|
|||||||
Comparative Analysis Of Biometric Authentication |
|||||||
Paper Id :
19164 Submission Date :
2024-08-03 Acceptance Date :
2024-08-11 Publication Date :
2024-08-12
This is an open-access research paper/article distributed under the terms of the Creative Commons Attribution 4.0 International, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. DOI:10.5281/zenodo.13309260 For verification of this paper, please visit on
http://www.socialresearchfoundation.com/innovation.php#8
|
|||||||
| |||||||
Abstract |
The
extensive use of technology has immense need of secure authentication
techniques which cannot be stolen, lost, or shared amongst networks. To
overcome this challenge, biometrics has been developed based on very safe input
methods. Improving both accessibility and security becomes critical as
technology keeps growing. With its unique capacity to verify people based on
their own physiological or behavioural characteristics, biometrics appears to
be a promising solution for enhancing security. This abstract delves into the
critical role that biometrics plays in tackling the complex security issues
that arise from the wide range of newly developed devices. The seamless
integration of biometric authentication can greatly enhance the usability of
devices, providing a fluid and user-centric experience. In addition, biometric identification strong design offers a strong barrier against unwanted access,
guaranteeing the security and integrity of sensitive data. The objective of
using such techniques is to ensure that the services are accessed only by a
legitimate user, and not by anyone else. |
||||||
---|---|---|---|---|---|---|---|
Keywords | Biometrics, Secure Authentication, Physiological Characteristics, Behavioral Characteristics, Behavioral Trait, Signature, biometric template, feature extraction | ||||||
Introduction | Biometric authentication is the process of verifying a person's identity using their unique physical characteristics. Various types of biometric authentication exist, including retinal scans, fingerprints, facial recognition, and ECG scans. During authentication, sensor devices scan the person's physical features and compare them with stored data in a database to validate their identity. This method is considered highly secure for exchanging sensitive data online. Biometric systems recognize individuals based on their anatomical traits (fingerprint, face, palm print, iris, voice) or behavioural traits (signature, actions). Because such traits are physically linked to the user, biometric recognition is a natural and more reliable mechanism for ensuring that only legitimate or authorized users are able to enter a facility, access a computer system, or cross international borders. Biometric systems also offer unique advantages such as deterrence against repudiation and the ability to detect whether an individual has multiple identity cards (for example, passports) under different names. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. A biometric system first records a sample of a user’s biometric trait using an appropriate sensor—for example, a camera for the face—during enrolment. It then extracts salient characteristics, such as fingerprint minutiae, from the biometric sample using a software algorithm called a feature extractor. The system stores these extracted features as a template in a database along with other identifiers such as a name or an identification number. |
||||||
Objective of study | The aim of the study on biometric
authentication is to evaluate and enhance the effectiveness, security, and user
experience of biometric systems for verifying and securing individual
identities. |
||||||
Review of Literature | This review aims to give a thorough overview of the state of biometrics
research in Internet of Things security, with a particular emphasis on two
crucial areas: encryption and authentication. Always prioritize end-to-end
encryption to protect data throughout its lifecycle. Use strong encryption
algorithms, implement secure key management, and consider lightweight
cryptographic solutions suitable for resource-constrained IOT devices.
Encrypting data in IOT (Internet of Things) devices is crucial for ensuring
security and privacy. Authentication is the act of confirming the
identification of objects and devices by using tools like cryptographic keys or
certificates to guarantee data integrity, secure access, and secrecy throughout
the network. |
||||||
Analysis | Every biometric system consists of four basic modules: 1. Enrolment Unit The enrolment module registers individuals into the biometric system database. During this phase, a biometric reader scans the individual’s biometric characteristic to produce its digital Representation. 2. Feature Extraction Unit This module processes the input sample to generate a compact representation called the template, which is then stored in a central database or a smartcard issued to the individual. 3. Matching Unit This module compares the current input with the template. If the system performs identity verification, it compares the new characteristics to the user’s master template and produces a score or match value (one to one matching). A system performing identification matches the new characteristics against the master templates of many users resulting in multiple match values (one too many matching). 4. Decision Maker This module accepts or rejects the user based on a security threshold and matching score [1] Classification of Biometric Technology Two main groups include biometric technology: 1. Physiological Biometric Techniques: These features are innate to each individual's physical traits of the body. Facial recognition, iris recognition, hand geometry, and fingerprints are a few examples. 2. Behavioural Biometric Techniques : These characteristics are linked to unique patterns of behaviour. Voice recognition, keystroke dynamics, and signatures are a few examples. Given that it differs amongst people, voice recognition could also be regarded as physiological. The major components of a biometric authentication system typically include:
Finger Print Technology Fingerprint identification is the oldest and best-known method of biometric identification for individuals. The important fact is that each person has a different fingerprint. However, the fingerprint identification has been subjected to major changes in recent years. A fingerprint is an impression of the friction ridges of a finger or any part of the finger. A friction ridge is a raised portion of the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These ridges are sometimes known as "dermal ridges" or "dermal ". Traditional methods use ink to get the finger print onto a piece of paper. This piece of paper is then scanned using a traditional scanner.[8] Nowadays, live fingerprint readers based on optical, thermal, silicon, or ultrasonic principles are commonly used. However optical fingerprint readers are the most prominent.
