Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Introduction

Technological issues and the desire to ensure that processes being carried out by individuals and corporate are performed efficiently have resulted in the increase in the use of automated systems. This means that an increased number of individuals have opted to use these systems to perform their tasks. The need to have adequate security in these systems in order to ensure that personal information and data is kept safe within the system has also increased. This has brought up the need to ensure that any person accessing the system is identified before access to the system is granted.

The security techniques that have been developed over the years involve the use of a database where information about all the members allowed to access the system is stored (Bishop, 2010, p. 120). When a user wants to access the system, he/she provides some information to the system. This is compared to the information that is stored in the database. In case of a match, the user is granted access. When the information provided does not match any data contained in the database, access is denied. Over the years, passwords have been used as a security technique to access systems. This meant that the users have to remember these passwords. With the technological advancement, this technique has been made easier by the use of tokens.

The authentication process that is available can be divided into three main categories. The first of these categories is referred to as knowledge based method. In this category, only the person who is allowed to access the system knows the authentication. This is mainly through the use of personal identification numbers or an answer to a secret question. The method that involves the use of passwords falls in this category. The second category is referred to as possession based method. In this case, the person who is allowed to access the system possesses the authentication. The authentication may be in the form of a smart card, a token or even a key (Grembi, 2008, p. 154). All these are tangible accessories and have to be carried by the individual to enable him/her to access the system that requires them for authentication.

The third category is the physiology based method. This is also referred to as behavior based. In this case, only the person allowed to access the system is the authenticator. This category uses the traits of the person. Biometrics can be categorized here. From these three categories, it is clear that for the knowledge based and possession based categories, the person has either to remember the authenticator or carry it. This is problematic as the person may forget to carry the authenticator or fail to remember it in case it is a password. The drawbacks of these techniques resulted in the need to come up with a way to counter these shortcomings. Biometrics offered a good alternative since the person just needed to be there and does not require the need to carry any component or keep a memory of the personal identification number.

Biometrics is an automated system that uses the traits of individuals for their identification (Wayman, Jain, Maoltoni, & Maio, 2005, p. 25). This technique uses various aspects of the human body to identify the validity of the request to gain access to a system. The various techniques that may be used include fingerprint recognition, face recognition, the use of a persons iris to identify him/her, vein pattern recognition, DNA recognition, voice recognition and the key stroke pattern recognition (Woodward, Orlans, & Higgins, 2003, p. 56). These are not the only biometric techniques used as the advancement in technology has resulted in the development of new biometric techniques. For the biometric system to work, information is first obtained from the individuals and stored in a database from where comparisons will be made when a user requests for access. Therefore, biometrics is based on the fact that there are distinct characteristics between all human beings. The fact that these characteristics are permanent also means that the technique can be used for a long time without the need for changes. Some of the used techniques in biometrics are illustrated below (Nalini & Bolle, 2004, p. 154).

Fingerprint, iris, DNA and keyboard stroke recognition techniques
Figure 1: Fingerprint, iris, DNA and keyboard stroke recognition techniques

The main objectives of this paper will be to examine how biometric authentication technology is beginning to transform the user authentication process. It also touches on the problems that will be encountered due to the implementation of this technology. Also of importance will the analysis of the advantages and the drawbacks of using this technology in the user authentication process. Finally, the current practice of the biometric authentication process in the UK will be examined.

Literature Review

Biometrics is a term that is obtained from two Greek words. These are bio which means life and metrics which means to measure. The biometric system is composed of various components. The components include sensors, signal processing units and algorithms, data storage devices, matching algorithms and a decision process (Reid, 2003, p. 111). The sensor is a component that is used to obtain analog data from the users of the system. This data is continuous and varies with time. It then converts the data into a digital form. This ensures that the data is in a form that can be interpreted by the computer. The signal processing units and algorithms are used to carry out the processing of the digital signal that is obtained from the sensor (Nalwa, 1997). The signal is converted to the required format for storage at this stage.

Signal conditioning and enhancement is also performed at this stage. The data storage unit serves the purpose of storing the processed signal. The stored data will be used as a reference during the identification process. The other component of this system is the matching algorithms. This refer to the guidelines that are followed during the comparison between the data that is stored in memory and the new data that has been acquired from the user. Once the matching process has been completed, the decision process follows (Chirillo, 2003, p. 136). In this process the decision to allow or deny access is made. If the provided details match the data that is stored in memory, then access is granted, otherwise it is denied.

