With the advancement in technology, news of identity theft and identity spoofing has become increasingly prevalent in several areas. The need of the hour is to build systems tightly integrated with biometrics so as to make the task of spoofing someone else’s identity extremely difficult. Biometric-identity has protected and provided reliable mechanism to several organizations to enable accurate and safe access rights to their existing infrastructure.
Biometrics, spanning several physical and behavioral features such as faces, eyes, fingers, gaits or voice patterns are made use of for identification purposes. Biometrics provide the added advantage that no additional thing such as token, card or passwords, are required for identification purposes.
Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their
The thing with biometrics is that it works great only if the verifier can verify two things: Firstly, that the biometric to be used has come from the intended person at the time of verification, and Secondly, which the biometric should match with the master biometric entry in the file database. If the system can't do that, it can't work. Biometrics are good in uniquely identifying the people, butat the same time they are not secrets and cannot be trusted [1].
Biometrics is a method of identifying an individual based on characteristics that they possess, typically physiological features such as a fingerprint, hand, iris, retina, face, voice, and even DNA. Some methods of biometrics security even use multiple physiological features or multimodal biometrics to provide superior security than a single form of biometrics can provide. Why are biometrics important in the field of information security? Biometrics provide a remarkable amount of security for information because biometrics are unique to each person, and thus cannot be lost, copied, or shared with another individual. This security allows for biometrics to provide a means to reliability authenticate personnel. The importance of biometrics can be further divided into the history of biometrics and why it was devised, past implementations of biometrics, current implementations of biometrics, and future implementations of biometrics.
Identification processes are significantly more complex and error prone than verification processes. Biometrics technologies are indicators of authentication assurance with results based on a predetermined threshold with measurable False Accept Rates and False Reject Rates.
Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
Technology is always improving, and new software is always being developed. One of these new technologies that have been developed is biometrics. Biometrics is the process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as means of confirming identity (Dictionary.com, 2013). In recent years, the FBI has employed new biometrics technology.
Ultimately all experts agreed that biometrics are superior to older methods of online identification. But experts question if this new technology is enhancing the customers experience. Experts debate these new features because they are more reliable than passwords but when hacked can give out more personal information. The social network for those in the IT industry Spiceworks says that 90% of companies will use biometrics by 2020.Companies like Microsoft and Facebook are already using this technology because it is a cheaper alternative than passwords. Passwords can get hacked, but are also easy to change, biometrics can be hacked, but users cannot change biometrics. Not only do hackers access your fingerprints, but they also have all of your online secured personal information. This advancement has proved to be beneficial for companies, but consumers are wary to give up this information. This is due to the fact the companies are selling this information to third parties without consent from the users. The European Union is addressing citizens' concerns mandating that companies give consent to customers. Hopefully other nations like the U.S. will adopt these laws to protect citizens. The article draws that biometrics can help companies get to really know their customers but customers no longer trust them because they have gone too
Face recognition is another biometric technology. Face recognition uses the same technology that iris recognition uses. For face recognition, a camera takes several images of a person to find out who it is. Face recognition differs from all of the other biometric technologies because the person that is in the picture does not have to cooperate with the process. In all of the other technologies it requires the people to actively participate in the process. In face recognition, the image can be taken without the person even knowing that it took place.
The government is actively involved in decreasing the amount of identity theft by providing the most effective tools to investigate and prosecute identity thieves. One of these tools is the Identity
Biometric identification has long been used by humans for thousands of years. This recognition relies on certain body characteristics such as voice, face and movement. Body identification was first implemented by Alphonse Bertillon, in the Paris Police department in the mid19th century, to identify criminal body measurements (Jain, Ross and Prabhakar 2004). Later, a discovery of the individuality of fingerprints, was a significant discovery. This progressed into Police officers “booking” criminals fingerprints for identification. From the earlier time of biometric techniques to today’s modern times, due to primarily the rapid development of technology, biometric research has focused on other biometric attributes.
Biometric is a growing technology not only in India but in entire world, which can be used in airport security, building access, cars, schools etc. A biometrics system is a recognition system that authenticates a person by his/her different biometrical factors.
Fraud Detection. Identification systems are deployed to determine whether a person’s biometric information exists more than once in a database. By locating and identifying individuals who have already registered for a program or service, biometrics can reduce fraud. In a public benefits program, for example, a person may be able to register under multiple identities using fraudulent documentation. A person can also obtain fraudulent identification such as a driver’s license. Without biometrics, there is no way to be certain that a person is not electronically registered under a different
Biometrics are automated methods of recognizing a person based on a physical or behavioral characteristic (2001). Essentially, biometric security technologies are used to accurately identify individuals on a unique trait. The most common biometric security techniques used currently are: signature
The authentication of users is done by taking in to account their physical features, as there are fewer chances of different people having the same features. Physical aspects vary from individual to individual. So the biometric features, Lip features, gestures can be used to solve the problems associated with security, as they are unchangeable and are owned to a particular person. The biometric used is the typing keystroke pattern features. The keystroke typing pattern varies from person to person [6].The core concept of biometric methodology is that the input data from the user is taken and the key stroke data is collected to calculate the key features. The calculated key features are used in the creation of samples and compared against the classifiers which are
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.