11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48 biometricsvariety <strong>of</strong> biometric scanners that take Bertillon’s ideas to amuch more detailed level.TechnologiesIn general, biometric scanning involves four steps: thecapture <strong>of</strong> an image using a camera or other device, theextraction <strong>of</strong> key features from the image, the creation <strong>of</strong>a template that uniquely characterizes the person beingscanned, <strong>and</strong> the matching <strong>of</strong> the template to stored templatesin order to identify the person.There are several possible targets for biometric scanning,including the following areas:Facial ScanningFacial scanning uses cameras <strong>and</strong> image analysis s<strong>of</strong>twarethat looks at areas <strong>of</strong> the human face that change littleduring the course <strong>of</strong> life <strong>and</strong> are not easily alterable, suchas the upper outline <strong>of</strong> the eye sockets <strong>and</strong> the shape <strong>of</strong>the cheekbones. Researchers at MIT developed a series <strong>of</strong>about 125 grayscale images called eigenfaces from whichfeatures can be combined to characterize any given face.The template resulting from a scan can be compared withthe one on file for the claimed identity, <strong>and</strong> coefficientsexpressing the degree <strong>of</strong> similarity are calculated. Varianceabove a specified level results in the person being rejected.Facial scanning is <strong>of</strong>ten viewed as less intrusive than theuse <strong>of</strong> fingerprints, <strong>and</strong> it can also be applied to surveillanceimages.However, iris scanning involves the front <strong>of</strong> the eye <strong>and</strong> ismuch less intrusive, <strong>and</strong> the person being scanned needsonly to look into a camera.Voice ScanningVoice scanning <strong>and</strong> verification systems create a “voiceprint”from a speech sample <strong>and</strong> compare it to the voice<strong>of</strong> the person being verified. It is a quick <strong>and</strong> nonintrusivetechnique that is particularly useful for remote transactionssuch as telephone access to banking information.Behavioral BiometricsBiometrics are essentially invariant patterns, <strong>and</strong> these canbe found in behavior as well as in physical features. One <strong>of</strong>the most promising techniques (recently patented) analyzesthe pace or rhythm <strong>of</strong> a person’s typing on a keyboard <strong>and</strong>generates a unique numeric code. A similar approach mightbe applicable to mouse usage.Applications <strong>of</strong> BiometricsDue to the expense <strong>of</strong> the equipment <strong>and</strong> the time involvedin scanning, biometrics were originally used primarily inverifying identity for people entering high-security installations.However, the development <strong>of</strong> faster <strong>and</strong> less intrusivetechniques, combined with the growing need to verify users<strong>of</strong> banking (ATM) <strong>and</strong> other networks has led to a growingFinger ScanningFinger scanning involves the imaging <strong>and</strong> automatic analysis<strong>of</strong> the pattern <strong>of</strong> ridges on one or more fingertips. Unliketraditional fingerprinting, the actual fingerprint is notsaved, but only enough key features are retained to providea unique identification. This information can be stored in adatabase <strong>and</strong> also compared with full fingerprints stored inexisting databases (such as that maintained by the FederalBureau <strong>of</strong> Investigation). Finger scanning can meet withresistance because <strong>of</strong> its similarity to fingerprinting <strong>and</strong> theassociation <strong>of</strong> the latter with criminality.H<strong>and</strong> GeometryThis technique measures several characteristics <strong>of</strong> theh<strong>and</strong>, including the height <strong>of</strong> <strong>and</strong> distance between thefingers <strong>and</strong> the shape <strong>of</strong> the knuckles. The person beingscanned places the h<strong>and</strong> on the scanner’s surface, aligningthe fingers to five pegs. H<strong>and</strong>-scanning is reasonably accuratein verifying an individual compared to the templateon file, but not accurate enough to identify a scan from anunknown person.Iris <strong>and</strong> Retina ScanningThese techniques take advantage <strong>of</strong> many unique individualcharacteristics <strong>of</strong> these parts <strong>of</strong> the eye. The scannedcharacteristics are turned into a numeric code similar to abar code. Retina scanning can be uncomfortable because itinvolves shining a bright light into the back <strong>of</strong> the eye, <strong>and</strong>has generally been used only in high-security installations.A portable iris recognition scanner being demonstrated at the Biometrics2004 exhibition <strong>and</strong> conference in London. (Ian Waldie/Getty Images)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!