Вы находитесь на странице: 1из 5

An Evaluation of Current Computing Research Aimed at Improving Online Security Using Biometrics

Paul Armstrong
Research CSE306 Student ID 1011741254

Abstract In a technology driven world security is becoming an ever more important factor of computing. This paper discusses and compares the array of biometric security options available to the standard finger and palmar print scanning method. The paper looks at whether there are any alternative systems which solve the problems inherent in unimodal systems as well as discussing emerging trends within research in the field of biometrics and what the future could hold for this technology. Keywords Biometric; unimodal; multimodal; finger-vein; palmar; iris; voice recognition; facial recognition; voice comparison

The state plans to extend the scheme to temporary workers. The computerised system, which is connected to the district's intranet, takes a three-dimensional picture of the fingers by going underneath the skin's first layer and measuring between 8 to 16 points of the fingers through radio frequency. That image is reduced to a binary number, which the system then matches with the employee's original image in a central database. If they match, a green light on the machine glows, stating that the log-in attempt is valid . III. PREVIOUS WORK Coupling palm print authentication with fingerprint authentication is an active current research topic with a number of studies on the subject taking place with the emergence of working technologies. The idea of finger coupled with palm prints recognition has been around for as long as standalone fingerprint scanning has but it is only taken into serious, real world consideration when various experiments were conducted onto how easy faking a fingerprint could be. Such an example is evident when, in a protest against the ever growing use of biometric data, the infamous but influential hacker group the Chaos Computer Club published an article including a fingerprint of the German Minister of the Interior (Home Secretary) Wolfgang Schuble in the March 2008 edition of their magazine Datenschleuder, also featured was a generic fingerprint on piece of film which readers could use to fool fingerprint readers. The demonstration was used to show the world how easy it would be to obtain even a high ranking officials prints rendering standalone print detection systems useless and insecure no matter the level of software, algorithms et cetera used within the program. This notion is backed up by a newspapers article from the Manchester Evening News whereby a criminal involved in a brutal heist of valuable watches used photographs taken via mobile phone in which to advertise the stolen property and was of a quality whereby police could identify the assailants fingerprint, and when checked against the database resulted in an arrest and a guilty plea demonstrating how easy a print could potentially be obtained. Perhaps a more humbling demonstration was when the television show MythBusters, with no previous industry experience and only the knowledge of what they had seen in movies such as James Bond and Mission Impossible, attempted to break into a commercial security door equipped

I. INTRODUCTION In recent years electronic security has become ever more important, particularly that of identifying an individual whether it be at an ATM, when trying to access a network or granting specific access privileges. Biometrics is a method whereby uniquely distinguishing one or more intrinsic physical or behavioural traits of human beings and more specifically, fingerprint and palmar scanning also known as dactyloscopy, which will be the base of this paper is one such technique to provide this type of security. A live scan is made by bouncing a light source onto the various ridges and valleys that make up a finger and palm print and scans the resulting image matching up the patterns based on a number of key referencing points and can often be used in conjuncture with a knowledge based identification system such as passwords to improve security further. This technology is becoming ever more popular and ever more refined as many researchers are delving into this area of study to improve technologies; however, it is not without fault. Fingerprint scanning technologies have been used within many national and international projects such as in the Olympic Games in Athens 2004, Australia and New Zealands SmartGate system which eases congestion at airports by matching the individuals biometric information to their passport and visas and is also featured in some high-end saloon cars such as the Mercedez-Benz S Class. II. BIOMETRICS IN THE REAL WORLD In 2002, Rhea Borja produced an article on how the Philadelphia School system used fingerprint readers to track the movements its 3,300 employees protect their 206,000 students. Hopefully preventing theft and to deter paedophiles.

with fingerprint authentication technology. The advanced commercial security door with live scanning was deceived with a printed scan of a fingerprint after it had been licked as well as by a photocopy of a fingerprint Error! Reference source not found.. Palm print scanning and analysis is exactly the same of that of just a fingerprint scan but the added variables of the palm print improve security by making the procedure much harder to counterfeit and some studies have even incorporated the use of gestures along with scanning to add even more, possibly, unfixable, variables as finger, palm, print, shape, size, joint position and angle are all distinguishing characteristics only inherent to the individual but this is costly to execute as incorporating gestures would require a dual scanning system involving image and video based processing. Despite all of the issues behind finger and palm print detection; it still remains the most popular biometric security system in the world today. Work carried out by Wei-Yun et al (2008) into fake finger detection means that fingerprint scanning systems can detect prosthetic or dead fingers/hands as well as finger and palm print disguises being used. They combat these spoof attacks by detecting sweat pores, coarseness of skin texture as these features are not easily duplicated. They also suggested the use of temperature, impedance and other electrical measurements as well as odour and spectroscopy but was concluded that a thin layer of gelatine containing the fake print could still fake the finger/palm reader as gelatine naturally contains moisture and is likely to could transmit the natural electrical impulses from the wearers hand. Wei-Yun et al also concludes that techniques such as spectroscopy and oximetry requires expensive equipment and is not user friendly. Despite the advances in this particular technology it is quite evident that simpler, cheaper, more complete and secure methods exist in this field of biometrics [15].

