Suleiman Dr. Patrick Juola COST 460 -- Computer Security Alshoaibi 1 Biometrics Introduction Technology that is advancing at a remarkably rapid pace controls the world we live in today. Most of these technological advancements are meant to make lives easier and safer. With the availability of large-scale computer networks and the increasing concern for identity theft cases, the use of an appropriate personal identification system has become of significant importance. The desired personal identification systems should possess the ability to point out an individual accurately, rapidly, reliably, without invading privacy rights, in a cost effective, user friendly and manage to cope with the changing technology. Biometrics systems form one of the newest technologies that have found a wide use in many areas of people’s daily lives. Biometrics can be explained as a process of measuring an individual’s physiological or behavioral characteristics by determining or verifying their identity. On the other hand, biometrics acts as a barrier between an individual’s personal data and the unauthorized use of that data. A biometric device works by creating a digital template, whereby a database compares this template with an already existing template (Modi 11-13). The main purpose of this paper is to analyze and discuss the best biometric technology by looking at the aspects of a reputable biometrics technology. Some of the most critical aspects that will be discussed on this essay are cost, accuracy, speed, safety, security, and inputs. The quantitative measurement of human beings for identification purposes was started in 1870s. Some olden means of identifying human beings included measuring the skull diameter or arm and foot length. These methods have ever since improved with the advancing technology up to the current biometric technologies. Since biometric technologies are used in identifying people for safety and security purposes, the selected method should be as effective as possible (Wayman et al 4). Types of biometric technologies Biometrics is divided into two main categories. The first category composes of physiological biometrics that is based on data retrieved from directly measuring part of a human body. Good examples of physiological biometrics include iris and facial recognition, fingerprints, and hand geometry. The second category composes of behavioral biometrics that functions through identifying action taken by an individual. This biometrics technologies base their actions and measurements on data derived from behavioral traits of an individual in the database and compares them with those of the individual in question. Examples of behavioral biometrics include speech patterns, keystrokes, and signatures (Modi 16-17). This discussion will analyze the effectiveness of physiological biometric techniques, looking specifically at fingerprint recognition biometric technology. Which biometric technology is the best? Alshoaibi 2 Researchers worldwide has had a hard task determining which biometric technology best serves the interests of people in terms of cost, speed of operation, safety, and accuracy. As discussed above, the most common automatic identification methods that use biometrics technology are fingerprints, iris, voice, retina, hand, face, and handwriting. The imaging requirements of these methods differ because they use a broad range of characteristics. These systems measure different aspects of human identification. The most common measurement techniques used are single one-dimension signal (like voice identification), single twodimensional image (fingerprint recognition), multiple two-dimensional measures (hand geometry) and a time series of two-dimensional images (face and iris identification) (Modi 3337). After identification of the above types of biometric technologies available, researchers used their qualities to determine which option best suits the aspects shown above. Most biometric technologies share same characteristics, and it becomes hard to determine which one is the best among all. According to their performance and effectiveness, the fingerprint recognition and hand geometry ranks as the best biometric technologies in the world today. The two methods are widely used in most applications today, but finger recognition is the most commonly used due to its low cost and accuracy. Hand geometry requires a complicated system apart from using large equipments although its results are similar to those achieved in fingerprint recognition. This makes fingerprint the best biometric technology to use today (Csongrády and Elena 196-197). An ideal biometric technology must possess five qualities. These are distinctiveness, robustness, accessibility, availability, and acceptability. The biometric technique in question is a fingerprint recognition technology. In terms of robustness, this is the most robust method that can be used for identification. There is never a single moment that an individual can change his or her fingerprint patterns; also, fingerprints differ in all individuals. Fingerprint recognition process measures robustness by the “false non-match rate” that measures the probability of an image to match the enrollment image. Taking into consideration the iris recognition process, an individual could have an iris similar to another person, and this introduces an issue of identical matches (Modi 25-29). Secondly, an acceptable biometric technology must be accessible. Fingerprint recognition process is the easiest method to access among all other processes. In addition, electronic sensors easily use fingerprints because they are located openly. Accessibility of a fingerprint recognition process is measured by the system’s ‘throughput rate’. In addition, the system has the ability to process many individual fingerprint patterns at any one given time without a lot of delay. On the