- Get link
- X
- Other Apps
- Get link
- X
- Other Apps

Biometric Authentication
Related terms:
Derrick Rountree, in Federated Identity Primer, 2013
2.2.1.1.2 Biometrics
Biometric authentication involves the usage of some part of
your physical make-up to authenticate you. This could be a fingerprint, an iris
scan, a retina scan, or some different bodily feature. A single characteristic
or multiple traits may be used. It all relies upon on the infrastructure and
the extent of safety preferred. With biometric authentication, the physical
feature being examined is generally mapped to a username. This username is used
to make choices after the man or woman has been authenticated. In some cases,
the user should enter the username whilst trying to authenticate; in others, a
lookup is executed at the biometric sample in order to determine the username.
Biometric authentication is completed through doing a
contrast of the bodily aspect you present for authentication against a replica
that has been saved. For example, you would area your finger on a fingerprint
reader for contrast in opposition to the saved pattern. If your fingerprint
fits the stored pattern, then the authentication is considered to achieve
success.
In order to set up biometric authentication the best
infrastructure need to be in place. Once the infrastructure is set up we sign
up users. Some merchandise permit users to sign in immediately while others
require a registration agent to carry out the registration for the person.
Let’s take the example of fingerprint-based authentication. During the
registration procedure, the device will ask the person to publish a pattern, in
actual reality it'll create multiple samples. The person places their finger on
the fingerprint reader. The system will record images of the consumer’s
fingerprint. The device will use the multiple pics to decide a point sample to
perceive the person’s fingerprint. These factors are essentially dots located
on special areas of the fingerprint. These dots are used to denote the sample
made by way of the fingerprint. Once a enough variety of samples had been taken
to shape a consistent factor pattern, the sample is saved and used as the
premise for later assessment in the course of authentication.
Biometric authentication is a reasonably strong technique of
authentication and is in use through many organizations nowadays but, it is not
with out its problems or drawbacks. One of the troubles with biometric
authentication is that it typically calls for unique hardware inclusive of a
fingerprint reader, retina scanner, and so on. The hardware has to be hooked up
and configured on each device (or endpoint) so as to be used for login. This
limits the general usability of the solution. You can’t just walk up to any
device and anticipate to use it to authenticate. It may be in particular tricky
whilst you are external in your organisation (i.E., running remotely or on the
road), as you need a machine that has the essential hardware mounted and
configured in line with the company coverage. In addition, cost can also be an
difficulty with biometrics. The specialized hardware required for biometric
authentication may be high-priced and has to be purchased for all
authentication endpoints. Therefore, the preliminary funding required for a
biometric answer may be pretty significant.
A second potential issue with biometrics is protection. Part
of putting in a biometric solution consists of configuring the sensitivity
degree for the sample. The sensitivity level determines how close a in shape
you want for authentication to be successful. Configuring the sensitivity
degree may be relatively tricky. If it’s set too low, one recorded sample could
potentially in shape multiple physical samples. If it’s set too high, you can block
get right of entry to to a person who's legitimately legal to access the
device.
There have also been instances wherein human beings had been
capable to break biometric authentication. The primary difficulty here is that
during many cases, biometric authentication is based simplest at the photograph
offered all through authentication, so it could be tricked via a cast image (we
see plenty of examples of this in current-day secret agent movies). In order to
combat this, a few biometric producers have been adding other necessities to
their biometric authentication solution. For instance, a fingerprint reader may
also test the temperature of the finger used to supply the fingerprint. If the
temperature isn't within a normal variety for the human body, the machine
assumes the fingerprint is being provided by means of a few bogus approach and
the authentication fails.
For those reasons, we do not see a lot of Internet-based
programs the usage of biometric authentication. We see it extra in corporate
settings and, normally, it’s used only for sure applications or under unique
circumstances.
R. Manjula Devi, ... K. Devendran, in Machine Learning for Biometrics, 2022
Abstract
Biometric authentication is the method of authenticating the
each and each man or woman identification based totally on biometric measures.
Retina biometric has been appeared as cozy technique amongst all of the
biometric measures to be had because it offers a unique stencil for each
character and additionally it does now not modify during the man or woman’s
existence. In this paintings, an green biometric retina identification the use
of ANFIS-based Retina Biometric Authentication System (ARBAS) for character’s
authentication has been recommended and proved it on a real-time dataset named
as VARIA database that includes samples of retinal pics accrued from diverse
humans at wonderful occasion of time. The authentication procedure using retina
undergoes levels: Enrollment Phase and
Authentication Phase. In Enrollment Phase, the retina of the diverse people has
been scanned; the biometric pattern has been derived based on the retina’s
extracted characteristic and saved the template in the database for destiny
use. In the Authentication Phase, the man or woman’s retina has been scanned;
the biometric sample has been extracted from it and correlated the extracted
pattern with the sample saved within the database. If the sample is matched,
then the consumer is authenticated as an authorized person. ARBAS achieves FRR
and the FAR with the proportion of two.Seventy eight% and 2.94%, respectively,
at the VARIA database.
