A Practical Guide To Biometric Security Technology - IT .

2y ago
147 Views
4 Downloads
331.10 KB
6 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Shaun Edmunds
Transcription

Technology-savvy organizationslooking to develop a competitiveadvantage should carefully watchdevelopments in biometrics.Simon Liu and Mark SilvermanA Practical Guide toBiometric SecurityTechnologyAs organizations search for more secureauthentication methods for user access,e-commerce, and other security applications, biometrics is gaining increasingattention. But should your company use biometrics? And, if so, which ones should you use and howdo you choose them? There is no one best biometric technology. Different applications requiredifferent biometrics.To select the right biometric for your situation,you will need to navigate through some complexvendor products and keep an eye on future developments in technology and standards.Your optionshave never been more diverse. After years ofresearch and development, vendors now have several products to offer. Some are relatively immature, having only recently become commerciallyavailable, but even these can substantially improveyour company’s information security posture.Webriefly describe some emerging biometric technologies to help guide your decision making.WHAT IS A BIOMETRIC?The security field uses three different types ofauthentication:InsideGlossaryResources something you know—a password, PIN, or piece of personalinformation (such as yourmother’s maiden name); something you have—a card key,smart card, or token (like aSecurID card); and/or something you are—a biometric.1520-9202/01/ 10.00 2001 IEEEOf these, a biometric is the most secure and convenient authentication tool. It can’t be borrowed,stolen, or forgotten, and forging one is practicallyimpossible. (Replacement part surgery, by theway, is outside the scope of this article.)Biometrics measure individuals’ unique physical or behavioral characteristics to recognize orauthenticate their identity. Common physical biometrics include fingerprints; hand or palm geometry; and retina, iris, or facial characteristics.Behavioral characters include signature, voice(which also has a physical component), keystrokepattern, and gait. Of this class of biometrics, technologies for signature and voice are the mostdeveloped.Figure 1 describes the process involved in usinga biometric system for security.FingerprintsA fingerprint looks at the patterns found on afingertip.There are a variety of approaches to fingerprint verification. Some emulate the traditional police method of matching minutiae; othersuse straight pattern-matching devices; and stillothers are a bit more unique, including things likemoiré fringe patterns and ultrasonics. Some verification approaches can detect when a live fingeris presented; some cannot.A greater variety of fingerprint devices isavailable than for any other biometric. As theprices of these devices and processing costs fall,using fingerprints for user verification is gaining acceptance—despite the common-criminalstigma.January February 2001 IT Pro27

SECURITYFigure 1. How a biometric system ricverification7the unique patterns of the retina. Retinal scanning can be quite accurate but does require theuser to look into a receptacle and focus on agiven point.This is not particularly convenient ifyou wear glasses or are concerned about havingclose contact with the reading device. For thesereasons, retinal scanning is not warmly acceptedby all users, even though the technology itself canwork well.IrisAn iris-based biometric, on the other hand,involves analyzing features found in the coloredring of tissue that surrounds the pupil. Iris scanning, undoubtedly the less intrusive of the eye(1) Capture the chosen biometric; (2) process the biometricrelated biometrics, uses a fairly conventionaland extract and enroll the biometric template; (3) store thecamera element and requires no close contacttemplate in a local repository, a central repository, or a portablebetween the user and the reader. In addition, ittoken such as a smart card; (4) live-scan the chosen biometric;has the potential for higher than average tem(5) process the biometric and extract the biometric template;plate-matching performance. Iris biometrics(6) match the scanned biometric template against stored temwork with glasses in place and is one of the fewplates; (7) provide a matching score to business applications; (8)devices that can work well in identification mode.record a secure audit trail with respect to system use.Ease of use and system integration have not traditionally been strong points with iris scanningdevices, but you can expect improvements inFingerprint verification may be a good choice for in- these areas as new products emerge.house systems, where you can give users adequate explanation and training, and where the system operates in a Facecontrolled environment. It is not surprising that the workFace recognition analyzes facial characteristics. Itstation access application area seems to be based almost requires a digital camera to develop a facial image of theexclusively on fingerprints, due to the relatively low cost, user for authentication. This technique has attracted consmall size, and ease of integration of fingerprint authenti- siderable interest, although many people don’t completelycation devices.understand its capabilities. Some vendors have madeextravagant claims—which are very difficult, if not impossible, to substantiate in practice—for facial recognitionHand geometryHand geometry involves analyzing and measuring the devices. Because facial scanning needs an extra peripheralshape of the hand.This biometric offers a good balance of not customarily included with basic PCs, it is more of aperformance characteristics and is relatively easy to use. niche market for network authentication. However, theIt might be suitable where there are more users or where casino industry has capitalized on this technology to creusers access the system infrequently and are perhaps less ate a facial database of scam artists for quick detection bysecurity personnel.disciplined in their approach to the system.Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a Signaturewide range of applications. Organizations are using handSignature verification analyzes the way a user signs hergeometry readers in various scenarios, including time and name. Signing features such as speed, velocity, and pressureattendance recording, where they have proved extremely are as important as the finished signature’s static shape.popular. Ease of integration into other systems and Signature verification enjoys a synergy with existingprocesses, coupled with ease of use, makes hand geometry processes that other biometrics do not. People are used toan obvious first step for many biometric projects.signatures as a means of transaction-related identity verification, and most would see nothing unusual in extendingthis to encompass biometrics. Signature verification devicesRetinaA retina-based biometric involves analyzing the layer of are reasonably accurate in operation and obviously lendblood vessels situated at the back of the eye. An estab- themselves to applications where a signature is an acceptedlished technology, this technique involves using a low- identifier. Surprisingly, relatively few significant signatureintensity light source through an optical coupler to scan applications have emerged compared with other biometBusinessapplications28IT Pro January February 2001

