13
BIOMETRICS BIOMETRICS The Issue of Privacy The Issue of Privacy in an Increasingly in an Increasingly Secure World Secure World By: Joanna Moser By: Joanna Moser

BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

BIOMETRICSBIOMETRICSThe Issue of Privacy The Issue of Privacy in an Increasingly in an Increasingly

Secure WorldSecure World

By: Joanna MoserBy: Joanna Moser

6 Types of Biometric 6 Types of Biometric Technology:Technology:

Face RecognitionFace Recognition

Fingerprint Fingerprint RecognitionRecognition

Hand GeometryHand Geometry

Iris/Retina ScanIris/Retina Scan

Voice RecognitionVoice Recognition

Keystroke DynamicsKeystroke Dynamics

Face Recognition Face Recognition TechnologyTechnology

Proven to be remarkably Proven to be remarkably ineffective.ineffective. To give accurate To give accurate identifications, the camera identifications, the camera requires the suspect to stare requires the suspect to stare directly and frontally into the directly and frontally into the lens.lens. To verify a match, a video To verify a match, a video database is also required and database is also required and this database must be updated this database must be updated frequently to account for frequently to account for changes due to aging and other changes due to aging and other cosmetic changes.cosmetic changes.

A computerized photo match that emphasizes parts of A computerized photo match that emphasizes parts of the face that are less susceptible to alteration such as the face that are less susceptible to alteration such as the upper outlines of the eye sockets, areas around the upper outlines of the eye sockets, areas around the cheekbones, and side of the mouth (Kroeker, the cheekbones, and side of the mouth (Kroeker, 2002).2002).

Fingerprint Recognition Fingerprint Recognition TechnologyTechnology

An individual puts his or her hand on a scanning pad called a platen and the finger’s minutiae, the ridges, valleys and bifurcations that are unique to an individual, are recorded.

The methodology utilized to capture finger scans comes from three sources:

1. capacitance, which uses electrical charges between the finger’s ridges,

2. optical, which uses light, and

3. thermal, which uses heat (Finger Image, 2003).

A single fingerprint is matched against a central database.

Is the least accurate biometric reading (only has 40 characteristics to measure) (Ackerman, 2003).

This is the preferred biometric tool because the general population has become accustomed to it and has accepted the practice as a legitimate invasion of privacy.

Hand GeometryHand GeometryThe user enters a PIN number on a keypad and then positions their hand on a plate (Spence, 2003).

This plate has a set of guidance pins, which ensure that the hand will be in generally the same position for every measurement.

A digital camera mounted above the plate, with the aid of a mirror, takes a picture of the top and side views of the hand.

The dimensions of the hand, such as finger length, width and area, are extrapolated from the image and the magnification of the camera (Spence, 2003).

            

          

Iris/Retina ScanIris/Retina Scan Focuses on identifying unique patterns of blood vessels on the back wall of the retina.

The head is positioned against a support, and a low power infrared light is directed against the back of the retina.

The vein pattern image is reflected back to the camera.

Extremely accurate because it has to verify 266 characteristics: more than any other biometric reading (IBG, 2003).

Very expensive.

Voice RecognitionVoice RecognitionThe user speaks into a microphone and gives his password or access phrase.

Utilizes digital technology to produce a voiceprint that is stored and then referred to each time the owner of the voiceprint attempts to access a system.

For a voice print to be verified, the pass phrase must be identical to the one initially recorded.

Verification time is about five seconds (Collin, 2003).

To prevent someone from using a recording of another person’s voice, the voice recognition system requires that high and low frequencies of the sound match.

Keystroke DynamicsKeystroke DynamicsEvaluates the manner by which an individual types at a computer terminal by monitoring the keyboard inputs thousands of times per second in an effort to identify users based on habitual typing rhythm patterns.

The durations of keystrokes and the latencies between them are recorded.

The sample is compared with the template through statistical means, where the computed distance must be within an accepted range.

Recognition based on typing rhythm is not intrusive, so users would not see this as an extensive invasion of privacy (Monrose and Rubin, 1999).

The U.S. National Institute for Technology & Standards has found that facial-recognition systems perform well in controlled situations but that in uncontrolled settings, facial appearances can vary significantly depending on lighting, camera angle, and a number of intangibles.

The IBG also criticized the accuracy of face-scanning systems: in one case study (under controlled circumstances), six weeks after users had been scanned into the system, the device failed to recognize them almost one-third of the time (Hawkins, 2002).

How Effective Is How Effective Is Biometrics?Biometrics?

How Effective Is How Effective Is Biometrics? Biometrics? (con’t)(con’t)The IBG says the failure rate of fingerprint scanners is as high

as 12%.

Digital fingerprint readers can fail to identify people whose professions entail working with harsh chemicals, such as hairdressers.

The prints of the aged may also be too worn to register.

About 4% of the population cannot be tracked by fingerprint biometrics because their prints are too blurry to discern (Salkever, 2003).

The ultimate biometric technology is the computer chip implant. Now being marketed by the VeriChip Corporation, the product is awaiting consumer acceptance. The computer chip will stay with you for life and will act like a

personal emergency transmission alert.

PossibilitiesPossibilities

Do you want a Do you want a computer chip computer chip

implanted into your implanted into your body?body?

Do we want to be watched all the time? The likely answer is NO!

(Source: Greater Things Website - http://www.greaterthings.com/News/Chip_Implants/)

However, unless the technology exists to simultaneously track the activities of millions, perhaps billions of computer chip recipients, surveillance will continue to be the result of a subjective decision to have somebody watched.

What is Privacy?What is Privacy?

“the right to be left alone”

“the right to exercise control over information about oneself”

“the ability to control the use and disclosure of one’s

personal information”

The concept of privacy remains difficult to define.