In Microsoft Vista for IT Security Professionals, 2007
Biometrics Authentication
Biometrics authentication devices rely upon bodily traits
consisting of a fingerprint, facial patterns, or iris or retinal styles to
verify person identity. Biometrics authentication is turning into famous for
many functions, consisting of community logon. A biometrics template or
identifier (a sample acknowledged to be from the legal user) need to be stored
in a database for the device to compare to a new sample given at some stage in
the logon system. Biometrics are regularly used along with clever playing cards
in excessive-safety environments. The maximum famous types of biometrics
devices are the subsequent:
Fingerprint scanners These are widely available for each
computing device and portable computer systems from a spread of vendors,
connecting via a USB or Personal Supercomputer Memory Card International
Association (PCMCIA, or PC Card) interface.
Facial pattern recognition devices These devices use facial
geometry evaluation to confirm identity.
Hand geometry recognition devices These are much like facial
pattern devices however examine hand geometry.
Iris scan identity devices Iris scanners examine the
trabecular meshwork tissue in the iris, that is permanently shaped at some
stage in the 8th month of human gestation.
Retinal scan identity devices Retina scanners examine the
patterns of blood vessels on the retina.
Jack Wiles, in Techno Security's Guide to Securing SCADA,
2008
Summary
Biometric authentication regimes can solve crucial issues
within your organization's SCADA security machine, however they're now not
beneficial in all situations, and that they present the machine administrator
with unique troubles and risks. In a SCADA security network, biometric
additives are beneficial best at the edges of the network where people have
interaction with the SCADA security and in which at ease facilities and system
need authorized get entry to. The kind of biometric readings, both invasive and
remote, demonstrates that biometric security can meet a big selection of
priorities inside your ordinary security program.
However, every biometric authentication capture device
provides its personal set of alternatives, including whether it is extra
important on your agency to allow equipped access in an emergency or whether
it's far extra important take intense steps to exclude any unauthorized people
from gaining access to comfortable facilities. These gadgets are not foolproof
and may be overwhelmed at some of exceptional points of vulnerability, such as
tricking the scanners or remodeling the gadget software. Storage and protection
of biometric samples can also be unsafe. Finally, biometric systems are not yet
so substantial that the regulation and policies for biometric capture can be
expected to remain constant over the several years of your organization's
funding in those structures.
A relaxed biometric authentication system for smart
surroundings the use of reversible facts hiding thru encryption scheme
V.M. Manikandan, in Machine Learning for Biometrics, 2022
Abstract
Biometric authentication is utilized in its fullest
potential in all clever environments. Face popularity and fingerprint
recognition are the two maximum famous approaches for biometric authentication.
In a few locations, in which a higher level of security is needed can be
equipped with the aggregate of face recognition and fingerprint popularity. In
trendy, from the customer side, the biometric statistics will be amassed using
a camera and fingerprint scanner, and that information can be transmitted to a
cloud carrier company to do the complicated duties, together with face
popularity and fingerprint popularity. In such situations, the transmission of
face snap shots and fingerprints from the client facet to a server is a major
situation considering the fact that an interloper may additionally try to seize
that data, and later, they could use that information to govern the
authentication system. In this chapter, we discuss a comfortable mechanism to
ship the face photos and the fingerprints with the useful resource of a
reversible information hiding (RDH) through the encryption scheme. RDH is a
manner of hiding some information by way of using a concealing medium in this
type of manner that later the extraction of the hidden message is possible
together with the recovery of the unique photographs. In a RDH thru encryption
scheme, the RDH procedure and the photograph encryption process will be blended
right into a single project to hide the name of the game message in an
photograph. In this bankruptcy, we advocate a brand new version wherein the
compressed fingerprint facts as a secret message may be embedded into the face
photo thru a reversible information hiding thru the encryption scheme. The
encrypted image received after RDH through encryption may be transmitted to the
cloud provider company for similarly processing.
Passwords, Vulnerabilities, and Exploits
Littlejohn Shinder, Michael Cross, in Scene of the
Cybercrime (Second Edition), 2008
Biometric Authentication
Biometric authentication devices rely on physical traits
inclusive of a fingerprint, facial styles, or iris or retinal styles to verify
person identity. Biometric authentication is turning into famous for plenty
purposes, which include network logon. A biometric template or identifier (a
sample regarded to be from the legal consumer) should be stored in a database
for the tool to evaluate to a brand new pattern given all through the logon
method. Biometrics is frequently used along with smart cards in
excessive-security environments. The maximum popular forms of biometric gadgets
are the following:
Fingerprint scanners These are broadly available for both
desktop and portable computers from a ramification of providers, connecting
through a Universal Serial Bus (USB) or PCMCIA (PC Card) interface.
- Get link
- X
- Other Apps