other hand, the effectiveness of a biometric process is determined by its availability. Fingerprint recognition process has been used since time immemorial, and it is highly available. Almost every organization today uses this process because of its less complexity and it is readily available (Csongrády and Elena 200-203). Moreover, the fourth key aspect of fingerprint recognition is distinctiveness. Fingerprint recognition system bears the ability to show significant variation over populations. The system is distinct because it only accepts individual fingerprints and raises an alarm in case it senses a mismatch. Finally, the fingerprint biometric system is readily acceptable. The process is used by many large organizations in recognizing their staff while they enter and leave the company premises. Most people like this system because it is fast, effective and does not require a lot of training to use (Csongrády and Elena 203). Alshoaibi 3 Fingerprint recognition biometric technique Biometrics technologies that use physiological traits are commonly used in today’s applications because they enhance the security for physical and logical access to systems. Even if most physiological biometric techniques offer many advantages over behavioral techniques, they are still vulnerable to attacks. An individual must decide on the best alternative that has low capability to attack (Wayman et al 13). Fingerprint recognition technology is the best among all other techniques given above. The system is extremely useful in most applications because fingerprints found most primary use as accurate identification methods. Fingerprints are used for identifying an individual because of their uniqueness and consistency over a long period. On the other hand, fingerprint recognition method has been used over decades and as recently been automated because of the advancement in technology. This shows that the method was taken as the most accurate and cost effective over any other identification process. On the other hand, fingerprint recognition process is extremely effective because it is easier to acquire. It also provides numerous sources available for collection (ten fingers) at once (Csongrády and Elena 213-215). The automated fingerprint recognition technology finds successful use around the globe by both law-enforcing and civilian applications. This biometric system continues to be the dominant method because many identity management and security access applications continue using it because of its proven performance, availability of a variety of databases and its low cost. In addition, it is the only biometric technique accepted in law courts for convicted criminal persecution. In addition, fingerprint recognition technology has been used for an exceedingly long time, and new researches methods have been developed to assist improve the process’s performance and effectiveness. This forms the only biometric system can combine a variety of features without confusing the database. Moreover, the process has the capacity to store millions of fingerprints in the database and perform issues such as distance recognition. Fingerprint identification technique forms a secure and revocable scientifically established process that is unique and poses a challenge to other biometric technologies (Csongrády and Elena 213-214). How the process works Fingerprint technology uses various acquisition devices like ink-less methods (senses finger ridges), live-scan fingerprint scanners (optical methods, CMOS capacitance, ultrasound sensing and thermal sensing). Once collected, fingerprints appear in the form of the series of dark lines representing peak for portions of friction ridge skin and the valleys between the ridges appear as white spaces. The technology bases its identification on the direction and location of the ridge endings and splits along ridge paths using three levels. The information collected from a fingerprint’s friction ridge includes the flow of friction ridges that forms the first level of recognition. The second level determines the availability or absence of features on the individual friction lines and the sequences. In addition, the third level analyzes details of a single ridge. The process recognizes an individual based on the first and second levels. Figure 1 shows a representation of a fingerprint identification process (Csongrády and Elena 198). Alshoaibi 4 Figure 1: fingerprint identification process Fingerprint matching techniques fall under two categories: minutiae and correlation based. Minutiae category works by pointing and mapping its relative placement on the finger. The minutiae approach has trouble hence, is not commonly used. For instance, a system has trouble in extracting the minutiae points especially with low quality fingerprints. In addition, the process fails to take into consideration the global pattern of ridges and furrows. On the other hand, correlation technique uses a precise location of the registration point. Image rotation and translation affects this method but can overcome some difficulties that minutiae cannot (Csongrády and Elena 198-200). In biometrics, the most crucial terms are identification, recognition and verification. A biometric technology that performs all the three terms effectively is termed as the best (Modi 55). Fingerprint recognition technique performs the three terms making it the most common biometric technique used in most industries today. In comparison with speaker identification method, fingerprint identification possesses many qualities desired of a biometric technology. The speaker identification has shortcomings because someone can imitate another person’s speech and get unwanted authentication. In addition, speaker identification has a problem with misspoken and mislead phrases that make it hard for the system to authenticate a user correctly. Fingerprint