<<

Biometrics-A Vision for the Future

January 2011

Biometrics-A Vision for the Future | January 2011

TABLE OF CONTENTS

Abstract ...... 3

Abbreviations ...... 4

Introduction: The Emergence of the Need for Security ...... 5

Choice of sensing techniques ...... 6

Biometrics Technology Types ...... 7

How does Biometric Technology Works? ...... 11

Selection of Biometric System – Parameters ...... 13

Market Facts and Trends ...... 16

Conclusion...... 19

Reference ...... 20

Authors Info ...... 20

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.

Biometrics-A Vision for the Future | January 2011

Abstract Biometrics technologies are base for a plethora of highly secure identification and personal verification solutions. But there arises a need for more robust systems in order to tackle the increasing incidents of security breaches and frauds. So there is always a need for fool proof technology that can provide security and safety to individuals and the transactions that the individuals make. This paper explores the need for biometrics in state and local governments, in the military, in commercial applications, Airports and Aircrafts. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from Biometrics. Also here the various markets and the potential revenue are analyzed.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 3

Biometrics-A Vision for the Future | January 2011

Abbreviations

Sl. No. Acronyms Full form IT 1 Information Technology PIN 2 Personal Identification Number ATM 3 Automatic Teller Machine DNA Deoxyribo Nucleic Acid 4 FVC Verification Competition 5 FRVT Face Recognition Vendor Test 6 ICE Iris Challenge Evaluation 7 CAGR 8 Compounded Annual Growth Rate IBG 9 International Biometrics Group

10 AFIS Automated Fingerprint Identification System

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 4

Biometrics-A Vision for the Future | January 2011

Introduction: The Emergence of the Need for Security Biometric is a methods of recognizing a person based on physiological or behavioral characteristics. Biometric technologies are becoming an additional layer added to existing system. There are bundle of highly secure identification and personal verification solutions but it is much required to have a robust system, encountering the security breaches and transaction frauds. It is one technology that is caught the attention of major IT vendors and it is regarded as an area that no segment of the IT industry can afford to ignore. Biometrics provides a hierarchical structure of data protection, making the data more secure. It is considered to act as a shield to existing system protecting the system from the mischief mongers. E-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading party's identity. Banks are bound to use this combination to better authenticate customers and ensure non-repudiation of online banking, trading and purchasing transactions. Biometrics can help to obtain secure services over the telephone through voice . Researchers hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas such as airports. Biometrics is being used to improve employee identity verification and access authorization, passenger identity verification, and flight crew identity verification. Adding biometrics to existing systems and security procedures could potentially protect against unauthorized access using lost, stolen, or forged badges; a terrorist on watch list attempting to obtain a using an assumed identity; and impersonation of a pilot, other flight crew member, or air traffic controller, by a terrorist. Although there are legal concerns about civil liberties with overly intrusive airport security systems, utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of or PINs). The need of the hour is a technology to replace the inefficient current system that relies on manual workers. So Biometrics is the technology that the future will hold, although there are still considerable political and airline resistance, some fingerprint biometric systems are being used at certain airports. Technologists are constantly working visualizing the next generation security systems with multiple levels of biometrics security implemented, i.e., multimodal biometrics, aliveness detection, gait analysis etc. Also researches are in progress to minimize the manual intervention of the user with the system. This paper will explain the biometrics technologies and also the potential market demands projected by the research reports in different modalities of biometrics and application areas.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 5

Biometrics-A Vision for the Future | January 2011

Choice of sensing techniques Multimodal Biometrics Biometric systems relying on a single technology are currently deployed, with various levels of success, in many different application contexts (airports, , physical and logical access control, etc.). However, by combining more than one modality, enhanced performance reliability and even increased user acceptance could be achieved. Combining less reliable technologies in sequence could strengthen the overall system performance and combining them in parallel could increase the flexibility of the system by providing alternative modes for the verification/identification process.

Aliveness Detection Aliveness detection can be added to fingerprint readers to discourage the use of fake fingers or, as in this case, carjacking and dismemberment. The idea is to detect whether or not the fingerprint is being presented by a living finger. Fingertips have a layered structure. The epidermis is the outermost layer and is not living tissue. Beneath the epidermis is the dermis. These two layers have different physical characteristics. For example the epidermis is harder, dryer, and has less electrical conductivity. The dermis has the same fingerprint as the epidermis and some sensors actually detect the print from this layer rather than the surface. Aliveness detection can be done at both levels but generally the deeper the sensor looks into the finger, the more reliable the aliveness measure can be. There are many techniques for detecting aliveness:

Blood flow Hematocrit Skin exudates Transpiratio n of gases Spectran identity Blood Electrical Electrical of tissue Oxygenation Plethysmography properties -Pulse of skin Oximetry Electrocardiogra Biochemical Differential blood Mechanical phic signals Assays of volume properties tissue of Skin Pulse Blood Moisture and Papillary pressure warmth lines Apart from these focus can be on special areas such as Multispectral lines analysis, Color Identification and Bone Structure.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 6

Biometrics-A Vision for the Future | January 2011

Biometrics Technology Types Biometrics is an automated method of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, , hand geometry, handwriting, iris, retinal, vein, and voice.

