Biometric Devices Overview

Embed Size (px)

Citation preview

  • 8/9/2019 Biometric Devices Overview

    1/58

    1

  • 8/9/2019 Biometric Devices Overview

    2/58

    DEFINITIONBiometrics - (Classical Definition) Identification of living things based on physiological and/orbehavioral characteristicsBiometrics - (ISO Definition) A measurable,physical characteristic or personal behavioral traitused to recognize the identity, or verify the

    claimed identity, of an enrollee.Biometric System (ISO Definition) An automatedsystem capable of: capturing a biometric sample from an end user; extracting biometric data from that sample; comparing the biometric data with that contained in

    one or more reference templates; deciding how well they match; and indicating whether or not an identification or

    verification of identity has been achieved.2

  • 8/9/2019 Biometric Devices Overview

    3/58

    HISTORY OF BIOMETRICS Used since ma n f irst walk ed up right

    We all u se facial recognition on a da ily ba sis We use voice recognition during con vers a tions to

    identi fy the other pa rty (e.g. Te le phone) Finger prints hav e been used in f orensics f or over 100ye a rs by p olice investig a torsBab ies registered a t birth using palm/f oot prints

    Dental records a nd X-r ay s hav e long been used to identi fydeco mp osed bodiesThe ha nd written sign a ture is a f or m of beh av ior albiometric identi f ica tion

    DNA is one of the latest a dva nces used in identi f ica tion

    3

  • 8/9/2019 Biometric Devices Overview

    4/58

    4Your body as password??

  • 8/9/2019 Biometric Devices Overview

    5/58

    H OW BIOMETRIC DEVICES WORK Withall b iometric s yste ms there a re 3 ste ps :

    Da ta Cap ture All biometrics start with a piece of raw analoguedata (e.g. fingerprint, voice sample,face/hand/retina image)

    S ign al P rocessing

    This raw data is digitized so that computers canprocess itThe computer software extracts the criticalfeatures (e.g. minutiae) and discards those

    elements that are irrelevant to making asuccessful comparison (i.e. creates template)

    DecisionThe stored and live templates are compared and

    if they match (i.e. within set threshold) user willbe accepted5

  • 8/9/2019 Biometric Devices Overview

    6/58

    6

  • 8/9/2019 Biometric Devices Overview

    7/58

    BIOMETRIC APPLICATIONSD epending on the application, biometrics can be used for security, privacy, convenience, fraud reduction, or to deliver

    enhanced services. Applications include: Physical security and access control (e.g. borders, airports) Computer/Network logins (e.g. laptops with fingerprint

    sensors built in) Business transactions (e.g. ATM withdrawals)

    Credit and debit card protection Voting Receiving government benefits (e.g. welfare, pension) Healthcare services (e.g. patient I D ) Law enforcement (e.g. drivers licenses, vehicle registration,

    smart guns, criminal identification systems) Identification D ocuments (e.g. Visas, passports, SIN cards,

    Military/Govt/Corporate I D cards) Registering race horses, research animals, pets and other

    wildlife D ata protection (e.g. biometric tokens) 7

  • 8/9/2019 Biometric Devices Overview

    8/58

    FINGER/THU MB PRINT READERS

    Most widely usedMost systems rely on classifyingthe differences between ridgesand valleys in the patterns of the print and at ridge

    bifurcations or ridge endings(i.e. minutiae)Produces one of the largesttemplates (aprox 1KByte)depending on the method usedDevices are very reliable in usebut in some cases othertechniques may be requiredSeveral types (e.g. optical,capacitive, ultrasound, RF)

    8

  • 8/9/2019 Biometric Devices Overview

    9/58

    FINGERPRINT (continued)

    Finger print ma tching techniq ues ca n be pla ced into two ca tegories : m inutia e -ba sed a nd corre la tion ba sed. Minutia e -ba sed techniq ues f irst f ind minutia e points a nd

    then map their re lative pla ce ment on the f inger. Howe ver,

    there a re so me diff iculties when using this app roa ch. It is difficult to extract the minutiae points accuratelywhen the fingerprint is of low quality.Also this method does not take into account the

    global pattern of ridges and furrows.More subject to wear and tear, and false minutiae.

    9

  • 8/9/2019 Biometric Devices Overview

    10/58

    10

    The corre la tion -ba sed method is abl e to overco me so me of the diff iculties of the minutia e -ba sed app roa ch. Howe ver, it ha s so m e of its own shortco mings.