recognition avoids all these problems because human fingerprints remain with the same pattern irrespective of age. On the other hand, face recognition process requires a sophisticated software material to implement that makes it get limited use in the society today. Moreover, face identification is prone to errors because some people have similar appearances, example of identical twins (Csongrády and Elena 209-213). Alshoaibi 5 Aspects of fingerprint recognition that makes it the best biometric technology today Cost effective of fingerprint recognition system In terms of cost, fingerprint recognition technique is one of the most cost effective biometric methods used today. Fingerprint recognition process identifies a person in a nonrepudiated manner. The process enhances user convenience and reduces or eliminates management costs because it provides user-specific provision. These cost benefits make many organizations adopt fingerprint biometrics for identifying their employees. On the other hand, the system uses only three processes to complete user identification. These processes make fingerprint recognition system easier and cheap to design. In general, development of a fingerprint recognition device reduces the cost in the following ways. Firstly, it gets rid of paper card and any other cost associated with cards like ribbons. Secondly, the system helps managers in effectively managing the attendance of their staff members ensuring time effective operations that in return saves most unnecessary costs. On the other hand, fingerprint recognition process forms the only low cost public recognition process that assists in identifying and detecting frauds. Organizations whose employees have been registered in the biometric system records low theft cases because such people have a low probability of committing crimes (Csongrády and Elena 230-231). Fingerprint recognition devices also save cost because it requires simple software applications unlike iris recognition and retinal scanning techniques that require complicated and expensive software to operate. In addition, the system is extremely economical because it uses simple biometric personal computer user authentication technique that comes at a low cost. On the other hand, the materials used to develop a fingerprint recognition device are readily available and cheap to acquire. Some biometric techniques, for example voice recognition, make use of very complicated materials and hardware that come with high costs of buying and installing. Finally, fingerprint recognition system does not require a lot of experience to install hence technicians charge less compared to other biometric techniques. Most organizations have been competing for the fast growth market for biometric techniques that led into lowering the cost for buying and installing fingerprint recognition. The competition has driven this system down making it a common technology for most security applications (Csongrády and Elena 233). A clear analysis of fingerprint recognition process shows that it is the cheapest among other biometrics with the technology costing as low as $100. The cost of using iris recognition ranges between $2,000 and $2,500. On the other hand, the cost of using face recognition is approximately $1,000 while hand geometry costs about $500. From the above information, fingerprint recognition technique is the most cost effective and reliable biometric method. In addition, the process is cost effective because once a user’s fingerprints are registered in the database, they maintain there as long as the person is alive. It eliminates costs associated with change of use authentication process like passwords (Csongrády and Elena 234). Accuracy of fingerprint recognition biometric technique It being a security system, we need to ask ourselves whether it can be beaten. This question is only answerable if there is a clue as to what the system wishes to achieve and the most valuable thing that requires security. Accuracy forms a vital aspect of a biometric technology because it determines its effectiveness. While most sensitive government computer Alshoaibi 6 systems store individual information in forms of name, address, and other valid information, fingerprint recognition process only requires fingerprint patterns for identification. These systems base their identification process on data stored from images. In addition, fingerprint images have the ability to appear in an infinite number of scans for accuracy purposes. The clarity of the image determines the success of searching for a fingerprint match in the database. Fake samples defeat most biometric techniques, for instance a person can use an artificial face for identification in face biometric technology. Fingerprint system is hard to confuse with fake fingerprints because the ridge sensors are extremely sensitive and easily discovers any wrong pattern in the system. The smart card technologies combined with fingerprint recognition process boosts its high levels of accuracy than any other biometric process. Moreover, the uniqueness of fingerprint identification system makes it easier for detection and prevention of copies. The following aspect contrasts this biometric technology from user IDs and passwords that are easier to replicate and use by sophisticated computer programs to gain access (Csongrády and Elena 240-242). In addition, the identification process uses an automated fingerprint identification process that has an exceptionally high precision hence, eliminates chances of making mistakes. The automated system has been termed as the most accurate identification method that has passed many tests in terms of integration and reliability. Traditionally, the process was used by law enforcement agencies in identifying criminals, but its accuracy has provoked private sectors to use it as an employee’s background checking