0% found this document useful (0 votes)
37 views7 pages

Publication 2

The document discusses physiological biometric authentication systems, providing a brief overview of fingerprint, face, iris, and other recognition techniques. It addresses the advantages and disadvantages of each method and potential future developments in biometric authentication.

Uploaded by

somya mathur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views7 pages

Publication 2

The document discusses physiological biometric authentication systems, providing a brief overview of fingerprint, face, iris, and other recognition techniques. It addresses the advantages and disadvantages of each method and potential future developments in biometric authentication.

Uploaded by

somya mathur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/322686764

Physiological Biometric Authentication Systems, Advantages, Disadvantages


And Future Development: A Review

Article in International Journal of Scientific & Technology Research · December 2015

CITATIONS READS

78 17,457

1 author:

Israa Alsaadi
University of Baghdad
5 PUBLICATIONS 106 CITATIONS

SEE PROFILE

All content following this page was uploaded by Israa Alsaadi on 10 August 2018.

The user has requested enhancement of the downloaded file.


INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

Physiological Biometric Authentication Systems,


Advantages, Disadvantages and Future
Development : A Review
ISRAA M. ALSAADI
Abstract— With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system
became a significant task for both of access control and securing user’s private data. Human biometric characteristics such as face, finger,
iris scanning ,voice, signature and other features provide a dependable security level for both of the personal and the public use. Many
biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master
role in degrading imposters’ attacks. Such authentication models have overcome other traditional security methods like passwords and PIN.
This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages,
disadvantages and future developments of each method is provided in this paper.

Index Terms— Biometrics; authentication methods; face recognition; distinguishing of human characteristics; automatic verification of
identities.

——————————  ——————————

1 INTRODUCTION
A utomatic identification/verification of an individuals’
identity based on the analysis of his/her biological (biometric)
Biometrics Based Authentication

traits is broadly known as biometrics technology [1].


Naturally, people depend on the observed features of a human
body such as facial traits, voice, way of walking (gait),
signature and etc. These ways are ideal to recognize others
because of these characteristics are unique for each person [2]. Physiological Behavioral

With the increased dominance and wide popularity of IT


applications, especially computational systems which deal
with the commercial transactions such as online banking Face Recognition Voice
services. Users inherently perform their daily activities using Hand Geometry Signature
computers. For examples, bank accounts, mailboxes, daily Fingerprint Gait
transactions and other activities. These systems contain
Keystroke
sensitive information of their clients that are publicly shared Iris
Dynamics
within the Internet environment. Retina
Lips
The frequent use of this personal information has imposed
Ear Recognition Movements
and raised the security risks of such important systems from
being illegally accessed or hacked by intruders or
unauthorized users. Therefore, there is a significant need to Figure 1. General classification of Biometric schemes
control the users access of such applications which can
strongly prevent impostors from accessing the critical The Fig. 1 lists the current deployed biometric techniques in
information and use them for personal benefits. the computer security market. Although, biometrics
Basically, personal biometric attributes are divided into two authentication systems have overcome other traditional
main categories: physiological features and behavioral authentication schemes such as password or (pass codes) and
features [2,3,4,5]. Physiological characteristics are related to PIN (Personal Identification Number). Till yet, there is no 100
the static traits of a human body that are not subject to change percent guarantee about achieving highest level of
over aging. Examples of physiological traits are face performance regarding identification/verification of a person
recognition, hand geometry, palm print, fingerprint, iris identity [3].
recognition, DNA, retina and recognition of blood veins The purpose of this study is to provide a brief review of
pattern. existing physiological biometric authentication techniques
On the other hand, the behavioral approach of biometrics is along with highlighting some of their advantages and
limited only to the behavioral traits of a human that deal with drawbacks/obstacles. In addition, a recent literature of current
the personal behavior of an individual such as voice developments of the reviewed authentication systems is
recognition, signature recognition, gait and keystroke provided in this paper. This paper has an extension of the work
dynamics [3,4,5]. Below, Fig. 1 lists the general classification of in [3] by including the future improvement of discussed security
biometric authentication schemes. authentication systems.
The general organization of this paper is described as follows:
Section 1 is the general introduction about biometrics technology.