ric methodologies. But if your application fits, it is a technology worth considering.GlossaryVoiceVoice authentication is not based on voice recognitionbut on voice-to-print authentication, where complex technology transforms voice into text.Voice biometrics has themost potential for growth, because it requires no new hardware—most PCs already contain a microphone. However,poor quality and ambient noise can affect verification. Inaddition, the enrollment procedure has often been morecomplicated than with other biometrics, leading to the perception that voice verification is not user friendly.Therefore, voice authentication software needs improvement. One day, voice may become an additive technologyto finger-scan technology. Because many people see fingerscanning as a higher authentication form, voice biometricswill most likely be relegated to replacing or enhancingPINs, passwords, or account names.USES FOR BIOMETRICSSecurity systems use biometrics for two basic purposes:to verify or to identify users. Identification tends to be themore difficult of the two uses because a system must searcha database of enrolled users to find a match (a one-to-manysearch). The biometric that a security system employsdepends in part on what the system is protecting and whatit is trying to protect against.Physical accessFor decades, many highly secure environments have usedbiometric technology for entry access. Today, the primaryapplication of biometrics is in physical security: to controlaccess to secure locations (rooms or buildings). Unlikephoto identification cards, which a security guard must verify, biometrics permit unmanned access control. Biometricdevices, typically hand geometry readers, are in officebuildings, hospitals, casinos, health clubs, and even a Mooselodge. Biometrics are useful for high-volume access control. For example, biometrics controlled access of 65,000people during the 1996 Olympic Games, and Disney Worlduses a fingerprint scanner to verify season-pass holdersentering the theme park.Engineers are developing several promising prototypebiometric applications to support the International AirTransport Association’s Simplifying Passenger Travel(SPT) initiatives. One such program is EyeTicket, whichCharlotte/Douglas International Airport in NorthCarolina and Flughafen Frankfurt/Main Airport inGermany are evaluating. EyeTicket links a passenger’s frequent-flyer number to an iris scan. After the passengerenrolls in the system, an unmanned kiosk performs ticketing and check-in (without luggage).The US Immigration and Naturalization Service’sPassenger Accelerated Service System uses hand geometryCrossover error rate (CER)—a comparison metric for different biometric devices and technologies; the error rateat which FAR equals FRR. The lower the CER, the moreaccurate and reliable the biometric device.Enrollment—the initial process of collecting biometricdata from a user and then storing it in a template for latercomparison.False-acceptance rate (FAR)—the percentage ofimposters incorrectly matched to a valid user’s biometric.False-rejection rate (FRR)—the percentage of incorrectlyrejected valid users.Identification—the process by which the biometric system identifies a person by performing a one-to-many (1:n)search against the entire enrolled population.Template—a mathematical representation of biometricdata. A template can vary in size from 9 bytes for handgeometry to several thousand bytes for facial recognition.Verification—the authentication process by which thebiometric system matches a captured biometric againstthe person’s stored template (1:1).to identify and process preenrolled, low-risk frequent travelers through an automated immigration system. Currentlydeployed in nine international airports, including Washington Dulles International, this system uses an unmannedkiosk to perform citizenship-verification functions.Virtual accessFor a long time, biometric-based network and computeraccess were areas often discussed but rarely implemented.Recently, however, the unit price of biometric devices hasfallen dramatically, and several designs aimed squarely atthis application are on the market. Analysts see virtualaccess as the application that will provide the critical massto move biometrics for network and computer access fromthe realm of science-fiction devices to regular system components.At the same time, user demands for virtual accesswill raise public awareness of the security risks and lowerresistance to the use of biometrics.Physical lock-downs can protect hardware, and passwordsare currently the most popular way to protect data on a network. Biometrics, however, can increase a company’s ability to protect its data by implementing a more secure keythan a password. Using biometrics also allows a hierarchical structure of data protection, making the data even moresecure: Passwords supply a minimal level of access to network data; biometrics, the next level. You can even layerbiometric technologies to enhance security levels.January February 2001 IT Pro29

