Biometric means of identification. Main selection criteria. Comparison of authentication methods based on the immutability of biometric characteristics

Biometric authentication systems- authentication systems that use biometric data to verify people’s identities.

Biometric authentication- the process of proving and verifying the authenticity of the user's declared name, through the user's presentation of his biometric image and by converting this image in accordance with a predetermined authentication protocol.

These systems should not be confused with biometric identification systems, such as, for example, driver facial recognition systems and biometric time tracking tools. Biometric authentication systems operate in an active rather than passive mode and almost always involve authorization. Although these systems are not identical to authorization systems, they are often used together (for example, in fingerprint door locks).

Encyclopedic YouTube

    1 / 4

    Biometric authentication in Active Directory

    MDG-Innovations. Biometric identification systems

    Biometric Windows authentication Hello

    # GLOBALIZATION MODE # BIOMETRIC SYSTEM #

    Subtitles

Authentication Methods

Various controlled access systems can be divided into three groups according to what a person intends to present to the system:

1) Password protection. The user provides secret data (for example, a PIN code or password).

1. Universality: This sign should be present in all people without exception.

2. Uniqueness: Biometrics denies the existence of two people with the same physical and behavioral parameters.

3. Consistency: For correct authentication, consistency over time is necessary.

4. Measurability: specialists must be able to measure the sign with some device for further entry into the database.

5. Eligibility: society should not be against the collection and measurement of a biometric parameter.

Static methods

Fingerprint authentication

Fingerprint identification is the most common biometric user authentication technology. The method takes advantage of the unique pattern of papillary patterns on people's fingers. The fingerprint obtained using the scanner is converted into a digital code and then compared with previously entered sets of standards. The benefits of using fingerprint authentication are ease of use, convenience and reliability. The versatility of this technology allows it to be used in any area and to solve any and a wide variety of problems where reliable and fairly accurate identification of users is necessary.

Special scanners are used to obtain information about fingerprints. To obtain a clear electronic representation of fingerprints, rather specific methods are used, since the fingerprint is too small and it is very difficult to obtain clearly visible papillary patterns.

There are three main types of fingerprint scanners commonly used: capacitive, rolling, and optical. The most common and widely used are optical scanners, but they have one serious drawback. Optical scanners are not resistant to dummies and dead fingers, which means they are not as effective as other types of scanners. Also, in some sources, fingerprint scanners are divided into 3 classes according to their physical principles: optical, silicon, ultrasonic [ ] [ ] .

Iris authentication

This technology Biometric personal authentication uses the uniqueness of the signs and characteristics of the iris of the human eye. The iris is a thin, mobile diaphragm of the eye in vertebrates with a hole (pupil) in the center; located behind the cornea, between the anterior and rear cameras eyes, in front of the lens. The iris is formed before a person is born, and does not change throughout life. The texture of the iris resembles a network with a large number of surrounding circles and patterns that can be measured by a computer, the pattern of the iris is very complex, this allows you to select about 200 points, with the help of which a high degree of authentication reliability is ensured. For comparison, best systems Fingerprint identification uses 60-70 points.

Iris recognition technology was developed to eliminate the intrusiveness of retinal scans that use infrared rays or bright light. Scientists have also conducted a number of studies that have shown that the human retina can change over time, while the iris remains unchanged. And most importantly, it is impossible to find two absolutely identical iris patterns, even in twins. To obtain an individual recording of the iris, the black and white camera makes 30 recordings per second. A subtle light illuminates the iris, allowing the video camera to focus on the iris. One of the records is then digitized and stored in a database of registered users. The entire procedure takes a few seconds and can be fully computerized using voice guidance and autofocus. The camera can be installed at a distance of 10 cm to 1 meter, depending on the scanning equipment. The term "scanning" can be misleading, since the process of obtaining an image does not involve scanning, but simply photographing. The resulting iris image is then converted into a simplified form, recorded and stored for later comparison. Glasses and contact lenses, even colored ones, do not affect the quality of authentication. [ ] [ ] .

Cost has always been the biggest deterrent to adopting the technology, but now iris identification systems are becoming more affordable for a variety of companies. Proponents of the technology claim that iris recognition will very soon become a common identification technology in various fields.

Retinal authentication

Hand geometry authentication

This biometric method uses the shape of the hand to authenticate an individual. Due to the fact that individual hand shape parameters are not unique, it is necessary to use several characteristics. Hand parameters such as the curves of the fingers, their length and thickness, the width and thickness of the back of the hand, the distance between the joints and bone structure are scanned. Also, the geometry of the hand includes small details (for example, wrinkles on the skin). Although the structure of the joints and bones are relatively permanent features, swelling of the tissues or bruises of the hand can distort the original structure. Technology problem: Even without taking into account the possibility of amputation, a disease called “arthritis" can greatly interfere with the use of scanners.

Using a scanner, which consists of a camera and illuminating diodes (when scanning a hand, the diodes turn on in turn, this allows you to obtain different projections of the hand), then a three-dimensional image of the hand is built. The reliability of hand geometry authentication is comparable to fingerprint authentication.

Hand geometry authentication systems are widely used, which is proof of their convenience for users. Using this option is attractive for a number of reasons. The procedure for obtaining a sample is quite simple and does not place high demands on the image. The size of the resulting template is very small, a few bytes. The authentication process is not affected by temperature, humidity or dirt. The calculations made when comparing with the standard are very simple and can be easily automated.

Authentication systems based on hand geometry began to be used around the world in the early 70s. [ ] [ ]

Facial geometry authentication

Biometric authentication of a person based on facial geometry is a fairly common method of identification and authentication. The technical implementation is a complex mathematical problem. The extensive use of multimedia technologies, with the help of which one can see a sufficient number of video cameras at train stations, airports, squares, streets, roads and other crowded places, has become decisive in the development of this area. To build a three-dimensional model of a human face, the contours of the eyes, eyebrows, lips, nose, and other various elements of the face are isolated, then the distance between them is calculated, and a three-dimensional model is built using it. To determine a unique pattern corresponding to a specific person, 12 to 40 characteristic elements are required. The template must take into account many variations of the image in cases of turning the face, tilting, changing lighting, changing expression. The range of such options varies depending on the application this method(for identification, authentication, remote search over large areas, etc.). Some algorithms allow you to compensate for a person’s glasses, hat, mustache and beard. [ ] [ ]

Authentication using facial thermogram

The method is based on studies that have shown that the facial thermogram is unique for each person. The thermogram is obtained using infrared cameras. Unlike facial geometry authentication, this method distinguishes between twins. The use of special masks, plastic surgery, aging of the human body, body temperature, cooling the facial skin in frosty weather do not affect the accuracy of the thermogram. Due to the low quality of authentication, the method is currently not widespread.

Dynamic Methods

Voice authentication

The biometric voice authentication method is characterized by ease of use. This method does not require expensive equipment, just a microphone and a sound card. Currently, this technology is developing rapidly, as this authentication method is widely used in modern business centers. There are quite a few ways to build a voice template. Usually, these are different combinations of frequency and statistical characteristics of the voice. Parameters such as modulation, intonation, pitch, etc. can be considered.