The iris is the coloured ring of textured tissue surrounding the pupil of the eye. Every iris is unique, even more so than fingerprints and even twins have different iris patterns as well as everyones left and right iris is also different. According to Stanley et al (2009) research shows that the matching accuracy of iris identification is greater than that of DNA testing [12]. During the recognition process the camera is hidden behind a mirror in which the user aligns the eye against markings on the mirror, also present is a light shining into the eye of the user so that the camera can take a quality picture. Once the eye is stable the camera will focus and take the picture and records a high level of data about the eye which results in high accuracy due to the complex comparisons made. Stanley et al (2009) also states that artificial duplication of the iris is virtually impossible because they are so unique. Also dead eyes or recently taken eyes will also result in a denial whether it was an authorised iris template. The research conducted by Stanley et al (2009) indicate that while iris recognition maintains a high level of accuracy it is very inconvenient as the process of both template capture and user authentication are arduous in comparison to the alternatives. Many test subjects report a discomfortability and unnaturalness about an artificial light being shone directly into the eye. Typically, iris recognition systems require the users eye to be practically still which some users find difficult. In addition to this, iris recognition systems are relatively expensive [12]. B. Voice Comparison Voice recognition is a process whereby a users voice requesting authentication is checked against a stored voiceprint or template on baselines of vocal characteristics that produce speech such as vocal tract, mouth and nasal cavities as well as other speech processing mechanisms and not that of the sound or pronunciation of speech itself. Jeberson et al (2009) states that the greatest advantage of vocal verification is that the equipment used is relatively humble and inexpensive. Any device with a microphone can be used for verification such as a mobile phone which means that there could be many remote applications that could use this type of technology. Other benefits of this technology apart from it being inexpensive is that this technology is already used in mainstream situations today meaning that users are likely to already be familiar with systems such as this because it is so easy to use. Another benefit of voice recognition that is very rare in biometrics is that users do not feel that the information captured is intrusive to their privacy. However, this technology has major disadvantages such as that network noise can decrease accuracy of authentication as well as being a technology which is quite easily maliciously replicated. Taking everything about this technology into consideration indicates that although there is some serious security flaws with this technology it is quite possible to use merely as a deterrent of malicious act when guarding quite low level or value access or items [12]. C. Facial Recognition

Figure 1: Typical Structure of Biometric Authentication IV. UNIMODAL ALTERNATIVES There are many different types of biometric security techniques in use today which can even use odour as a measurement. Others, through research matured and are commercially available today such as: fingerprint, finger geometry, hand geometry, palm print, iris pattern, retina pattern, facial recognition and voice comparison. A. Iris Recognition

Of course facial recognition is one of the most natural forms of biometric identification and one that we as humans do on a day to day basis. According to Klinsega et al (2009) facial recognition has never been a huge research area but any camera with sufficient resolution can be used to obtain a suitable image for comparison. The process generally assess grey-scale information and require the subject to stand a distance away from the camera and look straight at the camera which is to gain the correct size and exposure tolerances of the face and helps maintain photographic quality of facial features and also keep a uniform standard for pictures in template storage and when taking authentication copies for comparison [12]. D. Finger-Vein Recognition Hashimoto (2006) suggests utilizing the vein configuration in ones fingers as a method of personal identification as, like fingerprints, are unique to the individual. The examining of this study has led me to recommend this as an excellent biometric alternative to fingerprint and palm scanning as it rules out problems caused injuries such as burns which could irreversibly alter a persons finger and palm print as well as quelling the danger faced by people in possession of an authorised print such as that of Mr Kumaran, the subject of a BBC News report in 2005 whereby he had his index finger forcibly removed in order for the assailant to bypass Mr Kumarans Mercedez-Benz S Class immobiliser. Also research into the subject suggests that counterfeiting vein configuration would prove very difficult to achieve, especially when compared to that of finger and palm prints. Another good point not covered by Hashimoto is that the majority of equipment required to use this technology is already available and in use in current fingerprint recognition systems and usually only requires a change in software which may translate lower costs for those already employing FPPI systems. Hashimoto also fails to state that this technology is an improvement on finger and palm print identification because FPPI systems occasionally fail if the subjects hands are overly dry or overly oily, whereas this is not the case with vein configuration recognition. Vein configuration recognition therefore offers the convenience, ease and speed of finger and