    Correlation-based techniques (i.e. patternmatching) require the precise location of aregistration point and are affected by imagetranslation and rotation.Larger templates (often 2 3 times larger than

    minutiae-based)

  • 8/9/2019 Biometric Devices Overview

    11/58

    FINGERPRINT (continued)Intrusive procedureIn 199 7 the stamp-sized fingerprint reader ona microchip was introduced which has led tothe potential for many new applications (e.g.securing smartcards)A much smaller scrolling sensor is nowavailable which has made even moreapplications possible and has addressed someof the security concerns with latent prints

    Some more advanced readers can differentiatebetween live and dead tissue by checking for pulse by sensing oxygen level

    by checking capacitance of the biometric sample 11

  • 8/9/2019 Biometric Devices Overview

    12/58

    Issues and Concerns

    With Biometrics becoming available, individualscould:

    Plant DNA at the scene of a crime

    Fool a fingerprint detector with a piece of tape Fool an iris detector with a picture of an eye Break into the system and make a fail code a

    pass code

  • 8/9/2019 Biometric Devices Overview

    13/58

    Matsumoto s Technique

    Only a few dollars worth of materials13

  • 8/9/2019 Biometric Devices Overview

    14/58

  • 8/9/2019 Biometric Devices Overview

    15/58

    15

    Ha nd geo metr y is a f or m of physio logic al b iometrics tha t uses the sh ap e of the ha nd f or au thentic a tion pu r poses. Va rious tr a its of the ha nd, s uch a s f inger length, width a nd cur va ture, a s we ll a s uniq ue f e a tures may b e used f or identi f ica tion. [1] Ha nd geo metr y

    sc a n req uire tha t users pla ce their ha nds onto a s ur face with 5pegs. This al igns the ha nd so tha t the sc a nner ca n get aconsistent re a ding on e a ch sc a n. The sc a n is then co mpa red to the da taba se f or veri f ica tion. A typical sc a n will tak e two pictures of the ha nd : one of the top a nd one of the side.

  • 8/9/2019 Biometric Devices Overview

    16/58

    16

    Ha nd geo metr y is not a u niq ue f or mof biometric sec urity. More tha n one person may hav e the s am e or ver ysimilar ha nd sh ap es. This limits the use fulness of ha nd geo metr y to veri f ica tion, not identi f ica tion.

    Comb ining ha nd geo metr y w ith a nother f or m of biometric sec urity, s uch a s f inger print biometrics , would provide a v er y sec ure identi f ica tion s yste m. A s yste m w here ha nd geo metr y wa s used to veri fy the f inger print inpu t would a dd a n a ddition al lay er of sec urity a nd cre a te a v er y e ff ecti ve identi f ica tion s yste m.

  • 8/9/2019 Biometric Devices Overview

    17/58

  • 8/9/2019 Biometric Devices Overview

    18/58

    HOW IT WORKS

    Takes snapshot of palm veinsConverts into algorithmCompares with database

    18

  • 8/9/2019 Biometric Devices Overview

    19/58

    AccuracyTECH NOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE

    Palm Secure .00008% .01%

    Fingerprint 1-2% 3 %

    Iris .0001% - . 9 4 % .99 % - .2%

    Voice 2% 10%

    Vein patterns

    Distinctive and unique to individuals, even left and right

    hands. Difficult to steal or forgeFalse acceptance rate : A rate at which someone otherthan the actual person is falsely recognized.False rejection rate : A rate at which the actual person isnot recognized accurately. 19

  • 8/9/2019 Biometric Devices Overview

    20/58

    Practical Application

    Portable M ouse

    ATM M achine

    Palm Secure is now widelyused in various fields. ATM

    9 2% of all Japanese ATMs

    18,000+ ATM machines for

    Bank of Tokyo - Mitsubishi School ID, Entry Key to

    private property, Log-in toPCs or servers

    Potential is limitless

    PalmSecure mouse with abuild-in sensor in 200 7 easily installed to personal

    computer.

