biometric 1
TRANSCRIPT
-
8/2/2019 biometric 1
1/11
Abdul Mannan Student ID: 06037871
1 | P a g e
Current Development: CW1 Biometric
Abdul Mannan, 01/11/2011
Module Tutor: Bo Li
Module code: CC3006N
-
8/2/2019 biometric 1
2/11
Abdul Mannan Student ID: 06037871
2 | P a g e
Contents
1 Introduction.................................................................................................... page 3
2 Literature review............................................................................................ page 3
2.1 What is Biometrics?..................................................................................... Page 3
2.2 How biometric system work........................................................................ page 4
2.3 Historical developments page 5
3 Analysis............................................................................................................ page 7
3.1 Advantage of biometric identification......................................................... page 7
3.2 Disadvantages of biometric identification................................................... page 7
4 Commentary.................................................................................................... page 8
5 conclusion ....................................................................................................... page 9
5.1 The ethical concerns of biometric system................................................... page 9
5.2 Government use of biometric information.................................................. Page 9
Bibliography........................................................................................................ Page 10
-
8/2/2019 biometric 1
3/11
Abdul Mannan Student ID: 06037871
3 | P a g e
1 Introduction
In this report I am going to explain how biometrics work, the advantages and disadvantages
that the system carries, including the outcome of how the system changed and developed.
In addition I am also going to highlight the ethical considerations and concerns on the
system. My main aim of the report is followed by the nature of the biometric system and
how it is in place to date, with facts stating on how its used.
2 Literature review
2.1 What is Biometrics?
Biometrics has been founded during the early years, but it has now been developed and
used as high technology. Before there was no system of anyones kept identity everything
was in plain hand writing, today we have computer systems that can save and store
information, Mobile phones and many other gadgets. Biometric is the automated
identification to every human identity, through high quality of measurement of repeatable
physiological movement of behavioral characteristics. Biometric has data collected inside
the piece of technology which is saved in a file and carries out certain jobs. It reads DNA,
fingerprints, eye retinas, voice patterns, facial patterns and hand measurement for
authentication purposes. Ref 12
Biometric technology uses computerized methods to identify a person by their unique
physical or behavioral characteristics. Developments and uses have increased with demand
to match concerns over international, business and personal security. Biometrics is more
personal than a passport photo or Pin, using traits such as fingerprints, face or eye "maps"as key identifying features. Uses range from building access and laptop security to identity
cards and passports. Ref 10
However, there are concerns about the storing of biometric data and its possible misuse.
Biometric verification is becoming one of the most increasing security devices it is most
common in co-operate and public sectors. According to authentication by biometric
verification consumer electronics and point of sale is POS applications. Biometric has a
thriving force of convenience to the security system.
There is a table below showing all the major biometric systems. Ref 4
-
8/2/2019 biometric 1
4/11
Abdul Mannan Student ID: 06037871
4 | P a g e
Ref 10
2.2 How biometric system work
There are setbacks put in place to prevent identity theft, biometric data is usually encrypted
when its gathered.
In order to convert biometric input a software application is used to identify specific points
of data as match points. The match points in the database are processed using an algorithm
that translates that information into a numeric value. The database value is compared with
the biometric input the end user has entered into a scanner and authentication is either
approved or denied. Ref (3)
There are different devices which play a role for biometric system for example the finger
scanner consists of a reader of scanning device, software that converts the scanned
information into digital form and compares match points and a database that stores the
biometric data for comparison. Ref (3)
All biometric systems use three main steps these are enrolment, storage and comparison.
In the enrolment stage biometrics system records basic information about the person like
their name and identification number, it then captures an image or recording of your
specific trait. During storage process most systems dont store the complete image or
recording they instead analyse your trait and transfer it in to a graph or code. Some systems
even record this data on to a smart card which you can then carry with you. Last but not
least the most important part is when you re-use the biometric system it compares your old
results which was saved when first enrolled and compares with new data put in, the system
automatically reads the information and either allows access or denies it that you are who
you claim to be. Ref (4)
This is the process of how the system works.
-
8/2/2019 biometric 1
5/11
Abdul Mannan Student ID: 06037871
5 | P a g e
2.3 Historical developments
Biometric history shows that the science of biometric system did not originate in a single
place but people from around the world have been using the system for identifying
individuals from each other.
