ITNE2002 Assignment 2: In-Depth Survey on Biometric Security Report

Verified

Added on  2020/10/05

|7
|1658
|432
Report
AI Summary
This report provides a comprehensive overview of biometric security, a critical component of network and information security. It begins by defining biometric data and its role in authentication, detailing various types such as fingerprints, facial recognition, voice recognition, and DNA. The report explores the reliability of biometric systems, discussing their strengths and weaknesses, including factors like makeup, changing facial details, and the potential for data duplication. It also addresses the risks associated with biometric technology, such as misuse of personal data and potential information leaks. Furthermore, the report outlines methods to secure biometric systems, emphasizing the use of multiple authentication steps and improved server security. Overall, the report highlights the importance of biometric security in protecting data and information in the modern digital landscape, providing valuable insights into its applications, performance, and future developments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network and Information
Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Table of Contents.............................................................................................................................2
INTRODUCTION...........................................................................................................................1
MAIN BODY..................................................................................................................................1
Biometric Data.............................................................................................................................1
Types of Biometric Data..............................................................................................................1
Reliability of Biometric Security.................................................................................................3
Risk of Technology......................................................................................................................4
How to Secure biometric Method................................................................................................4
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
INTRODUCTION
Biometric is the authentication of behavioural or physical information or characteristics
that can be used for digital identity of person to get access to any system, data or device. The
different type of biometric identities is facial pattern, voice characteristics, fingerprint and retina.
Biometric security devices are used to provide access to particular person using their unique
traits (Lu, Y. and et. al., 2015). The information collected from this body parts or behavioural
characteristics are unique for every person. This study presents the survey of biometric security.
Recent development in information security is consists of different areas and study is explaining
use of biometric technology in information security. The methods used to secure information
through biometric security are explained in report.
MAIN BODY
Biometric Data
The biometric data of a person is the unique quality of person is pattern. The pattern and
uniqueness of this data can be used in different devices to provide access to particular device,
data and system. This is one of the most effective and suitable method for data security. Some
system which are confidential and needs high protection can be secured using this technology.
Through this method the access can be provided to authorised person by using their unique
identification attributes. The information can be only access by the person whose biometric data
added to the security system. The accuracy and precision of security can be improved by using
multiple type of biometric data. For example an important information is stored in a vault and the
key to open vault is biometric data of particular person. This vault can be only opened by that
person. This how the confidential data or information can be secured by biometric technology by
providing authority to limited people (Choi, Lee and Yoon, 2016). The most important thing
about the biometric data is it can't be stole by anyone because the biometric data is attached to
human body.
Types of Biometric Data
The different type of information of particular person which can be used as biometric data are-
fingerprint, photo and video, physiological recognition, voice recognition signature, DNA,
physical movement, navigation pattern and engagement. This all kind of information can be used
as biometric data. There are two type of information
Fingerprint-
1
Document Page
The fingerprint of all individual is different. The pattern in the fingerprint is unique for
each person. Two person can't have same fingerprints pattern. So, this speciality of fingerprint
makes it effective in biometric security. The devices used in biometric security for fingerprint
are the fingerprint scanner and a processing unit to process the finger print of the person who is
trying to open the protected data, system and information. The processor will only provide the
authority to the person whose fingerprint matches with pre-existed data to provide access.
Photo and Video
The photos and videos also can be used as the unique biometric information. This is also
known as face recognition. In this technique the facial data of a person is used as information
which is matches at the time of authentication. In the facial recognition method the information
of facial structure and pattern is used as unique information. This is the latest technology which
is used in different smartphones to unlock the device. The efficiency of this method is less