    20

  • 8/9/2019 Biometric Devices Overview

    21/58

    FACIAL RECOGNITIONConsidered by some as an intrusive systemU ses high resolution cameras (several types) to takepictures of the face for comparisonThe four primary methods traditionally employedby facial scan vendors to identify and verify subjectsinclude eigenfaces, feature analysis, neuralnetwork, and automatic face processingNew systems are being developed that measure

    three dimensional characteristics of the faceOne of the fastest growing areas in biometricindustry

    21

  • 8/9/2019 Biometric Devices Overview

    22/58

    FACIAL (continued)Source: MIT Face Recognition Demo Page

    S ource : b iometrics.cse. ms u.ed u/ inf o.ht ml

    22

  • 8/9/2019 Biometric Devices Overview

    23/58

    FACIAL (continued)Eigen face : "one's own face, " a techno log y pa tented a t MIT tha t uses 2D global gr ay sc ale ima ges re presenting distincti ve ch a r a cteristics of a fa cial ima ge. Most faces ca n be reconstr ucted by co mb ining f e a tures of 100-125 eigen faces. During enro llment, the user's eigen face is mapp ed to a series of numb ers (coe ff icients). Upon a 1:1ma tch, a "l ive " te mpla te is ma tched a ga inst the enro lled te mpla te to obta in a coe ff icient va ria tion. This va ria tion either a cce pts or rejects the user.

    Local F e a ture Analysis (LF A): also a 2 D techno log y, tho ugh m ore capabl e of a cco mm od a ting ch a nges in app e a r a nce or facial a s pect (e.g., s m iling, f rowning). LF A uses dozens of f e a tures f rom diff erent regions of the face; incor por a tes the loc a tion of these f e a tures. Re lative dist a nces a nd a ng les of the "bu ilding bloc ks " of the face a re m e a s ured. LF A ca n a cco mm od a te 25- degree a ng les in the horizont alpla ne a nd 15 degrees in the vertic al pla ne. LF A is a deri va tive of the eigen face m ethod a nd wa s de ve loped by Visionics, Cor p.

    23

  • 8/9/2019 Biometric Devices Overview

    24/58

    FACIAL (continued) Automa tic Fa ce P rocessing ( AFP ): This 2D techno log y u ses dist a nces a nd dist a nce r a tios bet ween e yes, nose, a nd corners of m outh. Not a s robu st a s the other techno logies, bu t may b e more aff ecti ve in dimly l it, f ront al ima ge cap ture sit ua tions.

    Neur al Net wor ks : use algorith ms tha t use a s mu ch

    of the face a s possi ble. These algorith ms r un a s the huma n br a in would in cognition to le a rn ab out facial f e a tures. Ne ur al net wor ks a re a ste p up f romLF A.

    24

  • 8/9/2019 Biometric Devices Overview

    25/58

    FACIAL (continued) New Volum etric -ba sed 3D P rocessing Sy ste ms : Cre a te a

    te mpla te of the face tha t is ba sed on tens -of-tho us a nds of points on the face, thus f or ming a v er y high -reso lution inter pret a tion of the s ub ject.

    A 3D laser cam er a tak es a p icture of the face a nd re presents it within a v irtual cub e. The input starts as a digital image and does notneed to be converted

    The secret to a tr ue 3D method lies in the ab ility to use direct me a s ure ments to co mpa re individual s.

    That is, rather than the traditional method of anindirect search for facial features on an image,these systems look at specific points within a

    millimeter apart.. 25

  • 8/9/2019 Biometric Devices Overview

    26/58

    Eye biometricRetina:

    back inside of the eye ball.

    pattern of blood vesselsused for identification.

    Iris:

    coloured portion of theeye surrounding the pupil.

    complex iris pattern used

    for identification. 26

  • 8/9/2019 Biometric Devices Overview

    27/58

    RetinaThe retina is a thin layer of ce lls a t the ba ck of the e ye ballof verte br a tes.It is the pa rt of the e ye which con verts light into ner vous sign als.The retin a cont a ins photorece ptor ce lls (rods a nd cones) which recei ve the light; the res ulting ne ur al sign als then

    undergo co mpl ex processing by other ne urons of the retin a , a nd a re tr a ns f or med into a ction potenti als in retin alga ng lion ce lls whose a xons f or m the optic ner ve. The retin a not on ly detects light, it also play s a signi f ica nt pa rt in visual p erce ption.

    In e mb r yonic de ve lopm ent, the retin a a nd the optic ner ve origin a te a s outgro wths of the br a in.The uniq ue str ucture of the blood vesse ls in the retin a ha s been used f or biometric identi f ica tion.