Iris Scan Retinal Facial Fingerprint Recognition Recognition Recognition Odour Hand Ear Shape Thermo gram Geometry Recognition Recognition Foot Prints Dynamic Grip Gait Finger Nail bed Recognition Recognition Identification Skin Elements Lips Vein Scan Voice Recognition Signature Key Stroke DNA Skull Structure Recognition Recognition Matching

Comparison of Various Biometrics Types Here a comparison is made taking the most commonly used Biometrics Modalities in the market.

Method Advantages Disadvantages Possible Applications Fingerprint High reliability Some users Access Verification – no two associate it Control (IT, people have with a “criminal” building, ever been stigma. physical) found to have Functional ATM‟s identical defects are Motor fingerprints. possible if the Vehicle Robust. fingertips access Highly are very dirty or PC/Laptop distinctive. worn. access Proven Hygienic Identification accuracy – has considerations Forensics been used by as a result of police skin contact forces for more with the sensor. than 100 Injury can years to solve affect. crimes. Dry skin, Advanced grease & sweat technology. can cause User recognition convenience. difficulties. Uniqueness. Poor Stable over environmental time. conditions can adversely affect collection. Hand Small Size of scanner Time and Geometry template Hygiene attendance

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 7

Biometrics-A Vision for the Future | January 2011

Method Advantages Disadvantages Possible Applications  Unaffected by considerations Access skin as a result of Control (IT, condition skin contact building, with the sensor physical) Juvenile growth Injury can affect Low distinctiveness Face High The face Access Recognition precision changes over Control (IT, Efficient time. building, process Can be physical) High manipulated by Crowd acceptance surgery. Control because Cannot Border no physical distinguish Control contact with between twins. Recognition the sensor is Religious or /identification necessary cultural systems inhibitions. Poor environmental conditions can adversely affect collection. Retinal Uniqueness– Not user- Access Scanning no two friendly. Control (IT, people have The procedure building, identical is often physical). patterns. perceived as - Robust unpleasant - Stable over fear of “eye time. scans”. Highly Slow read time. distinctive. High user training requirement. Poor environmental conditions can adversely affect collection.

Iris Uniqueness – Relatively new Access Scanning no two technology Control (IT, people have Complex building, ever been procedure physical) found to have High costs ATM the same Protected by Airline

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 8

Biometrics-A Vision for the Future | January 2011

Method Advantages Disadvantages Possible Applications iris structure. patent until check-in Robust. 2005, which was Very precise hindering and technological efficient advancement. method. Poor High environmental acceptance conditions can because adversely no physical affect collection. contact with the sensor is necessary. Stable over time. Highly distinctive.

Voice High level of Voice and Access Recognition user language Control (IT, acceptance usage change building, because the over time physical). voice is a (e.g. as a result Mobile natural form of of age or phones. communication. illness). Internet The voice is a Easy to banking. characteristic, manipulate, can individual be surgically feature. altered. Simple and Computerized cost-effective solutions technological often have low application. accuracy. Low training Poor requirement. environmental conditions can adversely affect collection.

Signature High user Unstable over Portable Recognition acceptance. time. devices (e.g. Low training Changes over courier requirements. time. delivery). Lengthy enrollment process. Low distinctiveness.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 9

Biometrics-A Vision for the Future | January 2011

Method Advantages Disadvantages Possible Applications DNA DNA is Sample taking Criminal Analysis unique. and forensics. Even twins do analysis are time not have and the same DNA cost-consuming structure. processes. Only feasible on a limited basis. Problems relating to data protection. Cloning will mean that DNA is no longer unique.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 10

Biometrics-A Vision for the Future | January 2011

How does Biometric Technology Works? There are many different types of biometric systems, including facial recognition, hand geometry, , retina recognition, and speaker recognition. Each of these systems involves similar processes such as Enrollment, Verification, Identification and Screening.

