Você está na página 1de 8

BIOMETRICS

progeny, even among large populations


packed into a small space. Humans with
CONTENTS such capabilities appear to be limited to
those whose other senses are severely
impaired, such as the blind and deaf Helen
 Introduction
Keller (Young 1988). Hence biometric
 Operation
techniques involve 'metrics' or
 Types
measurements of some kind, rather than
 Threat to biometric privacy
depending merely on informal or
 Biometric fingerprints
subliminal methods
 Biometric theft
 Uses Biometrics is the technique of
 Conclusion studying the physical characteristics of a
ABSTRACT person such as fingerprints, hand

This paper basically gives the geometry, eye structure or voice pattern.

meaning and origin of the biometrics. It Biometrics is an ancient greek word

also deals with the identification, ‘bios’=life, ‘metron’=measure. Biometrics

operation and the types of biometrics and is used for uniquely recognizing humans

the fields in which they are used in. It also based on physical traits or behavior traits.

discusses about the threats and the Performance of biometric systems

problems that may be encountered in the is measured in terms of False Accept Rate

due course. Biometric fingerprints are (FAR), False Reject Rate (FRR).

specially discussed here.


BIOMETRIC
INTRODUCTION IDENTIFICATION

Among many other instances in


Research on biometrics began at
the animal world, mice and penguins are
San Jose State University under the
capable of using their factory senses, aided
auspices of the College of Engineering in
to some extent by other cues, to very
1994. This study was completed in
reliably recognize their parents and their
1997.The Biometric Consortium
established the National Biometric Test may be on a device carried by the person
Center at San Jose State University in the themselves (such as a smartcard, a watch
Spring of 1997. The Test Center has also or a ring), or in two of the above, or even
been carrying out applied research using all three.
currently available biometric technologies.
The various forms of identification are: -
OPERATION
 The identification of products and
packaging
Biometric applications depend on
 The identification of vehicles
comparing a new measure against a
 Te identification of animals
previously captured measure. In order to
establish the necessary reference-point,  Forms of identification which

some aspect of a person is measured; the show a category to which a person

measure may be processed; and the belongs, rather than specifying the

resulting data is stored. At a subsequent individual

time, the same aspect of a person is  Te gathering and use of

measured, and compared against the stored information about identified

data. If it is being used for authentication, individuals; and

the new data is compared against the data  Restrictions on individuals'


already in storage for that person. If it is movements, actions and
being used for identification, the entire behavior.
database is searched, in order to locate one
or more individuals that are a close fit to Alternatively the data may be subjected to
the new data. processing of some kind, and the results of
that processing stored instead. The kinds
Most biometrics technologies do of processing include:
not seek exact equality between the new
and the stored measures. Instead they have • Compression, in order to reduce
a pre-set tolerance range within which the transmission time and costs and/or
two are deemed to be sufficiently close. to require less storage space.
The biometric measure itself may be Compression algorithms are of
stored. several different kinds, involving:
o The arbitrary removal of
Data-storage may be in a central data;
location, or may be local to the place o The selective removal of
where it is used (e.g. in a particular data that has been
building where the person works), or it determined to be of
limited value to the Biometrics can be used in almost
matching process between any application that requires the accurate
new and stored measures; identification of an individual. This ranges
and/or from computers where a fingerprint scan
o Te selective inclusion of on the mouse can verify the identity of a
data that has been user to nuclear power plants where various
determined to be of biometrics are used to restrict access to the
considerable value to the critical systems.
matching process;
• Encryption, in order to make the Types of Biometrics
data inaccessible to someone who
intercepts it in transmission, or Fingerprint Recognition - Visual
accesses it in storage. Biometric The use of the ridges and
• Hashing by which is meant a valleys (minutiae) found on the surface
mathematical conversion that tips of a human finger to identify an
protects the measure from being individual.
meaningful to someone who
intercepts it in transit. Hashing
algorithms are of two kinds:
o Reversible processes, such
that the original measure
can be recovered by
someone who knows what Finger Geometry Recognition -
hashing algorithm was Visual/Spatial Biometric The use of 3D
used and geometry of the finger to determine
o 'One-way hash' identity.
algorithms, for which
no inverse algorithm is Face Recognition - Visual Biometric The
analysis of facial features or patterns for
known, with the result
the authentication or recognition of an
that the original
individual’s identity. Most face
measure cannot be
recognition systems either use eigenfaces
recovered from the
or local feature analysis.
hashed data.

Eyes - Iris Recognition - Visual


Where can biometrics be used?
Biometric The use of the features found in
the iris to identify an individual.
Typing Recognition - Behavioral
Biometric The use of the unique
characteristics of a persons typing for
establishing identity.

DNA Matching - Chemical Biometric


The identification of an individual using
the analysis of segments from DNA.

Ear - Visual Biometric The identification


of an individual using the shape of the ear.

Odour - Olfactory Biometric The use of


Eyes - Retina Recognition - Visual
an individual’s odor to determine identity.
Biometric The use of patterns of veins in
the back of the eye to accomplish
Gait - Behavioral Biometric The use of an
recognition
individuals walking style or gait to
determine identity.
Voice - Speaker Verification - Auditory
Biometric The use of the voice as a
BIOMTERIC FINGERPRINTS
method of determining the identity of a
speaker for access control. The electronic data from the two
fingerprints is stored in a database and is
Voice - Speaker Recognition - Auditory made available at necessary Department of
Biometric The determination of identity of Homeland Security immigration
a speaker use the characteristics of their inspectors. The electronic fingerprint data
voice. is associated with an issued visa for
Hand Geometry Recognition - The use verification and the privacy of the data is
of geometric features of the hand such as protected by storage in the database.
the lengths of fingers and the width of the
hand to identify an individual. The Department of State makes
Signature Recognition - data available in accordance with the law
Visual/Behavioral Biometric The governing the use of visa records, to
authentication of an individual by the agencies that require the information for
analysis of handwriting style, in particular law enforcement purposes.
the signature.
are many thousands of biometric
deployments around the world too
numerous to list here.