IJSTR©2012
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

Section 2 provides a brief historical overview of biometric identification and verification of biometric authentication
authentication techniques. In Section 3, the essential mechanism systems. The same scenario is conducted in most of biometric
of biometric security systems is introduced. Section 4 discusses based authentication techniques to perform the security
the most common physiological biometric systems with more
checking [2,3,7,8]. The general mechanism of biometrics
details for each method. At the end, Section 5 concludes the work
technologies is well described in the blog diagram in Fig. 2
of this paper and provides a future work.
below.

2 HISTORICAL OVERVIEW OF BIOMETRIC SYSTEMS


For the last few decades, security systems based biometrics
have obtained a wide popularity and considerable amount of
attention. However, the utility of biometric traits of human
body started in the early past [2].
Biometrics as a terminology refers to the combination of the
Greece words (Bio) and (Metrics) which means ‘’life
measurements’’[7]. Biometrics as a technology indicates the
use of human physiological and behavioral characteristics for
several security purposes such as identification/verification of
one’s’ identity, access control, users authorization, data
protection and security management [9]. There are numerous
biometric authentication technologies were adopted by many
committees in their security applications for long time. In
Figure 2. Block diagram of biometric methods
contrast to the traditional security systems such as login
passwords and PIN, biometric security techniques have shown
an enhanced level of security [9,10]. However, these
4 Physiological Biometric Authentication Systems
techniques have their own advantages and disadvantages as
well. Below, is a brief overview of biometric authentication
The subsections below introduce a brief overview of mostly
systems and some exposes to future developments of each
used physiological characteristics for the automatic
method.
recognition of individuals.

3 GENERAL MECHANISM OF BIOMETRICS 4.1 Fingerprint Recognition


AUTHENTICATION SYSTEMS Fingerprint based biometric authentication systems became
one of the most conducted, popular and successful
In general, most of biometrics based authentication systems authentication techniques among other biometrics security
have a common scenario of the practical implementation of methods for both of identification and verification processes
each method. This general mechanism is divided into two of one’s’ identity [2,3,8]. This biometric authentication method
main processes: the enrolment process and release process was developed based on the natural truth which indicates
[2,6,7]. In the enrolment stage, a collection of data of user that each an individual has unique fingerprints of his/her
biometric attributes is included. The gathered information of hand that distinguish him/her from others. Moreover, each
system participants is manipulated in order to capture as
person has a different print on each finger. Even though when
much as biometric features of each individual.
two identical twins have an observed similarity in their
Then, these captured attributes are mathematically analyzed visible features but still they have totally different prints on
via specific algorithms and later on an unique template will be each ones fingers [3]. This method was firstly studied by
created for each user and stored in a database which will be Francis Galton in 1892 when he firstly classified fingerprints
used in the second stage [3,6]. In the release process, a into three main classes [11]. Figure 2. shows sample of a
comparison is made between sample of data of a subject and human fingerprint.
the template that is already stored in the database from the
first process.
The obtained result from the comparison process leads to the
decision of either identifying or verifying a person identity.
However, there is a potential difference between
————————————————
 ISRAA ALSAADI currently works as an assistant lecturer in the
Computer Science Department at the University of Kufa/ College of
Education in Iraq, 009647723828633. E-mail:
[email protected]

IJSTR©2012
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

characteristics which led to wide popularity of the Face


Recognition System (FRS). There are many commercial
software that are programmed to do the real identification of
human facial features.

