DynoTech Software Logo Interesting Articles about Popular Topics

  Article Index

 
Biometrics - Your Body as a Key
Dave Carlson - June 2, 2014

Abstract

Biometrics is a specific process of gathering and examining distinctive identifiers and measurable characteristics to identify individuals. Security often is achieved by verifying something you know (e.g. password), something you have (e.g. smartcard), or something you are (e.g. fingerprint). Biometric features are the most accurate method of human identification, since only biometrics can verify that you are you. There are two biometric modalities: physiological (distinctive attributes of the human body) and behavioral (distinctive behavioral patterns of a person). This article limits the scope of discussion to three popular biometric physiological characteristics used to grant access to automation systems and facilities: fingerprints, iris scan, and facial recognition.

Introduction

Biometrics is a specific process of gathering and examining distinctive identifiers and measurable characteristics to identify individuals. Biometric features are the most accurate method of human identification. Fingerprints and DNA analysis have been used for many years. Facial recognition and retina scans are accepted procedures to verify a person’s uniqueness. Documents, such as identification cards, can easily be altered and can be difficult to interpret if they are in a language unfamiliar to the reader. However, fingerprints and other biometric features cannot be altered without extensive effort and are universally accepted as a verification of identity.

Security often is achieved by verifying something you know (e.g. password), something you have (e.g. smartcard), or something you are (e.g. fingerprint). The U.S. Department of Defense (DoD) teaches in their Biometrics Awareness Course that only biometrics can verify that you are you. Identification cards or access tokens (smartcards, etc.) are not a part of you and can be lost, stolen, or (sometimes) duplicated. Passwords and pass phrases are not a part of you and can be forgotten, shared, observed, or broken. Only you can verify that you are you with the highest degree of accuracy.

Biometric Modalities

There are two types of biometrics (called modalities) -- physiological and behavioral.

Physiological. Physiological characteristics are related to distinctive attributes of the human body. Examples of physiological characteristics are:

  • Finger, Knuckle, and Palm Prints
  • Footprints
  • Facial Recognition
  • DNA
  • Vascular Imaging (Vein Geometry)
  • Hand/Finger Geometry
  • Iris/Retina Recognition
  • Odor/Scent
  • Voice Pattern
  • Others include: Earlobe, Sweat Pores, Lips

Behavioral. Behavioral characteristics are related to the distinctive behavioral patterns of a person. Examples of behavioral characteristics are:

  • Signature
  • Keystroke or Typing Rhythm
  • Gait (walking or running)
  • Speech Recognition

This article will limit the scope of discussion to three popular biometric physiological characteristics used to grant access to automation systems and facilities: fingerprints, iris scan, and facial recognition.

Fingerprints

Fingerprint Data

Among all the possible biometric signs, forensic and security personnel have observed fingerprints the longest. No two fingerprints are alike (even belonging to the same person). Fingerprint characteristics are features on the friction ridges of the skin. These ridges begin to form while inside the womb and grow proportionally as the baby grows. The ridges remain the same throughout a person's life and for a time after death. Damage to the skin which penetrates through the outer skin layer (epidermis) to the inner layer (dermis) will cause scarring and permanently alter ridge alignment.

Friction ridges form patterns in distinct main types (whorl, loop or arch) which allows for classification. The ridges are not continuous lines but may for example:

  • End (ridge ending);
  • Split into two ridges or two ridges combine to form one (bifurcations);
  • Be a very short ridge (island); or
  • Split into two and a short distance thereafter re-form into one ridge (lake).
Additionally, the ridges themselves may have a specific shape, thickness, or have distinctive pores. Every fingerprint will contain some ridge characteristics. However, it is the frequency and sequence in which these characteristics appear that makes each fingerprint unique.

Fingerprint  Identification

There are three types of fingerprints: latent, patent, and plastic.

  • Latent fingerprints -- created by sweat and oil on the skin’s surface. This type of fingerprint usually is invisible to the naked eye and requires additional processing to become visible. Processing of this type of fingerprints can include basic powder techniques or application of special chemicals.
  • Patent fingerprints -- made by blood, grease, ink, or dirt. This type of fingerprint is easily visible to the human eye.
  • Plastic fingerprints -- three-dimensional impressions which can be produced by pressing your fingers in fresh paint, wax, soap, tar, or other malleable substance. Similar to patent fingerprints, plastic fingerprints are easily seen by the human eye. They do not require additional processing to become visible.