The main and defining disadvantage of the voice authentication method is the low accuracy of the method. For example, the system may not recognize a person with a cold. An important problem constitutes the diversity of manifestations of one person’s voice: the voice can change depending on the state of health, age, mood, etc. This diversity presents serious difficulties in identifying the distinctive properties of a person’s voice. In addition, taking into account the noise component is another important and unsolved problem in practical use voice authentication. Since the probability of Type II errors when using this method is high (on the order of one percent), voice authentication is used to control access in medium-security premises, such as computer labs, laboratories of manufacturing companies, etc.

K. Gribachev

programmer at JSC NVP "Bolid"

INTRODUCTION

The concept of “biometrics” covers a complex various methods and technologies that allow identifying a person by his biological parameters. Biometrics is based on the fact that each person has an individual set of physiological, psychosomatic, personal and other characteristics. For example, physiological parameters include papillary patterns of the fingers, the pattern of the iris, etc.

With the development of computing technology, devices have appeared that can reliably process biometric data in almost real time, using special algorithms. This served as an impetus for the development of biometric technologies. Recently, the scope of their application has been constantly expanding. Figure 1 presents some applications of biometrics.

Rice. 1. Areas of application of biometrics

BIOMETRIC PARAMETERS

Biometric identification (BI) can use various parameters, which can be divided into 2 types: static and dynamic (Fig. 2).

Static parameters determine the “material” characteristics of a person as a physical object with a certain shape, weight, volume, etc. These parameters do not change at all or change little depending on the person’s age (this rule can only be violated in childhood). However, not all static parameters can be used when person identification must be carried out quickly (for example, in access control systems). Obviously, DNA analysis requires quite a significant amount of time and is unlikely to be widely used in access control systems in the near future.

Dynamic parameters largely describe the behavioral or psychosomatic characteristics of a person. These parameters can vary quite significantly both depending on age and with changing external and internal factors (health problems, etc.). However, there are application areas in which the use of dynamic parameters is very important, for example, when conducting handwriting examinations or for identifying a person by voice.

ADVANTAGES OF LIMITATIONS AND SPECIFICITY OF BIOMETRIC INFORMATION

Currently, the overwhelming majority biometric systems access control (BioSKUD) uses static parameters. Of these, the most common parameter is fingerprints.

The main advantages of using biometric information in access control systems (compared to access keys or proxy cards) are:

■ difficulties in falsifying an identification parameter;

■ impossibility of losing the identifier;

■ inability to transfer the identifier to another person.

Along with the described advantages, there are certain limitations in the use of biometric systems associated with the “inaccuracy” or “blurriness” of biometric parameters. This is due to the fact that, for example, when reading the same fingerprint repeatedly or when taking the same face again, the scanner never receives two absolutely identical images, that is, there are always different factors that influence the scan result. For example, the position of a finger in the scanner is never rigidly fixed, a person’s facial expression can also change, etc.

This fundamental “unrepeatability” of collecting biometric information is a specific feature of biometric systems, and, as a consequence, this leads to significantly increased requirements for the “intelligence” and reliability of computing algorithms, as well as for the speed of microprocessor elements of ACS. In fact, if when using a proximity card it is enough to check two digital codes for identity, then when comparing the measured biometric parameter with reference value it is necessary to use special, rather complex algorithms of correlation analysis and/or fuzzy (“fuzzy”) logic.

To facilitate solving the problem of “fuzzy” recognition, instead of scanned images, special digital models or templates. Such a template is a digital array of a certain structure that contains information about the read image of a biometric parameter, but not all data is stored in the template, as with a regular scan, but only the most characteristic information important for subsequent identification. For example, when using face scanning, the template may include parameters describing the shape of the nose, eyes, mouth, etc. Specific Method converting a biometric image into a digital template format is not strictly formalized, and, as a rule, each manufacturer of biometric equipment uses its own template formats, as well as its own algorithms for their generation and comparison.

It should be separately noted that it is fundamentally impossible to restore the original biometric image using a biometric template. This is obvious, since a template is, in fact, just a model that describes a real biometric image. This gives rise to a significant difference between biometrics in access control systems and, for example, biometrics in forensic science, where not template models are used, but “full” images of fingerprints. This distinction is important to keep in mind as, for example, in modern legislation it may mean that biometric templates cannot automatically be classified as a person's personal data.

Rice. 2. Types and types of biometric parameters


PARAMETERS FOR ASSESSING THE EFFECTIVENESS OF BIOMETRIC ACS

Due to the specifics of biometric information described above, in any BioAccess Control System there is always the possibility of errors of two main types:

■ false denial of access (FRR - False Rejection Rate), when the ACS does not recognize (does not allow) a person registered in the system;

■ false identification (FAR coefficient - False Acceptance Rate), when the access control system “confuses” people, letting in a “stranger” person who is not registered in the system, recognizing him as “one of our own”. These coefficients are the most important parameters for assessing reliability

BioSKUD.

In practice, the situation is complicated by the fact that these two types of errors are interdependent. Thus, expanding the range of possible recognition control parameters in such a way that the system always “recognizes its own” employee (that is, reducing the FRR coefficient), automatically leads to the fact that someone else’s employee will “leak” into this new expanded range (that is, the FAR coefficient will increase) . Conversely, when the FAR coefficient improves (that is, when its value decreases), the FRR coefficient will automatically worsen (increase). In other words, the more “carefully” the system tries to perform recognition so as not to miss a “strange” employee, the more likely it is that it “will not recognize its own” (that is, registered) employee. Therefore, in practice there is always some compromise between the FAR and FRR coefficients.

In addition to the indicated error rates, an important parameter for assessing the effectiveness of BioACS is the speed of identification. This is important, for example, at checkpoint enterprises, when a large number of employees pass through the system in a short period of time. The response time depends on many factors: identification algorithm, template complexity, number of employee biometric templates in the BioSKUD reference database, etc. Obviously, the response time also correlates with the reliability of identification - the more “thorough” the identification algorithm is, the more time the system spends on this procedure.

METHODS OF PROTECTION AGAINST IMITATION AND USER ERROR

It is obvious that, with all its advantages, the use of biometric information does not automatically guarantee the absolute reliability of the access control system. In addition to the identification errors described above, there is also a certain likelihood that attackers will use biometric simulators to “deceive” the BioSKUD. The means of imitation can be, for example, fingerprint imprints, color photographs of the face, etc.

Modern BioSKUDs have means of protection against such biosimulators. Let's briefly list some of them:

■ temperature measurement (finger, palm);

■ measurement of electrical potentials (finger);

■ measuring the presence of blood flow (palms and fingers);

■ scanning of internal parameters (pattern of hand veins);

■ use of three-dimensional models (faces).

In addition to protection from imitators, BioSKUD must also have means of protection against errors by the users themselves. For example, when scanning a fingerprint, an employee may accidentally or deliberately place his finger at an angle, children may place two fingers in the scanner at the same time, etc. To eliminate such phenomena, for example, the following methods are used:

■ special algorithms for filtering “anomalous” parameters;

■ multiple scanning (for example, scanning your fingerprint three times during registration);

■ possibility of repeated identification attempts.

CONCLUSION

The use of biometric data in access control systems is a promising and rapidly developing technology. The introduction of biometrics requires increasing the level of “intelligence” of access control systems, developing new high-tech algorithmic and software methods, and improving hardware. Thus, we can conclude that the introduction of biometric technologies contributes to the development of the access control and management systems industry as a whole.

