Biometrics - University of Wisconsin

advertisement
Biometrics
Kayla Burke
Department of Computer Science
University of Wisconsin – Platteville
Platteville, WI 53818
burkeka@uwplatt.edu
Abstract
Biometrics and the study of human characteristics or behavior have become an essential topic of
research in the field of computer science in order to create a more secure working and digital
environment. The numerous forms of biometrics have provided various opportunities in today’s
scientific society. The abilities of biometrics range from a small iris scan to recognizing how a
human walks. The field opens up numerous opportunities for those studying the field of
computer science and software engineering. However, even considering the benefits of
biometrics, the financial costs and concerns about privacy seem to hinder the application of the
software and hardware.
Issues with Authentication
Authentication asks two questions: Who is the user? Is the user really who he says he is? [2] In
today’s world, almost everyone has been exposed to some type of authentication.
The most common type of authentication would be the use of passwords or personal
identification numbers (more commonly known as PINs). Passwords and PINs are used
everywhere in today’s technology, such as logging into a personal computer or email system.
Because passwords and PINs are commonly used to protect important or confidential material,
many systems have policies that must be followed when creating a password. However, even
with these even with specific guidelines and policies to ensure password strength, they are still
very vulnerable. Users may not understand the importance of password security which has been
proved by various studies and surveys. According to a BBC News article from 2004, “More than
70% of people would reveal their computer password in exchange for a bar of chocolate.” The
article states that the majority of passwords created include information that is simple to reveal
from the user such as family names, sports teams, or pet names. [3] Along with this issue, many
users apply the same password for multiple sensitive accounts. This causes obvious problems
when easily hacked passwords are used for accounts that hold private information such as an
online bank account. Finally, users may not be aware of a stolen password or PIN for a length of
time after the theft occurs. These are only a few of the security issues involving passwords.
2
Cards and tokens can be used as another form of authentication. Because cards are a physical
form of authentication, only one person can use the card at a time. This does not mean that other
people cannot use it, but if the rightful owner allows another user to use the card, the owner
cannot gain access to the card protected information or secured area. In some ways, cards are
safer than passwords. Cards and tokens do not require any memorization, which is more
convenient for the user. Tokens automatically generate a code that the user will use to enter into
the authentication device or system which means that the token will be different each time.
Some systems use the current date and time to generate a token while others use an internal
counter. Another advantage of using a physical device is that the user will be able to tell
immediately if the device was stolen. However, similar to passwords, authentication devices and
computers will not have a way to tell if a card used is from its rightful owner or not. [1]
Biometrics is one more form of authentication whose measurements strive to resolve the issues
that occur with passwords, PINs, cards, or tokens. One can think of passwords as what users
know while cards and tokens are what users have. Biometrics authentication is what the users
physically are. [1]
Biometrics
The literal translation of biometrics is “life measurement.” A definition of biometrics, as it
applies to computer science, is automated methods of authentication based on physical or
behavioral characteristics of an individual. [1] Human beings use biometrics to identify each
other every day. Humans are able to recognize faces, voices, or behavioral characteristics of
other humans that they have met or known for a period of time. Besides facial and voice
recognition, there are many other forms of biometric measurement including fingerprinting, iris
and retina scanning, signature recognition, gait recognition, and facial and palm thermogram
recognition. [4] This essay will briefly discuss these different forms of biometric measurements
and then examine fingerprinting more closely.
Why use Biometrics?
