This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
Due to worldwide advancements in computer and telecommunication technologies and the underlying infrastructures, biometric voting systems are expanding throughout the entire world including developed and developing countries in APAC, Middle East, Latin America, and Africa regions. Preventing voter fraud, election rigging, and multiple voter registration, accurate and reliable biometric voter registration systems are now playing an active role in modern electoral infrastructures. Beside a reliable biometric voting system, there is a dire need for international standards to govern the technology, software reliability and accuracy, process and algorithms deployed within the technology, and the verification of all hardware, software and protocols involved. The M2SYS TrueVoter™ system is a scalable and customizable software package that allows you to perform a wide variety of tasks for processing, editing, searching, retrieving, and storing biometric voting templates and voter records. TrueVoter™ can easily collect the biometric data in an industry recognized standard format including ISO/NIST and FBI compliance to ensure a reliable and secured electoral system.
Voting is the opportunity given to the people it is one of the political process, and the system is created to work best with everyone’s participation. Electronic Voting Machines (EVM) are being used by Indian election commission to conduct elections for the past decade. In Aadhar based electronic voting machine voters have to register their fingerprint. Based on the features of fingerprint it gets matched with the person who will cast the vote. Finger print matching will be done using the Aadhar card data base. The efficiency of a fingerprint is based on biometric system and is relatively high in comparison to other biometric based authentication systems like iris recognition, face readers, retina scanning, voice recognitions or hand geometry. With the help of keypad matrix voter can select the candidate to whom they wish to cast their vote and a message is displayed in LCD confirming the vote casted.
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
Due to worldwide advancements in computer and telecommunication technologies and the underlying infrastructures, biometric voting systems are expanding throughout the entire world including developed and developing countries in APAC, Middle East, Latin America, and Africa regions. Preventing voter fraud, election rigging, and multiple voter registration, accurate and reliable biometric voter registration systems are now playing an active role in modern electoral infrastructures. Beside a reliable biometric voting system, there is a dire need for international standards to govern the technology, software reliability and accuracy, process and algorithms deployed within the technology, and the verification of all hardware, software and protocols involved. The M2SYS TrueVoter™ system is a scalable and customizable software package that allows you to perform a wide variety of tasks for processing, editing, searching, retrieving, and storing biometric voting templates and voter records. TrueVoter™ can easily collect the biometric data in an industry recognized standard format including ISO/NIST and FBI compliance to ensure a reliable and secured electoral system.
Voting is the opportunity given to the people it is one of the political process, and the system is created to work best with everyone’s participation. Electronic Voting Machines (EVM) are being used by Indian election commission to conduct elections for the past decade. In Aadhar based electronic voting machine voters have to register their fingerprint. Based on the features of fingerprint it gets matched with the person who will cast the vote. Finger print matching will be done using the Aadhar card data base. The efficiency of a fingerprint is based on biometric system and is relatively high in comparison to other biometric based authentication systems like iris recognition, face readers, retina scanning, voice recognitions or hand geometry. With the help of keypad matrix voter can select the candidate to whom they wish to cast their vote and a message is displayed in LCD confirming the vote casted.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Aadhar based Digital election system of indiaVikash Singh
it is a new technique of voting which can minimize the cost of election from the Indian economy and increase the voting ratio and eliminate vocus voting and other problems.
In this system the voter will scan his AADHAAR card barcode and authaunticate with his/her fingure prints... and than the candidates list in there respective area will be displayed , and then the voter will vote for the candidate he wants.. the vote is secure in
the same voting machine.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Aadhar based Digital election system of indiaVikash Singh
it is a new technique of voting which can minimize the cost of election from the Indian economy and increase the voting ratio and eliminate vocus voting and other problems.
In this system the voter will scan his AADHAAR card barcode and authaunticate with his/her fingure prints... and than the candidates list in there respective area will be displayed , and then the voter will vote for the candidate he wants.. the vote is secure in
the same voting machine.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...