Introduction

1.Classification and main characteristics of biometric means of personal identification

2. Features of the implementation of static methods of biometric control

2.1 Identification by papillary line pattern

2.2 Iris identification

2.3 Identification by retinal capillaries

2.4 Identification by geometry and thermal image of the face

2.5 Identification of hand geometry

3. Features of the implementation of dynamic methods of biometric control

3.1 Identification by handwriting and signature dynamics

3.3 Identification by keyboard rhythm

4. Biometric technologies of the future

Conclusion

Literature

Introduction

Subject course work"Biometric means of personal identification."

For personal identification, modern electronic systems access control and management (ACS) devices use several types. The most common are:

PIN code dialing devices (push-button keyboards);

Contactless smart card readers (Wiegand interface);

Proximity card readers;

Touch memory key readers;

Barcode readers;

Biometric readers.

Currently, all kinds of card readers (proximity, Wiegand, with magnetic stripe, etc.) are most widely used. They have their undeniable advantages and ease of use, however, at the automated access point, “the passage of the card, not the person,” is controlled. At the same time, the card can be lost or stolen by intruders. All this reduces the possibility of using access control systems based solely on card readers in applications with high security requirements. An incomparably higher level of security is provided by all kinds of biometric access control devices that use human biometric parameters (fingerprint, hand geometry, retinal pattern, etc.) as an identifying feature, which clearly provide access only to a specific person - the bearer of the code (biometric parameters ). But today, such devices are still quite expensive and complex, and therefore find their use only in particularly important access points. Barcode readers are currently practically not installed, since it is extremely easy to forge a pass on a printer or copier.

Goal of the work consider the principles of operation and use of biometric means of personal identification.

1. Classification and main characteristics of biometric means of personal identification

The advantages of biometric identifiers based on the unique biological and physiological characteristics of a person, which uniquely identify one’s identity, have led to the intensive development of corresponding means. Biometric identifiers use static methods based on the physiological characteristics of a person, i.e., on the unique characteristics given to him from birth (patterns of finger papillary lines, iris, retinal capillaries, thermal image of the face, hand geometry, DNA), and dynamic methods (handwriting and signature dynamics, voice and speech features, rhythm of keyboard work). It is proposed to use such unique static methods as identification by the subungual layer of skin, by the volume of fingers indicated for scanning, ear shape, body odor, and dynamic methods - identification by lip movement during playback code word, by the dynamics of turning a key in a door lock, etc. The classification of modern biometric identification tools is shown in Fig. 1.

Biometric identifiers only work well if the operator can verify two things: first, that the biometric data was obtained from a specific person during the verification, and second, that this data matches the sample stored in the file cabinet. Biometric characteristics are unique identifiers, but the issue of their reliable storage and protection from interception still remains open

Biometric identifiers provide very high indicators: the probability of unauthorized access is 0.1 - 0.0001%, the probability of false arrest is a fraction of a percent, the identification time is a few seconds, but they have a higher cost compared to attribute identification means. Qualitative results of comparison of various biometric technologies in terms of identification accuracy and costs are shown in Fig. 2. There are known developments of access control systems based on reading and comparing the configurations of the network of veins on the wrist, odor samples converted into digital form, analysis of the unique acoustic response of the human middle ear when irradiated with specific acoustic pulses, etc.


Rice. 1. Classification of modern biometric identification tools


The trend of significantly improving the characteristics of biometric identifiers and reducing their cost will lead to the widespread use of biometric identifiers in various access control and management systems. Currently, the structure of this market is

Any biometric technology is applied in stages:

Scanning an object;

Retrieval of individual information;

Formation of a template;

Compare the current template with the database.

The biometric authentication technique is as follows. The user, when making a request to the access control system, first of all identifies himself using an identification card, plastic key or personal identification number. Based on the identifier presented by the user, the system finds in its memory the user’s personal file (standard), in which, along with the number, his biometric data, previously recorded during the user registration procedure, is stored. After this, the user presents the specified carrier of biometric parameters to the system for reading. By comparing the received and registered data, the system makes a decision to grant or deny access.




Rice. 2. Comparison of biometric identification methods

Thus, along with biometric characteristics meters, access control systems must be equipped with appropriate readers of identification cards or plastic keys (or a numeric keypad).

The main biometric information security tools provided today by the Russian security market are given in Table. 1, specifications Some biometric systems are presented in table. 2.

Table 1. Modern biometric information security tools

Name Manufacturer Biosign Note
SACcat SAC Technologies Finger skin pattern Computer attachment
TouchLock, TouchSafe, Identix Skin pattern ACS of the facility
TouchNet finger
Eye Dentification Eyeidentify Retina drawing ACS of the facility
System 7.5 eyes (monoblock)
Ibex 10 Eyeidentify Retina drawing Object access control system (port, camera)
eriprint 2000 Biometric Identification Finger skin pattern ACS station wagon
ID3D-R Handkey Recognition Systems Hand palm drawing ACS station wagon
HandKey Escape Hand palm drawing ACS station wagon
ICAM 2001 Eyeidentify Retina drawing ACS station wagon
Secure Touch Biometric Access Corp. Finger skin pattern Computer attachment
BioMouse American Biometric Corp. Finger skin pattern Computer attachment
Fingerprint Identification Unit Sony Finger skin pattern Computer attachment
Secure Keyboard Scanner National Registry Inc. Finger skin pattern Computer attachment
Frontier NPF "Crystal" Signature dynamics, voice spectrum Computer attachment
Delsy touch chip Elsis, NPP Electron (Russia), Opak (Belarus), R&R (Germany) Finger skin pattern Computer attachment
BioLink U-Match Mouse,Mouse SFM-2000A BioLink Technologies Finger skin pattern Standard mouse with built-in fingerprint scanner
Biometric security system computer information Dakto OJSC "Chernigov Radio Devices Plant" Biologically active points and papillary lines of the skin Separate block
Biometric control system Iris Access 3000 LG Electronics, Inc Drawing of the iris Card reader integration

When talking about the accuracy of automatic authentication, it is customary to distinguish two types of errors: Type 1 errors (“false alarms”) are associated with denying access to a legitimate user. Errors of the 1st type (“missing the goal”) - granting access to an illegal user. The reason for errors is that when measuring biometric characteristics, there is a certain scatter of values. In biometrics, it is absolutely impossible for samples and newly obtained characteristics to give a complete match. This is true for all biometrics, including fingerprints, retinal scans or signature recognition. For example, the fingers of a hand may not always be placed in the same position, at the same angle, or with the same pressure. And so every time you check.

Modern science does not stand still. More and more often, high-quality protection for devices is required so that someone who accidentally takes possession of them cannot take full advantage of the information. In addition, methods of protecting information from are used not only in everyday life.

In addition to entering passwords digitally, more individualized biometric security systems are also used.

What it is?

Previously, such a system was used only in limited cases, to protect the most important strategic objects.

Then, after September 11, 2011, they came to the conclusion that such access could be applied not only in these areas, but also in other areas.

Thus, human identification techniques have become indispensable in a number of methods of combating fraud and terrorism, as well as in such areas as:

Biometric access systems to communication technologies, network and computer databases;

Database;

Access control to information storage facilities, etc.

Each person has a set of characteristics that do not change over time, or those that can be modified, but at the same time belong only to to a specific person. In this regard, it is possible to highlight following parameters biometric systems that are used in these technologies:

Static - fingerprints, ear photography, retinal scanning and others.