The advancement in technology has aided in ensuring that the ideas which were only put on paper many years ago are implemented. Biometrics is also one of the ideas. In situations where implementation was conducted, the implemented process was not automated. For example, the use of the identification cards where identification was through looking at the image on the identification card. Comparison between this image and the card holder was then done. This method was ineffective since a person may be subjected to changes in his/her physical appearance and therefore making it difficult to for identification to be performed. The discovery of computers and the processing capabilities that come with them meant that the automation of the biometric techniques could finally be achieved. The fingerprint method was the first biometric technique to be used (Miller, 1994). It was initially used to identify criminals. These included those in custody and those arrested after committing crimes. This enabled the law enforcing agencies to be able to keep the records of the crimes committed by a particular individual.

The next technique that followed after the fingerprint technique was the proposal by Frank Burch, an ophthalmologist, to use the iris pattern in the identification of individuals (Lakhmi, 1999, p. 235). This was in 1936. This idea did not come to fruition at that time due to the limitations in terms of technology at the time. In the 1960s face recognition came into play. At this time, the technique was not fully automated and required the assistance of another person to look at the facial features of the person requesting access. The process used the position of various facial features and compared these positions to identify a person. Technological advancements finally ensured that these biometric processes are automated and more biometric identification techniques are identified. Some of the biometric techniques that are used are discussed below.

Face recognition

This technique was used over the years but it was not automated (Phillips, Rauss, & Der, 1997). The advancement in technology enabled its automation and at the moment it runs independently without the supervision by another individual. The main techniques that are used in this process include a feature based technique which is also referred to as the geometric technique. The other technique is the view base technique also referred to as the photometric technique. The technique that was initially used for facial recognition was a two dimensional method (Adini, Moses, & Ullman, 1997). However, this technique had limitations and efforts were made to ensure that a three dimensional recognition system was developed. This is because a 3D system is more accurate.

Principal components analysis (PCA) is the technique that is mostly used in face recognition systems (Nanavati, 2002, p. 15). It is where the image of the face is acquired. The analysis of different parts of the face is then done. During this analysis, emphasis is made on the distance between different parts in the face. The results of this analysis is then stored as a weighted sum in the systems memory. Every time a person request to access the system, his/her entire face is scanned (Chellappa, Phillips, & Rosenfeld, 2003). This is important since the system will do the analysis of the image that is obtained then compare it with the data that was stored in memory previously. Other techniques that are implemented in the facial recognition technique include the Elastic Bunch Graph Matching (EBGM) and the Linear Discriminant Analysis (LDA) (Nanavati, 2002, p. 22).

Hand geometry recognition

The hand geometry method is mainly used since it is easy to use. Its implementation process is not complicated compared to other biometric techniques. The acceptability of the technique also makes its implementation easy. The first implementation of this technique was done in the late 1980s and it has been used since then. The system involves taking various measurements of the geometry of the hand. These include its length, its width, its thickness and also calculation of the surface area of the hand. This information is stored in the systems main database for comparison to be performed during the matching process. A silhouette image of the hand is obtained by the use of a special camera (Ashbourn, 2000, p. 156).

The image is then processed to obtain the details that are required for authentication. The camera has charge coupled devices that are inbuilt. These assist it in the capturing of the image. An angled mirror is also incorporated in the system to ensure that the sides of the hand are also captured. This is important as the mirror will ensure that the width of the hand is also captured. Once all the necessary data has been collected, comparison with the data stored in the database is conducted. This is during the decision process and appropriate action is taken. The memory requirement for this method is small as only 9 bytes are stored in the memory for the purposes of comparisons.

Iris recognition

The pattern of the iris for every individual is unique. This feature led to the inclusion of the iris as one of the biometric techniques for the purposes of authentication. The iris controls the amount of light entering the pupil through the contraction or the expansion of its muscles (Dougman, 2004). The muscles of the iris are the ones that form the unique pattern that is used for the identification process. A digital camera is used to obtain the image of the iris to mark the start of the authentication process. The quality of the image captured by this camera needs to be very high. Care should also be taken to ensure that the eye lashes and the surrounding of the eye is not captured as this may act as noise and affect the recognition process. To achieve a high quality image during the capturing process, some cameras employ additional illumination.