The person credited with developing the first fingerprint identification system is Sir Edward Henry. In 1900 Sir Henry published his book Classification and Uses of Fingerprints. In his book, he revealed his classification system depicting Right Loop (R), Left Loop (L), Whorl (W), Arch (A), and Tented Arch (T). By 1910, Sir Henry's classification system was the basis of identification by police forces and prison authorities throughout the English-speaking world.

Fingerprint  - Right Loop (R)   Fingerprint  - Left Loop (L)   Fingerprint  - Whorl (W)   Fingerprint  - Arch (A)   Fingerprint  - Tented Arch (T)

While recovering fingerprint evidence is helpful for criminal investigations, fingerprints used for security purposes are captured directly from a person’s finger. Most common are index finger and thumb recognition. A security device captures a person’s fingerprints when the person wishing to be identified presses their finger on the scanning window.

Two Steps in Biometric Fingerprint Technology
Two Steps in Biometric Fingerprint Technology

Occasionally distortions of a fingerprint (e.g. grease, dirt, and paint) make it a challenge to achieve positive identification when compared to a reference sample. Because of this challenge, scientists have developed complex computational algorithms to create highly accurate comparisons between fingerprint samples. These algorithms have allowed fingerprint identification to move from the realm of professional opinion to defined universal science. The science allows for commercial adaptation, such as integrating fingerprint scanners on notebook computers. Many portable computer systems now offer fingerprint biometric protection from unauthorized access.

Iris Scan

Iris Scanning Technology

Iris scanning is very accurate. The iris is a visible (yet protected) structure that usually does not change over time, making it ideal for biometric identification. Eyeglasses and contact lenses typically do not interfere with image capture or cause inaccurate readings. Blind people can use iris scanners as long as their eyes have irises. Even eye surgery does not change identifying iris properties for most people (with the exception of some types of cataract surgery).

Sophisticated modern iris scanning systems, like those used by the United States Department of Defense, compare 950 different characteristics to uniquely identify a person’s iris. This huge amount of unique data points can provide an accuracy level of only one false match in 1.2 million scans. Some forensics experts claim that the chance of two individuals having the same iris pattern is 1 in 10 to the 78th power. Because some modern iris scanners can handle around 2,000 data points (compared to about 100 for a fingerprint) an iris scan rarely results a false positive.

The human iris begins to form during the third month of gestation. Structures creating its distinctive pattern are complete by the eight month of gestation. However, iris pigmentation continues to develop and change for several years after birth.

The layers of the iris have both ectodermal (outer layer) and mesodermal (middle layer) embryological origin, consisting of (from back to front): Human Iris

  • Darkly pigmented epithelium;
  • Pupillary dilator and sphincter muscles;
  • Heavily vascularized stroma (connective tissue of interlacing ligaments containing melanocytes); and
  • An anterior layer of chromatophores and melanocytes with a genetically determined density of melanin pigment granules.
The combined effect of all these iris layers is a visible pattern displaying several distinctive features such as rings, arching ligaments, crypts, furrows, freckles, ridges, a zigzag collarette, and the corona.

Iridian Technology suggested some advantages of using iris recognition:

  • It uses a body part that is protected and not easily damaged or scratched, yet exposed and can be seen from a distance.
  • The recognition system can be quick and instantaneous.
  • The iris is ideal for recognition system because it almost always flat and so it shape, which is a crucial factor in this technology can be predicted.

An iris scanning system employs a CCD digital camera sensor using both visible and near-infrared light to capture a clear, high-contrast image of a person's iris. The computer connected to the camera identifies center of the pupil, edge of the pupil, edge of the iris, eyelids, eyelashes, and all related data. After locating the eye structures and collecting all the data points, the computer software analyzes patterns in the iris and generates a unique code and stores it in a database for future retrieval and recognition. By translating the image into a digital code, the system can store and compare much more data than if it had to analyze a complete image each time it needed to verify someone.

Facial Recognition


Facial Recognition Algorithm Representation    Face Scanner
Facial Recognition Algorithm Representation and a Facial Scanning System

The science of facial recognition involves the study of how people recognize faces and determining ways to emulate this process with computer systems. Just like humans use their eyes to gather information to determine facial recognition, computer systems use visual sensors to capture images. Humans use their brains to process facial recognition, while computer systems use hardware and software to replicate the process. Some computer sensors are video camera, CCD cameras, infrared cameras, and 3D scanning systems.

One of the challenges to accurate facial recognition is facial detection. Not only does a reliable facial recognition system need to identify a face, but it first needs to find the face. The system needs procedures to detect specific facial components and orient these components relative to each other. It then uses an algorithm to convert this data to a form a computer can use to locate a representative sample. This process is made more difficult by face positioning (e.g. head tilted left of right), face distance (e.g. head tilted forward or backward), face obscuration (e.g. hair in different positions), and a multitude of additional physical factors.