Biometrics technologies in the future will replace conventional methods of authenticating a person using a passport, as built-in chips, cards and similar innovations scientific technologies will be implemented not only in this document, but also in others.

A small digression about personality recognition methods:

- Identification- one to many; the sample is compared with all available ones according to certain parameters.

- Authentication- one to one; the sample is compared with previously obtained material. In this case, the person may be known, the obtained data of the person is compared with the sample parameter of this person available in the database;

How biometric security systems work

In order to create a base for a specific person, it is necessary to consider his biological individual parameters as a special device.

The system remembers the received biometric characteristic sample (recording process). In this case, it may be necessary to make several samples to create a more accurate reference value for the parameter. The information received by the system is converted into a mathematical code.

In addition to creating the sample, the system may require additional steps to combine the personal identifier (PIN or smart card) and the biometric sample. Subsequently, when scanning for compliance occurs, the system compares the received data, comparing the mathematical code with those already recorded. If they match, that means the authentication was successful.

Possible mistakes

The system may produce errors, unlike recognition using passwords or electronic keys. In this case, the following types of issuing incorrect information are distinguished:

Type 1 error: false access rate (FAR) - one person may be mistaken for another;

Type 2 error: false access denial rate (FRR) - the person is not recognized in the system.

In order to exclude, for example, errors of this level, it is necessary to intersect the FAR and FRR indicators. However, this is not possible, since this would require DNA identification of the person.

Fingerprints

At the moment, the most famous method is biometrics. When receiving a passport, modern Russian citizens are required to undergo the procedure of taking fingerprints in order to add them to their personal card.

This method is based on the uniqueness of fingers and has been used for quite a long time, starting with forensics (fingerprinting). By scanning fingers, the system translates the sample into a unique code, which is then compared with an existing identifier.

As a rule, information processing algorithms use the individual location of certain points that contain fingerprints - branches, the end of a pattern line, etc. The time it takes to convert the image into code and produce the result is usually about 1 second.

Equipment, including software for him, are currently produced in a complex and are relatively inexpensive.

Errors when scanning fingers (or both hands) occur quite often if:

There is unusual wetness or dryness of the fingers.

Hands are processed chemical elements, which make identification difficult.

There are microcracks or scratches.

There is a large and continuous flow of information. For example, this is possible in an enterprise where access to the workplace is carried out using a fingerprint scanner. Since the flow of people is significant, the system may fail.

The most famous companies that deal with fingerprint recognition systems: Bayometric Inc., SecuGen. In Russia, Sonda, BioLink, SmartLok, etc. are working on this.

Eye iris

The pattern of the membrane is formed at the 36th week of intrauterine development, is established by two months and does not change throughout life. Biometric iris identification systems are not only the most accurate among others in this range, but also one of the most expensive.

The advantage of the method is that scanning, that is, image capture, can occur both at a distance of 10 cm and at a distance of 10 meters.

When an image is captured, data about the location of certain points on the iris of the eye is transmitted to the computer, which then provides information about the possibility of admission. The speed of processing information about the human iris is about 500 ms.

For now this system recognition in the biometric market takes up no more than 9% of total number such identification methods. At the same time, the market share occupied by fingerprint technologies is more than 50%.

Scanners that allow you to capture and process the iris of the eye have a rather complex design and software, and therefore such devices have a high price. In addition, Iridian was initially a monopolist in the production of human recognition systems. Then other large companies began to enter the market, which were already engaged in the production of components for various devices.

Thus, at the moment in Russia there are the following companies that create human iris recognition systems: AOptix, SRI International. However, these companies do not provide indicators on the number of errors of types 1 and 2, so it is not a fact that the system is not protected from counterfeiting.

Facial geometry

There are biometric security systems associated with facial recognition in 2D and 3D modes. In general, it is believed that the facial features of each person are unique and do not change throughout life. Such characteristics as distances between certain points, shape, etc. remain unchanged.

2D mode is a static identification method. When capturing an image, it is necessary that the person does not move. The background, the presence of a mustache, beard, bright light and other factors that prevent the system from recognizing a face also matter. This means that if there are any inaccuracies, the result given will be incorrect.

At the moment, this method is not particularly popular due to its low accuracy and is used only in multimodal (cross) biometrics, which is a set of methods for recognizing a person by face and voice simultaneously. Biometric security systems may include other modules - DNA, fingerprints and others. In addition, the cross method does not require contact with the person who needs to be identified, which makes it possible to recognize people from photographs and voices recorded on technical devices.

The 3D method has completely different input parameters, so it cannot be compared with 2D technology. When recording an image, a face in dynamics is used. The system, capturing each image, creates a 3D model, with which the received data is then compared.

In this case, a special grid is used, which is projected onto the person’s face. Biometric security systems, taking several frames per second, process the image with the software included in them. At the first stage of image creation, the software discards inappropriate images where the face is difficult to see or secondary objects are present.

Then the program identifies and ignores unnecessary objects (glasses, hairstyle, etc.). Anthropometric facial features are highlighted and remembered, generating a unique code that is entered into a special data warehouse. The image capture time is about 2 seconds.

However, despite the advantage of the 3D method over the 2D method, any significant interference on the face or changes in facial expressions degrade the statistical reliability of this technology.

Today, biometric facial recognition technologies are used along with the most well-known methods described above, accounting for approximately 20% of the total biometric technology market.

Companies that develop and implement facial identification technology: Geometrix, Inc., Bioscrypt, Cognitec Systems GmbH. In Russia, the following companies are working on this issue: Artec Group, Vocord (2D method) and other, smaller manufacturers.

Veins of the palm

About 10-15 years ago, a new biometric identification technology arrived - recognition by the veins of the hand. This became possible due to the fact that hemoglobin in the blood intensively absorbs infrared radiation.

A special IR camera photographs the palm, resulting in a network of veins appearing in the image. This image is processed by the software and the result is displayed.

The location of the veins on the arm is comparable to the features of the iris of the eye - their lines and structure do not change over time. The reliability of this method can also be correlated with the results obtained from identification using the iris.

There is no need to make contact to capture an image with a reader, but using this present method requires that certain conditions be met in order for the result to be most accurate: it cannot be obtained by, for example, photographing a hand on the street. Also, do not expose the camera to light during scanning. Final result will be inaccurate if there are age-related diseases.

The distribution of the method on the market is only about 5%, but there is great interest in it from large companies that have already developed biometric technologies: TDSi, Veid Pte. Ltd., Hitachi VeinID.

Retina

Scanning the pattern of capillaries on the surface of the retina is considered the most reliable identification method. It combines the most best characteristics biometric technologies for recognizing a person by the iris of the eye and veins of the hand.

The only time when the method can give inaccurate results is cataracts. Basically, the retina has an unchanged structure throughout life.

The disadvantage of this system is that the retina is scanned when the person does not move. The technology, which is complex in its application, requires a long processing time for results.

Due to its high cost, the biometric system is not widely used, but it provides the most accurate results of all methods for scanning human features on the market.

Hands

The previously popular method of identification by hand geometry is becoming less used, as it gives the lowest results compared to other methods. When scanning, fingers are photographed, their length, the relationship between the nodes and other individual parameters are determined.