So, you want to go to Berlin? Hey, don’t we all! What’s not to love about a city that specializes in being a mixture of cool, crazy, calm, intellectually savvy, delicious and just plain exciting?
Yeah, that’s right; Berlin is for everyone - no matter how you would like to classify yourself.
CURSO: ARMONIZACIÓN CONTABLE
TÍTULO: APLICACIÓN DE LA NIC 16 EN LA EVALUACIÓN DE PROYECTOS DE INVERSIÓN
DOCENTE: Dr. Carlos Sandoval Aliaga
AUTOR: Mg Julio Capristán Miranda
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
The terms "Biometrics" and "Biometry" have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently, these terms have also been used to refer to the emerging field of information technology devoted to automated identification of individuals using biological traits, such as those based on retinal or iris scanning, voice patterns, dynamic signatures, fingerprints, face recognition, or hand measurements, especially for authentication purposes. Thus biometrics can be defined as the science and technology of measuring and statistically analyzing biological data. They are measurable physiological and / or behavioral characteristics that can be utilized to verify the identity of an individual. For a layman, it could be said that biometrics are the science of measuring physical and/or behavioral characteristics that are unique to each individual and they verify that an individual is who he or she claims to be.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
Biometric system is a pattern identification system that recognizes an individual by determining the originality of the physical features and behavioral characteristic of that person. Of all the recently used biometric techniques, fingerprint identification systems have gained the most popularity because of the prolonged existence of fingerprints and its extensive use. Fingerprint is dependable biometric trait as it is an idiosyncratic and dedicated. It is a technology that is increasingly used in various fields like forensics and security purpose. The vital objective of our system is to make ATM transaction more secure and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, there is no need to carry ATM cards to perform transactions. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and UART microcontroller. The Fingerprint and the user_id of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine. A Fingerprint scanner is used to acquire the fingerprint of the individual, after which the system requests for the PIN (Personal Identification Number). The user gets three chances to get him authenticated. If the fingerprints do not match further authentication will be needed. After the verification with the data stored in the system database, the user is allowed to make transactions.
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
Biometric technology is a science that used to verify or identify the individual based on physical and/or
behavioral traits. Although biometric systems are considered more secure than other traditional methods such as
password, or key, they also have many limitations such as noisy image, or spoof attack. One of the solutions to
overcome these limitations, is by applying a multibiometric system. Multibiometric system has a significant
effect in improving the performance of both security and accuracy of the system. It also can alleviate the spoof
attacks and reduce the fail to enroll error. A multi-sample is one implementations of the multibiometric systems.
In this study, a new algorithm is suggested to provide a second chance for the genuine user who is rejected, to
compare his/her provided finger with the other samples of the same finger. Multisampling fingerprint is used to
implement this new algorithm. The algorithm is activated when the match score of the user is not equal to a
threshold but close to it, then the system provides another chance to compare the finger with another sample of
the same trait. Using multi-sample biometric system improved the performance of the system by reducing the
False Reject Rate (FRR). Applying the original matching algorithm on the presented database produced 3
genuine users, and 5 imposters for the same fingerprint. While after implementing the suggested condition, the
system performance is enhanced by producing 6 genuine users, and 2 imposters for the same fingerprint. This
work was built and executed depending on a previous Matlab code presented by Zhi Li Wu. Thresholds and
Receiver Operating Characteristic (ROC) curves computed before and after implementing the suggested
multibiometric algorithm. Both ROC curves compared. A final decision and recommendations are provided
depending on the results obtained from this project
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
1. IMPLEMENTATION OF BIOMETRICS
BIOMETRIC VOTING SYSTEMS THROUGH COMPUTER NETWORKS
PRITHVIRAJ.A, VIGNESH.R
SASTRA UNIVERSITY
TANJORE.
