The Positive Effects of Biometrics on Modern Technology: A Report

Verified

Added on  2023/04/20

|18
|3907
|375
Report
AI Summary
This report investigates the positive impact of biometrics on technology, focusing on authentication methods and security enhancements. The report begins with a summary, followed by a literature review that synthesizes various research papers, journals, and articles on the subject. A key paper by Alsaadi (2015) is then reviewed, discussing psychological biometric authentication techniques and their advantages and disadvantages. The report evaluates the outcomes of this paper and offers personal recommendations for further investigation, including combining behavioral and psychological biometric systems. Finally, it addresses legal, social, ethical, professional issues, and academic misconduct related to biometrics, emphasizing the importance of addressing these concerns. The analysis covers various biometric methods, including face recognition, fingerprint scanning, and iris recognition, and their roles in improving security and user authentication, as well as future developments and potential advancements.
Document Page
Running head: HOW HAS BIOMETRICS POSITIVELY AFFECTED TECHNOLOGY
How has biometrics positively affected technology
Name of the Student:
Name of the University:
Author Note
Date of Production:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ReferencesReferences
Table of Contents
Summary..........................................................................................................................................2
Literature Review............................................................................................................................3
Review of a Key Paper....................................................................................................................7
Evaluation and Outcomes................................................................................................................8
Personal Recommendation for Further Investigation......................................................................9
Legal, Social, Ethical, Professional Issues and Academic Misconduct........................................11
Professional issues to Biometrics:.............................................................................................11
Social Issues to Biometrics:.......................................................................................................12
Legal Issues to Biometrics:........................................................................................................13
Ethical Issues to Biometrics:.....................................................................................................14
Academic Misconduct to Biometrics:.......................................................................................14
References......................................................................................................................................15
Document Page
2ReferencesReferences
Summary
Biometrics is simply referred to an individual’s recognition with respect to the
characteristics of biology and behavior. During the widespread of computer usage in the late 20th
century, digital biometrics was introduced in 1994 and saw significant emerge for new
possibilities. The following tool has been observed (frequently) to establish confidence in
dealing with the known-unknown factor of an individual (out of a group), while involved rights
are also present. The subject relies on the fact that every personnel have distinctive features, in
terms of both behavior and biology in multiple ways. The basic operations of recognition process
is shown below (Figure 1).
(Figure 1: Basic Sample Operation of Biometric Recognition)
Source: Author
The use of biometric system are not only limited to recognition, since access regulation to
information, physical spaces, services, and other benefits and rights, while crossing international
Document Page
3ReferencesReferences
borders are included. Moreover, motivational factor for using biometrics is overlapping and
diverse. The digital platform has the scopes of improving efficiency and convenient
characteristic of reduction in fraud, increasing public safety, national security and transactions in
routine access.
There are certain amount of research papers by many authors, who have justified
different scenarios to the same operation. However, the level of positive change in technology
(due to biometrics) and underlying issues has not been evaluated, justifiably. Thus, the following
paper aims to provide deep in-sights on the following:
Literature Review (Summarizing how other researches have studied biometrics)
Review of a Key Paper
Evaluation and Outcomes
Personal Recommendation for Further Investigation
Legal, Social, Ethical, Professional Issues and Academic Misconduct
Literature Review
The review of literature provides a neat picture of the involved problem which needs to
be planned and conducted. The review of the previously investigated researches prevents
duplication and, also presents justification of the uniqueness in validity of the current research.
Thus, it is indispensable in research step. The analysis has collected information from multiple
articles, journals, manuals, books and websites. Therefore, the following reviews are based on
Biometrics.
1. Research journal by Ratha, Senior & Bolle (2015) specifies the problem of a person
carrying multiple cards, thus being bound to remember the secret codes or passwords,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4ReferencesReferences
and also for security purposes. Further, a biometric fingerprint payment system has been
proposed which could initiate multiple payment systems. The payment feature was
transformed to a much more safe, secure and easy-to-use structure, which reduced the
effort of people to remember various codes (in wireless system, credit card system and
mobile system). The respective system of Biometric fingerprint payment system is
however expensive yet reliable. Moreover, the advantages surpass the disadvantages to
others.
2. Proposed journal by Jain, Ross & Pankanti (2016) is focused on the subject of online
biometrics playing a role in protection against identity theft. Some factors such as
technology acceptance, privacy, adoptive-influence (by internet community), security
concern, privacy concern, social influence and others to online biometrics have been
discussed in the respective study. Additionally, identification is justified through a
selective survey, which stated about 91% of participants declaring of concern towards the
problem. Finally, interest of individuals to adopt the technology has been proved and
enhancement of benefits, security and other traits also defined.
3. Ratha, Connell & Bolle (2014) covers the privacy, ethics and security to biometrics
usage. Also, the research states an in-depth feedback on the state of the art. The proposed
protection template called. Biometric template protection has included biometric
encryption, fuzzy extractors, fuzzy vaults, cancelable biometrics and biometric hashing.
The study also covers an analysis of security and also, the published attacks.
4. Jain, Flynn and Ross (2016) proposed journal introduces a Multiple Classifier System,
including the key elements like classifier dependencies, aggregation procedures,
architecture and method types have been discussed. Further, the introduction of MCS has
Document Page
5ReferencesReferences
followed multimodal biometric authentication of a person in last 20 years, also
visualizing the achievements. The paper also demonstrates the open challenges and
limitations in biometrics, and how MCS can be implemented to advance them.
5. A technical research by Pankanti ,Bolle & Jain (2015) has presented a novel biometric
system which recognizes real-time walker using sensor of pyroelectric infrared, signal
processing (sensor signal spectra) and Fresnel lens array. The modelling stage shares the
Maximum Likelihood Principle Components Estimation ((MLPCE) technique’s usage to
test the regression vector with respect to each registered human participant. Following
Figure 2 and Table 1 shows the evaluated suitable threshold to maximize the subject’s
rate of recognition which is investigated by the curves of receiver operating
characteristics (ROC). The effectiveness of the proposed sensor system (pyroelectric) in
subject’s recognition and rejection of unknown subjects have been demonstrated in the
results.
Figure 2: LOC curves of four registered participants
Document Page
6ReferencesReferences
Table 1: Recognition results to four registered and 5 other unregistered participants.
During the experimental period, each participant walks about 25 rounds in a static path.
The unregistered subjects are detected and yielded in ‘Others’.
6. (Fang et al. 2017) presented work shows an approach to biometric databases and
cryptographic protection methods to the biometric templates. Further, discussion on the
combination with centralized PIN verification schemes have created a new suggestion on
recommendable integration in existing protocols of online banking scenarios. The
research also demonstrates the limitation of using biometric systems (prior) and
efficiency after the evaluation of the proposed technique.
7. An informative research work by (Kamata & Tanaka 2014) is presented on the same
topic of biometric authentication. The increasingly popular state of biometric credentials
to authenticate people provide multiple advantages with respect to the classical featured
authentication methods (ex- password-based authentication) (Yan 2013). The
advantageous characteristic feature of natural strong bond between biometric credentials
and the user, also raises privacy concerns and security issues, due to the compromised
biometric trait. Thus, the respective article presents the most challenging issues that needs
to be considered during the designing phase of the biometric authentication protocols.
Clearly, the main threats are identified and described, against the privacy-preserving
scenarios and possible counter-measures are also suggested, in the same paper.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ReferencesReferences
Review of a Key Paper
Apart from all the described and recorded research works that are previously evaluated
by different authors, the conference journal by Alsaadi (2015) receives significant attention with
respect to the usefulness in the current research.
In the following paper, the demonstration of each methods to psychological biometric
authentication processes have been classified. The classification is divided with respect to the
techniques of Face recognition, fingerprint, iris, retina and others (shown in Figure 3). The
biometric techniques are not yet 100% accurate in guaranteeing the best levels of performance in
validation/verification of the user’s identity (Jain ,Bolle & Pankanti 2016). Thus, the deployment
of each psychological method has been justified, to highlight the scopes of it being superior to
the Behavioral standards of authentication. Additionally, advantages, disadvantages and
drawbacks/limitations of each method are also briefly demonstrated. Also, historical overview
and mechanism of the security systems have also been included in the body of the paper. The
paper is concluded with the justification of superiority of the methods to the behavioral ones.
Moreover, the drawbacks are also considered. Future work is also predicted.
Document Page
8ReferencesReferences
Figure 3: General Classification of schemes to Biometry
Moreover, the whole research is understood to be an empirical approach, as the
demonstrations are based on collected data, observations, evidence and previously evaluated
experimentations. The work is also theoretical in a manner, as the discussed analysis are
extensively overviewed. However, very less amount of focus is implemented on the factors of
issues to legal, social, ethical and professional aspects. Yet, the research is focused on improving
the security and privacy concerns of the users.