Biometric measurements are a convenient, strong form of authentication. Since the user does not
have to carry a device or remember any passwords, biometric authentication is convenient for the
user. Biometrics are strong because the authentication cannot be forgotten, stolen, or easily
replicated. Because of these advantages, many corporations have adopted biometrics as their
form of authentication. Here are some examples of biometric applications within the government
and military programs:




Social Services – to prevent citizens from acquiring additional funds
Trusted Traveler Credentials – for the security screening of passengers in civil aviation
National Identity – to identify the citizens of a country
Access Control – such as allowing certain people to use a secure computer system
3

Other various military programs [1]
Types of Biometrics
Hand Geometry
Hand geometry is based on a number of measurements of the hand including the shape of the
hand, width of the palm, and the length and width of the fingers. There are various types of hand
geometry scanners. One type only scans the palm of the hand. Another type examines the entire
hand by providing small pegs for the user to place his fingers next to. These pegs ensure that the
fingers are in the same position for each scan. Hand geometry is used quite commonly and is
known to be fairly accurate. [6] There are a few limitations when it comes to hand geometry,
however. Jewelry can cause problems if it is not worn on the hand consistently. Dexterity can
also become a problem. Also, if the user is not able to open their hand wide, they will not be
able to use the scanners. [4]
Facial Recognition
Faces carry the characteristics that humans most commonly use to identify one another. For
example, when passing another being, humans will look at the passerby’s face and will be able to
identify them or not depending if they have seen the face before. It is for this reason that
technology has tried to use the same idea in the field of biometrics. There are multiple forms of
facial recognition measurements but the most popular is the location and shape of facial
attributes. In order for the technology to be efficient, it should be able to recognize when a face is
in the image at all, locate the face when it exists, and be able to recognize the face from multiple
angles. [4] Similar problems to hand geometry occur in facial recognition. If the user alters their
facial features because of cosmetic surgery or injury, they will need to be reintroduced to the
system. The same problem occurs if the user adds temporary features to their face such as
glasses or jewelry. Some facial recognition is susceptible to replication spoofing. A person who
looks similar to a registered user may be able to gain access to the protected material.
Voice Recognition
Because voices are not as unique and can be easily imitated, voice recognition is not as widely
used as other forms of biometrics. However a voice is another human characteristic that is used
to identify each other. A person’s voice is created using various oral and nasal airways. User’s
airway sizes vary which causes the voice to sound differently from another’s. [1] Voice
recognition faces many challenges. Some of these challenges include the voice changing due to
aging or sicknesses and background noise. Voice recognition is most commonly used in
telephone applications. [4]
4
Iris Scanning
The iris is the colored part of the eye surrounding the pupil. The retina is comprised of the veins
behind the eyeball. (See Appendix C for a visual representation of an eyeball) [1] Irises, like
fingerprints, are unique to each individual and hold a lot of features that can be used in
identification. Because of this reason, iris scans seem to be a promising form of biometric
measurement for large scale systems. As more users are added, individual irises are able to be
matched. It is also easy to distinguish fake irises from authentic which resolves it issue of
possible iris replication that occurs in many other forms of biometric authentication. Iris
scanning hardware tends to be expensive which causes it to be used less frequently.
Retinal Scanning
Retinal scanning is known to be the most secure form of biometric authentication because it is
close to impossible to change or replicate another human’s retina. To get an initial read of the
retina, the eye must be physically contacted by the equipment and moved in specific patterns.
Users have been known to reject this process due to the uncomfortable effort that it requires.
Retina scanning hardware, which is similar to iris scanning hardware, is financially costly.
These are a few of the factors as to why retinal scans are not as widely accepted as other forms of
biometric authentication. [1]
Facial and Palm Thermogram Recognition
A thermogram is the pattern of heat that is emitted from the skin, in this case the palm of the
hand. [1] These patterns of heat are created by the infrared energy being produced from the
subject. [11] The data gathering process is as simple as taking a photo of the area to be measured.