Ear shape

Experts say that everything existing methods identifications are not as accurate as recognizing a person by However, there is a way to determine identity by DNA, but in this case there is close contact with people, so it is considered unethical.

Researcher Mark Nixon from the UK states that methods at this level are new generation biometric systems; they provide the most accurate results. Unlike the retina, iris or fingers, on which extraneous parameters may most likely appear that make identification difficult, this does not happen on the ears. Formed in childhood, the ear only grows without changing its main points.

The inventor called the method of identifying a person by the organ of hearing “beam image transformation.” This technology involves capturing an image with rays of different colors, which is then translated into a mathematical code.

However, according to the scientist, his method also has negative sides. For example, hair that covers the ears, an incorrectly chosen angle, and other inaccuracies can interfere with obtaining a clear image.

Ear scanning technology will not replace such a well-known and usual way identification, like fingerprints, but can be used along with it.

It is believed that this will increase the reliability of recognizing people. The combination of different methods (multimodal) in catching criminals is especially important, the scientist believes. As a result of experiments and research, they hope to create software that will be used in court to uniquely identify guilty parties from images.

Human voice

Personal identification can be carried out both locally and remotely using voice recognition technology.

When talking, for example, on the phone, the system compares this parameter with those available in the database and finds similar samples in percentage terms. A complete match means that the identity has been established, that is, identification by voice has occurred.

In order to access something the traditional way, you must answer certain security questions. This is a digital code, mother's maiden name and other text passwords.

Modern research in this area shows that this information is quite easy to acquire, so identification methods such as voice biometrics can be used. In this case, it is not the knowledge of the codes that is subject to verification, but the person’s personality.

To do this, the client needs to say a code phrase or start talking. The system recognizes the caller's voice and checks whether it belongs to this person - whether he is who he claims to be.

Biometric information security systems of this type do not require expensive equipment, this is their advantage. In addition, to carry out voice scanning by the system, you do not need to have special knowledge, since the device independently produces a “true-false” result.

By handwriting

Identification of a person by the way they write letters takes place in almost any area of ​​life where it is necessary to sign. This happens, for example, in a bank, when a specialist compares the sample generated when opening an account with the signatures affixed during the next visit.

The accuracy of this method is low, since identification does not occur using a mathematical code, as in the previous ones, but by simple comparison. There is a high level of subjective perception here. In addition, handwriting changes greatly with age, which often makes recognition difficult.

In this case it is better to use automatic systems, which will allow you to determine not only visible matches, but also other distinctive features of the spelling of words, such as slope, distance between points and other characteristic features.

ZlodeiBaal August 11, 2011 at 9:54 pm

Modern biometric identification methods

  • Information Security

Recently, many articles have appeared on Habré devoted to Google’s facial identification systems. To be honest, many of them reek of journalism and, to put it mildly, incompetence. And I wanted to write a good article on biometrics, it’s not my first! There are a couple of good articles on biometrics on Habré - but they are quite short and incomplete. Here I will try to briefly outline the general principles of biometric identification and modern achievements of mankind in this matter. Including identification by faces.

The article has, which, in essence, is its prequel.

A joint publication with a colleague in a journal (BDI, 2009), revised to suit modern realities, will be used as the basis for the article. Habré is not yet a colleague, but he supported the publication of the revised article here. At the time of publication, the article was a brief overview of the modern biometric technology market, which we conducted for ourselves before introducing our product. The applicability judgments put forward in the second part of the article are based on the opinions of people who have used and implemented the products, as well as on the opinions of people involved in the production of biometric systems in Russia and Europe.

general information

Let's start with the basics. In 95% of cases, biometrics is essentially mathematical statistics. And matstat is an exact science, the algorithms from which are used everywhere: in radars and in Bayesian systems. Errors of the first and second types can be taken as two main characteristics of any biometric system). In radar theory they are usually called “false alarm” or “target miss”, and in biometrics the most established concepts are FAR (False Acceptance Rate) and FRR (False Rejection Rate). The first number characterizes the probability of a false match between the biometric characteristics of two people. The second is the probability of denying access to a person with clearance. The lower the FRR value for the same FAR values, the better the system. Sometimes used Comparative characteristics EER, which determines the point at which the FRR and FAR graphs intersect. But it is not always representative. You can see more details, for example.
The following can be noted: if the characteristics of the system do not include FAR and FRR for open biometric databases, then no matter what the manufacturers declare about its characteristics, this system is most likely ineffective or much weaker than its competitors.
But not only FAR and FRR determine the quality of a biometric system. If this were the only way, then the leading technology would be DNA recognition, for which FAR and FRR tend to zero. But it is obvious that this technology is not applicable at the current stage of human development! We have developed several empirical characteristics that allow us to assess the quality of the system. “Forgery resistance” is an empirical characteristic that summarizes how easy it is for a biometric identifier to be fooled. “Environmental stability” is a characteristic that empirically evaluates the stability of the system under various external conditions, such as changes in lighting or room temperature. “Ease of use” shows how difficult it is to use a biometric scanner, and whether identification is possible “on the go.” An important characteristic is “Speed ​​of operation” and “Cost of the system”. We should not forget that a person’s biometric characteristic can change over time, so if it is unstable, this is a significant disadvantage.
Abundance biometric methods amazes. The main methods using static biometric characteristics of a person are identification by papillary pattern on the fingers, iris, facial geometry, retina, pattern of hand veins, hand geometry. There is also a family of methods that use dynamic characteristics: identification by voice, handwriting dynamics, heart rate, and gait. Below is the breakdown of the biometric market a couple of years ago. Every other source fluctuates by 15-20 percent, so this is just an estimate. Also here, under the concept of “hand geometry,” there are two different methods hidden, which will be discussed below.


In this article we will consider only those characteristics that are applicable in access control and management systems (ACS) or in tasks similar to them. Due to its superiority, these are primarily static characteristics. Of the dynamic characteristics at the moment, only voice recognition has at least some statistical significance (comparable to the worst static algorithms FAR~0.1%, FRR~6%), but only under ideal conditions.
To get a feel for the probabilities of FAR and FRR, you can estimate how often false matches will occur if you install an identification system at the entrance of an organization with N employees. The probability of a false match of a fingerprint scanner for a database of N fingerprints is FAR∙N. And every day about N people also pass through the access control point. Then the probability of error per working day is FAR∙(N∙N). Of course, depending on the goals of the identification system, the probability of an error per unit of time can vary greatly, but if we accept one error per working day as acceptable, then:
(1)
Then we find that stable operation of the identification system at FAR=0.1% =0.001 is possible with a staff size of N≈30.

Biometric scanners

Today, the concepts of “biometric algorithm” and “biometric scanner” are not necessarily interrelated. The company can produce these elements individually, or together. The greatest differentiation between scanner manufacturers and software manufacturers has been achieved in the finger papillary pattern biometrics market. The smallest 3D face scanner on the market. In fact, the level of differentiation largely reflects the development and saturation of the market. The more choice there is, the more the theme is worked out and brought to perfection. Different scanners have different sets of abilities. Basically it is a set of tests to check whether a biometric object is tampered with or not. For finger scanners this could be a bump test or a temperature check, for eye scanners it could be a pupil accommodation test, for face scanners it could be facial movement.
Scanners greatly influence the resulting FAR and FRR statistics. In some cases, these numbers can change tens of times, especially in real conditions. Typically, the characteristics of the algorithm are given for a certain “ideal” base, or simply for a well-suited one, where blurry and blurry frames are discarded. Only a few algorithms honestly indicate both the base and the full issuance of FAR/FRR for it.