tool. The accuracy of fingerprint biometric system is seen on the verification process. The fingerprint recognition systems are highly designed to memorize different fingerprint patterns and give accurate results for individual users. To improve its accuracy, the system has been designed for individuals to press five or ten fingers on the reader. In the past, users only used to press two fingers for identification, but the system was seen not to be more accurate (Csongrády and Elena 245-246; Modi 177). Speed of the fingerprint recognition technique When analyzing what the best biometric technology is the speed of operation plays a key role. Best biometric technologies always are fast in performance and require less time to carryout the identification process. The selection of a fingerprint recognition technique meets the above demand because the process takes place faster compared to other biometric processes. In an experiment to determine the performance evaluation of a fingerprint recognition device, it was realized that the system utilizes very few seconds to identify a person. It is without doubt that this process is the most efficient because the user only requires placing fingers in a biometric scanner and the system makes a positive or negative identification. The user does not require memorizing passwords in order to get access to the required facility as opposed to other forms of authentications (Csongrády and Elena 250). The type of algorithm used in recording fingerprints on the computer database determines the speed of operation of the system. In the automatic finger-detection algorithm, the scanner automatically looks for the presence of a finger on its surface, and as soon as a person places a finger on the scanner, it alerts the system. The iris recognition process records low speed because the image must pass many processes before the system recognizes the user. Secondly, the automatic finger-capture algorithm receives a series of images immediately after the system senses a finger. The fingerprint-capture algorithm determines the frame in the image sequence and uses it for processing the scanned image. Finally, a valid detection algorithm determines the Alshoaibi 7 consistence of the finger by ensuring that it is from a living human being. All these processes take place in a fraction of a second, and the system does not record any delays (Csongrády and Elena 251-252). Not easier to steal Most people have tried to fake their identities in order to access other people’s information or properties. The fingerprint recognition system is a difficult to fool biometric technique that identifies fake identities. The sensors on the market use a variety of means to circumvent them but such attempts are likely to happen. For instance, just after a legitimate user accesses the system someone may attempt to use latent print residue on the sensor. On the other hand, people might want to present a standalone finger not connected to any living body. Fingerprint recognition device consists of sensitive materials that determine whether the finger placed on the scanner is dead or alive. These sensors contain detectors for blood-oxygen level, pulse, blood flow, humidity, temperature, and skin conductivity. Unfortunately, no technology gives perfect-false positives and spoiled readings from time to time (Csongrády and Elena 222225). Most people today believe in the strength of password authentication processes as the most effective method of securing personal and organizational data and information. Such people should learn more on the accuracy of fingerprint recognition technique that is hard to crack in the absence of the user. Moreover, most helpdesk calls use password authentication method that poses many threats from computer hackers. Scanners are the most affordable and effective means of securing data irrespective of where they are located. Some people may incorporate them in computer keyboards and mouse, or even place them independently near the main entrance (Wayman et al 99-111). A person might also decide to alter his or her fingerprint in different means for various reasons. For instance, a user whose record does not appear on the database might use a fake finger that resembles legitimate user’s fingerprints to access the system. This process has been used by prisoners who cover their fingerprints with other materials like polythene papers and gloves to avoid being identified by fingerprint scanners. To cope with this problem, aliveness detection process has been introduced that helps detect whether the finger is live. Different vital signs of the finger like pulse, deformation and perspiration are used to detect the liveness of a finger. Such software materials are expensive but extremely useful in detecting any unauthorized authentication hence, minimizing theft cases (Modi 58-61). Also in terms of security, fingerprint recognition process offers the method of securing anonymous transactions. Finger geometry can be used to verify secure transactions involving sensitive objects. In addition, the process can be used for anonymous health care screening processes where a patient uses the process for the registration process instead of using a name or any other physical identification. Some patients might be in critical conditions and fingerprint recognition is the only identification method that can be used on such cases. On the other hand, people fear technology, especially identification process because of exposure to personal data. For security purposes, fingerprint recognition technology requires no personal data in the database (Csongrády and Elena 226-227). Alshoaibi 8 Harmless The main purpose of using biometrics today is for safety and security. The selected biometric technology should have the capability of causing no harm to its users in one way or another. Since computer came into