The cameras megapixels are high enough and the only factor that may prevent them from obtaining the required image quality is the lack of enough illumination. The most common form is the illumination by the use of infrared light. This form of light does not harm the person but only serves to provide illumination so that the image quality can be increased. Once the image is taken, it is filtered using Gabor filters (Deravi, 2008). These are high pass filters that are tuned to a specific frequency. The image is then developed and stored in form of vectors. The obtained vectors do not change and are not affected by physical parameters such as illumination (Huang, Luo, & Chen, 2002). These vectors are stored and when matching needs to be done during the recognition process, comparison is made between the calculated vectors and those that are stored in memory.

Voice recognition

In this technique, the voice is used to recognize the user. This is achieved by focus being made on the features of the voice that are affected by both the behavior of a person and the vocal tract of the individual (Campbell, 1997). This technique relies on other factors other than the way words are pronounced. A combination of the jaw movement, how the tongue is moved and the path through which air flows from the soft tissues in the vocal determine the voice that will be produced. These features result in the variations of the voice that is produced. The main technique that is used in the speech recognition process is where there is a preset phrase that is stored in memory (Ryan, 2009). The user requesting to be granted access is then required to pronounce this phrase. Once the pronounced phrase is captured, analysis is done to convert it to the required format. Comparison is then made between the obtained value and those that are saved in memory.

This is during the matching process. Another technique that is used in voice recognition does not use a pre-stored phrase. The user requesting access is prompted to say a word and the system performs the verification process. However, this requires the use of more complicated systems to ensure its efficiency and effectiveness. The characteristics of the voice that are compared may include the quality of the speech, the duration of the voice, the intensity of the voice and also its pitch (Jain, Ross, & Prabhakar, 2004). This system incorporates a microphone which captures the voice input inform of an analog signal and converts it to a digital form. This is the form that the computer can be able to understand and therefore analyze the data.

Key stroke pattern recognition

This involves the monitoring of how an individual inputs data to the system through the use of a keyboard (Monrose & Rubin, 2009). It is achieved by trying to recognize the habit of a person while inputting data through the keyboard. The aspects of the input that are measured include the speed with which the person types. This may be measured by the number of words the person inputs per minute. The precision of his/her typing and also the typing rhythm of the person may also be used for analysis. Therefore, this technique becomes effective when the data to be input is considerably long. This ensures that the characteristics mentioned above are able to be monitored. Short inputs may result in premature analysis resulting in the decision process being erroneous. The requirement of this system is a keyboard and monitoring software that is programmed to analyze the keystrokes from an individual (Bartmann, 2006).

Fingerprint recognition

This is a biometric technique that has been used for the longest time compared to the other techniques (Ratha, Cornell, & Bolle, 2006). Its automation was the first to be done as a considerable amount of research has been done on it. Various forms of research have been conducted to determine the uniqueness of the fingerprint and this resulted in the development of the fingerprint minutiae as a method of authentication. The fingerprint is composed of patterns of ridges which form on the surface of the finger. Research that was carried out indicated that these patterns are unique for every individual (Parziale, 2008). The identification process involves the use of discontinuities in the patterns of these ridges. The division of the ridges is also used to aid in the identification process. The discontinuities of the ridges are referred to as minutiae. The minutiae are extracted from the finger during the authentication process to be able to identify their orientation, their types and also their location. These are the features that make the fingerprint unique for every particular individual. The combination of all these features cannot be the same for two individuals as research has shown.

Initial research about the fingerprint recognition technique was conducted by Galton who identified the features that can be used to aid in the identification process (Galton, 1892). However, at the time the technology that was present meant that his ideas could not be implemented fully. With the advancement in technology, this has been made possible. The technological changes have also contributed to the identification of additional features that are used to make fingerprint identification technique more secure. Research has resulted in the identification of more unique features in the fingerprint. However, all these features are not incorporated in the recognition technique. The main minutiae types that are used in the identification process include the bifurcation and the points where ridges end. Bifurcations refer to the points where the ridges split and become two while the ridge ends refers to the points where the ridges terminate (Lin, Yifei, & Jain, 1998).

The importance of the ridges in this recognition technique means that their quality once the image of the fingerprint has been taken is of great importance. This is because their quality will ensure that the processing of the image and the matching stage will be done without encountering errors. However, the quality of the ridges that is obtained from the image is not always to the required standards. This may be attributed to the corruption of their clarity by noise that may have affected their quality (Pankanti, Prabhakar, & Jain, 2002). In such cases, the image that is obtained needs to be enhanced to ensure that the quality that is required is achieved. This process is done before the identification process is conducted. Different techniques may be employed to ensure that the enhancement of these images is conducted to obtain the quality that is required for identification. The main methods that are used include the use of Gabor filters and the directional Fourier filtering (Hong & Jain, 1998).

