A beginner's guide by Sean Taylor, Manager for Iris Recognition Products at Panasonic UK Ltd
Over the next few months we will look at the evolving market that is biometrics and review some of the leading technologies in this market place. Biometrics is a relatively new area in the field of security and we will uncover some of the market statistics for this ever growing market sector, and also highlight the importance this technology has to play in providing secure and accurate methods of recognising an individual.

Also, through this secure recognition process we can show some of the key applications that are using this technology and hopefully give an insight into the potential of this technology, and the advantages it can offer both the customer and installer alike.

What is biometrics
The term biometrics, as we understand it today, refers to the automated identification of an individual, based on their behavioural characteristics. Sounds very complicated. However, to simplify, a biometric system is essentially a device that recognises a given pattern, and from this recognition makes a personal identification by confirming the specific physical or behavioural characteristic of that individual.

We can ask ourselves the philosophical question, "Am I really an individual?" Well fortunately for the world of biometrics the answer is a resounding "yes"! Biometric technology has developed over a number of years to provide us with the capabilities of uniquely identifying an individual based upon pre-measured characteristics.

There are two methods to confirm a person's identity. One is identification: This is a method of establishing a person's identity without having any additional information (Who am I?).

The other method is Verification: This involves confirming the identity of a person's claimed identity (Am I who I say I am?).

Each of these methods have their own complexities and biometric systems usually use either one or both of these methods to facilitate the recognition of an individual.

As biometrics is a fairly generic term covering a wide range of human physiological and behavioural characteristics, technology vendors have produced varied solutions to measure these characteristics. Most biometric technologies measure relatively stable aspects of the human body e.g. hand geometry, fingerprint, DNA or iris recognition. However, other technologies rely on dynamic characteristics, such as the process of writing a signature or typing a password.

How Biometrics Work
Biometric technology uses a previously captured measurement and compares it to a new measure-ment from an individual. The previously captured measurement provides the system with a reference point and this information is usually captured during an enrolment process. However, some biometric systems, are capable of providing reference points based upon information devised from photography, such as facial recognition systems. The enrolled information may be processed and this data is then stored. Therefore, at a subsequent time, the individual may present the same characteristic for comparison against the stored data. As outlined previously, if the particular biometric is being used for identification (Who am I), the whole database will be searched or, if the system is being used to verify an individual's identity, a singular or likely match will be performed.

As biometric technology provides a unique physical identification of an individual, the use of biometric technology is far reaching and does not only provide benefits to the security industry but also to e-commerce, banking and data protection. However, the primary objectives for the use of the technology could be as follows: Identifying an individual who:

  • Conducted a particular transaction
  • Accessed information or processed data
  • Was in a particular location at a given time

Verifying and individual who:

  • Requires access to a building or location
  • Requires access to data
  • Requires permission to undertake a transaction

Biometric Technologies
Now we have briefly discussed what biometrics are, and how they work we can take a look at biometric technologies that are used today. The next section will provide an overview of this evolving market. However, this list is not exhaustive and is intended to provide a brief explanation of the technology available today. We will revisit this area at a later date and provide some deeper understanding of the use and applications of the products.

Using biometrics as a security tool does provide some additional benefits to both the user and the implementer. Biometrics essentially turn the individual into the key. Therefore, the biometric cannot be forgotten, stolen, forged or lost and can also provide significant cost savings by eliminating the need for cards and tokens. However, some systems architecture do use a combination of biometrics and tokens to further increase the security level and create one to one matching environments.

Iris Recognition
Iris identification uses a high-resolution camera to take a picture of the eye. It does not require physical contact and works from a comfortable distance away. Once the picture has been taken, the iris pattern is processed and encoded by the software into a 512-byte IrisCode® record, which is immediately encrypted and cannot be reverse-engineered.

In the mid 1990s, Dr John Daugman OBE of Cambridge University developed and patented the iris recognition algorithms now owned by Iridian Technologies, which form the basis of the products being produced and designed by Panasonic.

Fingerprint Matching
Fingerprint based identification is considered to be the oldest method of Biometric identification and has been used in numerous and wide ranging applications. Fingerprints are a unique physical trade of an individual made up of a series of ridges and furrows covering the surface of the finger. The unique traits of a fingerprint are derived by determining the pattern of furrows, ridges and minutiae points.