Email:prithviinfos@gmail.com
ABSTRACT:
Biometrics is the technique of using unique, non
transferable, physical characteristics, such as fingerprints,
to gain entry for personal identification. Since after the
invention of the unique technology it has been being used
in security systems and authentication. Presently, security
fields have three different types of authentication, they
are:
Something we know: a password, PIN, or piece of
personal information
Something we have: a card key, smart card, or token and
Something we are: a BIOMETRIC
Biometric based computer networks and its access in
the internet are the techniques which are known little and
very rarely implemented. This paper deals with the
accessibility of biometrics in a practical application like
polling of votes-‘e-voting’ using a physical entity (finger
print) through computer network (internet).
INTRODUCTION:
Biometrics is best defined as measurable physiological
and or behavioral characteristics that can be utilized to
verify the identity of an individual. Initially, these
techniques were employed primarily in specialist high
security
applications; however we are now seeing their use and
proposed use in a much broader range of public facing
situations. Biometrics measure individual’s unique
physical or behavioral characteristics to recognize or
authenticate their identity. Common physical biometrics
includes fingerprints; hand or palm geometry; and retina,
iris, or facial characteristics .Of this class of biometrics,
technologies for fingerprint is the most developed.
Biometrics are not a future technology, they are a
current technology, with a bigger role in the future.
Biometrics will not to replace passwords, swipe cards, or
pin numbers etc, rather work with them in enhancing
security in a simple, reliable, and cost effective way. It
involves directly the human being for the identification or
verification. Traditionally many security systems employ
the verification technique rather than the identification
which is the main aim of biometrics. Biometrics as said
earlier uses the individual’s physical characteristics to do
its job like hand geometry, retina structure, palm size etc.
Biometrics involves different types of devices for that.
E.g., fingerprint scanner, iris reader etc. It makes use of
the genetic differences between the two persons which is
a universal truth. Every human being on the earth has a
unique identification and that are shown in their different
body organs. Biometrics picks up that particular
peculiarity to distinguish the two bodies, and that makes it
so strong.
PHYSICAL ENTITY IN BIOMETRICS:
Several physical entities are used in biometrics
They are: Iris, fingerprint, face recognition, voice
recognition, retina scan etc.comparision between these
entities are as followed:
IRIS
FACE RECOGNITION
FINGERPRINT
VOICE
RETINA .
COMPARISION BETWEEN VARIOUS BIOMETRIC
ENTITIES:
Characteristi
c
Fingerprint
s
Retina Iris Face Voice
Ease of Use High Low
Mediu
m
Medium High
Error
Dryness,
dirt, age
Glasses
Poor
Lightin
g
Lighting
, age,
glasses,
hair
Noise,
colds,
weather
Accuracy High
Very
High
Very
High
High High
User
acceptance
Medium
Mediu
m
Mediu
m
Medium High
Required
security
level
High High
Very
High
Medium Medium
Long-term
stability
High High High Medium Medium
2. BASED ON USAGE:
finger print
iris
retina
voice
palm
From the above details it is very clear that finger print is
the most EFFICIENT AND ACCURATE one.
FINGER PRINT:
Fingerprint looks at the patterns found on a fingertip.
There are a variety of approaches to fingerprint
verification. Some emulate the traditional police method
of matching minutiae; others use straight pattern-
matching devices; and still others are a bit more unique,
including things like moiréfringe patterns and ultrasonics.
Some verification approaches can detect when a live
finger is presented; some cannot.
Fingerprint verification may be a good choice
for in house systems where adequate explanation and
training can be provided to users and where the system is
operated within a controlled environment. It is not
surprising that the workstation access application area
seems to be based almost exclusively around fingerprints,
due to the relatively low cost, small size (easily integrated
into keyboards) and ease of integration
HOW DOES THE SYSTEM WORKS
Whilst individual biometric devices and systems have
their own operating methodology, there are some
generalizations one can make as to what typically happens
within a biometric systems implementation.
Obviously, before we can verify an individuals identity
via a biometric we must first capture a sample of the
chosen biometric. This ‘sample’ is referred to as a
biometric template and is the reference data against which
subsequent samples provided at verification time are
compared. A number of samples are usually captured
during enrolment (typically three) in order to arrive at a
truly representative template via an averaging process.