And now in more detail about each of the technologies

Fingerprints


Dactyloscopy (fingerprint recognition) is the most developed biometric method of personal identification to date. The catalyst for the development of the method was its widespread use in forensic science of the 20th century.
Each person has a unique papillary fingerprint pattern, which makes identification possible. Typically, algorithms use characteristic points on fingerprints: the end of a pattern line, the branching of a line, single points. Additionally, information is used about the morphological structure of the fingerprint: the relative position of the closed lines of the papillary pattern, “arched” and spiral lines. The features of the papillary pattern are converted into a unique code that preserves the information content of the fingerprint image. And it is the “fingerprint codes” that are stored in the database used for searching and comparison. The time to convert a fingerprint image into a code and identify it usually does not exceed 1s, depending on the size of the database. The time spent raising your hand is not taken into account.
VeriFinger SDK statistics obtained using the DP U.are.U fingerprint scanner were used as a source of FAR and FRR data. Over the past 5-10 years, the characteristics of finger recognition have not made much progress, so the above figures show the average value of modern algorithms quite well. The VeriFinger algorithm itself won the International Fingerprint Verification Competition for several years, where finger recognition algorithms competed.

The characteristic FAR value for the fingerprint recognition method is 0.001%.
From formula (1) we find that stable operation of the identification system at FAR=0.001% is possible with a staff size of N≈300.
Advantages of the method. High reliability - the statistical indicators of the method are better than the indicators of identification methods by face, voice, and painting. Low cost devices that scan a fingerprint image. Enough simple procedure fingerprint scanning.
Disadvantages: the fingerprint papillary pattern is very easily damaged by small scratches and cuts. People who have used scanners in enterprises with several hundred employees report a high rate of scanning failure. Many of the scanners do not treat dry skin adequately and do not allow older people to pass through. When communicating at the last MIPS exhibition, the head of the security service of a large chemical enterprise said that their attempt to introduce finger scanners at the enterprise (scanners of various systems were tried) failed - minimal exposure to chemical reagents on the fingers of employees caused a failure of the scanners' security systems - the scanners declared the fingers a fake. There is also insufficient security against fingerprint image forgery, partly caused by the widespread use of the method. Of course, not all scanners can be fooled by methods from MythBusters, but still. For some people with “inappropriate” fingers (body temperature, humidity), the probability of being denied access can reach 100%. The number of such people varies from a fraction of a percent for expensive scanners to ten percent for inexpensive ones.
Of course, it is worth noting that a large number of shortcomings are caused by the widespread use of the system, but these shortcomings do exist and they appear very often.
Market situation
Currently, fingerprint recognition systems occupy more than half of the biometric market. Many Russian and foreign companies are engaged in the production of access control systems based on the fingerprint identification method. Due to the fact that this direction is one of the oldest, it has become most widespread and is by far the most developed. Fingerprint scanners have come a really long way to improve. Modern systems are equipped various sensors(temperature, pressing force, etc.), which increase the degree of protection against counterfeiting. Every day systems become more convenient and compact. In fact, the developers have already reached a certain limit in this area, and there is nowhere to develop the method further. In addition, most companies produce ready-made systems that are equipped with everything necessary, including software. Integrators in this area simply do not need to assemble the system themselves, since this is unprofitable and will take more time and effort than buying a ready-made and already inexpensive system, especially since the choice will be really wide.
Among the foreign companies involved in fingerprint recognition systems, one can note SecuGen (USB scanners for PCs, scanners that can be installed in enterprises or built into locks, SDK and software for connecting the system with a computer); Bayometric Inc. (fingerprint scanners, TAA/Access control systems, fingerprint SDKs, embedded fingerprint modules); DigitalPersona, Inc. (USB scanners, SDK). In Russia, the following companies operate in this area: BioLink (fingerprint scanners, biometric access control devices, software); Sonda (fingerprint scanners, biometric access control devices, SDK); SmartLock (fingerprint scanners and modules), etc.

Iris



The iris of the eye is a unique characteristic of a person. The pattern of the iris is formed in the eighth month of intrauterine development, finally stabilizes at the age of about two years and practically does not change throughout life, except as a result of severe injuries or severe pathologies. The method is one of the most accurate among biometric methods.
The iris identification system is logically divided into two parts: a device for capturing an image, its primary processing and transmission to a computer, and a computer that compares the image with images in the database and transmits the admission command to the executive device.
The time for primary image processing in modern systems is approximately 300-500ms, the speed of comparing the resulting image with the database is 50,000-150,000 comparisons per second on a regular PC. This speed of comparison does not impose restrictions on the use of the method in large organizations when used in access systems. When using specialized computers and search optimization algorithms, it even becomes possible to identify a person among the residents of an entire country.
I can immediately answer that I am somewhat biased and have a positive attitude towards this method, since it was in this field that we launched our startup. A paragraph at the end will be devoted to a little self-PR.
Statistical characteristics of the method
The FAR and FRR characteristics for the iris are the best in the class of modern biometric systems (with the possible exception of the retinal recognition method). The article presents the characteristics of the iris recognition library of our algorithm - EyeR SDK, which correspond to the VeriEye algorithm tested using the same databases. We used CASIA databases obtained by their scanner.

The characteristic FAR value is 0.00001%.
According to formula (1) N≈3000 is the number of personnel of the organization, at which employee identification is quite stable.
Here it is worth noting an important feature that distinguishes the iris recognition system from other systems. When using a camera with a resolution of 1.3MP or more, you can capture two eyes in one frame. Since the FAR and FRR probabilities are statistically independent probabilities, when recognizing using two eyes, the FAR value will be approximately equal to the square of the FAR value for one eye. For example, for a FAR of 0.001% using two eyes, the probability of a false admission will be 10-8%, with an FRR only twice as high as corresponding value FRR for one eye at FAR=0.001%.
Advantages and disadvantages of the method
Advantages of the method. Statistical reliability of the algorithm. Capturing an image of the iris can be done at a distance of several centimeters to several meters, without physical contact between a person and the device. The iris is protected from damage - which means it will not change over time. It is also possible to use a high number of methods that protect against counterfeiting.
Disadvantages of the method. The price of a system based on the iris is higher than the price of a system based on finger recognition or facial recognition. Low availability of ready-made solutions. Any integrator who comes to the Russian market today and says “give me a ready-made system” will most likely fail. Mostly sold expensive systems turnkey, installed by large companies such as Iridian or LG.
Market situation
At the moment, the share of iris identification technologies in the global biometric market is, according to various estimates, from 6 to 9 percent (while fingerprint recognition technologies occupy over half of the market). It should be noted that from the very beginning of the development of this method, its strengthening in the market was slowed down by the high cost of equipment and components necessary to assemble an identification system. However, as digital technologies developed, the cost of a single system began to decrease.
The leader in software development in this area is Iridian Technologies.
The entry of a large number of manufacturers into the market was limited by the technical complexity of the scanners and, as a consequence, their high cost, as well as the high price of the software due to Iridian’s monopoly position in the market. These factors allowed development in the field of iris recognition only to large companies, most likely already engaged in the production of some components suitable for the identification system (optics high resolution, miniature cameras with infrared illumination, etc.). Examples of such companies include LG Electronics, Panasonic, OKI. They entered into an agreement with Iridian Technologies, and as a result of joint work, the following identification systems appeared: Iris Access 2200, BM-ET500, OKI IrisPass. Subsequently, improved models of systems emerged, thanks to the technical capabilities of these companies to independently develop in this area. It should be said that the above companies also developed their own software, but in the end they prefer Iridian Technologies software in the finished system.
The Russian market is dominated by products of foreign companies. Although even that can be purchased with difficulty. For a long time, the Papillon company assured everyone that they had iris recognition. But even representatives of RosAtom, their direct buyer, for whom they made the system, say that this is not true. At some point, another Russian company appeared that made iris scanners. Now I don’t remember the name. They purchased the algorithm from someone, perhaps from the same VeriEye. The scanner itself was a 10-15 year old system, by no means contactless.
In the last year, a couple of new manufacturers have entered the global market due to the expiration of the primary patent for human eye recognition. The most trustworthy of them, in my opinion, is AOptix. At least their previews and documentation do not raise suspicions. The second company is SRI International. Even at first glance, to a person who has worked on iris recognition systems, their videos seem very deceitful. Although I wouldn’t be surprised if in reality they can do something. Both systems do not show data on FAR and FRR, and also, apparently, are not protected from counterfeiting.