    27

  • 8/9/2019 Biometric Devices Overview

    28/58

    II. Retina recognition

    The pattern of blood vessels that emanatefrom the optic nerve and disperse throughoutthe retina depends on individuals and neverchanges.No two retinas are the same, even in identicaltwins.Commercial products: Retinal Technologies

    28

  • 8/9/2019 Biometric Devices Overview

    29/58

    RETINA SCANNERSRely on the uniqueness of the pattern of bloodvessels lining the retinaU sers place their eyes a few inches from anincandescent light beam and the sensor maps thecapillary pattern by measuring reflected lightPeople with high blood pressure, diabetes orglaucoma may give inconsistent readingsTemplate aprox 35 Bytes and extremely reliablePrimary use is in high security access control

    29

  • 8/9/2019 Biometric Devices Overview

    30/58

    RETINA SCANNERS (continued)

    CameraCamera Enrollment deviceEnrollment device

    Source: Biometrics Store Website

    3 0

  • 8/9/2019 Biometric Devices Overview

    31/58

    RETINA SCANNERS (continued)

    Main retina featuresMain retina features Actual photo of retinaActual photo of retina

    Source: American Academy of Ophthalmology

    3 1

  • 8/9/2019 Biometric Devices Overview

    32/58

    3 2

    Iris sc a ns off er so me ma r ked imp rove ment over retin al sc a ns. The iris ha s a m esh -like text ure with ma ny over lays tha t prod uce cr ypts, furro ws, ridges, stri a tions, a nd other uniq ue ch a r a cteristics tha t over all p rovide auniq ue blu e print of the iris. Un like retin a s, which ca n ch a nge with a ge due to dise a ses

    s uch a s diab etes or glau co ma , the iris does not ch a nge during a p ersons lif etime.

  • 8/9/2019 Biometric Devices Overview

    33/58

    33

    Iris recognition is beco ming ver y p opula r in sec urity appl ica tions bec au se of its e a se of

    use, a cc ur a cy, a nd s af et y bu t also bec au se the techno log y on ly tak es a f e w seconds to de liver res ults, where a s DNA or f inger print identi f ica tion will tak e wee ks or e ven months. An iris pa ttern is extre me ly a cc ur a te bec au se it uses more tha n 240 p oints of re f erence in a ba sis f or a ma tch where a s af inger print on ly u ses se ven to 24re f erences. We a ring glasses or cont a ct

    lenses does not ch a nge or aff ect the ima ging res ults or the identi f ica tion process. Ma nya ir ports a nd schoo ls a re testing the iris sc a n a s a pa rt of their sec urity s yste ms.

  • 8/9/2019 Biometric Devices Overview

    34/58

    IRIS SCANNERSH igh resolution cameras capture image from up to 3 feet away (usually 10 to 12 inches)Converts picture of the distinctive fibers, furrows,flecks, crypts, rifts, pits and coronas of the iris into abar-code like identifierTemplate around 2 56 Bytes in sizeH uman iris is distinct with 2 5 0 differentiating featuresThe recognition of irises by their IrisCodes is basedupon the failure of a test of statistical independence. Any given IrisCode is statistically guaranteed to pass a test

    of independence against any IrisCode computed from adifferent eye; but it will uniquely fail this same test againstthe eye from which it was computed. Thus the key to irisrecognition is the failure of a test of statisticalindependence.

    34

  • 8/9/2019 Biometric Devices Overview

    35/58

    Iris properties

    Iris pattern possesses a high degree of randomness:extremely accurate biometric.Genetically independent: identical twins havedifferent iris pattern.Stable throughout life.H ighly protected, internal organ of the eye.

    Patterns can be acquired from a distance (1m).Patterns can be encoded into 2 56 bytes.

    35

  • 8/9/2019 Biometric Devices Overview

    36/58

    IRIS (continued)Idea for iris scanning has been around since 1 9 36Processing time is very quick (less than 2 secs)Does not use any special beams or lighting insteaduses a camera with a high quality lens

    Works well with people wearing contact lenses orglasses and at night with normal lightingAdvances in refractive and cataract surgery andcornea transplants don't change iris aspects

    Note: New contact lenses with artificial iris patterns, etc. have potential to defeat these systems, however, security mechanismscan be built in to protect against these attacks (i.e. performliveness tests) 36

  • 8/9/2019 Biometric Devices Overview

    37/58

    IRIS (continued)

    Condo miniumresidents in Tokyo ga in entr y to the bu ilding by their iris

    pa tterns, a nd the e le va tor is au toma ticallycalled a nd

    progr amm ed to bring the m to their residenti al floor.

