2. Problems with biometrics
There are a few problems with using biometrics.
“There are also devices that can capture iris images of a
person walking within a few feet of a video camera (often
behind a one-way mirror) so that it can be duplicated
and used for illegitimate purposes. The real problem with
biometrics is that once an individual's biometrics has
been compromised, they are compromised for life and
can never be trusted again. “(Strassmann, 2002).
“However, my most severe objection to biometrics as an
authentication method is their reliance on a central
database that contains the identifying graphic templates.
If such database is compromised, then the biometrics of
ALL users in the database are compromised for life.”
(Strassmann, 2002).
3. Solution
The solution is to use another type of security along
with using biometric devices.
“Knowledge tokens, such as passwords, secret
PINs (Personal Identification Numbers), or
knowledge of personal data (knowing one's mother's
maiden name, e.g.), or” Abernathy & Tien. (2003).
“Physical tokens such as ID cards, passports, chip
cards, or plain old keys.” Abernathy& Tien. (2003).
4. What are Biometrics?
Firstly what are biometrics?
According to the Electronic Frontier Foundation or EFF
biometrics are “Biometrics refers to the automatic
identification or identity verification of living persons
using their enduring physical or behavioral characteristics.
Many body parts, personal characteristics and imaging
methods have been suggested and used for biometric
systems: fingers, hands, feet, faces, eyes, ears, teeth,
veins, voices, signatures, typing styles, gaits and odors.”
(Abernathy & Tien, 2003).
5. What are biometrics? Continued.
In other words biometrics is measuring the metrics of our
biological make up.
They can measure many different aspects that make up
our bodies.
Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
6. Types of biometric devices.
The different types of biometric devices are as fallows:
voice;
- handwriting;
- fingerprint(s);
- face;
- retina of the eye;
- iris of the eye.
And many more…
8. Facial Recognition
Facial recognition is another biometric device that is
heavily used in many different industries.
It can be used to “geometrically map the face and also
have a view base of the face. There are 3 algorithms that
have been well studied that are used in facial recognition
software; Principal Components Analysis (PCA), Linear
Discriminant Analysis (LDA), and Elastic Bunch Graph
Matching (EBGM).” ("Face recognition," 2006).
10. Pros of biometric use
“With both Biometric systems, you eliminate all
problems associated with „buddy punching‟, but also
lost/forgotten/replacement ID cards” ("Using
biometric time," ).
They can also be easy to use if set up right.
They can help make your network more secure.
11. Picture References
http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for
fingerprint types
http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner
http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner
http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner
Gambling on research. (2008, September 18). Retrieved from
http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for
woma‟s face recognition
Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved
from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for
man with many cameras
Thesis subject: Biometric evaluation platform. (2006). Retrieved from
http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
12. References
Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Who's watching you?. Retrieved from
https://www.eff.org/wp/biometrics-whos-watching-you
Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf
Face recognition. (2006, August 7). Retrieved from
http://www.biometrics.gov/Documents/facerec.pdf
Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from
http://www.strassmann.com/pubs/searchsecurity/2002-
Using biometric time and attendance solutions. (n.d.). Retrieved from
http://www.hrindustries.co.uk/biometric-solutions.htm