IS BIOMETRICS A THREAT TO
PRIVACY?

This is a main barrier to wider use


Where are biometric technologies of biometric systems. If a person's
currently deployed? biometric information is stolen, then their
privacy has definitely been breached.
Passports: However, if certain standards in
Research into the use of face information collection and protection are
recognition for inclusion in passports. met, then biometrics can be a privacy
Includes significant input into the enhancing tool. It is the aim of the
development of the new international Biometrics Institute to see these standards
biometric data standards. From 26 October and procedures put in place.
2005 all newly issued New Zealand and
Australian passports used a biometric IS THEFT OF A BIOMETRIC
identifier to continue to meet visa waiver
POSSIBLE?
requirements for travel to or through the
USA.
A user's biometric cannot be
changed like a password. A behavioural
Australian Customs Service biometric such as signature or handwriting
- Smart Gate System: cannot be 'stolen' but someone can learn to
sign or write like you to a certain extent. A
First fully operational face physiological biometric such as fingerprint
recognition system for border control in or face or iris image can be 'stolen' - a
the world. Processes aircrew at Sydney copy of raw biometric data (or a feature
Airport, has now been operating template) obtained by illegal means.
successfully for over a year. Ideally a biometric is what an individual
Others: possesses and another individual should
not be able to possess the same. What they

Biometrics is currently being used have is only a copy of the sensed or

in the national identification card schemes measured form of it.

of both Hong Kong and Malaysia. There


However, merely obtaining the chosen from a large enough vocabulary
data is not enough. The impostor will have will make it harder because the impostor
to present the biometric to the system as will need to learn all the phrases in the
well and fool the system in this regard. vocabulary (which may not even be
Some systems have "liveness" tests which public). Such systems are referred to as
can reject presentations such as "pseudo-multimodal".
fingerprints copied on plastic material or
faces shown as photographs. Clever ways USES OF BIOMETRICS
of circumventing such checks have also
been devised and there is no completely Biometrics may be used for
secure method. identification. An example of this is the
comparison by police investigators of
One cannot change a fingerprint if fingerprints from the scene of a crime
the fingerprint data is stolen - unlike a against a collection of prints from persons
password. One way to prevent such theft previously convicted of serious criminal
for biometrics such as iris or retinal scans offences. In some jurisdictions,
(which cannot be as easily obtained as government agencies are permitted to
fingerprints or faces) would be to not collect biometrics without a conviction, or
supply them in raw form to anyone, but in even a charge; and there are increasing
an encrypted form - what is being referred attempts to compulsorily or pseudo-
to as 'cancellable' biometrics. Keys used voluntarily acquire biometrics from many
for encryption and decryption can be categories of people only remotely
changed. It just makes it harder for the associated with crime (such as visitors to
thief to get a useful form of the data. prisons, and people in geographical and/or
temporal proximity to the scene of a
Multimodal systems can have an crime).
advantage in this regard. It is more
difficult to present the face as well as a Biometrics may be used for
fingerprint and sign like another person. authentication. A new measurement that
Text-dependent behavioural purports to belong to a particular entity is
biometrics are like a combination of compared against the data stored in
password and biometric in this regard. For relation to that entity. If the measurements
example, the way you write or speak match, the assertion that the person is who
particular phrases. If someone learns to they say they are is regarded as being
write like you or mimic your voice for authenticated. Some building access
these phrases well, you can change the schemes work this way, with the system
phrases being used. A random phrase
comparing the new measure against the transactions to be undertaken
company's employee database. anonymously, or using pseudonyms.
Organizations must appreciate that, in
CONCLUSIONS many cases, it is entirely feasible for them
to protect their interests without knowing
Biometrics is one of the most their clients' identities.
serious among the many technologies of
surveillance that are threatening the Government agencies, and some
freedom of individuals and of societies in corporations, are seeking to exercise
one possible future, biometrics will fall tighter control over individuals using
into ill-repute in relatively free countries. various forms of data surveillance,
But in authoritarian countries, biometrics underpinned by effective identification
will be successfully imposed on the schemes. Parliaments throughout the
population, resulting in freedoms being world may passively process bills put
reduced even further. Biometrics providers before them to facilitate such schemes.
will flourish by selling their technology to Alternatively, they may choose to actively
repressive governments, and achieve seek a balance between the organizational
footholds in relatively free countries by and collective interests on the one hand,
looking for soft targets, starting in some and the individual interests on the other. If
cases with animals and in others with they adopt this course, then they must
captive populations like the frail aged, proscribe unjustifiably intrusive schemes,
prisoners, employees, insurance promote the use of anonymous and
consumers, and welfare recipients. All pseudonymous transactions wherever
relatively free countries will become more practicable, and, except in carefully
repressive. Public confidence in justified and regulated cases, deny the
corporations and government agencies will multiple uses of identification schemes.
spiral much lower. This scenario leads
away from freedoms and towards REFERENCES:
subjugation of the individual to powerful
organizations. www.anu.edu.

It was concluded that www.google.com


organizations should consider whether the
nature of their relationships with www.wikipedia.com
individuals really requires identification,
or whether appropriate design can enable

Você também pode gostar