You are on page 1of 5

Biometrics refers to metrics related to human characteristics and traits.

Biometrics
authentication (or realistic authentication) is used in computer science as a form of
identification and access control. It is also used to identify individuals in groups that are under
surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and describe
individuals. Biometric identifiers are often categorized as physiological versus behavioral
characteristics. Physiological characteristics are related to the shape of the body. Examples
include fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of
behavior of a person like typing rhythm, gait, and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
Traditional methods of access control include token-based identification systems, such as a
driver's license or passport, and knowledge-based identification systems, such as a password or
personal identification number. Since biometric identifiers are unique to individuals, they are
more reliable in verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate use of this
information.
The advantages include:
AcceptanceAs most people are familiar with the use of fingerprinting for identification
purposes, it is generally accepted as a technology. Most people understand its applicability to
access control.
AccuracyBy and large, fingerprint technology is accurate. There is a small chance of
rejection of a legitimate print, i.e., there is a chance of accepting a false print or a chance of
rejecting a legitimate print. The chances of accepting a false print are very low.
Ease of useVery little time is required for enrolment with a fingerprint scanning system.
Unlike other biometric devices, such as retina scanners, fingerprint scanners do not require
concentrated effort on the part of the user. Accordingly, one could consider fingerprint scanning
to be relatively nonintrusive.
InstallationChanges in technology have made fingerprint scanners relatively easy to install
and inexpensive. Most fingerprint scanners are now very small and portable. Plug-and-play
technologies have made installation very easy. In many cases, the scanning device has been
incorporated into keyboards, mouse buttons and even notebook computers.
TrainingDue to the intuitive nature of scanning fingerprints, such devices require no training
to use and little training to support.
UniquenessAs noted previously, fingerprints are a unique identifier specific to the individual.
SecurityFingerprints cannot be lost or stolen, and are difficult to reproduce. Furthermore,
storing fingerprint templates as statistical algorithms rather than complete copies ensures that the
ability to reproduce these unique identifiers is significantly reduced.

The disadvantages include:


AcceptanceAlthough also an advantage, user acceptance is not guaranteed. Fingerprint
scanning crosses the fine line between the impersonal and nonintrusive nature of passwords and
personal identification numbers (PINs), and utilizing part of an individuals body to identify
him/her. As will be discussed, some people view this as an invasion of privacy13 or worse.
InjuryInjury, whether temporary or permanent, can interfere with the scanning process. In
some cases re-enrolment is required. For example, bandaging a finger for a short period of time
can impact an individual if fingerprint scanning is used in a wide variety of situations. Something
as simple as a burn to the identifying finger could prevent use of an automatic teller machine
(ATM).
SecurityAs some authors have argued, there is nothing to suggest that the same technology
that is used to store fingerprints as statistical algorithms cannot also be used or modified to
recreate accurate depiction of the print itself. This raises serious concerns related to how such
data should be stored, maintained and protected to prevent fraudulent use.

What is Hand Geometry?


Hand Geometry biometrics is based on the geometric shape of the hand - size of the palm,
length and width of the fingers, distance between the knuckles, etc

What are advantages and disadvantages of Hand Geometry?


Advantages of Hand Geometry Biometrics:

Simple, relatively easy to use and inexpensive


Hand geometry data is easier to collect, unlike the fingerprints where a good
frictional skin is required by imaging systems, and retinal data where special lighting
is required
Environmental factors, such as, dry weather that causes the drying of the skin is not
an issue
Usually considered less intrusive than fingerprints, retinal, etc

Disadvantages of Hand Geometry Biometrics:

The hand geometry is not unique and cannot be used in identification systems
Not ideal for growing children
Jewelry (rings, etc), limited dexterity (arthritis, etc) etc may pose a challenge in
extracting the hand geometry information
The data size of hand geometry biometrics is large and is not ideal for using it in
embedded systems

Iris Recognition
Iris cameras perform recognition detection of a persons
identity by mathematical analysis of the random patterns that are
visible within the iris of an eye from some distance. It combines
computer vision, pattern recognition, statistical inference and
optics.
Of all the biometric devices and scanners available today, it is
generally conceded that iris recognition is the most
accurate. The automated method of iris recognition is relatively
young, existing in patent since only 1994.
The iris is the coloured ring around the pupil of every human
being and like a snowflake, no two are alike. Each are unique in
their own way, exhibiting a distinctive pattern that forms
randomly in utero, n a process called chaotic
morphogenesis. The iris is a muscle that regulates the size of the
pupil, controlling the amount of light that enters the eye.
Iris recognition is rarely impeded by glasses or contact lenses
and can be scanned from 10cm to a few meters away. The iris
remains stable over time as long as there are no injuries and a
single enrolment scan can last a lifetime.
Some medical and surgical procedures can affect the overall shape and colour of an iris but the
fine texture remains stable over many decades. Even blind people can use this scan technology
since iris recognition technology is iris pattern-dependent not sight dependent.
Iris scanning is an ideal way of biometric identification since the iris is an internal organ that is
largely protected by damage and wear by the cornea. This makes it more attractive then
fingerprints which can be difficult to recognize after several years of certain types of manual
labour.
The iris is also mostly flat and controlled by 2 muscles so it helps make the iris movements more
predictable then facial recognition. Even genetically identical twins have completely different
iris patterns.

