25-09-2010, 01:56 PM
Presented by
Zdenˇ k Ríha
e ˇ
Václav Matyáš
Introduction
Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To achieve more reliable verification or identification we should use something that really characterizes the given person. Biometrics offer automated methods of identity verification or identification on the principle of measurable physiological or behavioral characteristics such as a fingerprint or a voice sample. The characteristics are measurable and unique. These characteristics should not be duplicable, but it is unfortunately often possible to biometrics create a copy that is accepted by the biometric system as a true sample. This is a typical situation where the level of security provided is given as the amount of money the impostor needs to gain an unauthorized access. We have seen biometric systems where the estimated amount required is as low as $100 as well as systems where at least a few thousand dollars are necessary. This paper presents our conclusions_ from a year-long study of biometric authentication techniques and actual deployment potential, together with an independent testing of various biometric authentication products and technologies. We believe that our experience can help the reader in considering whether and what kind of biometric authentication should or should not be used in a given system. Biometric technology has not been studied solely to authenticate humans. A biometric system for race horses is being investigated in Japan and a company that imports pedigree dogs into South Africa uses a biometric technique to verify the dogs being imported.
read full report from
http://www.scribddoc/16120651/Fingerprin...-with-8051
Zdenˇ k Ríha
e ˇ
Václav Matyáš
Introduction
Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To achieve more reliable verification or identification we should use something that really characterizes the given person. Biometrics offer automated methods of identity verification or identification on the principle of measurable physiological or behavioral characteristics such as a fingerprint or a voice sample. The characteristics are measurable and unique. These characteristics should not be duplicable, but it is unfortunately often possible to biometrics create a copy that is accepted by the biometric system as a true sample. This is a typical situation where the level of security provided is given as the amount of money the impostor needs to gain an unauthorized access. We have seen biometric systems where the estimated amount required is as low as $100 as well as systems where at least a few thousand dollars are necessary. This paper presents our conclusions_ from a year-long study of biometric authentication techniques and actual deployment potential, together with an independent testing of various biometric authentication products and technologies. We believe that our experience can help the reader in considering whether and what kind of biometric authentication should or should not be used in a given system. Biometric technology has not been studied solely to authenticate humans. A biometric system for race horses is being investigated in Japan and a company that imports pedigree dogs into South Africa uses a biometric technique to verify the dogs being imported.
read full report from
http://www.scribddoc/16120651/Fingerprin...-with-8051