However, the hardware used to capture these images is very expensive so they have not been
widely adopted. [1] The fact that a thermogram can change easily due to blushing, lying, or even
environmental conditions is another major drawback to this form of biometric. [10]
Signature Recognition
Signature recognition looks at two main measurements: the way the signature is written and the
final signature. When examining how the signature is written the systems seeks out points where
the writing tool is pressed down harder and the speed of the writing. The system also identifies
unique qualities of the handwriting such has how the T’s are crossed or how I’s are dotted. The
data is gathered by allowing the user to write on an electronic writing space similar to the
hardware used to sign after making a financial transaction. Because signatures change quite often
and they are easily forged, they are not usually used in biometric systems. [1][4]
Gait Recognition
5
Gait recognition is another form of biometric measurement, but it is not commonly used. A
person’s gate can change with age, change in weight, and even injury. However, gait recognition
can be sufficient enough for low security systems. Gait recognition systems can be very costly
due to the hardware needed to record and analyze the gate of the subject. [1]
Keystroke Recognition
Keystroke recognition is attractive because it does not require additional hardware to use. The
technique is done entirely by software so it can be applied to any system that accepts keyboard
inputs. To gather the data, the user is asked to type their authentication information (usually a
username and password) multiple times in a row. Three measurements are taken from the user’s
keystrokes: the amount of time between each keystroke, dwell time, and flight time. Dwell time
the amount of time each individual key his pressed down. Flight time is the amount of time in
between pressing the same key twice. For example, if the word “coffee” was being typed, the
flight time would be the amount of time in between the pressing of the two f’s or e’s. The
averages of these measurements are calculated too and used in the creation the template to be
used in the matching process. [1] [9]
Fingerprint Recognition
As mentioned earlier, fingerprinting was used as a very basic form of identification dating back
to 2000-1000 B.C. Clay tablets that were thought to be ancient contracts showed fingerprints at
the bottom of the slab indicating a signature of sorts. This proves to be one of the very few uses
of fingerprinting. Sir Francis Galton was the first to begin researching and studying
fingerprinting as he was attempting to discover a way to determine genetic history and hereditary
traits during the late 1880s. He was the first to discover that fingerprints are unique to each
individual and that they remain the same thorough out a human being’s lifetime. He calculated
the odds of finding two identical prints to being 1 in 64 billion. [12]
During 1892, an Argentine police officer named Juan Vucetice created the first physical
fingerprint files based on Galton’s research. His collection of files came to be known as the
Vucetice system. The system migrated into the United States around 1903 where it was first
used by the criminal justice systems of New York and the Federal Bureau of Prisons. A few
years later, the United States army began researching and looking into improvements to the
system. In 1924, the identification division of the FBI was established and in 1946, they had
processed over 100 million fingerprint cards. This number doubled by 1971. At this point in
time, the fingerprint cards were organized in a way that is similar to today’s library cataloging
system. As the need to search through these cards increased, so did the need for more efficient
and convenient methods of organizing the cards. It was not until the 1990s that the first
computerized system known as the Automated Fingerprint Identification system (AFIS) was
created. This system finally allowed for fast searches through the cards. By 1999, the last of the
fingerprint cards had been transitioned into the computer system. [12]
6
Fingerprint recognition uses the unique features of the user’s fingerprints, known as minutia, to
identify the user from others. These minutiae are the ridges and valleys on the surface of a
fingertip. Looking at a fingerprint, ridges appear as dark lines and valleys are the lines where
light was able to shine through. These ridges and valleys also create other distinct patterns
within a fingerprint. A few of these minutiae are known as bifurcations, deltas, ridge endings,
and islands. A bifurcation is where one ridge splits into two different ridges. Delta is the point
in a bifurcation where the two ridges split. A ridge ending is where a ridge ends. Finally, an
island is where a ridge creates a circular shape in the fingerprint. (See Appendix A) The most
commonly used characteristics in a fingerprint are the ridge endings and the bifurcations. [1]
Another feature of fingerprints that are used in fingerprint recognition is the pattern of the print.
There are seven common fingerprint print patterns: arch, tentarch, loop, double loop, pocked
loop, whorl, and mixed. See Appendix B for visuals of these different patterns. These are the
seven fingerprint patterns that are used in the Federal Bureau of Investigation recognition
system. [14]
Because each person’s fingerprints are unique, the matching accuracy is very high. Even
identical twins have different fingerprints. [5] Although there are many benefits of
fingerprinting, there are still some issues with using fingerprints to protect systems. The number
one issue is replication and spoofing the system. There are multiple ways that culprits have been
able to fool fingerprint scanners. Many use prosthetic fingers (or “gummy fingers”) and even
Play-Doh to replicate a fingerprint. Another way the scanners have been fooled is when the
perpetrator breathes on the scanner which reactivates the previous fingerprint. One way that this
can be prevented is by performing liveness tests as the biometric is being entered. Liveness tests
are tests that attempt to prove that the user or the biometric is a not artificial. A few ways these
tests have been performed is by detecting warmth or a pulse in the finger. [1]
The Biometric Process
There are three main steps in the biometric process: acquiring data, processing the raw data, and
a decision process. Each step uses various algorithms and equations to calculate the needed data
and accuracy. Fingerprint recognition will be used as the biometric example in this investigation
of the three steps. [1]
Acquiring Data
The first step of the biometric process is where the physical characteristic being used for
identification is presented to the system. This step is usually known as enrollment. Multiple
samples of the fingerprint are taken in which a template will be made from in the next step. The
calculated average of these samples is assigned an enrollment score. Whether the score is good
enough or not depends on the minimum accepted level (or threshold) that is needed is
determined by the system owner.