Biometric system was dated back a longtime ago, the most primary known instance of
biometrics in practice was a form of finger printing traced back in china during the 14th
century as reported byJoao de Barro. Ref 9
Joao de Barro wrote that the Chinese merchants were stamping childrens palm prints and
footprints on paper with ink so as to differentiate the young children from one another and
this system is still being used today. Ref 9
Apart from its Chinese genesis, use of biometrics was also noted elsewhere in the world. Up
until the late 1800s, identification largely relied upon "photographic memory". In the 1890s,
an anthropologist and police desk clerk in Paris,Alphonse Bertillon, decided to fix the
problem of identifying convicted criminals and turned biometrics into a distinct field of
study. Ref 9
Bertillon developed a technique of multiple body measurements which later got named
after him - Bertillonage. His method was then used by police authorities throughout the
world, until it quickly faded when it was discovered that some people shared the same
measurements and based on the measurements alone, two people could get treated as
one. Ref 9
-
8/2/2019 biometric 1
6/11
Abdul Mannan Student ID: 06037871
6 | P a g e
After the failure of Bertillonage, the police started using finger printing, which was
developed by Richard Edward Henryof Scotland Yard, essentially reverting to the same
methods used by China for years. Ref 9
In recent years Biometric has seen extreme advancements and the technology have moved
from a single method (fingerprinting) to more than ten prudent methods.
Companies involved with new methods have grown into the hundreds and continue to
improve their methods as the technology available to them also advances. Ref 9
Prices for the hardware required continue to fall making systems more affordable for low
and mid-level budgets and thus making this more adaptable in small businesses and even
households. Ref 9
as the industry grows however, so does the public concern over privacy issues. Laws and
regulations continue to be drafted and standards are beginning to be developed. While no
other biometric has yet reached the breadth of use of fingerprinting, some are beginning to
be used in both legal and business areas. Ref 9
We have also seen biometric system being used in mobile phones and also laptops this
shows that biometrics system is advancing rapidly.
Ref 8
The table above shows all major biometric system including its cost and social acceptability
-
8/2/2019 biometric 1
7/11
Abdul Mannan Student ID: 06037871
7 | P a g e
3 Analysis
3.1 Advantage of biometric identification
The purpose of biometric identification is a broad aspect; there are a number of biometric
devices and organizations, who use them. Law enforcement officials use biometrics as a
tracking system for criminals and illegal immigrants.
The most common one for this type of system is facial recognition technology to identify
criminals and for border security. Many other companies use biometric devices to control
access to sensitive data systems and areas. Such as banks and airport and organizations like
the government, home land security and the military utilize.
It provides more security rather than a password or pin; ID cards with biometrics are used toprevent unauthorized personnel from accessing and entering networks and controlled
spaces. The advantage of biometrics is that each individual carry their own identity, its like
a key to unlocking something or activating something with your very own key. I have listed
the advantages for most major biometric systems; I believe in order for the law system to
work rapidly biometric plays a big part in enforcing the system to run smoothly. Ref 5
3.2 Disadvantages of biometric identification
Biometric identification systems have many disadvantages. Police have at times misused
biometric information for e.g. evidence planting by police happens, police officer gone
corrupt armed with an innocent person biometric information can destroy that individual.
Fingerprint readers are used to limit access to computers, but they are no more reliable
than turnkey locks. People are free to do what they wish with their own biometric
information, but also it can be abused for e.g. hacking or unlocking to steal the biometric
information if it's stored on a computer. There are many other drawbacks to these systems
The finger print of those people working in Chemical industries are often affected.Therefore these companies should not use the finger print mode of authentication.
It is found that with age, the voice of a person differs. Also when the person has fluor throat infection the voice changes or if there are too much noise in the
environment this method may not authenticate correctly. Therefore this method of
verification is not workable all the time
For people affected with diabetes, the eyes get affected resulting in differences. Biometrics is an expensive security solution.
Although biometrics is considered the most effective and safe method (it is very difficult to
falsify), we have to bear in mind its disadvantages. Ref 5
http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometricshttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics -
8/2/2019 biometric 1
8/11
Abdul Mannan Student ID: 06037871
8 | P a g e
4 Commentary
I believe that as much as the product and technology has its strong links I truly agree with
the fact that the vulnerability that it carries on individuals. As the system has been up and
running it will be hard to change policy or rules and regulations, some people have no idea
that they are so closely monitored and other just cant do anything about it. Society may be
free of criminals and the law breakers but what about the innocent and vulnerable.