Enrollment In the enrollment step the user needs to prove his or her identity, furnishes the identification document. The biometric characteristics of the concerned user are linked to the identity specified in the identification document. This ensures that the reference template is linked to the right identity. This is a key step which determines the integrity of the system. After the enrollment process the user provides any or the required biometric samples (like Fingerprint, Iris Pattern or Hand Geometry) to an acquisition device, usually a biometric sensor. Here the system acts operates in the data acquisition mode, where the device or scanner is used to populate the . The acquired data is encrypted using any secure and stored in the central/remote database. The storage can also be made in the memory chips or cards. The user may need to enroll and present the samples multiple times as small changes in positioning, distance, pressure, environment, and other factors influence the generation of a template, and it is expected to be unique. Therefore, a person may need to present biometric data several times in order to enroll. The reference template may then represent an amalgam of the captured data, or several enrollment templates may be stored. In addition, because biometric features can change over time, people may have to reenroll to update their reference template.

Verification The verification step objective is to confirm that a person is in fact who he or she claims to be. Here the real time input is compared with the stored template to determine whether or not there is a match. Verification is always considered to be “one-to-one” matching. Out of the millions of reference templates, only one needs to be compared to the sample template. The output of the verification systems is a match /no match decision in less than a second. In case of using multimodal or liveness detection priorities are set and also the system acts as a toll gate.

Identification The identification systems are considered to perform “one-to-many” matching, where the sample template is compared against the stored reference templates of all individuals enrolled in the system. There are two types of identification systems – Positive and Negative. Positive identification systems: Determine whether a user seeking access can be identified as having been enrolled in the system. Negative identification systems: Ensures that a user‟s biometric information is not present in a database. For example, a negative

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 11

Biometrics-A Vision for the Future | January 2011

identification system may be designed to identify people on a watch list.

Screening It is a step where the input templates are collected from many users and the process of comparing is done with all the Enrolled reference templates. It is considered to be “many to many” matching. The outcome of this step is a decision where it notifies X people out of the N numbers are identifies.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 12

Biometrics-A Vision for the Future | January 2011

Selection of Biometric System – Parameters Parameters for the selection of Biometrics

Parameter Explanation Accuracy Is the system accurate in terms of low error rates? Environment Is the technology fully deployable? Ergonomics/us Is the system user friendly? er friendly Stability and Is the feature being measured unique and stable Uniqueness over time? Security Is the system secure? Could it be easily tampered with or spoofed? Safety Is the system safe to use? Does it present any dangers to the user? Speed of How long does it take to enroll a subject? How enrolment and long does verification take? recognition Non- Is the technology intrusive to use? intrusiveness Convenience Is the system convenient to use? Is the system convenient to integrate with other systems or processes? Cost How much does the technology cost? Size of stored How big is the stored template? template Operational What are the limitations of the technology in the limitations deployed environment? (i.e. how well does the technology cope if the user is wearing protective clothing?) Requirement What is the system required to do? Can it perform both identification and verification tasks? Credible Is there credible scientific research to support scientific the technology? research Human Is the technology acceptable to users? acceptance

Parameters to Guide Selection of Facial, Fingerprint and Iris biometrics

Parameter Fingerprint Face Iris Accuracy Very accurate Accurate, Most accurate although not of all as good as iris commercially or fingerprint available biometrics (second only to DNA) Environment Can be used Can be used Can be used

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 13

Biometrics-A Vision for the Future | January 2011

Parameter Fingerprint Face Iris across a across a across a range of range of range of environments, environments, environments but but contaminated susceptible to environments poor lighting may cause and different issues backgrounds Ergonomics/user Once user is Easy to use Once user is friendly familiar, easy familiar, easy to use to use Stability and Stability may Likely to Stable, Uniqueness be affected by change (e.g. probability of injury, with age, and two people environment health status), having the and age. due to same iris is 1 78 Probability of similarity in in 10 two people face shapes, possessing uniqueness is the same questionable fingerprint is 1 80 in 10 Security Susceptible to Susceptible to Spoofing is spoofing, low spoofing, possible, but probability of medium low probability success in probability of of success in high security success. high security systems. systems. Safety May be some Safe to use Safe to use hygiene issues with sensors that require contact, otherwise safe to use Speed of Enrolment < Enrolment < Enrolment < 1 enrolment and 30 sec, 35 sec, minute, recognition verification < 1 verification < 1 verification < sec, sec, 2 sec, identification identification identification proportional to proportional to 1-2 sec based size of size of on database database database of 100,000 irises Non- Needs user Unobtrusive Needs user intrusiveness cooperation cooperation Convenience Range of Range of Range of different different different sensor sizes, camera sizes, sensor sizes, fixed and free fixed and free fixed and free Cost Low - Low, varies Low -

