well as the
extracted features are very sensitive data and so the master template should be
storedalways encrypted no matter what storage is used.As soon as the user is enrolled,
he/she can use the system forsuccessful authentications or identifications. This process is
typicallyfully automated and takes the following steps:
Acquisition(s)
The current biometric measurements must be obtained for thesystem to be able to
make the comparison with the master template.These subsequent acquisitions of the
user’s biometric measurementsare done at various places where the authentication ofthe
user is required. This might be user’s computer in the office, anATM machine or a sensor
in front of a door. For the best performancethe kind of the input device used at the
enrollment and forthe subsequent acquisitions should be the same. Other conditionsof use
should also be as similar as possible with the conditions atthe enrollment. These includes
the background (face recognition), the background noise (voice verification) or the
moisture (fingerprint).While the enrollment is usually guided by trained personnel,the
subsequent biometric measurements are most commonly fullyautomatic and unattended.
This brings up a few special issues. Firstly, the user needs to know how to use the device
to provide the sample in the best quality. This is often not easy because the devicedoes
not show any preview of the sample obtained, so for examplein the case of a fingerprint
reader, the user does not know whetherthe positioning of the finger on the reader and the
pressure is correct.Secondly, as the reader is left unattended, it is up to the readerto check
that the measurements obtained really belong to a livepersons (the liveness property). For
example, a fingerprint readershould tell if the fingerprint it gets is from a live finger, not
from amask that is put on top of a finger. Similarly, an iris scanner shouldmake sure that
the iris image it is getting is from a real eye not apicture of an eye. In many biometric
40
www.studymafia.org
Comparison
The currently computed characteristics are then compared withthe characteristics
obtained during enrollment. This process is verydependent on the nature of the biometric
technology used. Sometimesthe desired security threshold is a parameter of the
matchingprocess, sometimes the biometric system returns a score within a range. If the
system performs verification then the newly obtained characteristics are compared only
with one master template(or with a small number of master templates, e.g. a set of
mastertemplates for a few different fingers). For an identification request the new
characteristics are matched against a large number of mastertemplates (either against all
the records in the database or if thedatabase is clustered then against the relevant part of
the database)
41
www.studymafia.org
Decision
The final step in the verification process is the yes/no decisionbased on the
threshold. This security threshold is either a parameterof the matching process or the
resulting score is compared withthe threshold value to make the final decision. In the case
of identification the user whose master template exceeds the thresholdis returned as the
result. If multiple master templates exceed thethreshold then either all these users are
returned as the result or thetemplate with the highest score is chosen. Although the error
rates quoted by manufactures (typically ERR < 1%) might indicate that biometric systems
are very accurate, the reality is rather different.
The accuracy of biometric systems used by non-professional usersis much lower.
Especially the false rejection rate is in reality veryhigh (very often over 10%). This
prevents the legitimate users togain their access rights and stands for a significant
problem of thebiometric systems.
* Access control systems. These systems are used by ordinaryusers to gain a privilege or
an access right. Securing such asystem is much more complicated task.Let us consider
further the general-use systems of the latter type,as this report is devoted solely to the use
of biometrics for the authentication.
42
www.studymafia.org
Some systems incorrectly assume that biometric measurementsare secret and grant
access when matching biometric measurementsare presented. Such systems cannot cope
with the situationswhen the biometric measurements are disclosed, because thebiometrics
cannot be changed (unless the user is willing to havean organ transplant). Moreover, the
user will not learn that his/herbiometric is disclosed. People leave fingerprints on
everythingthey touch, and the iris can be observed anywhere they look.Biometrics
definitely are sensitive data and therefore should beproperly protected, but they cannot be
considered secret. So the security of the system cannot be based on knowledge of
thebiometric characteristics. When using secret keys or passwords for authentication, a
common method to defeat replay attacksis to use a challenge-response protocol, in which
the passwordis never transmitted. Instead, the server sends a challenge thatcan only be
answered correctly if the client knows the correctpassword. Unfortunately, this method
does not apply to biometricdata. The difference between a password and a fingerprint is
that the password is supposed to be secret, while the fingerprint is not.[1]
Hence, replaying attacks are inherent with biometric authenticationschemes.The
only way how to make a system secure is to make sure that the characteristics presented
came from a real person and wereobtained at the time of verification.