Figure 3. Sample of human Fingerprint

Figure 4. Automatic face recognition system


General scenario of the method: Biologically, the pattern of a
fingerprint surface is basically classified into three main
General scenario of the method: This method mainly
patterns are loop, arch and whorl [8]. As a biometric
conducts two ways for the facial authentication of
authentication system the automatic distinguish between two
individuals. First is static recognition of person’s facial
individuals is based on capturing the two main fingerprint
features depending on collecting a set of images by using
characteristics are the valleys and ridges on the finger surface.
photo-camera. Second is real time identification of persons
These two patterns have specific followings in their direction
based on video-camera. The captured images are used for
and locations on the fingerprint. The process of collecting the
creating a template for each sample (individual) and then a
fingerprint formation is done by scanning the finger surface
matching process is taken for the recognition purposes [2].
using a specific device is called sensor [2,3,8]. Fig. 3 shows a
Advantages: Ease of use and the low cost of system
sample of optical sensor.
implementation.
Advantages: Deploying fingerprint recognition for the
Disadvantages: Number of factors affect the overall
security purposes has been increasing in thousands of
performance of biometric based face recognition system. For
institutions for several reasons. First, the ease of use of this
examples, quality or resolution of collected photos for each
method by the users in comparison to the old method which
individual, light conditions , angles of face rotation, etc. Also,
was using physical inking of an individual fingertip in
different facial expressions impose some challenges on the
which a difficulty of removing the ink later on. Second reason
automatic recognition of people identities such as sad
is the low cost of implementation where the optical sensor is
expression, happy, angry and others [2,3,8].
a cheap device [2,4,11,12]. Moreover, fingerprint-based
Future Development: A lot of work has been done on the
authentication system does not require so much power [4].
development of face recognition system. One of these
Also, this method is implemented in mobile environment
recommendations on the improvement of this biometric
especially smart phones (e.g. iPhones) which makes it more
authentication method is using 3-dimensional camera for data
desirable authentication technique [4].
collection. In addition, some new trends of increasing the face
Disadvantages: Although fingerprint recognition system has
recognition accuracy is using more accurate sensors to
various its advantages ,this system has some drawbacks. This
capture images of face skin. This method looks for the
biometric system has some complexity in obtaining high-
distinctive features in a user’s face skin such as visual spots,
quality images of images of finger patterns. Due to the issues
lines and other unique patterns [3].
of dirty, cuts, tear and wear that can easily effect the ridges
and minutiae of fingertip [4,8].
4.3 Iris Recognition
Future Development: A new and challenging approach in
Iris is that colored circular part that is located in centre of the
biometric based individuals authentication has been recently
eye. The distinctiveness of iris pattern provides an effective
introduced. Finger nail plate is an emerging authentication
recognition scheme of individuals. Based on the biological
technology in the biometric study. This technique is based on
composition of the iris, it has a specific network of tissues that
the discriminate features on the surface of the finger nail plat.
are visibly recognized. However, an individual’s iris forms
More details can be found in paper work of [13].
over the first year of the life when the iris characteristics
cannot be genetically changed [2,8].
4.2 Face Recognition
The facial features (eyes, nose , lips and chin) of human have
played a significant role in the recognition of individuals for
long time. Depending on the unique shaping of each person’s
face, it has been a popular method in biometric recognition
area [2,3,8]. Computers have contributed in the automatic
recognition of individuals using the obvious facial

IJSTR©2012
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

recognition of individuals.
Disadvantages: It causes kind of user’s discomfort due to the
hard efforts by the contributors while capturing their retina
vessels. However, retina-scan based biometrics has some
medical factors that can affect the accuracy of its
authentication process such as high blood pressure[8]. Also,
different papers have addressed other conditions that can
decrease the performance of retina scanning like wearing
Figure 5. Iris recognition system
glasses, lenses and etc [14].
Future Development: A few studies is conducted on the
General scenario of the method: Similar to retina recognition, improvements of the blood vessel pattern of the retina for the
the general process of identifying/verifying a person is automatic recognition of the individuals. Such as using a high
accomplished by capturing images of his/her iris. Then pass resolution sensor for capturing more accurate images of blood
the iris images to the data analysis for extracting the vessel sample. Also, a new trend in retina recognition tries to
discriminating features for each sample as preparing for the provide an efficient implementation of this biometric method
authentication process. This process is done by using a special in mobile phones [4].
camera that does the iris scanning.
Advantages: It is an optimal method for the automatic
4.5 Hand Geometry Recognition
authentication of individuals due to the widespread of iris
scanners in different security sectors. Also, the ease of use and
Many security systems and applications depend on the
flexible operating of scanning devices that make this
recognition of hand geometry as an automated technique for
technique in an increased demand [2,15]. Furthermore, this
the identification/verification of their legitimate users. This
technique achieved a proper level of reliability in acquiring as
biometric authentication method started taking a wide
much distinguished features as possible.
popularity in various security sectors. It was early installed
Disadvantages: A number of researchers have addressed
and used as a biometric method since the late of 60s
different issues/factors that contribute in decreasing the
[2,3,15,16].
accuracy of iris recognition. Some of these factors are wearing
glasses, eye lenses and etc. Another difficulty of deploying
iris-based biometric is the high cost of implementation of
such authentication technique [8].
Future Development: Various papers have proposed more
developments on the accuracy of iris scanning for the
authentication mode in which three-dimensional camera is
essentially preferred for this purpose.

