Of these authentication methods, biometrics is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. With this in mind, we can now proceed to formally define biometrics: can be defined as measurable characteristics of the individual based on their physiological features or behavioural patterns that can be used to recognise or verify their identity". Biometric technologies attempt to automate the measurement and comparison of these characteristics for recognising individuals. Common physical biometrics include fingerprints; hand or palm geometry; and retina, iris, or facial characteristics. Behavioural characters include signature, voice (which also has a physical component), keystroke pattern, and gait. While there are advantages to using biometrics, authentication systems should not forego other methods as part of the overall authentication scheme. Security systems are generally built up using one, two, or all three of the above mentioned authentication methods, providing several levels of security. For example, you could use a card key to access your place of work, but you would also be required to verify your fingerprints against the biometric stored on the card. This would ensure that someone couldn’t just steal your card and gain access to your office. You could do away with the card altogether and just identify yourself using your fingerprints. Besides being easier to use, there is no physical object to lose. Biometric technologies were first proposed for high-security specialist applications. However these days things are different as not only has considerable technical progress been made, providing more accurate, more refined products, but unit cost has dropped to a point, which makes them suitable for broader scale deployment where appropriate, in addition, the knowledge base concerning their use and integration into other processes has increased dramatically. These technologies are now emerging as the key elements in developing online systems, as well as offline and stand-alone security systems, and for personal computing protection (originally designed for large companies, biometrics have now been scaled and made affordable for small networks and stand-alone systems.). Biometric technologies provide important components in regulating and monitoring access and presence. Significant application areas include electronic commerce, security monitoring, database access, border control and immigration, forensic investigations and telemedicine. In addition to such verification applications, biometric systems can be used for less constrained problems such as automatic identification of individuals, as a result of this, the biometric systems can be used in security applications, such as fraud and intrusion detection.
|
Fingerprints: This biometric involves looking at the patterns found on a fingertip. A greater variety of fingerprint devices are available than for any other biometric. These systems have a high accuracy rating, are quick to use, take up little space and are relatively low cost, so they’re useful for providing security for large numbers of users. Hand geometry: Hand geometry involves analysing and measuring the shape of the hand. This biometric offers a very good balance of performance characteristics and is quite easy to use. Retina: A retina-based biometric involves analysing the layer of blood vessels found at the back of the eye. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient for people who wear glasses. For this reason, retinal scanning is not in widespread use, even though the technology itself can work well. Iris: An iris-based biometric, on the other hand, involves analysing features found in the coloured ring of tissue that surrounds the pupil. Iris scanning, on the other hand is definitely less intrusive of the eye-related biometrics, it uses a fairly conventional camera element and requires no close contact between the user and the reader. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode. Face: Face recognition analyses the facial characteristics of a user. It requires the use of a digital camera to develop a facial image of the user for authentication. Because facial scanning needs an extra device not generally included with basic personal computers, it is targeted towards more niche areas such as network authentication. Signature: Signature verification analyses the manner in which a user signs his or her name. Common signing features such as speed, pressure, and velocity are as important as the finished signature's static shape. This biometric enjoys a synergy with existing processes that other biometrics do not. Signature verification devices are reasonably accurate in operation and obviously lend themselves to applications where a signature is an accepted identifier. Voice: Voice authentication is not based on voice recognition (as most of us would think) but on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth; because it requires no new hardware, most personal computers already contain a microphone. However, poor quality and ambient noise can affect the verification process. No single biometric technology has dominated the market. Different technologies are being used for the same applications. To gain widespread acceptance in businesses, multiple individual biometrics methods must coexist in a single system solution. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations. Future use of biometric technologies may include:
In the past few years, biometric
technology has rapidly pushed through barriers that had slowed its
adoption in mainstream environments, performance, accuracy and
reliability have steadily increased amongst all types of biometrics
methods and the prices of the capture devices used by this technology
have plunged, making biometrics an attractive addition to security
systems. For many companies, biometric systems are the perfect answer to
the expensive and time-consuming problems of fraud, theft, and access
control. Technical and financial considerations aside, biometrics can
pose a significant cultural challenge and introducing fingerprint
scanners to every desktop or a facial recognition based entry system has
to be done sensitively and carefully. Once the exclusive preserve of
sci-fi books and movies, biometrics now has to be considered as one of
the many challenges of modern day management. |