The acquisition of the fingerprint is key to the successful use of this biometric and can offer wide and varied applications for the technology from access control to PC desktop security. Fingerprint acquisition devices are fairly common place in the biometrics market sector and have seen success in many applications. The technologies in use today include optical, silicon and ultrasound acquisition devises.

Hand Geometry
Hand geometry uses the geometric shape of the hand to establish the user's authenticity.

Unlike some other biometric technologies, the hand, although a physical characteristic of the human body, is generally not considered to be unique. However, the use of hand geometry does provide a stable biometric for verification of an individual. This technique uses the finger length, thickness and curvature to verify a person's identity.

The acquisition process for Hand Geometry usually involves the user placing their hand palm- down on a flat surface. Guidance is given by locating pegs and the image is captured using a camera. From this image it is possible to extract features based upon widths and lengths of fingers at various locations.

Facial Recognition
Facial recognition is a method used to analyse the unique characteristics of a person's face. The usual capture method is via a digital video camera. However, photographic images can produce similar results.

Facial recognition measures the structure of the face, including distance between eyes, mouth, nose etc. This technology has been used for varying applications and provides a tool for verifying individuals or assisting in the verification against predetermined characteristics.

Voice Recognition
Speech Recognition is a biometric that combines both physiological and behavioural aspects to provide recognition. The main physiological aspect of human speech is the vocal tract shape. As it's rather too heavy to get into the medical definitions and physical components of the vocal tract, we can summarise that the vocal tract can modify sound waves as they pass through it, thereby, producing speech.

Voice recognition is often deployed in environments where the voice is already captured, such as telephony. Using voice recognition as a biometric authentication technology is well suited to a number of applications where other biometrics would be difficult or expensive to use.

Dynamic Signature Verification
Dynamic Signature Verification does not rely on a physical human characteristic for recognition but relies on a process for verifying an individual hand written signature. This technology uses behavioural biometrics to confirm the identity of the user. This recognition is achieved by analysing the shape, speed, and pressure of the user when the signature is written.

As signatures are already accepted as a common method of verification, this technology provides a simple leap into biometrics with minimal disruption to the user.

And to follow …
We have now outlined the basics of Biometrics and briefly covered some of the key technologies in the current marketplace. In the next edition we will further investigate the technologies in detail and consider the applications for this technology and what the future holds for biometrics.

In addition, we will take a look at design consid-eration when developing biometric solutions and why this technology is providing increased levels of security and a host of benefits to users.

The ‘future’ today

Open your eyes!
BT Northern Ireland approached CEM Systems with an unusual security request. BT needed to provide a highly secure environment for its e-Solutions Data Centre in Belfast. As this area hosts IT solutions to local businesses, including internet and e-commerce, an extremely resilient system was required to protect access to this sensitive information. With the CEM AC2000 system already controlling access to all BT offices and exchanges throughout Northern Ireland, CEM worked in partnership with the customer to evaluate all available biometric technologies that met their needs. BT chose an iris recognition system to integrate into the existing AC2000 system, thus giving a double layer of security. Biometric clocking terminal launched
York-based mitrefinch has unveiled its latest innovation in clocking terminals – a new biometric terminal which provides a stylish, robust unit that doubles the security and safety of clocking information.

Misuse of clocking systems can be virtually eliminated with the use of this terminal, claims Mitrefinch, because it uses fingerprint technology to combat fraud. Fingerprint information of all users is recorded on each card. Users clock in with their card first, and verify details with their fingerprint. Alternatively, the terminal can operate without the need for cards as Mitrefinch introduces the option to record clocking information directly from fingerprint recognition alone. Fingerprints are never stored – the system makes use of mathematical algorithm templates to protect individual privacy. Only accessible to 12 people
The handkey II biometric reader from IR Recognition Systems is providing access to a private library and museum at the New York Weill Cornell Medical Centre – so secure that it is only accessible to 12 people!

The Handkey II positively authenticates the doctors, support staff and museum manager by the shapes and sizes of their hands – not keys, cards or codes. “It was imperative that access be secured because of the value of our library and the museum’s contents,” explained director of security Ben Scaglione. Thanks to DAD
Fingerprint cards of Gothenburg is joining the Texas Instruments digital signal processing (DSP) third party network. This chip-based system will bring a simple and cost-effective user authentication solution to the global networks of developers who want to include security capabilities in their portable electronic communications devices. Fingerprint Cards’ software is the Distinct Area Detection (DAD) Algorithm. Through TI’s third party network the two companies will be able to offer co-ordinated support in the implementation of embedded fingerprint authentication.