Face recognition

There are many recognition methods based on facial geometry. All of them are based on the fact that the facial features and shape of the skull of each person are individual. This area of ​​biometrics seems attractive to many because we recognize each other primarily by our faces. This area is divided into two areas: 2-D recognition and 3-D recognition. Each of them has advantages and disadvantages, but much also depends on the scope of application and the requirements for a particular algorithm.
I’ll briefly tell you about 2-d and move on to one of the most interesting methods today - 3-d.
2-D facial recognition

2-D facial recognition is one of the most statistically ineffective biometric methods. It appeared quite a long time ago and was used mainly in forensic science, which contributed to its development. Subsequently, computer interpretations of the method appeared, as a result of which it became more reliable, but, of course, it was inferior and every year is increasingly inferior to other biometric methods of personal identification. Currently, due to poor statistical indicators, it is used in multimodal or, as it is also called, cross biometrics, or in in social networks.
Statistical characteristics of the method
For FAR and FRR, data for the VeriLook algorithms were used. Again, for modern algorithms it has very ordinary characteristics. Sometimes algorithms with an FRR of 0.1% with a similar FAR flash by, but the bases on which they were obtained are very questionable (cut out background, identical facial expression, identical hairstyle, lighting).

The characteristic FAR value is 0.1%.
From formula (1) we obtain N≈30 - the number of personnel of the organization, at which employee identification occurs quite stably.
As you can see, the statistical indicators of the method are quite modest: this eliminates the advantage of the method that it is possible to covertly photograph faces in crowded places. It’s funny to see how a couple of times a year another project is funded to detect criminals through video cameras installed in crowded places. Over the past ten years, the statistical characteristics of the algorithm have not improved, but the number of such projects has increased. Although, it is worth noting that the algorithm is quite suitable for tracking a person in a crowd through many cameras.
Advantages and disadvantages of the method
Advantages of the method. With 2-D recognition, unlike most biometric methods, expensive equipment is not required. With appropriate equipment, recognition is possible at significant distances from the camera.
Flaws. Low statistical significance. There are lighting requirements (for example, it is not possible to register the faces of people entering from the street on a sunny day). For many algorithms, any external interference is unacceptable, such as glasses, a beard, or some elements of a hairstyle. A frontal image of the face is required, with very slight deviations. Many algorithms do not take into account possible changes in facial expressions, that is, the expression must be neutral.
3-D facial recognition

The implementation of this method is a rather complex task. Despite this, there are currently many methods for 3-D facial recognition. The methods cannot be compared with each other, since they use different scanners and databases. Not all of them issue FAR and FRR; completely different approaches are used.
The transitional method from 2-d to 3-d is a method that implements the accumulation of information about a person. This method has better characteristics than the 2d method, but it also uses only one camera. When a subject is entered into the database, the subject turns his head and the algorithm connects the image together, creating a 3D template. And during recognition, several frames of the video stream are used. This method is rather experimental and I have never seen an implementation for access control systems.
The most classic method is the template projection method. It consists of projecting a grid onto an object (face). Next, the camera takes pictures at a speed of tens of frames per second, and the resulting images are processed by a special program. A beam incident on a curved surface is bent - the greater the curvature of the surface, the stronger the bend of the beam. Initially, a source of visible light was used, supplied through “blinds”. Then visible light was replaced by infrared, which has several advantages. Typically, at the first stage of processing, images in which the face is not visible at all or in which there are foreign objects that interfere with identification are discarded. Based on the resulting images, a 3-D model of the face is reconstructed, on which unnecessary noise (hairstyle, beard, mustache and glasses) is highlighted and removed. Then the model is analyzed - anthropometric features are identified, which are ultimately recorded in a unique code entered into the database. Image capture and processing time is 1-2 seconds for the best models.
The method of 3-D recognition based on images obtained from several cameras is also gaining popularity. An example of this is the Vocord company with its 3D scanner. This method gives positioning accuracy, according to the developers, higher than the template projection method. But until I see FAR and FRR at least in their own database, I won’t believe it!!! But it has been in development for 3 years now, and progress at exhibitions is not yet visible.
Statistical indicators of the method
Complete data on FRR and FAR for algorithms of this class are not publicly available on manufacturers’ websites. But for the best models from Bioscript (3D EnrolCam, 3D FastPass), working using the template projection method with FAR = 0.0047%, the FRR is 0.103%.
It is believed that the statistical reliability of the method is comparable to the reliability of the fingerprint identification method.
Advantages and disadvantages of the method
Advantages of the method. No need to contact the scanning device. Low sensitivity to external factors, both on the person himself (the appearance of glasses, a beard, a change in hairstyle) and in his environment (lighting, turning the head). High level of reliability comparable to fingerprint identification.
Disadvantages of the method. High cost of equipment. Commercially available systems were even more expensive than iris scanners. Changes in facial expressions and facial noise impair the statistical reliability of the method. The method is not yet well developed, especially in comparison with the long-used fingerprinting, which makes its widespread use difficult.
Market situation
Recognition by facial geometry is considered one of the “three big biometrics”, along with recognition by fingerprints and iris. It must be said that this method is quite common, and it is still preferred over recognition by the iris of the eye. The share of facial geometry recognition technologies in the total volume of the global biometric market can be estimated at 13-18 percent. In Russia, there is also greater interest in this technology than, for example, in iris identification. As mentioned earlier, there are many 3-D recognition algorithms. For the most part, companies prefer to develop ready-made systems, including scanners, servers and software. However, there are also those who only offer the SDK to the consumer. Today, the following companies are involved in the development of this technology: Geometrix, Inc. (3D face scanners, software), Genex Technologies (3D face scanners, software) in the USA, Cognitec Systems GmbH (SDK, special computers, 2D cameras) in Germany, Bioscrypt (3D face scanners, software) - a subsidiary of the American company L- 1 Identity Solutions.
In Russia, the companies Artec Group (3D facial scanners and software) are working in this direction - a company whose head office is located in California, and development and production are carried out in Moscow. Also several Russian companies own 2D facial recognition technology – Vocord, ITV, etc.
In the field of 2D face recognition, the main subject of development is software, because... regular cameras do a great job of capturing facial images. The solution to the problem of recognition from a face image has to some extent reached a dead end - for several years now there has been virtually no improvement in the statistical indicators of algorithms. In this area, a systematic “work on mistakes” is taking place.
3D facial recognition is now a much more attractive area for developers. Many teams work there and we regularly hear about new discoveries. Many works are in the “about to be released” state. But so far there are only old offers on the market; the choice has not changed in recent years.
One of interesting moments, which I sometimes think about and to which Habr may perhaps answer: is the accuracy of kinect enough to create such a system? There are quite a few projects to pull out a 3D model of a person through it.

