Memorandum - MavDISK

chocolatehookΑσφάλεια

30 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

88 εμφανίσεις

Memorandum


To:

Roland Nord


From:

Tim Arnal
(Eng 271
-
01)


Date:

November 30, 2013


Re:

Proposal to research biometric
access

(Proposal_tma.doc)

I propose to research the advantages

in security of biometric access.

According to Wikip
edia, biometrics is defined as
operations to distinctively distinguish
humans using unique physical or behavioral characteristics.
These physical or behavioral
traits can be measured
using many

different parts of the body including the finger, palm,
hand,
iris, retina, face,
voice,
and
any other part that has unique characteristics
.
B
ala
(2008, 64) tells us that

there exists a requirement for new and secure personal
identification verification methods because of the already expanding improvements to
network
ing, communication, and mobility.

Biometric access

enthusiasts
,

like Bala
,

argue that biometric technology is more s
ecure
than conventional methods.
But s
ome people
,

such as Karsten Weber

(2006,
14
)
,

are
stand
ing

by those conventional methods

for now and a
sking just how much of their
privacy is being invaded and if it could be dangerous to store biometric data

on people.

C
onventional
forms of security

include mechanical key locks, e
lectrical number pad
locks,
RFID scanners,
and more. All of these
forms of s
ecurity

have vulnerabilities that

can allow false positives, or fail to reject access to
someone

without proper credentials.

In my research report for Technical Communication (Eng 271), I will argue that
biometric access methods are more secure than conven
tional methods.

Problems to be investigated

I will attempt to answer the following questions:

1.

How does biometric access
’ authorization methods
compare to conventional
forms of security
?

2.

What special hardware
and

software is required?

3.

What are the costs ass
ociated with biometric
security
?

4.

How does the security of biometric access compare to conventional methods?

5.

How does biome
tric access protect individuals’

personal privacy
?

My report then will consist of five major sections: 1)
comparison between methods
,
2)
hardware and software required, 3) costs, 4) security, and 5) personal privacy.



Tim Arnal (Eng 271
-
01)



Proposal to research biometric access



Page
2


Methods of research

The list of
works cited in “The Biometric Menagerie” written by Neil Yager and Ted
Dunstone served as the starting point for my research.

I
also
conducte
d the following searches:

Database

Search type

Search terms

Limits

Results

IEEE Computer Society

Keyword

Biometric


100

Google

Keyword

Biometrics


3,120,000

ACM Digital Library

Keyword

Biometrics


996

Google

Keyword

Biometric system

Books

1,764

I will

use the documen
tation style used in IEEE Transactions on Pattern Analysis and
Machine Intelligence
. The following sources appear particularly useful:

Abhilasha Bhargav
-
Spantzel, Anna Squicciarini,
and
Elisa Bertino, “Privacy Preserving
Multi
-
Factor Authen
tication with Biometrics,” pp. 63
-
72,
Conference on Computer and
Communications Security
, 2006
.

Akhilesh Chandra

and

Thomas Calderon, “Challenges and Constraints to the Diffusion of
Biometrics in Information Systems,”
Communications of the ACM
, vol. 48, no
. 12,
pp.

101
-
106, Dec. 2005, doi:10.1145/1101779.1101784
.

Deepthi Bala, “Biometrics and Information Security,” pp. 64
-
66,
Information Security
Curriculum Development
, 2008
.

Fathimath Sabena, Ali Dehghantanha,
and
Andrew Seddon,

A Review of Vulnerabilitie
s in
Identity Management Using Biometrics,


pp. 42
-
49, 2010
Second International Conference on
Future Networks
, 2010
.

H. Kekre

and
V. Bharadi, “Adaptive Feature Set Updating Algorithm for Multimodal
Biometrics,” pp. 277
-
282,
International Conference on Adv
ances in Computing, Communication
and Control
, 2009
.

John Michael Williams, “Biometrics or .. Biohazards?” pp. 97
-
107,
New Security Paradigms
Workshop
, 2002
.

Karsten Weber, “
The next step: privacy invasions by biometrics and ICT implants
,”
Ubiquity
,
vol. 7
, no. 45, pp. 1
-
18, Nov. 2006, doi:
10.1145/1187566.1187567
.

Marios Savvides, Karl Ricanek Jr., Damon Woodard,
and
Gerry Dozier, "Unconstrained
Biometric Identification: Emerging Technologies,"
Computer
, vol. 43, no. 2, pp. 56
-
62,
Feb. 2010, doi:10.1109/MC.
2010.55
.

Melissa Zoepfl and
Harold Korves,

Improving Identity Discovery
T
hrough Fusion,


IT
Professional
, vol. 11, no. 1, pp. 27
-
35, Jan./Feb. 2009, doi:10.1109/MITP.2009.8
.

Nataliya Sukhai, “Access Control & Biometrics,” pp. 124
-
127,
Information Security

Curriculum
Development
, 2004
.

Neil Yager

and

Ted Dunstone,

The Biometric Menagerie,


IEEE Transactions on Pattern
Analysis and Machine Intelligence
, vol. 32, no. 2, pp. 220
-
230, Feb. 2010,
doi:10.1109/TPAMI.2008.291
.

Neil Yager and Ted Dunstone,
Biometri
c System and Data Analysis: Design, Evaluation, and Data
Mining.

Springer, 2008.



Tim Arnal (Eng 271
-
01)



Proposal to research biometric access



Page
3


Robert Snelick, Mike Indovina, James Yen,
and
Alan Mink, “Multimodal
B
iometrics:
I
ssues
in
D
esign and
T
esting,” pp. 68
-
72,
International Conference on Multimodal Interfaces
, 2
003
.

Vance Bjorn, “Biometrics
H
it the
M
ainstream:
A
n
A
nalysis of
S
ecurity and
P
rivacy
I
mplications,” pp. 407
-
407,
Conference on Computer and Communications Security
, 2005
.

Yagiz Sutcu, Husrev Taha Sencar
, and

Nasir Memon, “A Secure Biometric Authentication

Scheme Based on Robust Hashing,” pp. 111
-
116,
International Multimedia Conference
, 2005
.

Zhaofeng He, Tieniu Tan, Zhenan Sun,
and
Xianchao Qiu,

Toward Accurate and Fast Iris
Segmentation for Iris Biometrics,


IEEE Transactions on Pattern Analysis and Mac
hine
Intelligence
, vol. 31, no. 9, pp. 1670
-
1684, July 2009, doi:10.1109/TPAMI.2008.183
.

I plan to interview
Karsten Weber
,
who is currently
a philosophy professor at the
University of Opole, Poland. He is also the co
-
editor of an online journal,
Internati
onal
Review of Information Ethics

(http://www.i
-
r
-
i
-
e.net/)

and has written several papers
regarding the impacts of information communication technology and its impact on civil
rights. I would like to ask Karsten questions about privacy concerns as it rela
tes to
biometric access.

I also plan to (phone) interview Neil Yager and Ted Dunstone, coauthors of the article,
“The Biometric Menagerie” and
of the book
Biometric System and Data Analysis: Design,
Evaluation, and Data Mining
.

I would like to ask Neil and

Ted several questions regarding
why biometric access is more secure than conventional methods
, what hardware and
software is required with its use, and how much the many different forms of biometric
access would cost to implement in both a personal and bu
siness setting.

Timetable

I will provide the following deliverables:



progress report


April 26
, 2010



draft


May

10
, 2010



final draft


Ju
ne

1, 2010

Request for approval

Dr. Nord, I ask that you please approve my request to research the advantages of
biom
etric access. I would appreciate any
feedback on the subject
.