use, people have tried to figure out different ways of securing data. The use of fingerprint recognition technique forms the most safe and efficient method of recognizing individuals for security purposes. Fingerprint recognition process is harmless in the following ways. Firstly, the process does not involve any body piercing as opposed to the DNA process where an individual’s organ or blood is extracted to feed into the database. Fingerprint biometric technology only requires an individual to place his or her fingers in a scanner where the fingerprints are copied (Csongrády and Elena 233-235). Secondly, the process does not involve the use of strong waves like x-rays and other harmful waves. Some biometric processes, like Iris identification process, use lights with strong wavelengths that can cause harm to a user’s eye. X-rays and other strong wavelengths have proven to cause problems in human bodies when used over a long prolonged period. Such effects associated with these wavelengths include cancer development and damage of body tissue where the rays are mostly concentrated. Moreover, the iris identification process involves eye tissues that are extremely delicate and can cause blindness in case the machine produces more waves than required. The fingerprint recognition technique avoids such problems because there are no harmful waves used and, fingers are less likely to be affected compared to other body parts like the eye (Csongrády and Elena 235). Thirdly, fingerprint recognition process offers a more secure means of identification compared to other processes. Once the machine recognizes the fingerprints and correctly identifies a user, a pass is granted. In facial identification, the systems are prone to a lot of insecurity especially when the database fails to recognize a user face. Sometimes, the system can take a longer time to grant a user access causing waiting risks where evil people can attack or rob an individual. The finger scanner does not take a lot of user’s time making it impossible for attackers to intimidate a user (Csongrády and Elena 236). Finally, the fingerprint recognition process has passed the security test done in the United States under the USA Patriot Act and Border Security Act. The research conducted to access the capability of fingerprint recognition technique to meet both large-scale and small-scale requirements in the real world became successful. The system was found to have extremely limited errors when used in a number of data sets. In addition, the process recorded the least number of complaints from users as opposed to other biometric processes available today. The Federal Bureau of Investigation (FBI) recommended integrated automated fingerprint identification system as the most secure and safer way of recording criminal identities. In addition, the process is used to identify terrorists by taking fingerprint samples at the crime scene and running them in the database for identification. In the process, people’s safety is assured and wrong doers cause less harm (Wayman 88-91). Fingerprint recognition does not give a lot of information Fingerprint recognition process does not require a lot of information from the user for it to be effective. The system is unlike other biometric technologies like hand geometry and face identification that require the user to provide detailed information about oneself. The following Alshoaibi 9 feature makes fingerprint technology one of the most widely used biometric systems today because individuals take less time to register in the system database. On some instances, a user is required to provide information about one or two fingers whereas other systems require a person to provide all ten fingers. The process of identification is fast and efficient especially when scanning one finger. The amount of information recorded in one finger is enough for identifying a person and creates no room for errors. In addition, fingerprint recognition only requires information derived from individual fingers and nothing more. The unique code developed while scanning a finger can only code that particular finger, and an attempt to introduce a different finger creates an error. Fingerprint identification differs from the hand geometry that requires information on five fingers and a palm to grant an authentication. When information about one finger lacks, the system cannot work inconveniencing users (Csongrády and Elena 250-253). Conclusion Biometrics is one of the unique identity approaches offering a combination of user convenience, provisioning, non-repudiated compliance for process operator and cost-effective. The above discussion has given various reasons why fingerprint recognition technology is the best biometric technology in the world in terms of cost, safety, accuracy, amount of information required, security and speed. Fingerprint recognition has also kept in pace with the high rate of technological advancement. The first fingerprint identification processes worked by a person dipping a finger in ink while this has improved to the current day where live-scanners are used. I would recommend fingerprint recognition biometric technology to all organizations and industries across the world because it offers quality services at a reasonable cost. Moreover, this technology needs advancement to ensure systems sense when a person is forced to place fingers on the scanner, especially during robbery. Alshoaibi 10 Cited works Csongrády, T. and Elena, P.. "Spectral Biometrical Recognition Of Fingerprints." Central European Journal of Computer Science 1.2, 2011. pp. 194-254. Modi, S. K.. Biometric technologies and applications. Boston [u.a.: Artech House Publ., 2011. Print. Wayman, L., Jain, A. K. Maltoni, D. and Maio, D.. An Introduction to Biometrics Authentication System: Biometric Systems Technology, Design and Performance evaluation. 2005. Web