SECURITYResources The Biometric Consortium (http://www.biometrics.org): Serves asthe US government’s focal point for research, development, test,evaluation, and application of biometric-based personal identification and verification technologies. Association for Biometrics (http://www.afb.org.uk): Aims to promote the awareness and development of biometric-related technologies. It provides an international forum for research anddevelopment, system design and integration, application development, market development, and other issues. Avanti (http://homepage.ntlworld.com/avanti/): A reference site forbiometrics, Avanti contains a considerable amount of backgroundinformation about biometrics, their use in everyday business situations, and how to deploy them. Biometrics: Journal of the International Biometric Society (http://stat.tamu.edu/Biometrics/): Published quarterly, Biometrics aims topromote and extend the use of mathematical and statistical methodsin various disciplines. It describes and exemplifies developments inthese methods and their application for experimenters and thoseprimarily concerned with data analysis. International Biometric Industry Association (http://www.ibia.org): A trade association founded in September 1998 in Washington,D.C., to advance, advocate, defend, and support the biometric industry’s collective international interests. Governed by and for biometricdevelopers, manufacturers, and integrators, IBIA aims to serve allbiometric technologies in all applications.E-commerce applicationsE-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading party’s identity. For example, many banks areinterested in this combination to better authenticate customers and ensure nonrepudiation of online banking, trading, and purchasing transactions. Point-of-sales (POS)system vendors are working on the cardholder verificationmethod, which would enlist smart cards and biometrics toreplace signature verification. MasterCard estimates thatadding smart-card-based biometric authentication to aPOS credit card payment will decrease fraud by 80 percent.Some are using biometrics to obtain secure services overthe telephone through voice authentication. Developed byNuance Communications, voice authentication systems arecurrently deployed nationwide by both the Home ShoppingNetwork and Charles Schwab.The latter’s marketing catchphrase is “No PIN to remember, no PIN to forget.”Covert surveillanceOne of the more challenging research areas involvesusing biometrics for covert surveillance. Using facial and30IT Pro January February 2001body recognition technologies, researchers hope to use biometrics to automatically identify known suspectsentering buildings or traversing crowdedsecurity areas such as airports.The use ofbiometrics for covert identification asopposed to authentication must overcome technical challenges such as simultaneously identifying multiple subjects ina crowd and working with uncooperativesubjects. In these situations, devices cannot count on consistency in pose, viewing angle, or distance from the detector.THE FUTURE OF BIOMETRICSAlthough companies are using biometrics for authentication in a variety ofsituations, the industry is still evolvingand emerging. To both guide and support the growth of biometrics, theBiometric Consortium formed inDecember 1995. The recent BiometricConsortium annual conference highlighted two important areas.StandardizationThe biometrics industry includes morethan 150 separate hardware and software vendors, each with their own proprietary interfaces, algorithms, and datastructures. Standards are emerging toprovide a common software interface, toallow sharing of biometric templates, and to permit effective comparison and evaluation of different biometrictechnologies.The BioAPI standard released at the conference, definesa common method for interfacing with a given biometricapplication. BioAPI is an open-systems standard developed by a consortium of more than 60 vendors and government agencies. Written in C, it consists of a set offunction calls to perform basic actions common to all biometric technologies, such as enroll user, verify asserted identity (authentication), and discover identity.Not surprising, Microsoft, the original founder of theBioAPI Consortium, dropped out and developed its ownBAPI biometric interface standard.Another draft standard is the Common BiometricExchange File Format, which defines a common means ofexchanging and storing templates collected from a varietyof biometric devices. The Biometric Consortium has alsopresented a proposal for the Common Fingerprint Minutia

