Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 History  





2 Types of biometric devices  





3 Subgroups  





4 Uses  



4.1  Workplace  





4.2  Immigration  





4.3  Handheld and personal devices  







5 Present day biometric devices  



5.1  Personal signature verification systems  





5.2  Iris recognition system  







6 Problems with present day biometric devices  



6.1  Biometric spoofing  





6.2  Accuracy  







7 Benefits of biometric devices over traditional methods of authentication  





8 Future  





9 References  














Biometric device






العربية
Čeština
Bahasa Indonesia
Русский
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 

(Redirected from Biometric security device)

Iris scanner in action to identify people

Abiometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.[1]

History[edit]

Biometric devices have been in use for thousands of years. Non-automated biometric devices have in use since 500 BC,[2] when ancient Babylonians would sign their business transactions by pressing their fingertips into clay tablets.

Automation in biometric devices was first seen in the 1960s.[3] The Federal Bureau of Investigation (FBI) in the 1960s, introduced the Indentimat, which started checking for fingerprints to maintain criminal records. The first systems measured the shape of the hand and the length of the fingers. Although discontinued in the 1980s, the system set a precedent for future Biometric Devices.

Types of biometric devices[edit]

There are two categories of biometric devices,

  1. Contact Devices - These types of devices need contact of body part of live persons. They are mainly fingerprint scanners, either single fingerprint, dual fingerprint or slap (4+4+2) fingerprint scanners, and hand geometry scanners.
  2. Contactless Devices - These devices don't need any type of contact. The main examples of these are face, iris, retina and palm vein scanners and voice identification devices.

Subgroups[edit]

The characteristic of the human body is used to access information by the users. According to these characteristics, the sub-divided groups are

Uses[edit]

Workplace[edit]

IRIS and Fingerprint recognition at Heathrow Terminal 4

Biometrics are being used to establish better and accessible records of the hour's employee's work. With the increase in "Buddy Punching"[4] (a case where employees clocked out coworkers and fraudulently inflated their work hours) employers have looked towards new technology like fingerprint recognition to reduce such fraud. Additionally, employers are also faced with the task of proper collection of data such as entry and exit times. Biometric devices make for largely fool proof and reliable ways of enabling to collect data as employees have to be present to enter biometric details which are unique to them.

Immigration[edit]

As the demand for air travel grows and more people travel, modern-day airports have to implement technology in such a way that there are no long queues. Biometrics are being implemented in more and more airports as they enable quick recognition of passengers and hence lead to lower volume of people standing in queues. One such example is of the Dubai International Airport which plans to make immigration counters a relic of the past as they implement IRIS on the move technology (IOM) which should help the seamless departures and arrivals of passengers at the airport.[5]

Handheld and personal devices[edit]

Fingerprint sensors can be found on mobile devices. The fingerprint sensor is used to unlock the device and authorize actions, like money and file transfers, for example. It can be used to prevent a device from being used by an unauthorized person. It is also used in attendance in number of colleges and universities.

Present day biometric devices[edit]

The signature is authenticated by the spaces taken in each square

Personal signature verification systems[edit]

This is one of the most highly recognised[6] and acceptable biometrics in corporate surroundings. This verification has been taken one step further by capturing the signature while taking into account many parameters revolving around this like the pressure applied while signing, the speed of the hand movement and the angle made between the surface and the pen used to make the signature. This system also has the ability to learn from users as signature styles vary for the same user. Hence by taking a sample of data, this system is able to increase its own accuracy.

Iris recognition system[edit]

Iris recognition involves the device scanning the pupil of the subject and then cross referencing that to data stored on the database. It is one of the most secure forms of authentication, as while fingerprints can be left behind on surfaces, iris prints are extremely hard to be stolen. Iris recognition is widely applied by organisations dealing with the masses, one being the Aadhaar identification carried out by the Government of India to keep records of its population. The reason for this is that iris recognition makes use of iris prints of humans, which hardly evolve during one's lifetime and are extremely stable.

Problems with present day biometric devices[edit]

Biometric spoofing[edit]

Using fine powder and a brush to reveal and copy fingerprints

Biometric spoofing is a method of fooling[7] a biometric identification management system, where a counterfeit mold is presented in front of the biometric scanner. This counterfeit mold emulates the unique biometric attributes of an individual so as to confuse the system between the artifact and the real biological target and gain access to sensitive data/materials.

One such high-profile case of Biometric spoofing came to the limelight when it was found that German Defence Minister, Ursula von der Leyen's fingerprint had been successfully replicated[8]byChaos Computer Club. The group used high quality camera lenses and shot images from 6 feet away. They used a professional finger software and mapped the contours of the Ministers thumbprint. Although progress has been made to stop spoofing. Using the principle of pulse oximetry[9] — the liveliness of the test subject is taken into account by measure of blood oxygenation and the heart rate. This reduces attacks like the ones mentioned above, although these methods aren't commercially applicable as costs of implementation are high. This reduces their real world application and hence makes biometrics insecure until these methods are commercially viable.