4.4 Retina Recognition Figure 6. Scanning of hand/palm geometry


In each person’s eye, the retina is that layer which is made of a
complicated network of neural cells at the back of the eye. General scenario of the method: The measurements of the
This part has a unique features for each retina due to the hand-geometry is obtained by scanning the hand area using a
complicated capillaries that is responsible for providing the specific scanner for this purpose. A three-dimensional
retina with the blood [8]. Many studies have concluded that scanning takes different angles of the hand for better feature
the blood vessel pattern is distinctive pattern for each single extraction in order to composite an accurate sample [2].
retina of the same person. This complication pattern of the Advantages: This method has its positive points among other
retina has contributed in the development of new automatic biometric authentication techniques. For example, ease of use
authentication system for the fast distinguish among and the wide acceptance by participants which make this
individuals [3]. In addition, any identical twins do not have method more friendly authentication system than other
the same patterns of their retina. biometric systems.
General scenario of the method: The technology of retinal Disadvantages: It requires a special hardware device for
scan-based authentication system uses a specific sensor for scanning the hand geometry. Such scanner needs to be a
the data acquisition. In this process, a person is required to three-dimensional in order to acquire full information of the
peep where the sensor directs on a particular spot in the visual palm. In contrast with other devices which take only a few
field in which the capturing of characteristics of blood vessel fingers information. Therefore, this method is considered as
pattern is performed [3]. an expensive biometric authentication system [2].
Advantages: This biometric authentication technique has Furthermore, there are some constraints which may impact
obtained a large amount of attention because of the high level the extraction of palm information such as the wearing some
of accuracy of samples that can be obtained from the jewelries and etc. Another drawback of hand scanning is the

IJSTR©2012
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

large space which is required for storing the scanned combined with finger print system for achieving a better
information of palm geometry [8]. performance. Iris scanning is compatible with retina
Future Development: One of the current improvement of recognition were a high differentiating in person iris/retina
hand recognition is working on simplifying the sensor device features is perfectly obtained. Moreover, transforming such
in order to reduce the overall cost of features extraction of an security authentication techniques from traditional practical
individual’s hand geometry [8]. environment into more flexible one such as mobile phones it
can potentially upgrade the integration of the overall system.
4.6 Ear Recognition
Another biometric authentication technique is conducted
ACKNOWLEDGMENT
based on the recognition of the unique shape and appearance
of human being ear. Naturally, a person is born with a visual
THE AUTHOR OF THIS WORK WOULD LIKE TO THANK ALL ANONYMOUS
shape of his/her ears. However, human ear is not subject to
REVIEWERS FOR THEIR MOTIVATION, SUPPORT AND COMMENTS DURING
change while a person’s growth and even aging [3,14]. It has a THE COMPLETION OF THIS RESEARCH.
dependable stability which increases its level of security as a
proposed method for the security identification/verification of
individuals.
REFERENCES
[1] Yanushkevich, S.N., "Synthetic Biometrics: A Survey," in Neural
Networks, 2006. IJCNN '06. International Joint Conference on , vol., no.,
pp.676-683, 0-0 0

[2] Eng, A.; Wahsheh, L.A., "Look into My Eyes: A Survey of Biometric
Security," in Information Technology: New Generations (ITNG), 2013 Tenth
International Conference on , vol., no., pp.422-427, 15-17 April 2013