Table 1. Comparison of biometricsCharacteristicFingerprintsHand geometryRetinaIrisFaceSignatureVoiceEase of UseHighHighLowMediumMediumHighHighError incidenceDryness, dirt,ageHand injury,ageGlassesPoorlightingLighting, age,glasses, hairChangingsignaturesNoise, colds,weatherAccuracyHighHighVery highVery highHighHighHighCost*******User acceptanceMediumMediumMediumMediumMediumVery highHighRequiredsecurity levelHighMediumHighVery highMediumMediumMediumLong-term stabilityHighMediumHighHighMediumMediumMedium* The large number of factors involved makes a simple cost comparison impractical.Exchange format, which attempts to provide a level ofinteroperability for fingerprint technology vendors.Biometric assurance—confidence that a biometricdevice can achieve the intended level of security—isanother active research area. Current metrics for comparing biometric technologies, such as the crossover errorrate and the average enrollment time, are limited becausethey lack a standard test bed on which to base their values. Several groups, including the US Department ofDefense’s Biometrics Management Office, are developingstandard testing methodologies. Much of this work isoccurring within the contextual framework of theCommon Criteria, a model that the international securitycommunity developed to standardize evaluation and comparison of all security products (Kimberly Caplan,“Building an International Security Standard,” ITProfessional, Mar.-Apr. 1999).a smart card that contains a fingerprint sensor directly onthe card.This is a stronger secure architecture because cardholders must authenticate themselves directly to the card.PKI uses public- and private-key cryptography for useridentification and authentication. It has some advantagesover biometrics: It is mathematically more secure, and itcan be used across the Internet.The main drawback of PKIis the management of the user’s private key. To be secure,the private key must be protected from compromise; to beuseful, the private key must be portable. The solution tothese problems is to store the private key on a smart cardand protect it with a biometric.In the Smart Access common government ID card program, the US General Services Administration is exploring this marriage of biometrics, smart cards, and PKItechnology. The government of Finland is also considering using these technologies in deploying the FinnishNational Electronic ID card.Hybrid technology usesOne of the more interesting uses of biometrics involvescombining biometrics with smart cards and public-keyinfrastructure (PKI). A major problem with biometrics ishow and where to store the user’s template. Because thetemplate represents the user’s personal characters, its storage introduces p

A Practical Guide to Biometric Security Technology Simon Liu and Mark Silverman A s organizations search for more secure authentication methods for user access, e-commerce, and other security appli-cations,biometrics is gaining

Related Documents:

Biometric system using single biometric trait is referred to as Uni-modal biometric system. Unfortunately, recognition systems developed with single biometric trait suffers from noise, intra class similarity and spoof attacks. The rest of the paper is organized as follows. An overview of Multimodal biometric and its related work are discussed .

existing password system. There are numerous pros and cons of Biometric system that must be considered. 2 BIOMETRIC TECHNIQUES Jain et al. describe four operations stages of a Unit-modal biometric recognition system. Biometric data has acquisition. Data evaluation and feature extraction. Enrollment (first scan of a feature by a biometric reader,

biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect na-ture of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for the digital rights management systems.

Multimodal biometric systems increase opposition to certain kind of vulnerabilities. It checks from stolen the templates of biometric system as at the time it stores the 2 characteristics of biometric system within the info [22]. As an example, it might be additional challenge for offender to spoof many alternative biometric identifiers [17].

the specifics of biometric technology is available elsewhere.3 Biometric technology continues to advance, new biometric measures are under development, and existing technological restrictions may disappear. A biometric identifier may work today only under ideal conditions with bright lights, close proximity, and a cooperative data subject.

the definition of a biometric reference in Clause 3.3.1616 of ISO/IEC 2382-37:2017 [ISO2382-37]. A biometric template17 is indeed one example of such biometric reference, but in other applications like the ICAO 9303 compliant passport, the biometric reference is a biomet

Integrated Biometric Support Multiple brands of biometric readers are integrated with Axiom. A variety of biometric technologies are supported: fingerprint, iris, palm etc. Using a combination of TCP/IP and Wiegand connections allows to integrate virtually any upcoming or established biometric technology. USB enrollment readers

concept of Self-Sovereign Biometric IDs (SelfIs), which are cancelable biometric templates fully man-aged by the user. 2) A novel machine learning ap-proach capable of extracting features from encoded cancelable bloomed biometric templates. 2.Motivation Our goal is to provide a way to use biometrics in a secure, privacy-first way, without .