Fingerprint Classification Fingerprint classification plays a crucial role in identification systems by reducing the search space within a fingerprint database. By partitioning the database into smaller, more manageable segments, it becomes easier to locate and verify individual fingerprints. This process is particularly useful in systems with low populations, where a single class can be used to identify or verify an individual's identity. Classification of fingerprints is based on the direction of the ridges around the core, as well as the number of core and delta points. Despite this, it was later discovered that not all fingerprints fit neatly into these predefined categories. Consequently, classification systems often include an "unexpected classification" category for such fingerprints. Fingerprints are typically divided into five main classifications: 1. Arch 2. Tented Arch 3. Left Loop 4. Right Loop 5. Whorl Fingerprint Analysis Methods To optimize database searches, not all fingerprint images are fully stored. Instead, the entire image is initially analysed, and key points or features are extracted and stored. This method significantly speeds up the search process. Each fingerprint image has around 35 important features, known as minutiae, which include points such as ridge endings, bifurcations (forks), and crossovers. Using between 8 to 22 of these minutiae points is generally sufficient to identify and verify fingerprints with high accuracy.
The fingerprint profile, containing these extracted features, can be stored on various mediums, including workstations, servers, or smart cards. This ensures the flexibility and security of fingerprint data management, catering to different system requirements and security protocols. Face Detection: Special cameras or sensors detect and locate the image of a face, whether it's alone or in a crowd. This step is crucial for isolating the face from the background and other objects. Face Analysis: Once the face is detected, an image of it is captured and analyzed. Facial recognition technology typically relies on 2D images because they can be conveniently matched with public photos or images in a database. The software analyzes various facial features such as the distance between the eyes, the shape of the cheekbones, and the contour of the lips and chin. These features help create a unique profile of the face. Converting the Image to Data: The facial features analyzed are then converted into digital data. This process transforms the analog information of the face into a mathematical formula known as a faceprint. Each person has their own unique faceprint, similar to how fingerprints are unique to each individual. Finding a Match: The faceprint derived from the captured image is compared against a database of known faces. This database can include images from various sources such as government databases, social media platforms, or private collections. If there is a match found between the faceprint and an image in the database, the system makes a determination of the person's identity.
[10] Facial Detection Algorithm An effective facial detection algorithm is crucial for improving facial recognition accuracy. Several methods exist, including geometry-based approaches, feature invariant methods, and machine learning techniques. One of the most effective and widely used algorithms is the Viola-Jones detection algorithm, known for its high detection rate and speed. This algorithm uses an Integral Image and the adaboost learning algorithm as classifiers, and it performs well in various lighting conditions. IRIS Authentication Iris recognition captures an image of the iris using a high-resolution camera. The eye section is isolated and segmented, and mathematical algorithms process this image to locate and extract the iris, considering factors like pupil size and eye rotation. Natural variations in iris patterns, such as crypts, furrows, and the collarette, are analyzed to create a unique iris code. Daugman's algorithm, using Gabor filters, extracts texture and converts this code into a binary or numerical representation. This iris template, with its mathematical representation of distinctive features, ensures robustness under various conditions like lighting and pupil dilation, making it a reliable biometric technology. Retina Recognition Retina recognition uses the
unique arrangement of cells in the retina for heightened security. Initially
conceived by Dr. Carleton Simon and Dr. Isodore Goldstein in 1935, it boasts an
impressive recognition rate of about 90%. Recent innovations, such as the
method by Sukumaran et al. Using fractal dimension and the system by Tuama and
George focusing on retinal vascular diagrams, have demonstrated high accuracy
with low computational requirements. Hand
biometric techniques use the unique features of a person's hand to verify their
identity. These methods exploit various physical attributes of the hand, which
can be distinctive and difficult to replicate. Here’s a detailed overview of
the different hand biometric techniques: 1. Hand Geometry Recognition Description:
Hand geometry recognition measures the shape and dimensions of a person's hand.