43
www.studymafia.org
Authentication software
The biometric system must be convinced that the presented
biometricmeasurements come from a trusted input device and were captured at a certain
time. If the authentication is done on-device,the device itself should be trustworthy. If the
authentication is doneoff-device, then the operating environment of the software and
thecommunication link between the software and the device, have tobe secure. For
example, in a client-server application, if the clientworkstation is not trusted, then there is
no point authenticating a user using that workstation. If one chooses to run the
authenticationsoftware at the server side, then the communication link betweenthe server
and the device itself (not just the clientworkstation) hasto be secured. Otherwise, a
malicious party or even the workstationitself may intercept the communication and replay
recordedbiometric data. One way to defeat replaying attacks is to put a separate secret key
in the device and use challenge/response protocolwith this key. Obviously, the device has
to be trustworthy.The best solution probably is to use a TLS-like protocol withmandatory
authentication of both parties. In any case it is necessaryto transmit the whole biometric
measurements over the connection.
Either the reader sends the biometric measurements to theworkstation (or server or
whatever grants the access right) to make the match or the workstation provides the
master template to thereader that makes the matching. Hashing in the usual sense
andsending only the hash over the link does not help here, because thebiometric
measurements never are the same. To make it work we either would have to ensure that
the biometric measurements arealways the same (but see the warning below) or change
the hashfunction not to depend on all the input.One has to consider that 100% similarity
of two samples fromdifferent biometric measurements implies a good forgery. This istrue
with almost 100% probability.
44
www.studymafia.org
is based on keys. Secure storage of keys is a crucial non-trivial task. Key management
often is the weakest point of many systems. Secret and private keys mustbe kept secret,
and here the biometric technologies might help.Indeed, one of the most promising
applications of biometricsis the secret key protection. If a user’s local workstation is
trusted,then the problem of the authentication software is minor, but the inputdevice must
be trustworthy. The security concerns are the sameno matter whether the secret (or
private) keys are stored on a smart-card or on the hard disk of the workstation. If a user’s
workstation is not trusted, the private keys have to be stored in a separate secureplace,
usually a smartcard. Smartcard based solutions where the secret key is unlocked only
after a successful biometric verificationincrease the overall security, as the biometric data
does not need to leave the card. For smartcards the fingerprint techniqueswith a silicon
fingerprint reader are most commonly used today.It is necessary to distinguish securing a
key with biometrics andgenerating a key from biometrics. The latter does not work. It
mustbe pointed out that biometric data cannot be used as capability tokensin the same
way as secret keys or passwords. In secret key or password based access control schemes,
a key/password itself can be used as a capability. Knowing a secret key or a password
canmean that the user has the right to use certain application. However,this does not apply
to biometric data. As we already know biometricsare not secrets. One viable way is to use
digital certificates. Digital certificates can be used as capabilities or digital identitiesthat
allow users to access remote applications, while biometrics isused to secure the
access/usage of the private keys associated withthe digital certificates.[4]
Chapter – 4
CONCLUSION
Even if the accuracy of the biometric techniques is not perfectyet, there are many
maturebiometric systems available now. Properdesign and implementation of the
biometric system can indeedincrease the overall security, especially the smartcard based
solutionsseem to be very promising. Making a secure biometric systemsis, however, not
as easy as it might appear. The word biometricsis very often used as a synonym for the
45
www.studymafia.org
perfect security. This isa misleading view. There are numerous conditions that must be
takenin account when designing a secure biometric system. First, itis necessary to realize
that biometrics are not secrets. This implies that biometric measurements cannot be used
as capability tokensand it is not secure to generate any cryptographic keys from
them.Second, it is necessary to trust the input device and make the communicationlink
secure. Third, the input device needs to check theliveness of the person being measured
and the device itself should be verified for example by a challenge-response protocol.
REFERENCES
Google.com
Wikipedia.org
Studymafia.org
Pptplanet.com
46