Biometric verification is gaining a lot of popularity among public security systems as well as in the commercial market. In our daily lives, we witness the use of biometrics in many places, such as the digital attendance system in offices, airport security checkpoints, wearable technological devices that retrieve our biological information, and even our national identification cards, also known as like Aadhaar cards, are created using biometrics. technology. In fact, this national identification program holds the largest biometric database in the world.
Figure 1: Biometric Technology
To perform biometric authentication, there are several data collection methods. Each of these methods has its importance, whether carried out separately or combined with other forms of data collection. Interestingly, some forms of biometric authentication can be performed even without the knowledge of the subject under surveillance.
The following are some of the most commonly used biometric methods:
• Facial recognition
Figure 2: Facial recognition technology
This system works by analyzing specific characteristics of individuals using a digital camera. These characteristics include information such as the distance between the eyes, the position of the cheekbones, the jaw line, the chin, the width of the nose, etc. Data is collected in the form of numerical quantities and then combined into a single code which is then used to uniquely identify each individual.
• Fingerprint
Fingerprint identification refers to the procedure of comparing the pattern of ridges, grooves and minutiae of the fingers. It was reported that after comparing the database of fingerprints collected over 140 years, no two fingerprints were found to be the same, not even for identical twins.
• Hand Geometry Biometrics
Hand geometry readers measure the user's hands along many dimensions and this is compared with the measurements stored in a file. Since this method is not as unique as fingerprinting or other similar methods, it is not preferred in places with large populations or high security applications. Instead, it is suitable for use alongside other forms of biometrics or for simple applications such as attendance operations.
• Retina exam
It is a biometric technique that analyzes unique patterns in the blood vessels of an individual's retina. In this method, a beam of infrared light is shined into the person's eye when they look through the scanner. Because retinal blood vessels readily absorb light, the amount of reflection varies. It is then scanned and stored in the database.
• Iris Recognition
In this biometric identification method, mathematical techniques for recognizing patterns in video images of the individual's iris are used. It uses video camera technology with subtle near-infrared lighting to capture the intricate structures of the iris. These patterns are then subjected to mathematical and statistical algorithms to encode digital models for identifying individuals.
• Signature
Signature recognition is a form of behavioral biometrics that digitizes individuals' signatures for identification and authentication purposes. It is carried out in two ways. In the first, the signature is taken on paper and then digitized using an optical scanner and then the signature is analyzed based on its format. The second way is to subscribe to tablets that acquire information in real time.
• Voice Analysis
It is the study of speech sounds for purposes such as speech recognition. Such studies involve medical analysis of the voice along with speaker identification. Much like facial recognition, it offers a way to authenticate a subject's identity without their knowledge.
Applications of Biometrics
The applications of biometrics can be divided into three categories –:
• Commercial: Includes applications such as computer network login, e-commerce, ATMs/credit cards, PDA, etc.
• Government: Includes applications such as driver's license, border control, passports, national identity cards, etc.
Logical access control
It refers to granting access to a computer network at a workstation or remotely from a distant location. Conventional registration methods through usernames and passwords can be easily hacked or manipulated. Therefore, to prevent the growing number of cybercrimes, the method was replaced by two modalities, namely fingerprint and iris recognition.
These devices are connected to workstations via USB or the sensor is built into the device itself. The method is fast and there is no fear of data being stolen or hacked. Called single sign-on solutions, they completely eliminate the financial expense of resetting a password.
Physical Access Entry
It refers to giving an employee access to an office building for safe entry. Previously, keys and badges were issued to individuals, followed by smart cards. However, these can be easily replicated, lost or stolen. Therefore, to solve such problems, fingerprint recognition accompanied by hand geometry scanning acts as a multimodal biometric solution. In these methods, biometrics are connected to an electromagnetic lock.
Time and Attendance
Figure 3: Biometric Time and Attendance System in Offices
All types of companies, regardless of industry, need to track employees on the time they contribute to the organization so that they are paid accordingly. Following traditional methods can lead to a lot of data manipulation. In such a situation, hand geometry along with fingerprint recognition are the most commonly used methods. Additionally, vein pattern recognition and iris recognition are also gaining popularity due to their contactless nature.
Law enforcement
All law enforcement agencies at all levels of the Federal Government use biometric technology to identify suspects. The most traditional method used for this purpose is Fingerprint Recognition, but nowadays facial and vein pattern recognition methods are also being used on the market.
The suspect's fingerprint is collected and analyzed through a massive database known as the Automated Fingerprint Identification System, also known as AFIS. This system has now been replaced by the Integrated Automated Fingerprint Identification System. It offers the following advantages -:
• Criminal search results can be sent to the responsible law enforcement agency within 24 hours.
• Latent fingerprint images collected at crime scenes are stored in IAFIS databases.
• Highly digitized criminal photographs can be obtained upon request at any time.
• These databases also support remote connectivity so that police officers can connect to the required database over a secure Wi-Fi connection.
Surveillance
Figure 4: Crowd surveillance camera recording activities
Surveillance is basically keeping an eye on a large group of people through devices from an established baseline to determine any type of abnormal behavior. The most common technique used for this purpose is facial recognition. This modality can be implemented easily and secretly through CCTV cameras and is widely followed in many places. Provides a high chance of identifying a suspect or criminal in crowded areas.
The techniques used for surveillance can be overt, when people know they are being monitored, or they can be covert, when they have no idea that their activities are being recorded. The latter method generally uses facial recognition technique for authentication and identification of individuals.
Latest biometric market trends
• Smartphones
Figure 5: Fingerprint recognition on smartphones
The smartphone market is one of the spaces with the greatest potential for biometric applications. From unlocking the phone through fingerprint recognition to using voice recognition and facial recognition, a smartphone is highly integrated with biometrics. This not only makes operation easier, but also increases the security of your data.
Figure 6: Wearable device that monitors the body's brain waves
The wearable devices market is currently witnessing a boom and is highly based on biometrics. Almost all wearables measure individuals' biological characteristics, such as sweat, brain activity and heart rate. This data is detected to identify valuable information about the health of the person using the device.
• E-commerce
With the rise of e-commerce, people are undoubtedly very happy to enjoy the ease of online shopping, but online payment methods are often subject to many threats. Therefore, it is proposed that instead of accessing the user's account through credentials, the use of fingerprints, iris and facial recognition can go a long way in ensuring a secure login. Additionally, it will save store managers from countless questions whenever a customer forgets their bill.
• Cloud-based biometrics
Cloud computing is gaining a lot of popularity in the corporate world, irrespective of the size and nature of the business. This is because it offers highly convenient, secure, and mass storage space for all valuable data. However, there is still a need to ensure security, which can be done through the implementation of biometric possibilities, such as smart spaces, access control applications, smart environmental environments.
You can read our Blog and Articles section for more topics on electronic engineering, industry and technology.
(tagsToTranslate)pic