Escolar Documentos
Profissional Documentos
Cultura Documentos
com
www.fullinterview.com
www.chetanasprojects.com
Fingerprint Verification and User Identity –
Maintaining Privacy
ABSTRACT
Biometrics is the science of measuring and statistically analyzing
biological data. By using biometric technology, the body itself becomes a password.
algorithms, then by comparing the data with a digital file in order to determine if
programs, implementation issues relating to user privacy are paramount. The tie
between the actual identity of an individual and the daily use of the biometric is
delicate and provokes much debate, particularly relating to privacy and societal
issues. This paper seeks to clarify some of these issues by providing a framework,
INTRODUCTION
societal identifiers such as passport number, and social security number, and
breeder data or documents, such as a birth certificate or passport, that are used to
The use of the word recognizes is generally defined as “identify as already known”.
www.1000projects.com 1
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
In other words, a biometric system does not establish the identity of an individual in
any way; it merely recognizes that they are who they say they are (in a verification
system), or that they were not previously known to the system (in a “negative
3) A biometric can be used in a “verification” mode that the individual is the valid
holder (either physically or logically) of the identifier by which they are known to
The fact that identification can be used to achieve two modes of operation,
positive and negative, means that the holder of a biometric template that is used for
one purpose can use it for the other. Biometrics is typically analyzed in a particular
way (typically known as the algorithm). For example, a fingerprint can be analyzed
biggest fear of privacy advocates. For example, the use of a finger minutiae record
potentially be used to link to another database for other purposes. Templates that
are created purely for the purposes of verification, such as the Bioscrypt template,
www.1000projects.com 2
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
are not designed for use with biometric identification. This explicitly limits the
potential misuse of such templates and helps to maintain user privacy, as described
2 User Registration/Enrollment
Consider the various steps comprising the registration of a new user within an
Registration
. User Enrolled
. Bioscrypt Template
.
• An administrator of the system establishes the unique identity of the individual
As described above, this is typically achieved through the use of so-called “breeder
documents” such as birth certificate etc., but may also include a search over a
www.1000projects.com 3
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
• If the individual is identified as unique, the security system will establish the
individual as a new user of the system, and assign a unique identifier by which they
• The individual will be instructed to enroll their biometric and the biometric system
• The template will be bound to the identifier, by binding them together using
Subsequently, when the user requests to use a service or initiate a transaction, the
• An individual establishes a claim to the system that they are a valid user of the
• The security system ensures that the user record of the claimed user is available to
selecting it within the biometric system), where it will be unbound to produce the
template and identifier. As part of the unbinding process, either the security system
www.1000projects.com 4
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
or the biometric system (or both) may verify the authenticity of the user record, by,
• The individual is requested to verify that they are the valid owner of the user
record, by comparing a live biometric sample with that represented by the template
• If a successful match occurs, the identifier that was stored in the user record is
relayed to the security system where the user is authorized, according to their
3 User Privacy
www.1000projects.com 5
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
This separation between the verification of the individual and the authorization of
biometric system and the rights and privileges that the user is assigned by the
revocation of a user’s rights and privileges (for example, a passport number may
need to be revoked).
2) This process also prevents identity theft, as an attacker cannot simply overwrite a
legitimate user record with his own (if he has access to both on a portable medium
such as a smart card), as he would also need to have a valid identifier on the system.
3) From a privacy perspective, it is important that the User is known only to the
system by their identifier. This point is crucial for maintaining user privacy as the
system only need ever know that the identifier that was established for the user at
4) Biometrics can not only be used to link to a particular identifier (for example,
bank account details), but it can be used to link together several identifiers (thus
designed to link databases will allow function creep, whereas a pattern based
www.1000projects.com 6
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
Bioscrypt’s fingerprint templates have been carefully designed to produce
the most robust verification algorithm in the world. This is achieved by using a
image enhancement routine. During this process, the image is filtered, smoothed,
Feature such as creases, cuts, abrasions, and pores that appear inconsistently or
move from place to place within the image are removed. In this way, the data that
Bioscrypt uses for comparison are the entire ridge pattern, which remains
unchanged throughout a person’s lifetime. The end points of the ridges, or minutiae
will typically be removed from the image during this process. Secondly, the
Bioscrypt technique estimates and removes the relative distortion between the
unique and patented approach, every ridge of the candidate is aligned with every
ridge of the template image providing maximum use of the entire fingerprint image.
Subsequent to the removal of the distortion, the ridge patterns are correlated,
emphasizing areas in which the images are clean and highly complex and down
weighting area where the images are noisy or bland. This combination of pattern-
bifurcations, bridges, etc). Generally, all other information from the fingerprint is
eliminated.
Subsequently, the minutiae list from the candidate is compared to the list
from the template and a decision is made based on the fraction of overlapping
www.1000projects.com 7
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
points. Minutiae based templates are designed to be compatible with identification
databases. Bioscrypt’s pattern based template is not compatible with these minutiae
Conclusion:
In the biometry context, the threat to individual rights and privacy does not come
from the positive identification of the person, but from the capacity of third-party
entities to access the personal data in an identifiable form and link it with other
information, which leads to a secondary usage of the data without the consent of the
targeted person. This means that the individual does not have control anymore over
dictate the use and diffusion of the personal data concerning the individual; it is
linked to the freedom of choice. Without the possibly of using a certain control over
the use of one’s personal data, the respect of privacy becomes an empty notion.
www.1000projects.com 8
www.fullinterview.com
www.chetanasprojects.com
www.1000projects.com
www.fullinterview.com
www.chetanasprojects.com
The efficacy and usefulness of the biometric identification techniques, depending on
the objective, is such that we cannot hope to abolish or eliminate not only their
usage, but also their evolution and expansion. However, we will have to insure that
the use of such techniques will be made in just balance between society’s needs and
References:
www.webville.com
www.biometrics.org
www.securenet.com
www.1000projects.com 9
www.fullinterview.com
www.chetanasprojects.com