palm recognition systems while avoiding ease of counterfeit, its high error rates caused by wedding ring and hand moisture, it shares the low error rate of iris recognition but avoids the high cost, discomfort and psychological resistance of shining direct light into the eyes during screening. The technology has since been adopted by the major Japanese financial institutions as their newest security technology [5]. V. MULTIMODAL ALTERNATIVES Multimodal biometric systems have been widely quoted to be the answer to limitations of unimodal systems. Despite high recognition accuracy research by Shan et al (2008) demonstrates indicates that users feel multimodal systems to be an inconvenience as the majority, but not all, multimodal systems require several steps in order to acquire the necessary data. There are many different combinations of biometrics used in synchronisation as a security method. Ho Park et al (2011) believes that a combination of fingerprint and finger-vein recognition is the top combination and the favoured answer to the issues of unimodal biometrics. Fingerprint and finger-vein images can be caught at the same time, from the same device which removes the inconvenience of multiple step systems while still achieving high accuracy rates (Ho Park et al, 2011). The image will acquire biometric variables of the fingerprint, finger-vein, first and second knuckles of the finger using reference points based on local binary pattern (LBP) and will then compare the images to the stored template using decision level fusion which according to Ho Park et al returns a high level of accuracy. Ho Park et al (2011) then goes on to talk of an added benefit of this method being that standard equipment used in this method is small enough to me used on mobiles devices. Fingerprint and finger-vein is relatively inexpensive and offers speed, convenience, ease, single stage, accuracy and means that the system is hard to fool and as well as making it extremely difficult to produce prosthetic replicas while also eliminating the issues with hand moisture found in unimodal fingerprint systems and is not sensitive to varying environmental effects such as weather. Although this is an extremely complete system Ho Park et al (2011) concede that

(a) Image using Reflection

Figure 3: Light Reflection Method

Figure 4: Light Transmission Method

(b) Image using Transmission

there is always room for improvement. Emerging technologies such as UltraSound used in biometrics could be used within this system to provide an even higher level of detail within scanned images allowing the system to distinguish easier while meaning that the system can compare images on even more reference points. Ultrasonic sensors make use of the principles of medical ultrasonography in order to create visual images of the finger. Unlike optical imaging, ultrasonic sensors use very high frequency sound waves to penetrate the epidermal layer of skin. The sound waves are generated using piezoelectric transducers and reflected energy is also measured using piezoelectric materials. Since the dermal skin layer exhibits the same characteristic pattern of the finger, the reflected wave measurements can be used to form an image of the fingerprint. This eliminates the need for clean, undamaged epidermal skin and a clean sensing surface. This technology has not yet been coupled with this type biometric scan but research trends indicate that this is the next stage for this type of biometrics [10][1].

need to be introduced as regular capture methods produce problems when in 3D as there are too many variations from situation to situation. In 2D the user will press their finger on a Perspex platform which flattens out the print to make every print of the same format resulting in easier comparison of the template, however, in 3D this would cause too many variations [8]. VII. CONCLUSIONS It is evident that every biometric method has its own advantages, disadvantages and uses in specific situations. Which method to use is relative to what you are trying to protect.
TABLE I COMPARISON OF MAJOR BIOMETRIC SYSTEMS
Biometrics Fingerprint Iris Face Voice Vein Map Security AntiAccuracy Forgery Speed Convenience Enrolment Resistance Cost Size Rate : Good : Average : Insufficient

Figure 2: Typical Finger Scanner Hashimoto (2006) also adds the factor of the direction of light during scans. Traditional finger scanners operate using a light source underneath the finger to highlight the fingerprint ridges and creases such as that featured in the image above (Fig. 2), this is called light reflection method (fig. 3). Park et al failed to factor light direction into his research, assuming the light source would typically be underneath the finger despite experiments indicating that this should be taken as a serious part of any finger-vein scanning process. Hashimotos suggestion is placing an addition light source above the finger to allow light to pass through the finger resulting in a significantly more enhanced finger-vein image compared to systems using one light underneath the finger, which is called light transmission method (fig. 4). Hashimoto then performed this test using reflection and transmission methods and captured the resulting images. As can be depicted from results (a) and (b) transmission provides more finger-vein detail which will result in more accurate template comparisons and could help that supplementary reference points could be used in finger-vein recognition [5]. VI. FUTURE OF BIOMETRICS Maeva et al (2009) believes that using 3D image capture within biometrics is the most critical step in automating systems. 3D imaging is achieved by using ultrasonic waves to map out a picture of the finger in the same way that a the medical industry use ultrasound to get an image of a baby inside a womb. Although the system still compares the various ridges and valleys of the fingerprint it can do so which much more detail as well as using the third dimension. Introducing 3D technology means that new contactless capture methods

