What is Biometric data? Explain.
Biometric data is the present trending discussed topic in the past and present also. Previous discussion includes many research papers, proposals for strong biometric information (data) on passports. Many countries like Germany have already implemented this technology in Video Stores for authentication, fingerprint sensor integrated in laptops and even banks started using this biometric devices as well. Even though having wide range of trail uses and proposals, in many countries, this biometric data systems are not widely used for authentication purpose. In this report, we have discussed why biometric authentication is not a standard technique till now. We also analyzed that these biometric devices will make system safety and much more secure. Even though these devices cost high, it is also worth spending much more amount of money on these systems. Our results leads to a conclusion that in most of the cases, the trade-offs which need not to be consider user’s biometric data for authentication as compared to other alternative methods like password authentication.
Security is the most important aspect in the software industry. Many scientists have been proposed different methods like login/password, Personal Identification Number (PIN) etc. But if we look into the present security problems, these methods cannot prevent those problems. In order to overcome the problems, a new security system has been implemented i.e. Biometric data for authentication. Now a days, this technology is used in many places, like banks, market stores, companies, institutions, etc. Even we find finger print sensors in laptops (integrated with it) and also for computers connected as external device. Systems using biometric data introduces a new concept authentication paradigm – i.e. based on something like fingerprint, face ,iris etc. or you can do such as handwriting, voice etc.
It is study of automated method for genuinely recognizing things based on one or more intrinsic behavioral or physical traits. It is also described as study of Biometrics that discover ways to compare and make difference between things (individuals) using personal things (that we do) and physical characteristics (things we are). The general physical features used are eyes (IRIS and retina), facial features, hand geometry and fingerprints. The common examples for personal traits are handwriting and voice that are used to distinguish between persons. As these characteristics and traits are unique and universal for all individuals, these are commonly used in this system.
Before going into the detailed explanation about biometric authentication, Let us discuss the general view of access control model that is useful to understand how to keep the authenticaiton system secure. If we look at the following diagram, fig 2, it gives an overview about the model.
Fig 2. Overview of access control model.
The guard in the middle will give grant for the access to the system. For the decision, the guard uses the data to identify the authorization information and requesting source to find out if the given source is equal to the identified source. If it is equal, then the user was allowed to get access to the requested resource. If necessary, The decision taken by the guard is given to log in, so that it can be able to backtrack decisions.
In this report, we talk about the authentication process of the systems that is marked with the darker colored parts in the diagram. In this case, The source is biometric information provided by the person along with combination with other identification information. This information is sent to the guard. The guard use algorithms and it will perform a comparison with the stored information. If it matches, the user was allowed to get access. If not, no grant for the access. Biometric identification is the process of presenting the unknown person biometric data to the system. Then the system use the algorithms for processing the data and compares the data with the stored database until one matches. By this, the system will be able to identify the unknown personality (one to many). So there are many process to run, it takes a little time than that of biometric verification. Biometric verification is the process of providing biometric data to the system and it claims whether the particular identity belongs to this data or not (one to one). In most of the authentication processes, biometric verification is used[2].
Coming to the working of biometric system, A biometric system consists of a testing and an enrolment phase. The sample biometric data sets are produced and saved in enrollment phase, that are used for comparison in the authentication process. Each authorized user has to go with this step. In this phase, examples like fingerprints are as in digital information and saved in a database as PIN. If we come to the testing phase, when the person requested for the access of the system, the saved sample in the enrollment phase is used by the guard for decision whether to give grant access to the system or not. The important process for a biometric system is enrollment phase. This can be explained with an example. Suppose if the given sample data taken from a user for authentication, is not good enough, then there will be a high chance of refusing the access to that person[3].
In this section, we will look at the performance and security considerations. We know that as the technology gets improved, the old systems gets replaced by the new systems.[3] It is difficult to measure the performance of a biometric authentication. The main factor that tells about the system is accuracy that indicate whether the performance is good or bad. There are also other factors that need to be considered like speed, cost, storage and ease of use are also considered as well.[5]
Sometimes, biometric devices are not perfect and produces errors. If we look at an example, sometimes there are chances of authorized person is rejected by the system and also will get access for a non- authorized person. The probability of the rates of these errors are named as False acceptance and False rejection. In short they are called as FA and FR. For most of the systems, it is possible to tradeoff these types of errors against each other. This is done by increasing the threshold that is used for decision to make a match for these two biometric data. The FA and FR are dependent on each other. For a perfect system, there will be no errors and these rates (FA and FR) are almost zero. For a very secure system, the probability of FA rate is increased to almost zero that results in a high FR rate.
The time needed for the authentication process depends on the accuracy and thereby with the security of the system. If the system needs high security, i.e. high rate of FA, then the system could use more characteristic points that need to be compared for an authentication process. So for a more security system, the authentication time will be more as compared with the one with lower security. Therefore authentication systems having a FR and FA rates that affects the time of the authentication process.
Now let’s discuss the results of several optical, thermal and capacitive fingerprint scanners, one face recognition and iris scanner system. There are 3 scenarios about how to fool the biometric system.[4]
All fingerprint scanners are able to trick by using artificial gained data. The following methods are used in tricking the fingerprint recognition system:
Conclusion :
If we look at the above results and discussion, it seems to exist more advantages as compared to the disadvantages for biometric authentication systems. The biometric authentication is an interesting and presently the trending topic that has a lot of research going on and to be done on this area. It is also advised to use biometric authentication with other different authentication technologies. This use of multi factor authentication is more secure and research has to be made to improve the techniques and increase the applications of this technology.
References:
Anil K. Jain, Lin Hong, Sharath Pankanti, and Ruud Bolle, An identity- authentication system using ï¬Ângerprints. In Proceedings of the IEEE, volume 85 of 9, September 2007.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download