The first step in the technique is the normalization of the ridges. This is then followed by the estimation of their orientation and their frequency. Finally, filtering is conducted to ensure that the fingerprint image is enhanced. The normalization process in fingerprint enhancement aims to change the images mean and variance to attain the recommended values (Delak & Grgic, 2004). It also ensures that variations due to factors such as uneven contact between the finger surface and the capturing device when the fingerprint image is being obtained are taken care of. Also of concern is the uneven distribution of the finger print ink. This deficiency is also corrected by the normalization process. The frequency selectivity and the orientation of the fingerprint are enhanced through the use of the Gabor filters. These filters are band pass filters that are tuned such that their selectivity is very high (Moenssens, 1971). Their tuning is set to the required values and this enables them to enhance the image according to these values.

The other technique that may be used in the fingerprint enhancement process is the directional Fourier filtering. This technique has the advantage of cost when compared to the use of Gabor filters. The cost of using the technique is lower. In this method, the orientation of the fingerprint image is calculated. This is by the use of 16 directions in which the image is oriented during the calculation process (Weaver, 2006). The fingerprint image is rotated through these directions while obtaining information about the projection of the ridges after every rotation. The variances of these projections are also obtained during the process. The projection that has the highest value of projection is perceived to be dominant. This process is repeated for all the available pixels on the image and the combination of all the dominant projections results in the formation of a new enhanced image. The image is then filtered through the use of band pass filters that are tuned to a particular ridge orientation. The Fourier transform is used to convert the image into frequency domain. In the frequency domain, the image is then filtered by filters (Bahuguna, 1996). The number of filters used in this case is also 16 and their tuning is also done to a specific orientation. Once the image has been passed the directional filters, it is converted to the special domain from t6he frequency domain.

The image then undergoes a final enhancement stage where pixel values are used to obtain the enhanced final image. Therefore, these techniques that are used for image enhancement are mainly based on the use of filters. These filters are tuned to respond to the required characteristics of the fingerprint. These fingerprint enhancement techniques have four main stages. The first is normalization. After this process, estimation of the orientation of the ridges is done. This is followed by the estimation of the frequency of the ridges. Finally, filtering is done. Other important stages that are incorporated in the process include segmentation and thinning (Rhodes & Brtillon, 1956). Segmentation is the process where the actual part of the fingerprint is differentiated from the background (Brunelli & Falavigna, 1995).

This is done during the process where the fingerprint image is being obtained for authentication. This is a necessity during this process since it ensures that only the fingerprint image is acquired and would subsequently be processed without the presence of other components that may act as noise. Presence of the background in the image may distort the processing of the fingerprint and consequently resulting in errors being encountered as false minutiae may be obtained. The separation is mainly done through the comparison of variance values. Thinning on the other hand is done before the extraction of the minutiae is done. This is to ensure that the width of the foreground pixels is one pixel for each of them (Parks, 1991). This is achieved by the removal of any additional width if present.

The enhancement of the image is the initial stage of processing. The image that has been enhanced has to undergo other processes. The extraction of the minutiae is one of these processes. Once the extraction of the minutiae is done, the image that is obtained is then processed to ensure that there is no possibility of the minutiae being false. Minutiae extraction may be done using different techniques. The one used in this method is the Crossing Number (CN) concept (Jain & Ross, Multi-modal biometrics, 2004). This method uses the patterns of the ridges together with the enhanced image. The ridge pixels are scanned by the use of a 3X3 window to obtain the minutiae (Jain & Ross, Multi-modal biometrics, 2004). Computation of the Crossing Number is then performed. This involves the comparison of the pixels that are adjacent in the eight-neighborhood. The properties of the Crossing Number that are used are shown below.

