Privacy & Identity - Security and Usability: The Viability of Passwords & Biometrics
Privacy & Identity - Security and Usability: The Viability of Passwords & Biometrics
Fingerprint Scanner
Security Application
Database
Access or deny
Biometrics
2 Categories of Biometrics
Physiological – also known as static biometrics:
Biometrics based on data derived from the
measurement of a part of a person’s anatomy. For
example, fingerprints and iris patterns, as well as
facial features, hand geometry and retinal blood
vessels
Behavioral – biometrics based on data derived
from measurement of an action performed by a
person and, distinctively, incorporating time as a
metric, that is, the measured action. For example,
voice (speaker verification)
Biometrics – How do they
work?
Although biometric technologies
differ, they all work in a similar
fashion:
The user submits a sample that is
an identifiable, unprocessed
image or recording of the
physiological or behavioral
biometric via an acquisition
device (for example, a scanner or
camera)
This biometric is then processed
to extract information about
distinctive features to create a
trial template or verification
template
Templates are large number
sequences. The trial template is
the user’s “password.”
Overview of Biometrics
Biometric Acquisition Device Sample Feature Extracted
Iris Infrared-enabled video Black and white iris image Furrows and striations of
camera, PC iris
camera
Fingerprint Desktop peripheral, PC Fingerprint image (optical, Location and direction of
card, mouse chip silicon, ultrasound or ridge endings and
or reader touchless) bifurcations on
embedded in fingerprint, minutiae
keyboard
Voice Microphone, telephone Voice Recording Frequency, cadence and
duration of vocal
pattern
Signature Signature Tablet, Image of Signature and Speed, stroke order,
Motion-sensitive record of related pressure and
stylus dynamics appearance of
measurement signature
Face Video Camera, PC Facial image (optical or Relative position and shape
camera, single- thermal) of nose, position of
image camera cheekbones
Hand Proprietary Wall- 3-D image of top and sides Height and width of bones
mounted unit of hand and joints in hands
and fingers
Retina Proprietary desktop or Retina Image Blood vessel patterns and
wall mountable retina
unit
Strengths, Weaknesses and
Usability of Biometrics
Biometric Strengths Weakness Usability
Iris Very stable over time Potential user resistance Information security
Uniqueness Requires user training access control,
Dependant on a single especially for
vendor’s technology Federal Institutions and
government agencies
Physical access control
(FIs and government)
Kiosks (ATMs and
airline tickets)
Signatures High user acceptance Unstable over time Portable devices with
Minimal training Occasional erratic variability stylus input
Changes with illness, stress or Applications where a “wet
injury signature” ordinarily
Enrollment takes times would be used.
Strengths, Weaknesses and
Usability of Biometrics
Biometrics Strengths Weakness Usability
Hand Small template (approximately Physical size of acquisition device Physical access control
10 bytes) Physical contact required Time and attendance
Low failure to enroll rate Juvenile finger growth
Unaffected by skin condition Hampered by temporary physical
injury
Retina Stable over time Requires user training and IS access control,
Uniqueness cooperation especially for high security
High user resistance government agencies
Slow read time Physical access control
Dependent on a single vendor’s (same as IS access control)
technology
Comparison of Different
Biometrics Technology
Promise that Biometrics hold
for Privacy
Increased Security
Biometric cannot be lost, stolen or
forgotten; it cannot be written down and
stolen by social re-engineering
By implementing biometrics organizations
can positively verify users’ identities,
improving personal accountability
In conjunction with smart cards biometrics
can provide strong security for Public Key
Infrastructure (PKI)
Perils that Biometrics hold for
Privacy
Privacy is one of the leading inhibitor for
biometrics technology. Main issues:
Misuse of Data
Health/Lifestyle – Specific biometric data has been
linked with the information beyond which it is set out
to be used for such as AIDS. Is a person able to
control the information gathered on himself/herself?
Function Creep
Law Enforcement – The template database may be
available for law enforcement
Credit Reporting – The template database may be
cross referenced against other databases including
those held in hospitals and the police departments,
by a credit reporting agency
Future Trends in Biometrics