About Biometrics

Biometrics are measured human physical and behavioral characteristics that can be used for the purpose of personal identification (associating an identity with a person) [1] [2] [3] [4] [5][6]. A traditional example is the fingerprint. Fingerprints are widely recognized as being unique to each person and are a permanent physical characteristic (biometric). Because of this, fingerprints have been used for personal identification for many years.

A biometric personal identification system measures some physical and/or behavioral characteristic of a user and compares the measured information with previously stored information for the purpose of identifying the user.

When using a typical ATM (automated teller machine), an ATM card and a PIN (personal identification number) are required for someone to access their bank account. When paying for goods at a department store, a credit card and a signature are all that is required. When buying gasoline, only a credit card is necessary. These are examples of automated personal identification. However, one should understand that only the cards, signatures, and/or PINs are what is actually identified, not the person who provided them. They could have been provided by anyone. The purpose of using biometrics is to provide a means of absolute identification for a given task. These tasks can include bank transactions, facility or computer access, and consumer purchases. The use of biometrics allows for positive personal identification without reliance on items that can be lost, forged, forgotten, or stolen. Common biometrics includes fingerprints, hand geometry, facial features, speech pattern, iris characteristics, and retinal features. Items associated with personal identification that can be lost, forged, forgotten, or stolen include keys, ATM cards, credit cards, debit cards, driver's licenses, PINs, safe combinations, passwords, and signatures. An identification system that uses biometrics offers accurate personal identification and the added luxury of not having to keep up with cards and tokens or relying on recollection of PINs, passwords, or combinations

[1] Julian Ashbourn, "Biometrics: Advanced Identity Verification, The Complete Guide," Springer, London, 2000.

[2] A. Jain, R. Bolle, S. Pankanti, editors, "BIOMETRICS Personal Identification in Networked Society," Kluwer Academic Press, Boston, 1999.

[3] D. Zhang, "AUTOMATED BIOMETRICS Technologies and Systems," Kluwer Academic Publishers, Boston, 2000.

[4] N.K. Ratha, A. Senior, "Tutorial on Automated Biometrics," CVPR 1999, Fort Collins, Colorado.

[5] D. Polemi, "Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication, Including an Appraisal of the Areas Where They are Most Applicable," Final Report, April 1997, http://www.cordis.lu/infosec/src/stud5fr.htm. Last accessed: 31 July 2001.

[6] J. Ashbourn, "The Biometric White Paper," 1999, http://homepage.ntlworld.com/avanti/whitepaper.htm. Last accessed: 31 July 2001.