Skip to main content

Biometric Security Technology

INTRODUCTION

The word biometrics comes from the Greek words “bios” (life) and “metrikos” (measure). Strictly speaking, it refers to a science involving the statistical analysis of biological characteristics. Thus, we should refer to biometric recognition of people, as those security applications that analyze human characteristics for identity verification or identification. However, we will use the short term “biometrics” to refer to “biometric recognition of people”.


MAIN FOCUS OF THE ARTIClE

This article presents an overview of the main topics related to biometric security technology, with the central purpose to provide a primer on this subject. Biometrics can offer greater security and convenience than traditional methods for people recognition. Even if we do not want to replace a classic method password or handheld token) by a biometric one, for sure, we are potential users of these systems, which will even be mandatory for new passport models. For this reason, it is useful to be familiarized with the possibilities of biometric security technology.

BIOMETRIC TRAITS

Biometric traits can be split into two main categories:

  • Physiological biometrics: it is based on direct measurements of a part of the human body. Fingerprint (Maltoni et al., 2003), face, iris and hand-scan (Faundez-Zanuy, Navarro-Mérida, 2005) recognition belong to this group. 
  • Behavioral biometrics: it is based on measurements and data derived from an action performed by the user, and thus indirectly measures some characteristics of the human body. Signature 

However, this classification is quite artificial. For instance, the speech signal (Faundez-Zanuy and Monte, 2005) depends on behavioral traits such as semantics, diction, pronunciation, idiosyncrasy, etc. (related to socio-economic status, education, place of birth, etc.) (Furui, 1989). However, it also depends on the speaker’s physiology, such as the shape of the vocal tract. On the other hand, physiological traits are also influenced by user behavior, such as the manner in which a user presents a finger, looks at a camera, etc. 

Verification and Identification

  • Identification: In this approach no identity is claimed from the user. The automatic system must determine who the user is. If he/ she belongs to a predefined set of known users, it is referred to as closed-set identification. However, for sure the set of users known (learnt) by the system is much smaller than the potential number of people that can attempt to enter. The more general situation where the system has to manage with users that perhaps are not modeled inside the database is referred to as open-set identification. Adding a “none-of-the-above” option to closed-set identification gives open-set identification. The system performance can be evaluated using an identification rate. 
  • Verification: In this approach the goal of the system is to determine whether the person is the one that claims to be. This implies that the user must provide an identity and the system just accepts or rejects the users according to a successful or unsuccessful verification. Sometimes this operation mode is named authentication or detection. The system performance can be evaluated using the False Acceptance Rate (FAR, those situations where an impostor is accepted) and the False Rejection Rate (FRR, those situations where a user is incorrectly rejected), also known in detection theory as False Alarm and Miss, respectively. There is a trade-off between both errors, which has to be usually established by adjusting a decision threshold. The performance can be plotted in a ROC (Receiver Operator Characteristic) or in a DET (Detection error trade-off) plot (Martin et al., 1989).

Security and Privacy

A nice property of biometric security systems is that security level is almost equal for all users in a system. This is not true for other security technologies. For instance, in an access control based on password, a hacker just needs to break only one password among those of all employees to gain access. In this case, a weak password compromises the overall security of every system that user has access to. Thus, the entire system’s security is only as good as the weakest password (Prabhakar, Pankanti & Jain, 2003). This is especially important because good passwords are nonsense combinations of characters and letters, which are difficult to remember (for instance, “Jh2pz6R+”). 



Comments

Popular posts from this blog

HOW CAN WE MOTIVATE OURSELVES MORE EFFECTIVELY THROUGH REINFORCEMENT?

•We'd all like to be more effective in reaching our goals, and according to behaviorists, the way to improve our effectiveness is by rewarding ourselves for the little steps that take us closer and closer to those desirable outcomes.  •First, find something you really like to do or something you'd like to have that can, realistically, serve as a reward.  •Then, take the goal that you are hoping to achieve that, realistically, you could achieve but just haven't succeeded at yet.  •Next, work backward from that goal to your present state.  •Arrange to give yourself those desired rewards as you inch closer from where you are now to the desired end point.  •As you start to make progress, only give yourself a reward when you've moved forward from where you are now.  •For example, if you'd like to cut back on your television watching and instead read more often, reward yourself by allowing yourself to watch television only when you've read for 20 minutes,

15 Did You Know Fact that will surprise you

1) Did you know that this colourful little chap is the Costa Rican Variable Harlequin toad aka the Clown frog. 2) Did you know that the Karni Mata Hindu Temple in Rajasthan, India, is also known as the Temple of Rats. The temple is famous for the approximately 25,000 revered black rats that live there. Visitors play with and feed the rats and even sometimes drink from the same milk and eat the same food. 3) Did you know that vanilla flavoring is sometimes made with the urine of beavers. 4) Did you know that Botox is made from botulinium toxin which is considered the most deadly substance in the World as half a pound would be enough to wipe out the entire World population. Almost all the Botox in use throughout the World is made in one single factory in Ireland. 5) Did you know that tuna swim at a continuous steady rate of about 14km per hour for their whole life until they die. Whilst alive they never stop moving as if they stop they are unab

WHY DO WE SLEEP AND DREAM?

•We spend about one-third of our lives sleeping.  •Why do we invest so much time in sleep?  •The most straight forward answer is that, sleep is restorative, and it replenishes the body's energy stores.  •However, intense neural activity during rapid eye movement (REM) sleep, the stage in which most dreams occur, suggests there may be more to the story.  •One theory, which by far has the largest body of evidence, is that sleep plays a critical role in learning and consolidating memories.  •It is probably why infants and toddlers need up to 14 hours of sleep a day, with half of it spent in REM sleep.  •In adults, dreams may also play a role in brain plasticity and learning, which is why sleep-deprived adults perform worse in memory tests and tasks.