Evaluation and Outcomes
Alsaadi (2015) has set the objectives of the research work to influence the readers of the
methods that can used to authenticate users in a more private and secure way. The research work
was aimed to address the psychological biometric authentication techniques, along with the
justification of the underlying advantages, disadvantages and drawbacks.
After inspecting the respective research work, a clear knowledge has been understood on
the aspects of inheriting specific biometric technique, in accordance to the requirement and
scenario. For clarification, Hand geometry recognition is observed be the most user-friendly,
Document Page
9ReferencesReferences
whereas, retina recognition has been recorded to produce discomfort of usage. Disadvantages or
drawbacks have clearly stated the reasons of comparing an each method to another. Further
improvement in the respective scenario has relatively extended the reader’s abilities to be aware
of the essentiality of modifications. Therefore, it can concluded that the results and predictions
(as stated by Alsaadi) has been justified, in accordance to the aimed objectives. Moreover, the
research is projected to be claimed as ‘Positive’ however, upgradations to the systems will
enhance the protection levels. Yet, there has been very less mentions of the issues to the scopes
of legality, sociality, professionalism and ethics. However, the paper extends the knowledge of
readers in the field of biometric authentication systems and different systems can be
implemented in different areas. The research is beneficial and optimistic, to be extended to
further improvements and upgradations.
Personal Recommendation for Further Investigation
The respective work on psychological biometric systems are dependable enough to
extend the abilities of awareness to inherit the platforms in the field of technology, science,
healthcare and others. According to a survey journal by Riha (2013) on 98 candidates using
retina, iris, finger and ear biometric scanning method, all the systems worked accordingly,
however had few security breach concerns as identical features could be obtained through
specified methods.
Thus, Recommendation can be stated to combine the behavioral and psychological
biometric authentication systems and thus, it may provide an evolutionary biometric program
that might guarantee 100% accuracy in privacy and security protection. For example, the easy
extension of adding face recognition to finger print system can create a system that will analyze
both the face and finger of the user and respond, accordingly. The accuracy is also depended on
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10ReferencesReferences
external variables like training levels of enrollment, temperature, physical condition and others.
Most of the biometric systems is dependent functional activity which is represented in a ROC
curve graphical figure (Sana,Gupta and Purkait 2017):
(Figure 4: ROC Curve)
Source: Sana,Gupta and Purkait 2017
Here, FMR= False Match Rate; FNMR= False Non-Match Rate; FTE= Failure To Enroll
FMR and FNMR are related to one another and are dependent variables, which is shown
in Figure 4. Moreover, this needs to be considered as well.
Transformation of the traditional practices to new security authentication techniques are
sure to produce upgraded and integrated solutions for an overall system (Faundez-Zanuy 2015).
Also, the extension of the research will consider the issues in terms of legal, social, ethical and
professional aspects by enhancing the security and other accomplishments of the new system.
The same can be implemented in the multiple business operating environment (e.g. mobile
technology, biometry check-in, precise agriculture) to increase the levels of protection and
Document Page
11ReferencesReferences
decreasing security breach and attacks (which are frequently present). Therefore, improvements
and extensions to the researched methods by Alsaadi (2015) are important to be executed and,
then the authenticity of the proposed benefits could be appropriately justified.
Legal, Social, Ethical, Professional Issues and Academic Misconduct
Professional issues to Biometrics:
Considerably, a biometric system’s weakest link is the process of enrollment,
where subjects present fake documents (i.e. passport, driving license, etc.) during
their enrollment in a biometric facility. An imposter can then continue
unprofessional acts such as entering facility, purchasing restricted material and
others using a fake identity (Wickens 2017). It is a fact that few of the 9/11
attackers had used nearly a dozen counterfeit US licenses (Jain and Kumar 2015).
Government should be aware of the situation and increase security for
maintenance of the databases.
Lack of maturity standards within the biometric industry is another huge problem.
The standards ensure vendors to maintain protocols, exchange file formats,
sharing of common files and equip conformance testing with respective to the
authentication programs. Multinational committees such as US counterpart
(INCITS) and International Standards Organization (ISO) have created BIPAPO
standards which are aimed to maintain the industry’s standardization presence
(Lodge 2015). Moreover, presence of multiple imposters in legacy databases
would result the biometric application’s significant degraded quality of security
for any respective population.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]