-
8/2/2019 biometric 1
9/11
Abdul Mannan Student ID: 06037871
9 | P a g e
5 Conclusions
Overall biometric technology has its positive side as its considered to be an effective
measure for security and protection against crime, it also has its negative side and concerns
that it violates the privacy and personal rights of individuals, these issues include the
possibility of fraud, identity theft, civil liberty violations and accuracy of data that could
result in being accused of crime or become a victim of discrimination. I believe without
having biometric systems in place the world would be at stake, there wouldnt be any forms
of civilisation things would be a mess and people would easily be able to switch places. Its
like not having a passport or national insurance number. With all these systems in place
create a cycle where the country or the place we live is civil.
5.1 The ethical concerns of biometric system
The moral concern for this type of system would be that information and data could be
changed, as human nature takes its toll people change for different purposes, illness, grow
old, self-harm (drug abuse), these systems are not always reliable, and their identity would
be denied as a result. There are several concerns about biometric systems; every time its
used youre being tracked by a database bringing up a range of privacy and security issues.
The expense for this type of system is very expensive. ref 1
5.2 Government use of biometric information
As the government has a lot of power over the general public, facial recognition is taking
away someones amendment right for example, being identified in protesting about
governmental issues they could store it on their database.
Facial recognition is prone to a huge rate of error it is possible that individuals could be
accused of being involved with crime they havent committed.
TSA want to do a whole body scanner, this is a naked digital picture of individuals being
shared and transmitted to other location, and this is considered to be a civil liberties
violation.
Privacy issue of fingerprints could be accessed and misused.
Loss of jobs and discrimination could be possible with incorrect reading of the biometric
security cards.
Privacy issues could arise, cross link information about an individual such as religion, marital
status, ethnicity and employment. Ref 1
-
8/2/2019 biometric 1
10/11
Abdul Mannan Student ID: 06037871
10 | P a g e
Bibliography
Web ref:
1
http://www.brighthub.com/computing/enterprise-
security/articles/85687.aspx#ixzz16ssl8BDa
2
http://www.networkdictionary.com/security/b.php
Accessed on 07/11/2011
3
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211666,00.html
Accessed on 14/11/2011
4
http://science.howstuffworks.com/biometrics.htm
Accessed on 15/11/2011
5
http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics
Accessed on 12/11/2011
6
http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics#
ixzz1dRkYsQdi
Accessed on 09/11/2011
7
Disadvantages to Biometric Identification Systems |
eHow.com http://www.ehow.com/list_5969015_disadvantages-biometric-identification-
systems.html#ixzz1dRn4xSyF
Accessed on 05/11/2011
8
http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%
20of%20technologies
Accessed on 05/11/2011
9
http://www.questbiometrics.com/biometric-history.html
Accessed on 11/11/2011
10
http://news.bbc.co.uk/1/shared/spl/hi/guides/456900/456993/html/Accessed on 8/11/2011
http://www.brighthub.com/computing/enterprise-security/articles/85687.aspx#ixzz16ssl8BDahttp://www.brighthub.com/computing/enterprise-security/articles/85687.aspx#ixzz16ssl8BDahttp://www.networkdictionary.com/security/b.phphttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211666,00.htmlhttp://science.howstuffworks.com/biometrics.htmhttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometricshttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics#ixzz1dRkYsQdihttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics#ixzz1dRkYsQdihttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologieshttp://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologieshttp://www.questbiometrics.com/biometric-history.htmlhttp://www.questbiometrics.com/biometric-history.htmlhttp://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologieshttp://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologieshttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html#ixzz1dRn4xSyFhttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics#ixzz1dRkYsQdihttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics#ixzz1dRkYsQdihttp://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometricshttp://science.howstuffworks.com/biometrics.htmhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211666,00.htmlhttp://www.networkdictionary.com/security/b.phphttp://www.brighthub.com/computing/enterprise-security/articles/85687.aspx#ixzz16ssl8BDahttp://www.brighthub.com/computing/enterprise-security/articles/85687.aspx#ixzz16ssl8BDa -
8/2/2019 biometric 1
11/11
Abdul Mannan Student ID: 06037871
11 | P a g e
11
http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.
png/350px-Biometric_system_diagram.png
Accessed on 09/11/2011
Book
12
Anil K. Jain, Ruud Bolle, Sharath Pankanti, 2002, Biometrics personal identification in networked
society. Kluwer academic publisher. America