Despite this unimodal biometric systems are quickly becoming obsolete with the vast emergence of multimodal systems especially those that do not require any extra steps to process. Until the time when systems are advanced enough to identify a person just by their walk without any extra input from the user fingerprint recognition coupled with finger-vein recognition is by far the best overall system because it offers a system whereby users are already familiar, the technology is already in place for people who already use fingerprint recognition. Finger-vein prosthetics or forgery tools will be almost impossible to achieve. A new system is relatively inexpensive to its rivals as well as this it maintains a high level of accuracy and speed. This method can be used in any environment without an effect on results. This technology can also help bypass problems caused by damage to the skin while still identifying the user. Research indicates that 3D and UltraSound technologies will be used with some of the work examined to make the captured data even more detailed which will allow for a more detailed comparison and therefore resulting in a high standard of accuracy, also this will mean that authentication can be contactless. REFERENCES
[1] AO, Shan, REN, Weiyin and TANG, Shoulian (2008). Analysis and Reflection on the Security of Biometrics System. In: WiCOM '08. 4th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing University of Posts & Telecommunications, Beijing, China, 12-14 October 2008. , Page(s): 1 - 5. BORJA, Rhea R (2002). Finger-Scanning Technology Monitors School Employees. Education Week, Volume: 22 (Issue: 8), Page(s): 8. DOI, Junta and YAMANAKA, M (2004). Biometric Authentication Using Finger and Palmar Creases. In: 2004 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, 2004. (VECIMS)., Chiba Institute of Technolnology, Tsudanuma, Japan, 12-14 July 2004. , Page(s): 72 - 76.

[2] [3]

[4] DU, Yingzi, IVES, Robert W, Etter, DELORES M, Welch, THAD, B


[5] [6]

[7]

[8]

[9] [10]

[11] [12] [13]

[14]

[15]

(2005). A Multidisciplinary Approach to Biometrics. IEEE Transactions on Education, Volume: 48 (Issue:3), Page(s): 462 - 471. HASHIMOTO, J (2006). Finger Vein Authentication Technology and its Future. In: Symposium on VLSI Circuits, 2006. Digest of Technical Papers, Kawasaki, Tokyo, Japan, 20 February 2006. , Page(s): 5 - 8. KENT, Jonathan (2005). Malaysian Car Thieves Steal Finger. [online]. Last accessed 16 November 2011 at: HYPERLINK "http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm" http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm LAI FONG, Leong and SENG, Woo Chaw (2009). A Comparison Study on Hand Recognition Approaches. In: 2009 International Conference of Soft Computing and Pattern Recognition, University of Malaya, Kuala Lumpur, Malaysia, 4-7 December 2009. , Page(s): 364 - 368. MAEVA, A and SEVERIN, F (2009). High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics In Biometrics Identification. In: 2009 IEEE International Ultrasonics Symposium (IUS), University of Windsor, Windsor, ON, Canada, 20-23 September 2009. , Page(s): 2260 - 2263. MythBusters Season 2006 - Fingerprint Lock. (2006). Discovery Channel. PARK , Young Ho, et al. PARK, Young Ho, TIEN, Dat Nguyen, Lee, HYEON, Chang, PARK, Kang Ryoung, LEE, Eui Chul, KIM, Sung Min, KIM, Ho Chul (2011). A Multimodal Biometric Recognition of Touched Fingerprint and Finger-Vein. In: 2011 Internation Conference on Multimedia and Signal Processing (CMSP), Dongguk University, Seoul, South Korea, 14-15 May 2011. , Page(s): 247 - 250. RATHA, N K, CONNELL, J H and BOLLE, R M (2001). Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal, Volume: 40 (Issue: 3), Page(s): 614 - 634. STANLEY, P, JEBERSON, W and KLINSEGA, V (2009). Biometric Authentication: A Trustworthy Technology for Improved Authentication. AAI-DU, India, 7-9 March 2009. , Page(s): 171 - 175. SUI, Yan , ZOU, Xukai and DU, E Y (2011). Biometrics-based Authentication: A New Approach. Indiana University - Purdue University Indianapolis, Indianapolis, IN, USA, 31 July 2011-4 August 2011. , Page(s): 1 - 6. YAMANAKA, Kimihiro , NISHIUCHI, Nobuyuki and KOMATSU, Shungo (2009). A Biometric Identification Using the Motion of Fingers. In: International Conference on Biometrics and Kansei Engineering, Tokyo Metropolitan University, Tokyo, Japan, 25-28 June 2009. Tokyo, IEEE Xplor, Page(s): 22 - 27. YAU, Wei-Yun, TRAN, Hai-Linh and TEOH, Eam-Khwang (2008). Fake Finger Detection using an Electrotactile Display System. In: 10th International Conference on Control, Automation, Robotics and Vision, 2008. ICARCV, Singapore, 17-20 December 2008. , Page(s): 962 - 966.

Вам также может понравиться