Abstract
Biometric systems are used for recognising a user on the basis of biometric traits he have. During authentication some of the frequently asked questions are “Is he who he claims to be?”, “Is he a valid user for gaining access to the system?”. Biometric system answers all these questions by authenticating the users. Every second information is shared and transferred between people and it is important to make sure that what is sent by sender is what received by the receiver thus raising the demand of security. Steganography is one of the techniques used for securing the data. The secret message is hidden inside a cover media like audio, video or image with the help of a secret key. Biometric templates can also be secured with this technique. Instead of storing original templates in the database stego-image is stored. LSB is one of the common techniques that replace the LSB of every pixel of the cover image with the secret message to form stego-image.
Keywords: Biometric, Biometric Attacks, Biometric template, Steganography, Security.
1. Introduction
With increasing rate of attacks, everyone today needs a reliable and secure system. Biometric systems fulfil the needs to a great extent as biometric traits are better than passwords or pins which have chances of being stolen and forgotten. Before using biometric systems enrolment phase is necessary during which the templates of the users are stored in the database. During authentication user 's claim is matched with the
Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.
The thing with biometrics is that it works great only if the verifier can verify two things: Firstly, that the biometric to be used has come from the intended person at the time of verification, and Secondly, which the biometric should match with the master biometric entry in the file database. If the system can't do that, it can't work. Biometrics are good in uniquely identifying the people, butat the same time they are not secrets and cannot be trusted [1].
Biometrics are important to not only information systems, but to information security as a subject. Today, most information is kept secure via ID cards or secret information, such as a PIN, password, pattern, etc., the downside to this type of security is the lack of a failsafe (Ashok, Shivashankar and Mudiraj)! What would happen if an ID card was lost? Or a PIN, password or pattern was leaked to individuals who were not on a “need to know” basis”? This is where the importance of biometrics comes into play.
Identification processes are significantly more complex and error prone than verification processes. Biometrics technologies are indicators of authentication assurance with results based on a predetermined threshold with measurable False Accept Rates and False Reject Rates.
Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
QR Code has been introduced quite a long time ago. Its lightweight properties have propelled it to become a worldwide phenomenon among online stores. Its complicated matrix is an innovative method to hide data among the grey area. This grey area can be used to transfer biometrics across network using
In biometric recognition there different kind of recognition that relates to biometric but some of the current uses in iris recognition is the national border controls which is the iris being an passport. Also their more current uses for the iris recognition is the forensic usage which is when tracing and finding a missing person or any individual that was missing personal files. There also other uses that their using and one of them is for iris recognition is using the internet security to control the access of the privileged information. Some of the current uses for face recognition is for crime fighting which is when the law enforcement agents are using to recognize many people based on their face. Also another uses of face recognition
We live in a world today, in which technology moves at a very rapid pace. Many of these technological advances can be used to make our everyday lives easier and safer. One of these new technologies is Biometrics. Biometrics is the process of measuring a person’s physical properties. This would include measuring things like fingerprints, retinas, odor, vein structure on the back of the hand and many other things. Biometrics is a very important topic because it would create better security precautions for certain places that need to be secure. Biometrics will make our society safer by only allowing authorized people out of secure facilities and by keeping the unauthorized people out. Throughout the rest of this
Biometrics is a term that refers to the broad amassment of various human characteristics. In computer science, biometrics authentication is used for access and a form of identification. Biometrics can also be used to survey and identify individuals in groups. Statistically, biometrics are unique and measurable to only one individual. When biometrics are used in authentication they can be broken down into two groups of measurability, physiological characteristics and behavioral characteristics. Physiological characteristic can be, but are not limited to, Biometrics that consist of a person’s Deoxyribonucleic acid (DNA), fingerprints, face, hands, eyes, ears or even odor. The second of the two characteristics, are the behavioral
Theorist working on a comparison of the biometric template that is created and temporarily stored template with a number of people. And then takes the decision-maker in mind the similarity measures produced by matcher.
A Biometric authentication is the process of verifying if a user or the identity of a user is who they claim to be; using digital biological information of the user. Such pieces of information include finger vein scans, finger prints (ink) and face scans. This information would be compared to a known database of information where the security team can correctly identify and verify the
Biometric methodologies emerged into existence in 1858 by use of recording hand images for identification purposes. From 1858 to 1896 studies progressed in the identification of individuals by hand geometry, a person’s measurements, and fingerprints. From the year 1936 to 1985 biometric studies proceeded for iris pattern, face recognition, acoustic speech, written signature, and hand identification. Patents for hand and iris identification became a reality 1985 to 1986 and in 1988 the first semi-automated facial recognition system was deployed. By 1991 face recognition is automated with the ability of detecting faces in real-time. By the mid to late 1990’s biometric methodologies evolves and is integrated into technology allowing the practice of fingerprint, palm systems, and iris identification to become more reliable with increased automation capabilities. Studies therefore increased and biometric technology became even more advanced in the early 2000’s up until today’s time.
You have seen biometric technology in the films Mission: Impossible and Gattaca. The technology has also graced the covers of many weekly news magazines. But many people, even though the technology has been widely talked about for the last half decade, are still surprisingly unaware of what biometrics are and why the technology is so important for computer security and personal identification.
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.
In recent years there have been heightened concerns about security due to the advancements of networking, communications, and mobility. This has led to the increase in biometrics in different applications for authentication and identification. The applications can be divided into 3 main groups Forensics, Government and Commercial (Jain, Flynn & Ross, 2008).