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 14

Biometrics-A Vision for the Future | January 2011

Parameter Fingerprint Face Iris Medium, according to Medium, varies sensor varies according to according to sensor sensor Size of stored Varies Varies Varies template according to according to according to sensor, sensor, sensor, approx 250 approx 1300 approx 512 bytes bytes bytes Operational Unsuitable for Poorly or Possibly limitations use with excessively lit effected by protective environments the use of clothing, may pose protective eye damaged or problems, wear, soiled hands, backgrounds although but has been may also some studies shown to work impact on have shown it successfully in picture quality to work a variety of through them environments Requirement Works well in Works well in Does not work watch list and , well in verification watch list and surveillance or applications verification watch list applications applications as user cooperation is required Credible Plethora of Plethora of Plethora of scientific research, research, research, Iris research Fingerprint Face Challenge Verification Recognition Evaluation Competition Vendor Test (ICE) multi- (FVC) multi- (FRVT) multi- vendor testing vendor testing vendor testing Human Some issues Most accepted Questionable, acceptance with of all more research acceptance biometrics required exist due to the association with criminality

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 15

Biometrics-A Vision for the Future | January 2011

Market Facts and Trends Morgen Keegan Survey According to US based Morgan Keegan biometrics is being incorporated into numerous governmental programs and security systems. In parallel, Private sector organizations are rapidly ramping-up the use of biometric technology to increase security, productivity, and profitability.

Key Forecasts  The total biometrics market will grow at a 25% CAGR, reaching $4.2 billion in 2011 in industry revenue  Fingerprint technology will remain the dominant biometric identifier across all applications (in terms of revenue) due to high familiarity, low overall cost factors, and the existence of large legacy fingerprint  Private sector organizations are rapidly ramping-up the use of biometric technology to increase security, productivity, and profitability

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 16

Biometrics-A Vision for the Future | January 2011

IBG Survey According to International Biometrics Group (IBG) research report, the global market for Biometrics slated for high growth through 2014. In terms of technology, Automatic Finger Identification System (AFIS)/ Live Scan will be the main revenue contributor, which was worth $1.3 billion in 2009; this market is forecasted to grow to $2.9 billion by 2014.

Key Forecasts  The total biometrics market will grow at a 22.3% CAGR for the next five years, thus reaching $9.37 billion in 2014 in industry revenue.  International Biometric Group Expects Biometric Market to Nearly Triple by 2014  Global biometric revenues are projected to grow from US$3.42billion in 2009 to $9.37 billion in 2014, driven in part by government identity management and border management programs.  Fingerprint recognition including AFIS is dominant: 2/3 of biometric market. Fingerprint is expected to gain 45.9% of the non-AFIS biometrics market in 2009, followed by face recognition at 18.5% and iris recognition at 8.3%.  Annual iris recognition revenues are projected to approach $700 million by 2014  Asia and North America are expected to be the largest global markets for biometric product and services  Vein recognition is expected to play a larger role in access control applications, eventually comprising more than 10%of this market

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 17

Biometrics-A Vision for the Future | January 2011

Acuity Market Intelligence Survey A more recent long-term forecast from the US-based Acuity Market Intelligence indicates similar expected growth.

Key Forecasts  The total biometrics market will grow at a 19.69% CAGR for the next eight years, thus reaching $10.9 billion in 2017 in industry revenue.  The Central and South American region will experience the highest CAGR over the forecast period of 39.46%, the overall market dominance will shift from Europe (and the greater EMEA region) and the US (and the greater North America region) to Asia (and the greater Asia Pacific region). By 2017, the Asia Pacific Region will generate the greatest percent of revenues for the biometrics industry with more than 32% of global revenues.  The dominance of AFIS/Livescan and Fingerprint continues thorough 2009-14. However, by 2017 iris and face recognition begin to rival their dominance together accounting for more than 33% of global revenues.  Commercial deployment revenues match to Public Sector revenues in 2014 and then surpass Public Sector representing more than 55% of the total global market for biometrics core technology by 2017.  The percent of revenue from Identification Services declines over the period 2009-14 but only from 65% to 47%. Surveillance and Monitoring posts the strongest percentage gain growing from less than 1% to nearly 8% of total market revenue.