Crossing Number Property
0 Isolated point
1 Ridge ending point
2 Continuing ridge point
3 Bifurcation point
4 Crossing point

Table 1: Crossing Number properties

The classification of the ridge pixels can then be done according to the details provided in the Crossing Number properties. This means that if the crossing number of 2 is obtained, the ridge pixels will be classified as a continuing ridge point. This process relies on the skeleton image to be able to extract the minutiae (Turk & Pentland, 1991). Once the minutiae are obtained, it is subjected to further processing to ensure that all the false minutiae that may be present in the image are eliminated. The structures that may represent a false minutiae include spur structures, hole structures, triangle structures and spike structures (Ashbaugh, 1991). When these structures appear in the minutiae they may act as either bifurcations if a hole, triangular or spike structures appear. They may also act as false ridge endings if the spur and spike structures occur. The appearance of the false minutiae may lead to errors during the decision process. Rules are set to govern the way false minutiae are removed. These rules are used to govern the validity of a ridge ending and also a bifurcation. If the identified ridge ending does not conform to the standards that are set by these rules, it is discarded as a false bifurcation of a ridge.

Current biometric authentication practice in the UK

The UK has adapted different biometric techniques in the activities that are managed by the private sector and also the government. This is due to the desire to enhance the security of an organization. The applications of the biometric techniques in the UK may be divided into three categories. These include the forensic category, the government and lastly the commercial applications. The forensic category is mainly used in the identification of dead bodies that isolated to ensure that the family of the deceased is notified. It is also used in the identification of the parents of a child for example if there is a dispute in the court. This is important since it servers to settle the cases. The UK government uses biometric for a number of purposes. Firstly the passports are electronically generated. Theses passports have a chip that holds the data of a particular individual (Condon, 2007). The schools in the UK have also implemented the use of biometrics in their systems. Schools use the fingerprint technique to identify their students before entry to the compound and also other points within the school compound.

The government has also implemented the use of biometrics in its security buildings and the prison department. The identification of inmates has also incorporated the use of facial recognition where the facial images of the criminals are taken. Border security is also enhanced in the UK through the use of the biometric techniques. This ensures that immigrants do not enter the country illegally. At the transport terminals such as the airports, biometrics is used to ensure that the people boarding the planes are counterchecked to ensure that those who are boarding the planes are the same people who checked in. Biometrics has also been applied in the financial institutions. These include the ATM machines where the fingerprint authentication technique is being used. The biometric authentication for transaction over the internet has also been enhanced (Condon, 2007).

Methodology

Introduction

In order to carry out effective research, the research method has to be identified. The choice of a particular design is dependent on a number of factors. The research design is a stepwise procedure that shows how the research will be carried out. These include the problem which the research intends to solve and also the duration of time that the researcher has. The research design ensures that all the information that is collected meets the requirements of the research and aims to solve the objectives of the research. Therefore the research design should be chosen to ensure that all the objectives of the research are met within the allocated time for the research. This section deals with the research design and the methods that have been used to collect information for the research activity.

The research that has been carried out previously in the field of biometrics mainly focused on the implementation process of the biometric techniques and how this affected the current systems that were being used. The researchers mainly focused on improving the system to ensure that a system that was as efficient as possible was developed. The recommendations on how they intended to achieve this are also included in their research. The research that I carried out aimed to collect information about various issues that affect the biometric techniques and how the implementation of biometrics has made a difference in the current society. Therefore, the research focuses on how the biometric techniques have been implemented and where they are used, how different techniques have been accepted and also their individual merits and demerits.

The availability and accessibility of the previous research that had been carried out is important to my research as it will act as a source of secondary data for my research. This data is very helpful when coming up with conclusions since it involves recommendations that were made after research was carried out. They can therefore act as very important documents for comparison between the data obtained and that which was obtained before.

The methodologies that may be used in carrying out the research vary. There are various methods that can be applied. These include; the exploratory research approach, the explanatory research approach, the conclusive research approach and the performance monitoring research approach. The exploratory research approach is used where very limited knowledge is known about the topic being studied. It is used to gather more information about the topic and ensure that the best possible solution is applied. In this research this method was employed to get information about the implementation of biometrics.

This information included details on which methods are preferred and why and also the reasons why other methods are not easily acceptable. An explanatory research approach on the other hand aims to establish the causes of certain results in a research. It relates the causes and the effects of those causes on the result that is produced. In this research, this approach was used to analyze the effects of the introduction of the use of the biometric passports in the UK. The descriptive research approach requires that the researcher has more information about the topic being studied. It may be used to compare the researches that were already carried out with the one that is presently being carried out.

Data Collection

Data collection is an important aspect when carrying out any research activity. This is because the data that is collected will act as a very important tool during the analysis and conclusion of the research. The choice of the data collection methods to be used in any research therefore becomes an aspect that cannot be overlooked to ensure that the data that is collected is of use for the intended analysis. The data collection methods that were used during this rese

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now