FST21, a New York City company, offers a building security system that eliminates the need for keys by combining facial recognition with other biometric sensors. The system uses sophisticated scanners to recognize a person’s face, voice, build, and stride. Once the system identifies the appropriate person it can unlock their door in less than two seconds. Any strangers not in the database will be denied access. "This is only the beginning," says General Aharon Farkash, the founder and president of the firm FST21. "This is the way people will enter buildings in the 21st century."

The main facial recognition methods are: feature analysis, neural network, eigenfaces, automatic face processing, and three-dimensional facial recognition. Bruce and Young developed the best-known face recognition model in 1986. They based their study on an established four-step human cognitive process for recognizing a known face:

  1. Extract visual structural codes from the target face observed.
  2. Compare these codes with structural codes stored in memory.
  3. Access and connect specific semantic information with the identity of the owner of the target face.
  4. Access and match the appropriate name of the recognized person.

Facial recognition systems can be effective in security situations. The systems are most effective if the target image is well-documented in the facial recognition system. Under controlled conditions (e.g. office environment) these systems can be extremely accurate. A good use for these systems is to allow computer user access. The user looks into a camera so the facial recognition system can identify the person and allow access to the computer.

Summary

Biometric Physiological and Behavioral Modalities Chart

Biometrics is a process of gathering and examining distinctive identifiers and measurable characteristics to identify individuals. Biometric features are the most accurate method of human identification, since only biometrics can verify that you are you. There are two biometric modalities: physiological (distinctive attributes of the human body) and behavioral (distinctive behavioral patterns of a person). This paper discussed three popular biometric physiological characteristics used to grant access to automation systems and facilities: fingerprints, iris scan, and facial recognition.



REFERENCES - BIOMETRICS

For further study, you may find the following list of biometrics references helpful. The author reviewed these references during the development of this article.

Ashbourn, Julian. (2004). Practical Biometrics: From Aspiration to Implementation. London: Springer-Verlag.

Ashbourn, Julian. (2011). Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors. London: Springer-Verlag.

Basit, Abdul. (2010). Iris Recognition: An Identification Biometric System. Saarbrücken, Germany: Lambert Academic Publishing.

Bhanu, Bir and Tan, Xuejun. (2004). Computational Algorithms for Fingerprint Recognition. Norwell, MA: Kluwer Academic Publishers.

Birch, David G. (Ed.). (2007). Digital Identity Management: Perspectives on the Technological, Business and Social Implications. Hampshire, England: Grower Publishing.

Bolle, Ruud (Ed.). (2004). Guide to Biometrics. New York: Springer-Verlag.

Bonsor, Kevin and Johnson, Ryan. (2001). How Facial Recognition Systems Work. Retrieved June 2, 2014 from http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition.htm/printable.

Boulgouris, N. V., Plataniotis, Konstantinos N., and Micheli-Tzanakou, Evangelia (Eds.). (2010). Biometrics: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons.

Burge, Mark J. and Bowyer, Kevin (Eds.). (2013). Handbook of Iris Recognition. London: Springer-Verlag.

Carlson, Dave. (2006). Fingerprints: Collection and Analysis. Retrieved May 30, 2014 from http://www.dynotech.com/articles/fingerprints.shtml.

Chaban, Matt. (2014). Biometric Scanners That Can Identify People Are Poised for Big Growth in Building Security. Retrieved May 29, 2014 from http://www.nydailynews.com/life-style/real-estate/biometrics-future-21st-century-security-article-1.1621948.

Chaudhary, Vivek and Singla, Sunil Kumar. (2011). Biometrics. Saarbrücken, Germany: Lambert Academic Publishing.

Clover, Juli. (2014). Iris Scanning: The Newest Addition to Apple's Biometric Roadmap. Retrieved June 2, 2014 from http://www.macrumors.com/2014/01/21/apple-iris-scanning/.

Craighead, W. Edward and Nemeroff, Charles B. (Eds.). (2001). The Corsini Encyclopedia of Psychology and Behavioral Science, Volume 1, 3rd Ed. New York: John Wiley & Sons.

Crime Museum. (n.d.). Fingerprints. Retrieved May 30, 2014 from http://www.crimemuseum.org/crime-library/fingerprints.

DoD. (2013). Biometrics Awareness Course. Washington, D. C.: US Government Printing.