It focuses on attributes like the length and width of the fingers, the distance
between joints, and the overall shape of the hand. Process: Capture: A 2D or 3D scanner
captures the hand's shape. This may involve placing the hand on a flat surface
or using a 3D camera. Feature
Extraction:
Key features such as finger lengths, hand width, and the shape of the palm are
extracted. Matching:
These
features are compared against a database of enrolled hand shapes to verify
identity. Advantages:
Disadvantages
2. Handprint Recognition Handprint recognition involves capturing and analyzing the unique patterns of
ridges and valleys on the palm, similar to fingerprint recognition but on a
larger scale. Process Capture: A high-resolution image of
the hand's palm is taken. Feature
Extraction:
The system identifies and extracts the unique ridge patterns, minutiae points,
and other distinctive features. Matching: The extracted features are
compared with those in a database. Advantages
Disadvantages
3.
Vein Pattern Recognition Vein pattern recognition analyzes the unique patterns of veins in the hand.
This technique leverages the fact that these patterns are unique to each
individual and are not easily observable. Process: Capture: An infrared camera
captures images of the vein patterns beneath the skin. Feature
Extraction:
The system extracts and processes the vein patterns. Matching: The extracted vein
patterns are compared to a stored database. Advantages:
Disadvantages:
4.
Finger Vein Recognition Description:
Similar to vein pattern recognition but focuses specifically on the veins in
the fingers. Process:
Advantages:
Disadvantages:
5.
Palmprint Recognition Description:
Palmprint recognition focuses on the unique features of the palm, including
lines, ridges, and minutiae points. Process:
Advantages:
Disadvantages:
How
Finger Vein Recognition Works Process: 1. Capture: Infrared Imaging: The system uses near-infrared (NIR) light to capture images of the finger’s vein patterns. The infrared light penetrates the skin and is absorbed by the blood in the veins, making them appear darker than the surrounding tissue. Sensor Placement: The finger is typically placed on a scanning device where the infrared camera captures a detailed image of the vein patterns. 2. Feature Extraction: Image Processing: The captured image is processed to highlight the vein patterns. This involves filtering out noise, enhancing contrast, and extracting the vein structure. Pattern Analysis: Algorithms analyze the extracted vein patterns, identifying key features such as the arrangement, thickness, and branching of veins. 3. Template Creation: Feature Extraction: The system creates a biometric template from the vein patterns. This template contains data on the unique features of the vein structure. Database Storage: The template is stored in a database along with any additional identifiers like names or identification numbers. 4. Matching: Verification: When an individual attempts to authenticate, their finger vein pattern is captured and processed similarly. The resulting pattern is compared against the stored template in the database. Decision: The system determines whether the captured pattern matches a stored template to grant or deny access. Applications
of Finger Vein Recognition Security: 1.
Access Control: Used in secure facilities and
high-security areas to control access. 2.
Financial Transactions: Increasingly used in banking and
financial services for secure transaction authorization. Identification: 1.
Government Use: Applied in national ID systems and
border control for verifying identities. Healthcare: Patient
Identification: Used
in hospitals to verify patient identities and access medical records. 4.
Technical Considerations Hardware
Requirements: 1.
Infrared Camera: Captures the vein patterns using
infrared light. 2.
Sensor: Detects the reflected infrared light to
generate the vein pattern image. Software
Requirements: 1.
Image Processing Algorithms: Used to enhance and
analyze vein patterns. 2.
Matching Algorithms: Compare captured vein patterns with
stored templates for authentication. Performance
Factors: 1.
Blood Flow: Variations in blood flow can affect the
clarity of the vein patterns. 2.
Environmental Conditions: Temperature and
lighting can impact the infrared imaging process. 3.
User Positioning: Accurate placement of the finger is essential
for capturing high-quality images. 5.
Advantages Over Other Biometrics 1.
Anti-Spoofing: Difficult to forge or spoof, as vein
patterns cannot be easily replicated. 2.
Hygiene: Non-contact scanning reduces issues
related to contamination or wear. 3.
Stable: Vein patterns remain relatively stable
over time, providing consistent performance.