Accuracy[edit]

Biometric Island examining facial image 2D and 3D, voice timbre, and verifying handwritten signature

Accuracy is a major issue with biometric recognition. Passwords are still extremely popular, because a password is static in nature, while biometric data can be subject to change (such as one's voice becoming heavier due to puberty, or an accident to the face, which could lead to improper reading of facial scan data). When testing voice recognition as a substitute to PIN-based systems, Barclays reported[10] that their voice recognition system is 95 percent accurate. This statistic means that many of its customers' voices might still not be recognised even when correct. This uncertainty revolving around the system could lead to slower adoption of biometric devices, continuing the reliance of traditional password-based methods.

Benefits of biometric devices over traditional methods of authentication[edit]

Future[edit]

Researchers are targeting the drawbacks of present-day biometric devices and developing to reduce problems like biometric spoofing and inaccurate intake of data. Technologies which are being developed are-

References[edit]

  1. ^ Wayman, James; Jain, Anil.; Maltonie, Davide.; Maio, Dario (2005). An Introduction to Biometric Authentication Systems. Boston, MA: Springer London. pp. 1–20. ISBN 978-1-85233-596-0.
  • ^ Mayhew, Stephen (14 January 2015). "History of Biometrics". biometricupdate.com. Archived from the original on 14 December 2015. Retrieved 24 October 2015.
  • ^ Zhang, David (2013-11-11). Automated Biometrics: Technologies and Systems. Springer Science & Business Media. p. 7. ISBN 9781461545194.
  • ^ "What is Buddy Punching? How to Prevent it [Updated 2021]". quickbooks.intuit.com. Retrieved 2023-08-29.
  • ^ Basit, Abdul (20 October 2015). "Dubai Airport without immigration counters?". Khaleej Times. Retrieved 28 October 2015.
  • ^ M.M. Fahmy, Maged (5 November 2010). "Online handwritten signature verification system based on DWT features extraction and neural network classification". Ain Shams Engineering Journal. 1 (1): 59–70. doi:10.1016/j.asej.2010.09.007.
  • ^ Trader, John (2014-07-22). "Liveness Detection to Fight Biometric Spoofing". Retrieved 4 November 2015.
  • ^ "German minister fingered as hacker 'steals' her thumbprint from a PHOTO". The Register. 29 Dec 2014. Retrieved 21 October 2015.
  • ^ Reddy, P.V; Kumar, A; Rahman, S; Mundra, T.S (2008). "A New Antispoofing Approach for Biometric Devices". IEEE Transactions on Biomedical Circuits and Systems. 2 (4): 328–337. CiteSeerX 10.1.1.141.6902. doi:10.1109/tbcas.2008.2003432. PMID 23853135. S2CID 8908501.
  • ^ Warman, Matt (2013-05-08). "Say goodbye to the pin: voice recognition takes over at Barclays Wealth". The Telegraph. Retrieved 22 October 2015.
  • ^ O’Gorman, Lawrence (2003). "Comparing Passwords, Tokens, and Biometrics for User Authentication". Proceedings of the IEEE. 91 (12): 2021–2040. doi:10.1109/jproc.2003.819611. S2CID 11397126.
  • ^ Florencio, Dinei; Herley, Cormac (2007). "A large-scale study of web password habits". Proceedings of the 16th international conference on World Wide Web - WWW '07. p. 657. CiteSeerX 10.1.1.75.8414. doi:10.1145/1242572.1242661. ISBN 9781595936547. S2CID 10648989.
  • ^ Funk, Wolfgang; Arnold, Michael; Busch, Christoph; Munde, Axel. "Evaluation of Image Compression Algorithms for Fingerprint and Face Recognition Systems" (PDF). 2005 IEEE Information Assurance Workshop.
  • ^ K. U. Okereafor, C. Onime and O. E. Osuagwu, "Multi-biometric Liveness Detection - A New Perspective," West African Journal of Industrial and Academic Research, vol. 16, no. 1, pp. 26 - 37, 2016 (https://www.ajol.info/index.php/wajiar/article/view/145878)
  • ^ K. U. Okereafor, C. Onime and O. E. Osuagwu, "Enhancing Biometric Liveness Detection Using Trait Randomization Technique," 2017 UKSim-AMSS 19th International Conference on Modelling & Simulation, University of Cambridge, Conference Proceedings, pp. 28 – 33, 2017 (http://uksim.info/uksim2017/CD/data/2735a028.pdf)
  • ^ Malenkovich, Serge (24 December 2012). "10 Biometric Security Codes of the Future". kaspersky.com. Retrieved 28 October 2015.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Biometric_device&oldid=1189835645"

    Categories: 
    Computer security
    Security
    Perimeter security
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
     



    This page was last edited on 14 December 2023, at 09:36 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki