The Web    Google
Biometric Security - From Fingers To Faces

Biometric Security - From Fingers To Faces
July 1, 2002

Biometric security definitely isn't a "one-size-fits-all" proposition. Depending on the needs of the enterprise, administrators might find themselves dealing with fingerprint, iris, hand, or facial biometric identifiers, for example.

Usually, biometrics acts as a second or third layer of security, speakers said, during the recent BiometriTech conference in New York City. Unlike a password, which is "something you know," or a token, which is "something you have," a fingerprint or a facial scan is "something you are."

"You have to adapt to (existing) security. You can't just throw out all that PKI you bought, much as you might want to," said John Ticer, President and CEO of Bionetrix.

"Our view is that you layer in the gateway security that makes everything else more valuable," he added.

Theoretically, biometric identifiers are also "not susceptible to theft, loss, or compromise, and are difficult to repudiate," said Gillian Glasser, senior consultant for the International Biometric Group, an industry analyst, consulting, and product testing firm specializing in biometrics.

"(But) accuracy is still an issue. Some small percentage of users will be falsely matched, non-matched, and not enrolled," Glasser acknowledged.

Biometrics have also shown themselves to be spoofable, she admitted, mentioned "gummy fingers" as one example.

Although Glasser didn't spell out any of the details, "gummy fingers" have been written up in security publications. Tsutomu Matsumoto, a Japanese cryptographer and a teacher at Yokohama National University, first developed "gummy fingers," which he credits with fooling commercial fingerprint readers about 80 percent of the time.

Matsumoto has used two techniques to make the "gummy fingers." In one method, he makes a plaster mold of a live finger and pours liquid gelatin over the mold, waiting till the mold hardens.

The other technique, known as "latent fingerprinting," is more complicated, but yields the same statistical results. Essentially, Matsumoto takes a digital photo of a fingerprint left on a piece of glass, and processes it in Photoshop to improve the contrast. After printing the photo on to a transparency sheet, he uses a photo-sensitive PCB to etch the fingerprint into copper. Finally, he makes a "gummy" mold from the copper finger.

The accuracy of biometric identifiers does vary according to the type of identifier, Glasser said at the conference in New York City. Generally speaking, fingerprints are among the most accurate identifiers, and facial scans among the least.

Even fingerprints can change over time, though. "Manual labor does alter the ability to be repeatable," according to Glasser.

When it comes to facial scanning, lighting conditions and positioning of the subject can matter a lot. "Companies realize what the weaknesses (of facial scanning) are. We're expecting some kind of leap in algorithm technology," she predicted.

Understandably, some end users are worried about their privacy. As a result, administrators should work with legal departments to establish policies around biometrics. "There has to be a legal policy about protecting personal artifacts," Ticer noted.

Beyond security benefits, administrators might be asked to implement biometric systems for reasons ranging from government regulations to better workflow.

Ticer said that one of his customers, a large bank, has gained a lot of productivity by using biometrics to help eliminate lengthy paper trails that used to choke communications with brokerage firms.

"It used to take a couple of months to fax things back and forth. A two month process (is now) a three-day process," he maintained.

On the other hand, productivity gains can be offset by "hidden costs" incurred from systems integration and user training, according to Glasser. Quite commonly, she said, hardware prices account for only about 20 percent of overall implementation costs.

One administrator attending the conference, from Brookhaven National Laboratories, said he found the cost of additional network wiring an unwelcome surprise.

Government agencies, in fact, are becoming big users of biometric security. Other agencies present at the show included the FBI, the INS, and the Department of Defense. Early adopters also include highly regulated fields such as banking, health, and the pharmaceutical industry.

Outside of accuracy levels, biometric identifiers vary along other lines, as well. Costs of biometric hardware systems tend to be lowest for fingerprinting, higher for hand scanning, and even higher for iris scanning. "(But) pricing is coming down," Glasser added.

Hand scanning is "straightforward," so it is suitable for use with children, for instance.

Finger scanning requires "some training" of end users. On the other hand, though, some users resist fingerprinting, associating it with "the criminal element."

Iris scanning can be a good technique for populations such as senior citizens, who might have trouble using their hands. However, some users don't do well at focusing on the camera, and others don't want to "feel invaded."

There are "dozens of vendors" in the finger scanning field, according to Glasser. Iris scanning vendors include Visionics and Visage. Iridian is the only supplier of iris scanning systems, so far, and Hand Recognition Systems is alone in the hand scanning arena.

Also at the BiometriTech show, however, Sprint rolled out plans to provide biometric technologies in several vertical markets. Sprint is looking at health, education, and hospitality, for instance, according to another speaker, Charles G. Warren, director of Sprint's Service Technologies Lab.

  • Securing the DoJ
  • 'Buffalo Spammer' Arrested
  • Cisco Snaps Up Security Software Maker
  • 7/20: Mydoom.L@mm a Mass-Mailing Worm
  • New nCipher Product Targets Online Payment Card Fraud
  • For Win Wonks, Software Restriction is Good Policy
  • War Threat Threaded to Digital Attacks?
  • Anti-Spam Bill Clears Senate
  • AntiOnline Security Spotlight: CD-Wrecker
  • 6/14: Dansh.worm!irc an IRC Bot
  • 10/28: Backdoor.Futro a Server Program
  • Security Camera Industry Information