    S ource : b iometrics.cse. ms u.ed u/inf o.ht ml37

  • 8/9/2019 Biometric Devices Overview

    38/58

    IRIS (continued)Freq uent Flyers a t S chi pho l Air port (NL) may enro ll in the "Privium" p rogr amm e,

    en abl ing the m to enter The Nether lands witho ut pa ss port present a tion. Inste a d the y a re recognised bya n iris cam er a , av oiding lines a nd de lays a t Imm igr a tion Contro l.

    S ource : b iometrics.cse. ms u.ed u/ inf o.ht ml

    3 8

  • 8/9/2019 Biometric Devices Overview

    39/58

    I. DNADNA has been called the ultimate identifier

    Identify information from every cell in the body in adigital formN ot yet fully automated, not fast and expensiveTheoretical limitation: Identical twins have the same

    DNAP rivacy issue DNA contains information about race,

    paternity, and medical conditions for certain disease

    3 9

  • 8/9/2019 Biometric Devices Overview

    40/58

    DNA TESTINGPerhaps the ultimate identifier (what about

    twins/clones?) Recent cloning experiments raise questions about itssuitability as a unique identifier

    Identical twins have identical DNA

    Obviously very intrusiveNot practical for everyday authentication orverification, only for very high stakes situations Criminal forensics

    PaternityProcess is currently not automatedTime intensive Process takes from 2- 4 hours

    4 0

  • 8/9/2019 Biometric Devices Overview

    41/58

    4 1

    How D NA recognition works?The ce lls tha t cont a in DNA sh a re genetic

    ma teri al ( inf or ma tion) thro ugh chro moso mes. Huma ns hav e 23 chro moso mes tha t ho use apersons DNA a nd their genes. Of the 46 totalchro moso mes, 23 co me f rom e a ch pa rent of a n off s pring. 99 .7% of a n off s prings DNA is sh a red with their pa rents. The re ma ining .3% of a n individual s DNA is va riabl e re petitive coding uniq ue to a n individual . This re petitive coding is the ba sis of DNA biometrics. DNA

    recognition uses genetic prof iling, also called genetic f inger printing, to iso late a nd identi fythese re petitive DNA regions tha t a re uniq ue to e a ch individual to either identi fy or veri fy apersons identit y.

  • 8/9/2019 Biometric Devices Overview

    42/58

    VOICE VERIFICATIONA completely non-intrusive techniqueExamines tonal wave patterns that cannot beimitated by other individuals (voice patterns of impersonators are different than the real voicepattern)Analog recordings cannot reproduce accurate tone

    patterns, but digital recordings may be able to do so Random question and answer techniques, and patternmatching (i.e. comparing successive voice samples)may help to prevent reply attacks based on digitalvoice recordings

    Most appropriate method for telephone use

    People with colds & laryngitis can affect FRR although slight variations can be compensated forSignal quality can introduce errors (e.g. bad phoneline, noise in background)

    4 2

  • 8/9/2019 Biometric Devices Overview

    43/58

    VOICE VERIFICATION (continued)

    It is these well-formed, regularpatterns that are unique toevery individual. These patternsare created from the size andshape of the physical structure

    of a person's vocal tract. Sinceno two vocal tracts are exactlythe same, no two signalpatterns can be the same.

    A complete signal has anoverall pattern, as well as amuch finer structure, calledthe frame. This frame is theessence of voice verificationtechnology.

  • 8/9/2019 Biometric Devices Overview

    44/58

    VOICE VERIFICATION (continued)These unique featuresconsist of cadence,pitch, tone, harmonics,and shape of vocal tract.

    The image at right shows howcharacteristics of voiceactually involve much

    more of the body than just the mouth.

    44

  • 8/9/2019 Biometric Devices Overview

    45/58

  • 8/9/2019 Biometric Devices Overview

    46/58

    SIGNATU RE ANALYSIS (continued)Bu ilt-in sensors register the dynam ics of the a ct of writing. These dynam ics

    inc lude the 3D-f orces tha t a re appl ied, the s peed of writing, a nd the a ng les in va rious directions.

    This signing pa ttern is uniq ue f or e a ch individual , a nd thus allows f or strong au thentic a tion. It al so protects a ga inst f r au d since it is pr a ctic ally imp ossi ble to dupl ica te "ho w" so meone signs.