Behavioral Biometric
Authentication Behavioral biometrics verify a user's identity based on unique behavioral patterns like typing rhythm, mouse movements, gait analysis, and voice intonation. This method offers a non-intrusive and user-friendly way to authenticate individuals without relying on physical attributes. However, behavioral biometrics face challenges such as spoofing or imitation attempts . Keystroke Dynamics Keystroke dynamics analyze how a person types on digital devices to create a distinctive digital signature. Initially proposed by Gaines et al., advancements include the use of fuzzy logic, neural networks, and pattern recognition techniques like the Bayes classifier. Advantages
Disadvantages
Voice Authentication Technology Voice recognition technology has evolved significantly over the decades. In the 1990s, the introduction of Hidden Markov Models (hmms) and advancements by companies like Dragon Systems and IBM led to improved accuracy and the ability to handle continuous speech and larger vocabularies. The 2000s saw the rise of Gaussian Mixture Models (gmms) and other statistical techniques, with major strides made by Microsoft and Google in integrating voice recognition into products like Windows Vista and Google Voice Search. The 2010s marked a revolution with deep learning, using Deep Neural Networks (dnns), Convolutional Neural Networks (cnns), and Recurrent Neural Networks (rnns) to significantly enhance accuracy and capabilities. This era saw the development of advanced voice assistants such as Google Assistant, Siri, Alexa, and Cortana. Recent innovations in the 2020s include context-aware and multimodal systems, privacy-preserving techniques like federated learning, and improvements in real-time processing. Today, voice recognition technology is increasingly integrated into iot devices and offers highly personalized, context-aware interactions. Advantages 1. Hands-Free Operation: Allows users to interact with devices without using their hands. 2. Accessibility: Provides critical support for individuals with disabilities. 3. Efficiency: Speeds up tasks like composing messages and executing commands. 4. Natural Interaction: Feels more intuitive and engaging. 5. Multitasking: Enables users to perform tasks while doing other activities. 6. Streamlined Data Entry: Improves efficiency in fields like healthcare. Disadvantages 1. Accuracy Issues: May misinterpret accents, noise, or non-standard speech. 2. Privacy Concerns: Risks related to data security and unauthorized access. 3. Context Understanding: May struggle with complex or ambiguous speech. 4. Connectivity Dependency: Requires stable internet for cloud-based processing. 5. Limited Multilingual Support: Quality varies across languages and dialects. 6. Security Vulnerabilities: Susceptible to voice spoofing attacks. 7. Ambient Noise Sensitivity: Performance can be affected by background noise. Signature authentication It is a method used to verify an individual's identity and authorize transactions based on their handwritten signature. It involves comparing a signature on a document or transaction with a pre-existing signature on record to ensure authenticity. Whether it is a digital or a physical signature is it widely used in financial transactions, legal documents and to authenticate. Although, it provides security and integrity but there is a risk of forgery and mistakes. Signature authentication involves capturing a
user’s handwritten signature using digital tools, such as tablets or
touchscreens, to record both static and dynamic features like shape, speed, and
pressure. These features are extracted and encoded into a biometric template,
which is then stored in a secure database. During authentication, a new
signature sample is captured and compared against the stored template using
specialized algorithms to verify identity. The system's accuracy is assessed
through metrics like false acceptance and rejection rates, and it is integrated
into applications while providing user training and support.
Signature [12] |
||||||
Conclusion |
Biometric authentication has become crucial for enhancing security and usability in technology applications. Utilizing unique physiological and behavioral traits, biometric systems provide a reliable way to verify identities, ensuring only authorized users access sensitive information and services. This review covered various biometric technologies, such as fingerprints, facial recognition, iris and retina scans, and voice recognition, highlighting their strengths and weaknesses. Fingerprint identification remains a staple due to its reliability, with advancements in live fingerprint readers enhancing its effectiveness. Facial recognition, supported by algorithms like Viola-Jones, offers a balance of speed and accuracy. Iris and retina scans, known for their precision, are ideal for high-security applications. Behavioural biometrics, such as keystroke dynamics and voice recognition, provide non-intrusive authentication methods, though they face challenges like susceptibility to spoofing and environmental factors. Integrating biometric authentication into the Internet of Things (IoT) underscores the need for robust encryption and authentication protocols to ensure data integrity and privacy across networks. Its seamless integration into various applications and high security levels make it a valuable tool in the digital security landscape. Future efforts should focus on enhancing system robustness, addressing vulnerabilities, and ensuring widespread user adoption to fully realize the potential of biometric technology. |
||||||
References |
|