The template is then referenced against an identifier
(typically a PIN or card number if used in conjunction
with existing access control tokens) in order to recall it
ready for comparison with a live sample at the transaction
point. A poor quality template will often cause
considerable problems for the user, often resulting in a re-
enrolment. These methods of template collection is done
during the time of registering the person as a voter.
Template storage is an area of interest, particularly with
large scale applications which may accommodate many
thousands of individuals. The possible method is:
STORING THE TEMPLATE IN A CENTRAL
REPOSITORY DATABASE
This method is storing the template collected from the
voter in a separate database. . This may work well in a
secure networked environment where there is sufficient
operational speed for template retrieval to be invisible to
the user. However, we must bear in mind that with a large
number of readers working simultaneously there could be
significant data traffic, especially if users are impatient
and submit multiple verification attempts. The size of the
biometric template itself will have some impact on this,
with popular methodologies varying between 9 bytes and
1.5kb. Another aspect to consider is that if the network
fails, the system effectively stops unless there is some sort
of additional local storage. This may be possible to
implement with some devices, using the internal storage
for recent users and instructing the system to search the
central repository if the template cannot be found locally.
VERIFICATION OF THE TEMPLATE AND
ONLINE POLLING.
The verification process requires the user to claim an
identity by either entering a PIN or presenting a token,
and then verify this claim by providing a live biometric to
be compared against the claimed reference template.
There will be a resulting match or no match accordingly
(the parameters involved will be discussed later under
performance measures). A record of this transaction will
then be generated and stored, either locally within the
device or remotely via a network and host (or indeed
both).
With certain devices, you may allow the user a number of
attempts at verification before finally rejecting them if the
templates do not match.
At the time of election , the voter is advised to
login in to the official website of the election commission
3. where public voting takes place. He or she can login with
a particular ration id.no. after login the voter is adviced to
select the political party to which he wants to poll his
vote. After the selection the voter is asked to connect his
BIOMETRIC FINGERPRINT READER, once the reader
is connected the voter is asked to swipe his finger, it is
noted that the voter’s id correspond to his finger template
and he could swipe his finger only once. Once the finger
template is verified the vote is registered and the voter is
automatically directed out of the site.
PERFORMANCE MEASURES:
False accepts, false rejects, equal error rates,
enrolment and verification times - these are the typical
performance measures quoted by device vendors (how
they arrived at them is another matter). But what do they
really mean? Are these performance statistics actually
realized in real systems implementations? Can we accept
them with any degree of confidence?
False accept rates (FAR) indicate the likelihood
that an impostor may be falsely accepted by the system.
False reject rates (FRR) indicate the likelihood
that the genuine user may be rejected by the system. This
measure of template matching can often be manipulated
by the setting of a threshold, which will bias the device
towards one situation or the other. Hence one may bias
the device towards a larger number of false accepts but a
smaller number of false rejects (user friendly) or a larger
number of false rejects but a smaller number of false
accepts (user unfriendly), the two parameters being
mutually exclusive.
Somewhere between the extremes is the equal error point
where the two curves cross and which may represent a
more realistic measure of performance than either FAR or
FRR.
These measures are expressed in percentage (of
error transactions) terms, with an equal error rate of
somewhere around 0.1% being a typical figure. However,
the quoted figures for a given device may not be realized
in practice for a number of reasons. These will include
user discipline, familiarity with the device, user stress,
individual device condition, the user interface, speed of
response and other variables. We must remember that
vendor quoted statistics may be based upon limited tests
under controlled laboratory conditions, supplemented by
mathematical theory. They should only ever be viewed as
a rough guide and not relied upon for actual system
performance expectations.
This situation is not because vendors are trying
to mislead you (in most cases anyway) but because it is
almost impossible to give an accurate indication of how a
device will perform in a limitless variety of real world
conditions.