[3] Kataria, A.N.; Adhyaru, D.M.; Sharma, A.K.; Zaveri, T.H., "A survey
 of automated biometric authentication techniques," in Engineering
Figure 7. Ear based biometric authentication system (NUiCONE), 2013 Nirma University International Conference on , vol., no.,
pp.1-6, 28-30 Nov. 2013
General scenario of the method: Ear recognition has the same
scenario of face recognition in terms of ear features extraction [4] Weizhi Meng; Wong, D.S.; Furnell, S.; Jianying Zhou, "Surveying the
Development of Biometric User Authentication on Mobile Phones," in
and also matching processes. The actual recognition scenario
Communications Surveys & Tutorials, IEEE , vol.17, no.3, pp.1268-1293,
of this approach is using specific measurements of outlook of thirdquarter 2015
the ear in which a mathematical model is created for
providing a unique template. [5] Pahuja, G.; Nagabhushan, T.N., "Biometric authentication &
Advantages: It is more comfortable/friendly method in terms identification through behavioral biometrics: A survey," in Cognitive
of user contribution than iris and retina recognition. Computing and Information Processing (CCIP), 2015 International Conference
on , vol., no., pp.1-7, 3-4 March 2015
Disadvantages: As like other biometric recognition schemes,
ear-based biometric authentication has its own drawbacks. [6] Lifeng Lai; Siu-Wai Ho; Poor, H.V., "Privacy-security tradeoffs in
This method has not achieved a remarkable level of security biometric security systems," in Communication, Control, and Computing,
yet. One of the disadvantages of ear recognition is the simple 2008 46th Annual Allerton Conference on , vol., no., pp.268-273, 23-26 Sept.
distinguished features of the ear that cannot provide a strong 2008
establishment of an individual’s identity [3].
[7] Xiao, Q. (2007). Technology review-biometrics-technology, application,
Future Development: Current efforts of pattern recognition
challenge, and computational intelligence solutions. Computational
researchers work on the development of ear recognition. Intelligence Magazine, IEEE, 2(2), 5-25.

[8] Dharavath, K.; Talukdar, F.A.; Laskar, R.H., "Study on biometric


5 CONCLUSION AND FUTURE WORK authentication systems, challenges and future trends: A review," in
Securing critical and sensitive systems from being illegally Computational Intelligence and Computing Research (ICCIC), 2013 IEEE
accessed by imposters has been a potential research field. International Conference on , vol., no., pp.1-7, 26-28 Dec. 2013
Biometric based security authentication obtained considerable
[9] Ye Wang; Rane, S.; Draper, S.C.; Ishwar, P., "A Theoretical Analysis of
attention for its accuracy, reliability, universality and Authentication, Privacy, and Reusability Across Secure Biometric
permanence etc. This paper overviewed the most conducted Systems," in Information Forensics and Security, IEEE Transactions on , vol.7,
physiological biometric authentication techniques. The focus no.6, pp.1825-1840, Dec. 2012
of this work is to briefly present various physiological
biometric security methods. General scenario or mechanism of [10] Deutschmann, I., Nordstrom, P., & Nilsson, L. (2013). Continuous
each technique is introduced. Also, some exposes to their key authentication using behavioral biometrics. IT Professional, 15(4), 12-15
advantages, disadvantages and future improvements for each
security system. A combination of several biometric security [11] Zaeri, N. (2011). Minutiae-based fingerprint extraction and recognition.
systems is highly recommended for best level of reliability and INTECH Open Access Publisher.
accuracy. For example, face recognition can be easily

IJSTR©2012
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOL 1, ISSUE 1

[12] Faundez-Zanuy, M., "Biometric security technology," in Aerospace and


Electronic Systems Magazine, IEEE , vol.21, no.6, pp.15-26, June 2006

[13] Narhar, U.K.; Joshi, R.B., "Highly Secure Authentication Scheme," in


Computing Communication Control and Automation (ICCUBEA), 2015
International Conference on , vol., no., pp.270-274, 26-27 Feb. 2015

[14] Jain, A.K.; Ross, A.; Prabhakar, S., "An introduction to biometric
recognition," in Circuits and Systems for Video Technology, IEEE Transactions
on , vol.14, no.1, pp.4-20, Jan. 2004

[15] Liu, Simon; Silverman, M., "A practical guide to biometric security
technology," in IT Professional , vol.3, no.1, pp.27-32, Jan/Feb 2001

[16] Delac, K.; Grgic, M., "A survey of biometric recognition methods," in
Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International
Symposium , vol., no., pp.184-193, 18-18 June 2004

IJSTR©2012

View publication stats

You might also like