Biometrics – Pointing A Finger Towards The World Essay Example
Biometrics – Pointing A Finger Towards The World Essay Example

Biometrics – Pointing A Finger Towards The World Essay Example

Available Only on StudyHippo
  • Pages: 8 (2101 words)
  • Published: April 18, 2017
  • Type: Case Study
View Entire Sample
Text preview

Gone are the days when adventure only required getting past a tough-looking security guard. Spies no longer rely on signature forging, wigs, or black gloves and stockings to obtain their objectives. Instead, the thrill lies in outwitting computers by forging fingerprints and creating realistic masks like Mrs. ?>

Thanks to the revolutionary security system known as biometrics, Doubtfire's previous methods of disguise are now rendered useless. Biometrics utilizes sensor devices to capture digital representations of an individual's distinct physical characteristics. These attributes may include a person's fingerprints, iris or retina patterns, hand shape and vein configuration, vocal patterns, and even their signature style. Once captured, a sophisticated computer generates digital representations of the captured characteristics and measures them based on unique features that identify each individual.

Bi

...

ometric data is gathered and converted into a template using a certain algorithm. These templates are then saved in a secure central file, which can only be accessed if it is necessary to verify identity. In order to pass the security check, an individual must provide their body part, voice, or signature by using sensor devices that will convert their biometric data into new templates. These new templates will then be compared to the template in the centralized database to authenticate the subject's identity.

If a match is found, then it is confirmed that the person attempting to enter the secure room or obtain protected information is indeed authorized to do so. Due to the irreversible algorithmic transformation, it is impossible for anyone to duplicate biometric data solely by accessing the template in the central database. This ensures that no one can create another template by using patterns already present i

View entire sample
Join StudyHippo to see entire essay

the database, as evidenced by how Charlie's Angels had to resort to alternative methods for obtaining fingerprints and iris scans instead of tampering with central security systems. To further hinder criminal activity, templates are sometimes stored on chip cards instead of in a central database.

The security system can verify the legitimacy of the user by presenting the chipcard and body part, eliminating the need for passwords. It is no longer necessary to remember pin codes that can be forgotten or stolen. Fingerprinting is considered the "bedrock forensic identifier of the 20th century" by scientists and remains a unique identifier throughout adulthood, unlike shoe size which can change with amputations.

It is during the 17th week in the womb that fingerprints begin to form, becoming a lifelong marker. The permanence of fingerprints has been relied upon heavily in both scientific and legal fields. Fingerprint biometric security systems are preferable due to their speed and ease of use.

Recent experiments have cast doubt on the assumption that fingerprints are unchanging, as up to 12% of the population may have fingerprints that are worn, chemically altered, or difficult to scan (Hawkins, 2002, p. 0). Despite this, fingerprint scanning is already being used for welfare benefit distribution in several California counties and for accessing social benefits in Spain through social security card verification and fingerprint scanning. Alternatively, iris scanning technology can use up to 260 unique characteristics on the iris such as furrows, striations, pits, collagenous fibers, filaments, crypts (dark areas), vasculature, rings, and freckles.

Biometric systems that use unique characteristics for identification are highly preferred because they require no interaction with a machine. The iris, with its small but distinct characteristics,

is six times more credible than fingerprints. Additionally, the blood vessel patterns in the retina are also unique enough for biometrics, and the eye's automatic alignment when focusing makes it easier for cameras to capture images.

It is possible to capture pictures of the eye up to 12 inches away from a camera. Nevertheless, comparing template records can be slow and take about 10 seconds for processing. Eye Ticket, a biometrics firm, has tested its iris technology at Frankfurt and Charlotte/Douglas airports. It was also the preferred system during the 2000 Olympics in Sydney, Australia.

Virgin Atlantic and British Airways frequent fliers are utilizing iris scanning in order to expedite customs and immigration processing at Heathrow. This biometric system was obtained through their membership in the iris program. A similar process is employed at Schipol Airport in Amsterdam for members of the Privium Club, airport police, and immigration services who use iris scans.

Facial biometrics offer the benefit of being able to capture images from greater distances through video cameras. Similar to other biometric systems, developers are currently facing the challenge of creating larger databases. In addition, multimedia video technology and software must be developed to meet the demands of facial recognition systems. Over 100 casinos in the U.S. alone were implementing facial recognition as early as 2004.

In February 2004, during Super Bowl XXXV, Be Vocal Voice biometrics was used by authorities to help screen felons from the large audience of 10,000 football fans. This biometric system utilizes the speech of an individual to obtain necessary data. However, despite being a developing technology, it faces several challenges such as performing poorly in certain backgrounds, channel noise, extreme hoarseness,

fatigue and vocal stress.

Although biometrics cannot identify the specific words spoken by an individual, Banco Santander International in Canada has addressed this issue through the implementation of voice biometrics or diaphonics. This allows customers and employees to reset their passwords via phone with ease. The decision was made due to the requirement for call recording on their VOIP network and to provide a simpler password resetting process for staff members, as explained by Agustin Abalo, Senior Vice-President of the biometrics department.

Com (2006) explains that hand geometry biometrics entails placing one's palm on a metal surface scanner fitted with guidance pegs to generate a template of the hand's attributes. It takes approximately 5 seconds to verify the user's identity. Nonetheless, this biometric approach has a drawback since the human hand is less distinctive than fingerprints or iris scans and may not possess adequate unique characteristics for identification purposes.