suitable because two persons may have same facial structure.
Physiological Recognition
The information like body structure, hand geometry, retinal information is used as unique
key to provide access to a person. The other physiological biometric data are iris scanning, vein
recognition of palm and recognition of ear (Donaldson, AliphCom, 2015). By using camera and
infrared rays are used to scan this kind of information of person to provide access to device or
information.
Voice Recognition
The voice property and pattern can also be used as biometric data cause each person have
different voice pitch and pattern for same sentence. This patterns of person's voice can be used as
unique data to authenticate a person to get access to a vault. The voice patterns and pitches are
analysed by the computer to generate information for particular person. This collected
information us used at the time when authentication is required to get access to the information.
Signature
Writing pattern of each person has different qualities which can't be copied. The upper
and bottom strokes of hand writing of individual person are connected with their psychological
behaviour. For each person the pattern of words written in signature have uniqueness that
information is used as key or password to get access to some protected data, system or
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
information. At the time of authentication the uniqueness of sample is compared to the signature
of person to provide them access.
DNA Structure
The DNA is the most complex and 100% unique information which is unique for each
human being. The nitrogen base sequence in DNA is consists of uniqueness. For each person this
sequence is different. So, the DNA also can be used as biometric data to secure any important
detail or information.
The behavioural biometric data is related to psychology of person. This kind of
information is typing pattern, physical movement, navigation pattern and engagement.
Typing Pattern
The speed of typing is different every person. The typing speed of individual person can
be used as the biometric data to authenticate a person (Karimian, Wortman and Tehranipoor,
2016). The degree of impact on the keyboard is used to find the pattern.
Physical Movement
The walking and moving style of each person is different the movement while walking
and moving. This physical movement are tracked by different sensors. This walking pattern is
used to compare at the time of authentication process to a person.
Navigation Pattern
The movement of fingers on the touch pad and patterns of movements also can be used as
biometric data. The device can perform the biometric operation to check the authenticity of user.
The most important thing in this is the navigation of person on the device which is consists of
protected data or information.
Engagement Patterns
This data is related to the process how the person works on different devices and
applications. This patterns of work are stored and analysed by the system to process check the
person authenticity at the time of working on system.
Reliability of Biometric Security
The performance of the biometric security is not that much efficient for different
conditions. The biometric system is not able to detect the person with makeup and sunglasses.
The facial details change with time and in condition like illness can make the person's voice pitch
different. The biometric details which are originated from the behaviour person can be vary as
3
Document Page
per the mood of person. The details like voice and duplicate fingerprint can be used to access the
protected files. This is also difficult the situation like two of attributes are matching and some of
them are attributes are different of authenticated person. This maker the system less reliable.
Risk of Technology
The technology can be misused by anyone to perform illegal activity. Different
companies can use this personal data to manipulate their thinking (Adams and Little, BlackBerry
Ltd, 2016). Leakage of information related to DNA can cause huge troubles from medical and
research field.
How to secure biometric Method
The different methods can be used to make biometric security system more reliable. The
multiple authentication and manual authentication can be used to make the system more
efficient. The security of server need to be improved to get more secure operation of biometric
data. Multiple step verification can improve the authentication process using biometric data.
CONCLUSION
This report is concluding the importance of biometric security technology in protection of
data and information. The different methods used in biometric security are evaluated in report.
Different way to use unique information of person in biometric methods is explained in study.
The application and performance of biometric authentication technology is explained through
report.
4
Document Page
REFERENCES
Books and Journals
Adams, N.P. and Little, H.A., BlackBerry Ltd, 2016. Optimized biometric authentication method
and system. U.S. Patent 9,378,346.
Choi, H.S., Lee, B. and Yoon, S., 2016. Biometric authentication using noisy electrocardiograms
acquired by mobile sensors. IEEE Access. 4. pp.1266-1273.
Donaldson, T.A., AliphCom, 2015. System and method for controlling access to network services
using biometric authentication. U.S. Patent 9,118,488.
Karimian, N., Wortman, P.A. and Tehranipoor, F., 2016, October. Evolving authentication
design considerations for the internet of biometric things (IoBT). In Proceedings of the
Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign
and System Synthesis (p. 10). ACM.
Lu, Y. and et. al., 2015. An enhanced biometric-based authentication scheme for telecare
medicine information systems using elliptic curve cryptosystem. Journal of medical
systems. 39(3). p.32.
5
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]