Similarly, actual enrolment times will depend
upon a number of variables inherent in your enrolment
procedure. Are the users pre-educated? Have they used
the device before? What information are you gathering?
Are you using custom software? How well trained is the
enrolling administrator? How many enrolment points will
you be operating? What other processes are involved?
And so on. The vendors cannot possibly understand these
variables for every system and their quoted figure will
again be based upon their own in house experiences under
controlled conditions.
Verification time is often misunderstood as vendors will
typically describe the average time taken for the actual
verification process, which will not typically include the
time taken to present the live sample or undertake other
processes such as the presentation of a token or keying of
a PIN. Consider also an average time for user error and
system response and it will be apparent that the end to end
verification transaction time will be nothing like the
quoted figure.
THE BLOCK DIAGRAM OF BIOMETRIC VOTING
SYSTEM IS AS FOLLOWS:
ACCURACY:
There are two parameters to judge the accuracy of the
biometrics system :false acceptance rate and false-
rejection rate. Both methods focus on the system's ability
to allow limited entry to authorized users. However, these
measures can vary significantly, depending on how you
adjust the sensitivity of the mechanism that matches the
biometric. For example, you can require a tighter match
between the measurements of hand geometry and the
STEP 7:IF
BOTH
MATHCES,
VOTE IS
SUCCESFULLY
POLLED
STEP.5:STORING
OF USER
TEMPLATE
TEMPERORILY
STEP 3:THE
VOTER’S
TEMPLATE IS
RETRIEVED
FROM
DATABASE .
STEP 1.
VOTER
LOGINS
USING HIS
ID.
STEP 2.a
TEMPLATE
DATAB ASE
OF VOTERS
STEP4:VOTER
INPUTS HIS
FINGER PRINT-
biometric
STEP
6:CHECKING
THE USER
TEMPLATE
STEP 8:DIRECTED
OUT OF WEBSITE
STEP.2b
PARTY
SELECTIO
N
4. user's template (increase the sensitivity). This will
probably decrease the false-acceptance rate, but at the
same time can increase the false-rejection rate. So be
careful to understand how vendors arrive at quoted values
of FAR and FRR.
Technology leaning toward the false reject protect any
unauthorized acceptance and hence become more widely
taken while in the case of false-acceptance sometimes an
unauthorized person may got the access permission which
may be dangerous. Hence based on these two variables
the accuracy of the installed technology is measured.
ADVANTAGES:
It is time efficient.
no proxy votes are polled
human power and money spent over elections could be
saved.
loss of lives at election riots could be prevented as the
system is safe and secure.
sick and handicapped could be benifitted.
votes polled by NRIs could be collected quickly
DISADVANTAGES:
It is difficult for the illiterate people to understand the
technology
the technology implemented is costly.
Maximum database security should be given for
prevention against ethical hacking.
.FAR (False acceptance rate) is probability by which
system can accept imposter as genuine individual.
.FRR (false rejection rate) is probability by which system
can reject a genuine individual.
COMPARISION BETWEEN USUAL VOTING AND
BIOMETRIC VOTING:
0
10
20
30
40
50
60
70
80
90
p c e t r
usual voting
biometric
voting
p-price ,c-cost ,e-efficiency ,t-time ,r-reach to people
OTHER APPLICATIONS OF BIOMETRICS:
Virtual Access:
For a long time, biometric-based network and computer
access were areas often discussed but rarely implemented.
Analysts see virtual access as the application that will
provide the critical mass to move biometrics for network
and computer access from the realm of science-fiction
devices to regular system components. passwords are
currently the most popular way to protect data on a
network. Biometrics, however, can increase a company's
ability to protect its data by implementing a more secure
key than a password. Using biometrics also allows a
hierarchical structure of data protection, making the data
even more secure: Passwords supply a minimal level of
access to network data; biometrics, the next level. You
can even layer biometric technologies to enhance security
levels.