    Source: Biometrics Store Website and Smart Pen

    46

  • 8/9/2019 Biometric Devices Overview

    47/58

    KEYSTROKE DYNAMICS

    These devices sample typing patterns up to onethousand times per second and continuously keeptrack of the speed, sequence and rhythm of a userstyping

    Both NIST and the National Science Foundationstudies have shown that typing patterns are uniqueVerification occurs seamlessly as the person typesStill in research and development phase

    User typing pa tternSp eedP ress a nd Re le a se Ra teUnique pa tterns a re gener a tedcompa risons

    47

  • 8/9/2019 Biometric Devices Overview

    48/58

  • 8/9/2019 Biometric Devices Overview

    49/58

    IX. Body odor

    Its absolutely clear that people withdiffering immunity genes producedifferent body odors

    E lectronic/artificial noses: developed asa system for the automated detection andclassification of odors, vapors, gases.

    P rometheus ( A lpha Mos) ,an example of electronicnose

    Schematic Diagram of Artificial nose

    A rtificial nosesare not yetsophisticatedenough to do all

    the job 4 9

  • 8/9/2019 Biometric Devices Overview

    50/58

    VI. Ear recognition

    Ea r geo metr y recognition uses the sh ap e of the e a r to per f or midenti f ica tion Su ggestions hav e been ma de tha t the sh ap es a nd ch a r a cteristics of the huma n e a r a re wide ly diff erent

    An inf r a red ima ge ca n be used to e limina te ha ir Might be recognized a t adist a nce

    5 0

  • 8/9/2019 Biometric Devices Overview

    51/58

    5 1

    in the future your e a r may b eco me your ne wpa ss word? A ltho ugh recent ly re ports hav e st a rted to

    discredit e a r imp rints a s a val id f or m of biometric identi f ica tion there is a nother a s pect of the e a r tha t see ms to be uniq ue to individual s. Mammal ia n, a nd hence huma n, e a rs e mit noises in res ponse to

    cert a in types of au dio stimul i; these e mitted noises, called optoa co ustic e missions (O AE), may b e used to disting uish individual s bec au se the y a re tho ught to be uniq ue.

  • 8/9/2019 Biometric Devices Overview

    52/58

    VII. Skin reflection

    Lumidigm Inc. has established that the absorptionspectrum of the skin depends on the individuals.

    In a range of wavelengths over 6 mm patch,several LEDs send light into the skin, andphotodiodes read the scattered light, which isanalyzed to perform the authentication.

    5 2

  • 8/9/2019 Biometric Devices Overview

    53/58

    VIII. Lip motion

    Compa res the ch a r a cteristic lip m otions of peo ple while the y s pe ak .

    He lps identi f ica tion a ssoci a ted with s pe ak er recognition.

    Diff erent ima ging conditions : Inf r a red (high sec urity & cost) a nd Ne a r Inf r a red (che ap , nor mally u sed f or a ctive sensing)

    53

  • 8/9/2019 Biometric Devices Overview

    54/58

    54

  • 8/9/2019 Biometric Devices Overview

    55/58

    NEGATIVE ISSU ES

    Some opthamologists warn that a simple retina scancould indicate that a person has AIDS or uses drugs,which may have severe privacy impactThe prospect of interoperable networked databases of

    biometric data raises concerns that our templates canbe bought and sold like SIN and credit card numbers,but unlike those, we cannot change our biometriccharacteristics if they become compromisedBelief that biometric systems are way to difficult andexpensive to implementFears that criminals, etc., will cut off victim s fingersand hands or take out eyeballs to defeat systemsbased on these technologies

    55

  • 8/9/2019 Biometric Devices Overview

    56/58

    NEGATIVE ISSU ESIn any large scenario some portion of the general

    population is likely to be physiologically unable to useone or more techniqueCertain cultures and religions prohibit or look withgreat disfavor upon photographing of individuals.One of the most frightening concerns is that thesesystems will be used to constantly track us asindividuals by govt., police, etc.People value their privacy and fear this technology willinhibit their ability to preserve their anonymity whileundertaking certain transactions (e.g. buying XXXvideos)Biometrics may lead to personal profiling bymarketing and other groups

    56

  • 8/9/2019 Biometric Devices Overview

    57/58

    REFERENCES

  • 8/9/2019 Biometric Devices Overview

    58/58

    REFERENCES http://www .biometrics.org

    http://www .biometricid f or um .org /www.recogs ys.co mwww.irisc a n.co mwww.inf osec urityma g.co m

    http:// ioso f twa re.co mwww.biodigest.co mwww.biometritech.co mwww.ibia .org

    http://www .n a tion alb iometric.org / http://www .biometrics.dod. mil/ http://www .biometricgro up .co m/ http://www .s peechtech ma g.co m/