7
The algorithms used to acquire this data are not normally published which makes examples
difficult to find. However, a thesis paper from the University of Los Angeles did show the
pseudocode and calculations used to thin the ridges of a fingerprint. (See Appendix D). The 3x3
window (also shown in Appendix D) is placed over the image of the fingerprint and the
calculations in each window are performed with the algorithm until the image is stable. [5]
Accuracy is measured by a failure to enroll rate (FTER). What determines if the enrollment fails
varies, depending on the biometric. In fingerprint recognition, the enrollment might fail if there
is debris, perspiration, or even a cut on the fingertip. Each system owner may have different
requirements for this measurement as well. This rate is calculated by dividing the number of
unsuccessful enrollments by the number of participants attempting to enroll. If the system has a
high failure to enroll rate, that means that the system will struggle to find matches when the
number of total participants increases. [1]
Raw Data Processing
The second step in the biometric process is where the data collected from the enrollment step and
a template is created for the matching process. Algorithms are used to separate the irrelevant
data from the data that will be used in the matching process. These algorithms are usually very
protected by the biometric vendors that created them. This template is created by identifying and
drawing out the unique characteristics of the fingerprint (See Figure 1). This template is referred
to as a minutia map. This step also produces a quality score and a matching score which tell how
likely that the data will be able to be matched in the future. These scores are analyzed by the
system administrator to determine if they are fit for the system. [1]
Figure 1: Raw Data Processing
Decision Process
The decision process is the final step and is where the biometric is matched and the yes or no
decision is made. There are two different levels of decision making: verification and
8
identification. [8] Verification is the simpler of the two due to the fact that it is a one-to-one
matching system where the system is only searching for one match. Verification asks the
question “Am I who I claim I am?” This is the type of decision making that is used when
protecting computer systems or secured areas. On the other hand, identification involves a oneto-many match where all of the records in the system are searched for a match. The question
“Who am I?” can be asked in this type of decision making. This type of decision making is used
more commonly in criminal justice systems where officials are attempting to identify a suspect
by searching the system for matching fingerprints that were found at the scene of the crime.
[1][2]
Accuracy of the decision process is measured using two equations. The first equation measures
the false acceptance rate (FAR). This rate is calculated by dividing the number of false
acceptances by the number of samples. This number measures the of the likelihood that the
biometric security system will incorrectly accept an access attempt by an unauthorized user. The
other equation used to measure accuracy is the false rejection rate (FRR). This rate is calculated
by dividing the number of false rejections by the number of samples. This number is the
measure of the likelihood that the biometric security system will incorrectly reject an access
attempt by an authorized user. Usually, the false acceptance rate is analyzed more than the false
rejection rate. [1][7]
Finally, there are two types of searches that can be performed during the decision process: binary
and multiple sequence. In the binary search, if a match is not found the participant is simply
denied access. In a multiple sequence search, if a match is not found, a second query is
performed. This secondary query can be done on another device or by using the same device as
the first query. [1]
Applications in Computer Science and Software Engineering
Computer science courses in biometrics are now being taught in schools around the United States
such as Purdue and the University of Notre Dame. With the knowledge base increasing, the
opportunities for those studying biometrics is also growing. Just like any other program or
computer system, updates are always needed as the technology becomes more efficient. The
algorithms that are used to find matches and to get relevant data need to be written, updated, and
tested. Biometrics also provides additional jobs to those who are interested in the infrastructure
and software to support aspects of computer science and software engineering as they all need to
be maintained. Also, there is various testing that needs to be done to all phases and portions of
the systems. According to online job sites, the average salary of an employee working with
biometrics is around $60,000 to $65,000 a year. [13]
Conclusion
Biometrics are a very promising form of authentication because it holds advantages that could
really help to improve security within businesses and other areas that need strong security. With
9
the numerous options that biometric studies have provided, it is quite possible that perhaps one
day, users will not have to remember passwords or PINs or carry access cards with them to work
each day. All a user will need to access their data is themselves. As the biometric process
continues to evolve along with the world of technology, there is no doubt that opportunities will
follow.