E-Commerce:
E-commerce developers are exploring the use of
biometrics and smart cards to more accurately verify a
trading party's identity. For example, many banks are
interested in this combination to better authenticate
customers and ensure nonrepudiation of online banking,
trading, and purchasing transactions. Some are using
biometrics to obtain secure services over the telephone
through voice authentication. Developed by Nuance
Communications, voice authentication systems are
currently deployed nationwide by the Home Shopping
Network.
FUTURE OF BIOMETRICS
Although companies are using
biometrics for authentication in a variety of situations, the
industry is still evolving and emerging.
Standardization:
Standards are emerging to provide a common software
interface, to allow sharing of biometric templates, and to
permit effective comparison and evaluation of different
biometric technologies.
The BioAPI standard released at
the conference, defines a common method for interfacing
with a given biometric application. BioAPI is an open-
systems standard developed by a consortium of more than
60 vendors and government agencies. Written in C, it
consists of a set of function calls to perform basic actions
common to all biometric technologies, such as
*enroll user,
*verifyassertedidentity(authentication),and
* discover identity.
Another draft standard is the Common Biometric
Exchange File Format, which defines a common means of
exchanging and storing templates collected from a variety
of biometric devices.
Hybrid Technology:
One of the more interesting uses of biometrics involves
combining biometrics with smart cards and public-key
infrastructure (PKI). Vendors enhance security by placing
more biometric functions directly on the smart card. Some
vendors have built a fingerprint sensor directly into the
smart card reader, which in turn passes the biometric to
the smart card for verification. PKI uses public- and
5. private-key cryptography for user identification and
authentication. It is mathematically more secure, and it
can be used across the Internet.
CONCLUSION
At its infancy, current biometric
technology is still considered immature to completely
replace password and other authentication schemes.
Security wise, biometric technology shows vulnerabilities
that can be easily exploited for wrongful purposes.
Biometrics itself is by nature complicated and
distinctively secured to each unique identity. Hence, to
achieve higher security performance, the design of
biometric system should take into consideration the
possible vulnerabilities of the processes and algorithms of
the system for the whole life cycle, namely data
collection, data transmission, storage, templates
comparison and susceptibility of the system to physical
human attack.
Another challenge confronting biometrics is the fact
that people are not ready to accept the technology in its
entirety. Due to the far-reaching impact of biometric data
misuse, any irresponsible use of the technology could be
destructive to the society and would certainly compromise
the privacy rights of people. Thus, regulations are needed
to control and manage the implementation of biometrics.
3-factors authentication, microchip implantation and
DNA profiling are among the many that deserve attention.
Although the challenges confronting
biometrics are many, none of these is going to stop the
progress of biometrics being used as authentication and
identification tools. This is not the time to argue whether
biometrics should be used widely or not in the future.
6. private-key cryptography for user identification and
authentication. It is mathematically more secure, and it
can be used across the Internet.
CONCLUSION
At its infancy, current biometric
technology is still considered immature to completely
replace password and other authentication schemes.
Security wise, biometric technology shows vulnerabilities
that can be easily exploited for wrongful purposes.
Biometrics itself is by nature complicated and
distinctively secured to each unique identity. Hence, to
achieve higher security performance, the design of
biometric system should take into consideration the
possible vulnerabilities of the processes and algorithms of
the system for the whole life cycle, namely data
collection, data transmission, storage, templates
comparison and susceptibility of the system to physical
human attack.
Another challenge confronting biometrics is the fact
that people are not ready to accept the technology in its
entirety. Due to the far-reaching impact of biometric data
misuse, any irresponsible use of the technology could be
destructive to the society and would certainly compromise
the privacy rights of people. Thus, regulations are needed
to control and manage the implementation of biometrics.
3-factors authentication, microchip implantation and
DNA profiling are among the many that deserve attention.
Although the challenges confronting
biometrics are many, none of these is going to stop the
progress of biometrics being used as authentication and
identification tools. This is not the time to argue whether
biometrics should be used widely or not in the future.