Security and convenience are key factors driving increased adoption of biometric techniques for personal authentication in both physical access and IT applications.
A biometric is a personal charaacteristic that is unique to an individual. Well known biometric characteristics (such as fingerprints, iris, voice patterns, face) have a different level of accuracy and security. Some do not vary significantly enough between individuals to be reliable, while others are too easily forged!
Using a biometric technique to identify individuals is convenient. By definition, you always have your biometric credentials with you, you cannot lose them, forget them or leave them at home. Biometric scanners can relieve users of the need to carry keys and cards and remember a whole hosts of passwords and pin numbers.
With the right choice, using biometrics can also be extremely secure. You cannot lend your biometric to another person, and your biometric cannot be guessed like a password. The aim of using a biometric is to guarantee that the person claiming to be present really is present, which is the prime goal of security, whether in physical or logical IT applications.
Clearly this is essential for a time and attendance system, but no less important for remote login access to a computer network...
VEIN PATTERNS AS A BIOMETRIC
A relatively recent development in the field has been the development of practical devices for capturing vascular biometrics.
Vascular biometrics rely on identifying the differences between blood vessel structures between individuals. Some superficial blood vessel networks can be seen by looking at the inside of the wrist or the palm of the hand.
Whilst they are indistinct under normal light, using near infrared light, these blood vessels can be seen more clearly since the haemoglobin in blood is a strong absorber of near-IR.
An advance on this technology is to shine infrared light through a body part i.e. palm, hand, finger, in order to acquire an image of the sub-surface venous network.
With a well-chosen infrared wavelength, the flesh is translucent, but the blood vessels are strong absorbers. Using a CCD camera with sensitivity in the infrared, a unique shadow pattern of the veins can be captured.
This is the principle behind Biotecnix's vein biometric scanning technology applications for the security of business assets.
The vein biometrics technique is essentially unique in being a truly internal biometric. By using transmitted light, vein scanners reveal the true internal structure of the venous network which is completely unique from person to person, hand to hand where no one is the same.
Since the vein scanner captures the hidden structure of the vein patterns within the body, it has a natural security advantages over normal, external biometric techniques.
In order to attack a biometric system to take someone else's identity, you need to do two things...
First, you need to capture the required biometric feature from the person being impersonated, then you need to replicate it to the scanner.
Since all the more 'traditional' techniques are external, capturing the biometric does not present too many problems. For example, a person does not even need to to be present for his or her 'fingerprints' to be captured. They can be quite easily lifted and replicated from a surface that has been touched by the person sometime previously. In addition to this, as fingerprint biometrics is a contact biometric system then the security of this solution is also questonable due to the silicon which is used for capturing and authenticating fingerprints can wear down and/or erode with use and cleaning.
Similarly, a voice print can be captured without the person being present. Facial and iris recognition biometrics are also external - they can be captured from a considerable distance using a suitable camera. A person need not even know that his or her biometric has been stolen.
An internal biometric based on vein structures, however is impossible to capture from a distance. Capturing the vein structure in the finger or the palm of the hand, relies on the individual placing their 'living' finger or palm over a device in extreme close proximity without contact. This cannot be done unless the person is physically present and is difficult to do without their knowledge.
The second stage of an attack is to take the person's biometric and try to replicate it to a reader. This is very easy to accomplish with commodity fingerprint scanners and requires no specialist knowledge. And successful attacks have been demonstrated against fingerprint, facial, iris, voice and other scanners without using sophisticated techniques.
In contrast, it is difficult to see how an internal vein pattern of a living person could be replicated to a vein scanner - scanners only work on living individual users of the system. In addition, liveness detaction is automatic, in a severed finger the blood pressure drops instantly and the veins collapse, so they no longer visible to the reader.
The Biotecnix vein biometric applications has a number of characteristics that sets it apart as an ideal biometric for enhancing both security and convenience.
As an internal biometric, vein recognition offers significant advantages over the alternatives!!
www.biotecnix.ltd.uk