References
[1] Woodward, J. D., Orlans, N. M., & Higgins, P. T. (2003). Biometrics. New York: McGraw-Hill/Osborne.
[2] Carter, R. (n.d.). Authentication vs. Authorization . Home | Duke University. Retrieved October 29,
2012, from http://www.duke.edu/~rob/kerberos/authvauth.html
[3] Passwords Revealed by Sweet Deal. (2004, April 20). BBC News - Home. Retrieved October 30, 2012,
from http://news.bbc.co.uk/2/hi/technology/3639679.stm
[4] Jain, A. K., Ross, A., & Prabhakar, S. (January 1). An Introdcution to Biometric Recognition. CITeR Center for Identification Technology Research. Retrieved October 29, 2012, from
http://www2.citer.wvu.edu/members/publications/files/RossBioIntro_CSVT2004.pdf
[5] Ackerman, A., & Ostrovsky, R. (n.d.). Fingerprint Recognition. UCLA Computer Science Department.
Retrieved October 31, 2012, from http://www.cs.ucla.edu/honors/UPLOADS/andrew/thesis.pdf
[6] Varchol, P., & Levicky, D. (2007, December). Using Hand Geometry in Biometric Security Systems.
Radioengineering. Retrieved October 29, 2012, from
http://www.radioeng.cz/fulltexts/2007/07_04_082_087.pdf
[7] False Acceptance Rate (FAR) & False Recognition Rate (FRR) - Bayometric Blog. (2012, June 28).
Biometric Security Devices: Access Control Systems, Fingerprint Reader & Scanner.
Retrieved November 1, 2012, from http://www.bayometric.com/blog/index.php/biometric-securitysystems/false-acceptance-rate-far-false-recognition-rate-frr/
[8] n Overview of Biometric Recognition. (n.d.). Michigan State University. Retrieved October 30, 2012,
from http://biometrics.cse.msu.edu/info.html
[9] From Passwords to Keystrokes: An Evolution in User Identification Technology. (2012, August 31).
Payza Blog. Retrieved November 1, 2012, from http:// blog.payza.com/2012/08/31/from-passwords-tokeystrokes-an-evolution-in-user-identification-technology/
[10] Ramli, A., & Adnan, W. (2011). A Study on a Robust Facial Thermogram Recognition System (FTRS).
UPM Knowledge Management Portal. Retrieved October 29, 2012, from
http://km.upm.edu.my/kmportalweb/infox/assetDetailAction.action;jsessionid=2cFVPcMSCxKh2gpxpkjz
CGfgxkrbfk5Mn28MF89ZnpJyB4PvhQ4h!796603960?execute=view&assetId=000060363&actionFlg=alllist
10
[11] Thermography. (n.d.). In Wikipedia. Retrieved November 24, 2012, from
http://en.wikipedia.org/wiki/Thermography
[12] Fingerprint America History of Fingerprints. (n.d.). Fingerprint America. Retrieved November 1,
2012, from http://www.fingerprintamerica.com/fingerprinthistory.asp
[13] Biometrics Salaries. (n.d.). Simply Hired. Retrieved November 12, 2012, from
http://www.simplyhired.com/a/salary/search/q-Biometrics
[14] Fingerprint Patterns. (n.d.). Ridges and Furrows. Retrieved October 30, 2012, from
http://ridgesandfurrows.homestead.com/fingerprint_patterns.html
11
Appendix A
Appendix B
12
Appendix C
Figure 2: Eye Anatomy (1) Lens, (2) Retina, and (3) Iris
13
Appendix D
Pseudo Code for Zhang –Suen Thinning:
Let A(P) be the number of 01 patters in the order set P2 …
P9
Let B(P) be the number of non-zero neighbors of P
Do until image is stable (i.e. no changes made)
Sub-iteration 1:
Delete P from image if:
a) 2 ≤ B(P) ≤ 6
b) A(P) = 1
c) P2 * P4 * P6 = 1
d) P4 * P6 * P8 = 1
Sub-iteration 2:
Delete P from image if:
a) and b) from above
c') P2 * P4 * P8 = 1
d') P2 * P6 * P8 = 1
Download