FBI. (1984). The Science of Fingerprints, Rev. 12-84. Darby, PA: Diane Publishing Company.

Gates, Kelly A. (2011). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. New York: New York University Press.

Girard, James E. (2015). Criminalistics: Forensic Science, Crime, and Terrorism, 3rd Ed. Burlington, MA: Jones & Bartlett Learning. [NOTE: This book was a pre-published release. Actual release date to the public was unknown at the time of writing this paper.]

Gregory, Peter H. and Simon, Michael A. (2009). Biometrics for Dummies. Hoboken, NJ: Wiley Publishing.

Harris, Tom. (2002). How Fingerprint Scanners Work. Retrieved May 29, 2014 from http://computer.howstuffworks.com/fingerprint-scanner.htm/printable.

Hutchinson, Roland. (2013). Apple Scores Patent for Facial Recognition Technology. Retrieved May 29, 2014 from http://www.geeky-gadgets.com/apple-scores-patent-for-facial-recognition-technology-03-12-2013/.

Iridian Technologies. (2012). Iris Scanning and Recognition. Retrieved May 29, 2014 from http://www.iridiantech.com/iris-scanning-and-recognition/.

Jain, L. C., Halici, U., Hayashi, I., Lee, S. B., and Tsutsui, S. (Eds.). (1999). Intelligent Biometric Techniques in Fingerprint and Face Recognition. Boca Raton, FL: CCR Press.

Kambar Technologies. (2012). Biometrics Technology. Retrieved May 29, 2014 from http://accesscontrolconsult.in/biometric.html.

Kanade, Sanjay G, Petrovska-Delacrétaz, Dijana, Petrovska-Delacr Taz, Dijana, and Dorizzi, Bernadette. (2012). Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. San Rafael, CA: Morgan & Claypool.

Kumar, Ajay and Zang, David. (2010). Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing. Berlin: Springer-Verlag.

Lee, Henry C., Ramotowski, Robert, and Gaensslen, R. E. (Eds.). (2001). Advances in Fingerprint Technology, 2nd Ed. Boca Raton, FL: CRC Press.

Li, Stan Z. (Ed.). (2009). Encyclopedia of Biometrics. New York: Springer Science+Business Media.

Nait-Ali, Amine and Fournier, Regis (Eds.). (2012). Signal and Image Processing for Biometrics. London: ISTE Ltd.

Nanavati, Samir, Thieme, Michael, and Nanavati, Raj. (2002). Biometrics: Identity Verification in a Networked World. New York: Wiley Computer Publishing.

Newman, Robert. (2009). Security and Access Control Using Biometric Technologies. Boston, MA: Course Technology.

Rakover, Sam S. and Cahlon, Baruch. (2001). Face Recognition: Cognitive and Computational Processes. Amsterdam: John Benjamins Publishing.

Ratha, Nalini and Bolle, Ruud (Eds.). (2004). Automatic Fingerprint Recognition Systems. New York: Springer-Verlag.

Rose, Mary. (2012). Biometrics. Retrieved June 2, 2014 from http://www.engineersgarage.com/articles/biometrics.

Scottish Fingerprint Service. (2007). Guide to the Fingerprint Identification and Verification Process. Retrieved May 29, 2014 from http://archive.scottish.parliament.uk/business/committees/justice1/reports-07/j1r07-03-vol1-02.htm.

Shelly, Gary and Vermaat, Misty. (2011). Discovering Computers 2011: Complete. Boston, MA: Course Technology.

Subramanian, Ramesh (Ed.). (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey, PA: IRM Press.

Tipton, Harold F. and Krause, Micki (Eds.). (2012). Information Security Management Handbook, 5th Ed. Boca Raton, FL: CRC Press.

Uwechue, Okechukwu A. and Pandya, Abhijit S. (1997). Human Face Recognition Using Third-Order Synthetic Neural Networks. Norwell, MA: Kluwer Academic Publishers.

Vacca, John R. (2007). Biometric Technologies and Verification Systems. Burlington, MA: Butterworth-Heinemann.

Wechsler, Harry. (2007). Reliable Face Recognition Methods: System Design, Implementation and Evaluation. New York: Springer Science+Business Media.

Wilson, Tracy V. (2005). How Biometrics Works. Retrieved May 29, 2014 from http://science.howstuffworks.com/biometrics.htm/printable.

Zhou, Shaohua Kevin, Chellappa, Rams, and Zhao, Wenyi. (2006). Unconstrained Face Recognition. New York: Springer Science+Business Media.



 

  Article Index




Copyright © 2016, DynoTech Software, All Rights Reserved.