Combining this system with other biometric systems is recommended as it cannot distinguish the vitality of a hand and can be deceived by a fake hand applying controlled pressure. Despite this limitation, the system is currently being utilized by the U.

The S. Federal Bureau of Prisons requires hand scanning for all individuals who enter their premises, including prisoners, staff, and visitors. The information gathered is stored in a database and each person is given a magnetic swipe card that must be carried at all times. This card is essential for inmates to access facilities like the cafeteria.

Dynamic Signature Verification (DSV) is a biometric approach that concentrates on the signing process rather than the end outcome of signatures. DSV examines factors such as signing speed, flow, pressure, and lift

frequency to detect any disparities in signature writing even if a forger can duplicate an image of the signature with exactness. Widely used in banks, DSV is deemed practical since it reduces expenses related to administration costs, paper usage, authentication time.

The terrorist attack by Al Qaida, commonly referred to as 9/11, acted as a wake-up call for both the US and UK governments to prioritize improving security systems. The impact of seeing a real airplane crash into the World Trade Center was far greater than anything depicted in spy movies. In response to this threat, David Blunkett, then Home Secretary of the UK, suggested issuing national identity cards to all residents.

The Home Office's Strategic Action Plan for the National Identity Scheme, released in December 2006, asserts that incorporating biometrics into cards can aid in deterring terrorists, managing identity fraud, and addressing the issue of illegal immigration. The primary objective of the scheme is to securely manage personal identity data for individuals who legally reside or work within the UK. Biometric implementations are viewed as a promising solution to persistent issues like credit card fraud and illegal immigration since they offer a more secure means of authenticating residents compared to passwords or pin numbers. By requiring biometric authentication on new identity cards, impersonators will find it increasingly difficult to commit petty crimes; thereby reducing their chances of success.

The Home Office is currently seeking a biometric system that aligns with their objectives. At present, the National ID is leaning towards utilizing fingerprint biometrics, although there are instances where fingerprints may not be scannable due to hand trauma or abuse. There is also the concern that terrorists could

intentionally damage their fingerprints to avoid detection.

S. is enhancing its visa processing security measures by developing a biometrics system. This system uses finger scans, which Homeland Security believes will speed up the processing of travelers while making it difficult for terrorists to fake their biographical information. The use of biometrics is expected to reduce cases of fraud and theft of passports by eliminating the possibility of falsifying travel documents. This move by the American authorities aims to address and prevent fraudulent activities in travel-related documentation.

Although biometrics have potential advantages for national security, there are apprehensions regarding the decrease in immigration security and concentration of delicate data. The utilization of biometrics can also generate privacy and security concerns since a single agency holds all confidential information. This could simplify the process for impostors, lawbreakers, and terrorists to manipulate these records. The development of the "I Love You" virus by students from the Philippines in May 2000 emphasizes this vulnerability as it was capable of disrupting international web infrastructure and significantly affecting establishments such as the American State Department and CIA.

Not only were major companies like Ford and Time-Warner affected, but terrorists could potentially replicate the actions of student hackers utilizing biometrics. Biometrics is continuously evolving and expanding to address diverse issues to promote a healthier world. It is currently improving business systems in areas such as sales, marketing, and auditing. The possibilities for this science and technology are still vast. Additionally, biometrics holds great potential in the field of online marketing, providing more precise data on customer behavior than current methods such as credit cards, log-in passwords, and cookies.

Tracking website visitors for specific products can

be difficult on shared computers. To address this, marketers and scientists are collaborating to develop a biometric device, like a biometric mouse with fingerprint scanning capabilities, to identify the user surfing the web. By targeting promotions and ads to solely those who show interest, marketers can save money and understand their clients better. However, biometrics may compromise online personal privacy. One solution to this concern is involving trusted third-party organizations.

In order to maintain customer privacy, marketers are only able to observe customer behavior and needs, while a trusted third party keeps their identities confidential. Meanwhile, the Illinois Department of Revenue (IDOR) auditors must physically visit the companies being audited - which could be far away from IDOR - in order to access their databases. If information is needed from the database, the auditor must call their office and arrange for it to be sent by mail or messenger.

The installation of a speaker-verification system by IDOR in 1994 allowed auditors to quickly access their computer network by voice-verification over a telephone line, resulting in faster processing times. This system is still in use today and the process typically takes ten days.

The Home Shopping Network (HSN), a global business, urges customers to shop with them and has implemented voice biometric technology to replace touch-tone procedures when dealing with phone orders. The traditional touch-tone method is only accessible to 70% of the market, whereas voice biometrics can identify customers based on their phone numbers. The new system enables new customers to be directed to operators while regulars are immediately identified.

The field of biometrics is promising in terms of securing homes, bank accounts, and national security. However,

privacy issues and proper implementation to prevent misuse and abuse must be thoroughly discussed, especially since high technology and cost are involved. Biometrics has the potential to enhance global security, but coordination among nations is crucial in deciding which biometric system is feasible for all immigration procedures in order to better address terrorism concerns.

International cooperation has the potential to result in a fresh form of internet marketing, which can offer smaller economies an edge in worldwide commerce. Biometric technology is not limited only to security systems, but has expanded to finance, auditing and internet usage, resulting in safer and more interactive global environment. Despite concerns regarding privacy issues, there are numerous commercial advantages that businesses can leverage from this rapidly evolving technological trend. Therefore, it is imperative not to discard biometrics altogether.

The latest technology poses challenges, as reported by BBC News, but solutions can be developed to meet society's biometric needs with the help of a growing number of specialists.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New