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 18

Biometrics-A Vision for the Future | January 2011

Conclusion Biometrics systems have found a worldwide use and have penetrated into many markets but still biometric technologies are evolving and emerging towards a large scale of use. Attempts are also being made to standardize common software interfaces to enable sharing of biometric templates and to permit the effective comparison and evaluation of different biometric technologies. Biometric systems still face the major challenge of securing the user's template. The templates represent the user‟s personal characters and hence pose a threat to invading one's if not stored properly. Also storing the template in a centralized database paves for attack and compromise. One of the option that has been looked upon for secure storage are the smart cards, which will enhance the individual privacy and increase the protection from attacks as the individual users control their own templates. Biometrics does have a promising future in the next generation authentication and security systems. It is the right time for the companies to boost their biometric capabilities and also invest in technologies pertaining to Biometrics keeping the demands of the industry in mind.

Key Takeaways from the Research Reports  International Biometric Group Expects Biometric Market to Nearly Triple by 2014  Use of Biometric technologies is going to be common across the world  Investment on a multimodal biometric solution with liveliness detection would be a key differentiator and a game changing solution  Asia and North America are expected to be the largest global markets for biometric product and services  Security cost is a major concern of Airlines and Airports. Partial or full automation of passenger operations would result in a sizeable business opportunity for airports and airlines  Finger print (AFIS) followed by Face recognition and Iris recognition are going to be the key modalities around which the biometrics market will revolve  All the above surveys indicate an increasing trend in the growth of the Biometrics market

IT IS STILL A RIGHT TIME TO INVEST

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 19

Biometrics-A Vision for the Future | January 2011

Reference  Biometrics Technology Review 2008, Rebecca Heyer  BIOMETRICS, Chris Roberts, November 2005  Morgan Keegan - Biometrics, Industry Overview for the Investment Community, October 2006  IBG Survey - Biometrics Market and Industry Report 2009- 2014- http://www.biometricgroup.com/reports/public/market_report .php  Future of Biometrics- Published by Acuity Market Intelligence August 2009

Authors Info

Kumaralingam R is a postgraduate from IIT Bombay. He has an experience of about 9 years in the IT industry and is working as a Solution Evangelist with Indian IT giant HCL Technologies, Chennai ().

Rahul G is a graduate from Sastra University. He has an experience of about 4 years in the IT industry and is working as a Solution Evangelist with Indian IT giant HCL Technologies, Chennai (India).

© 2011, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved. 20

Hello, I’m from HCL’s Engineering and R&D Services. We enable technology led organizations to go to market with innovative products & solutions. We partner with our customers in building world class products & creating the associated solution delivery ecosystem to help build market leadership. Right now, 14500+ of us are developing engineering products, solutions and platforms across Aerospace and Defense, Automotive, Consumer Electronics, Industrial Manufacturing, Medical Devices, Networking & Telecom, Office Automation, Semiconductor, Servers & Storage for our customers. For more details contact [email protected] Follow us on twitter http://twitter.com/hclers and our blog http://ers.hclblogs.com/ Visit our website http://www.hcltech.com/engineering-services/

About HCL About HCL Technologies HCL Technologies is a leading global IT services company, working with clients in the areas that impact and redefine the core of their businesses. Since its inception into the global landscape after its IPO in 1999, HCL focuses on „transformational outsourcing‟, underlined by innovation and value creation, and offers integrated portfolio of services including software-led IT solutions, remote infrastructure management, engineering and R&D services and BPO. HCL leverages its extensive global offshore infrastructure and network of offices in 26 countries to provide holistic, multi-service delivery in key industry verticals including Financial Services, Manufacturing, Consumer Services, Public Services and Healthcare. HCL takes pride in its philosophy of „Employee First‟ which empowers our 72,267 transformers to create a real value for the customers. HCL Technologies, along with its subsidiaries, had consolidated revenues of US$ 3.1 billion (Rs. 14,101 crores), as on 31st December 2010 (on LTM basis). For more information, please visit www.hcltech.com

About HCL Enterprise HCL is a $5.5 billion leading global technology and IT enterprise comprising two companies listed in India - HCL Technologies and HCL Infosystems. Founded in 1976, HCL is one of India's original IT garage start-ups. A pioneer of modern computing, HCL is a global transformational enterprise today. Its range of offerings includes product engineering, custom & package applications, BPO, IT infrastructure services, IT hardware, systems integration, and distribution of information and communications technology (ICT) products across a wide range of focused industry verticals. The HCL team consists of over 77,000 professionals of diverse nationalities, who operate from 29 countries including over 500 points of presence in India. HCL has partnerships with several leading Global 1000 firms, including leading IT and technology firms. For more information, please visit www.hcl.com