Iris cameras, in general, take a digital photo of the iris pattern and recreating an encrypted
digital template of that pattern. That encrypted template cannot be re-engineered or reproduced
in any sort of visual image. Iris recognition therefore affords the highest level defence against
identity theft, the most rapidly growing crime.
The imaging process involves no lasers or bright lights and authentication is essentially noncontact. Todays commercial iris cameras use infrared light to illuminate the iris without causing
harm or discomfort to the subject.
Before scanning of the iris takes place, the iris is located using landmark features. These
landmark features, and the distinct shape of the iris allow for imaging, feature isolation and
extraction. Localization of the iris is an important step in iris recognition because, if done
improperly, resultant noise (i.e.: eyelashes, reflections, pupils and eyelids) in the image may lead
to poor performance.
The general uses of iris recognition so far have been: substituting for passports (automated
international border crossing); aviation security and controlling access to restricted areas at
airports; database access and computer login; premises access control; hospital settings including
mother-infant pairing in maternity wards; "watch list" screening at border crossings; and it is
under consideration for biometrically enabled National Identity Cards.
Having only become automated and available within the last decade, the iris recognition
concept and industry are still relatively new. Through the determination and commitment of
the iris industry and government evaluations, growth and progress will continue.

Retinal scans map the unique patterns of a persons retina. The blood vessels within the
retina absorb light more readily than the surrounding tissue and are easily identified with
appropriate lighting.
A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a
persons eye as they look through the scanners eyepiece. This beam of light traces a
standardized path on the retina.
Once the scanner device captures a retinal image, specialized software compiles the unique
features of the network of retinal blood vessels into a template. Retinal scan algorithms require a
high-quality image and will not let a user enroll or verify until the system is able to capture an
image of sufficient quality. The retina template generated is typically one of the smallest of any
biometric technology.
Retinal scan is a highly dependable technology because it is highly accurate and difficult to
spoof, in terms of identification. The technology, however, has notable disadvantages including
difficult image acquisition and limited user applications. Often enrollment in a retinal scan
biometric system is lengthy due to requirement of multiple image capture, which can cause user

discomfort. However, once user is acclimated to the process, an enrolled person can be
identified with a retinal scan process in seconds.
Retinal scan technology has robust matching capabilities and is typically configured to do oneto-many identification against a database of users. However, because quality image acquisition is
so difficult, many attempts are often required to get to the point where a match can take place.
While the algorithms themselves are robust, it can be a difficult process to provide sufficient data
for matching to take place. In many cases, a user may be falsely rejected because of an inability
to provide adequate data to generate a match template.
Because retinal blood vessels are more absorbent of log-energy infrared light than the rest of the
eye, the amount of reflection varies during the scan. The pattern of variations is converted to
computer code and stored in a database.
Retinal scans should therefore not be confused with another ocular-based technology, iris
recognition, which is described as the process of recognizing a person by analyzing the random
pattern of the iris.
The retinas intricate network of blood vessels is a physiological characteristic that remains
stable throughout the life of a person.
As with fingerprints and iris patterns, genetic factors do not determine the exact pattern of blood
vessels in the retina. This allows retinal scan technology to differentiate between identical twins
and provide robust identification.
The retina contains at least as much individual data as a fingerprint, but, unlike a fingerprint, is
an internal organ and is less susceptible to either intentional or unintentional modification.
Certain eye-related medical conditions and diseases, such as cataracts and glaucoma, can render
a person unable to use retina-scan technology, as the blood vessels can be obscured.
Retinal scan devices are mainly used for physical access applications and are usually used in
environments requiring exceptionally high degrees of security and accountability such as highlevel government, military, and corrections applications. Retinal scanning has been utilized by
several U.S. government agencies including the Federal Bureau of Investigation (FBI), the
Central Intelligence Agency (CIA), and NASA.
Retinal scanning is also used for medical diagnostic applications. Examining the eyes using
retinal scanning can aid in diagnosing chronic health conditions such as congestive heart failure
and atherosclerosis.
Diseases such as AIDS, syphilis, malaria, chicken pox and Lyme disease, as well as hereditary
diseases, such as leukemia, lymphoma, and sickle cell anemia, also impact the eyes and can be
detected using retinal scan technology.

You might also like