Recognition by veins of the arm


This is a new technology in the field of biometrics, its widespread use began only 5-10 years ago. An infrared camera takes pictures of the outside or inside of the hand. The pattern of veins is formed due to the fact that hemoglobin in the blood absorbs infrared radiation. As a result, the degree of reflection is reduced and the veins are visible on the camera as black lines. Special program Based on the received data, it creates a digital convolution. No human contact with the scanning device is required.
The technology is comparable in reliability to iris recognition, being superior in some ways and inferior in others.
The FRR and FAR values ​​are given for the Palm Vein scanner. According to the developer, with a FAR of 0.0008%, the FRR is 0.01%. No company provides a more accurate graph for several values.
Advantages and disadvantages of the method
Advantages of the method. No need to contact the scanning device. High reliability - the statistical indicators of the method are comparable to the readings of the iris. Hiddenness of the characteristic: unlike all the above, this characteristic is very difficult to obtain from a person “on the street,” for example, by photographing him with a camera.
Disadvantages of the method. The scanner should not be exposed to sunlight or halogen lamps. Some age-related diseases, such as arthritis, greatly worsen FAR and FRR. The method is less studied in comparison with other static biometric methods.
Market situation
Recognition by hand vein pattern is quite new technology, and therefore its share in the world market is small and amounts to about 3%. However, to this method there is growing interest. The fact is that, being quite accurate, this method does not require such expensive equipment as, for example, recognition methods based on facial geometry or iris. Now many companies are developing in this area. For example, by order of the English company TDSi, software was developed for the biometric palm vein reader PalmVein, presented by Fujitsu. The scanner itself was developed by Fujitsu primarily to combat financial fraud in Japan.
The following companies also operate in the field of vein pattern identification: Veid Pte. Ltd. (scanner, software), Hitachi VeinID (scanners)
I don’t know of any companies in Russia working on this technology.

Retina


Until recently, it was believed that the most reliable method of biometric identification and personal authentication was a method based on scanning the retina. It contains the best features of iris and arm vein identification. The scanner reads the pattern of capillaries on the surface of the retina. The retina has a fixed structure, unchanged over time except as a result of disease, such as cataracts.
A retinal scan uses low-intensity infrared light directed through the pupil to the blood vessels at the back of the eye. Retinal scanners have become widespread in access control systems for highly sensitive facilities, since they have one of the lowest percentages of denied access to registered users and there is virtually no erroneous access permission.
Unfortunately, a number of difficulties arise when using this biometric method. The scanner here is quite complex optical system, and the person must not move for a significant period of time while the system is being aimed, which causes unpleasant sensations.
According to EyeDentify, for the ICAM2001 scanner with FAR=0.001%, the FRR value is 0.4%.
Advantages and disadvantages of the method
Advantages. High level of statistical reliability. Due to the low prevalence of systems, the likelihood of developing a way to “deceive” them is low.
Flaws. Difficult to use system with high processing time. High cost of the system. Lack of a wide market supply and, as a consequence, insufficient intensity of development of the method.

Hand geometry


This method, which was quite common 10 years ago and originated from criminology, has been on the decline in recent years. It is based on obtaining the geometric characteristics of the hands: finger lengths, palm width, etc. This method, like the retina of the eye, is dying, and since it has much lower characteristics, we will not even introduce a more complete description of it.
It is sometimes believed that vein recognition systems use geometric recognition methods. But we have never seen anything like this explicitly stated on sale. And besides, often when recognizing by veins, a picture of only the palm is taken, while when recognizing by geometry, a picture of the fingers is taken.

A little self-PR

At one time, we developed a good eye recognition algorithm. But at that time, such a high-tech thing was not needed in this country, and we didn’t want to go to bourgeoistan (where we were invited after the first article). But suddenly, after a year and a half, there were investors who wanted to build themselves a “biometric portal” - a system that would feed 2 eyes and use the color component of the iris (for which the investor had a worldwide patent). Actually, this is what we are doing now. But this is not an article about self-PR, this is a short lyrical digression. If anyone is interested, there is some information, and sometime in the future, when we enter the market (or don’t), I will write a few words here about the ups and downs of the biometric project in Russia.

conclusions

Even in the class of static biometric systems, there is a large selection of systems. Which one should you choose? It all depends on the requirements for the security system. The most statistically reliable and forgery-resistant access systems are the iris and hand vein access systems. For the first of them there is a wider market of offers. But this is not the limit. Biometric identification systems can be combined to achieve astronomical precision. The cheapest and easiest to use, but with good statistics, are finger tolerance systems. 2D face tolerance is convenient and cheap, but has a limited range of applications due to poor statistical performance.
Let's consider the characteristics that each of the systems will have: resistance to counterfeiting, environmental resistance, ease of use, cost, speed, stability of the biometric feature over time. Let's put ratings from 1 to 10 in each column. The closer the score is to 10, the better system in this regard. The principles for selecting assessments were described at the very beginning of the article.


We will also consider the relationship between FAR and FRR for these systems. This ratio determines the efficiency of the system and the breadth of its use.


It is worth remembering that for the iris, you can increase the accuracy of the system almost quadratically, without loss of time, if you complicate the system by making it for two eyes. For the fingerprint method - by combining several fingers, and recognition by veins, by combining two hands, but such an improvement is only possible with an increase in the time spent working with a person.
Summarizing the results for the methods, we can say that for medium and large objects, as well as for objects with the highest security requirements, the iris should be used as a biometric access and, possibly, recognition by hand veins. For facilities with up to several hundred personnel, access using fingerprints will be optimal. Recognition systems based on 2D facial images are very specific. They may be required in cases where recognition requires the absence of physical contact, but it is impossible to install an iris control system. For example, if it is necessary to identify a person without his participation, using a hidden camera, or an external detection camera, but this is only possible if there is a small number of subjects in the database and a small flow of people filmed by the camera.

A note for young technicians

Some manufacturers, for example Neurotechnology, have demo versions of the biometric methods they produce available on their website, so you can easily connect them and play around. For those who decide to delve into the problem more seriously, I can recommend the only book that I have seen in Russian - “Guide to Biometrics” by R.M. Ball, J.H. Connell, S. Pankanti. There are many algorithms and their mathematical models. Not everything is complete and not everything corresponds to modern times, but the base is good and comprehensive.

P.S.

In this opus I did not go into the problem of authentication, but only touched upon identification. In principle, from the characteristics of FAR/FRR and the possibility of forgery, all conclusions on the issue of authentication suggest themselves.

Tags:

  • biometrics
  • fingerprint scanners
Add tags