Running Head: INNOVATION BRIEF
Device that Using Random Intensity Light Patterns Produces a Unique Image of the
October 11, 2012
Author of this Document:
Project Manager, Programmer, Network Security Specialist
In the era of growing digital society cybercrimes threaten individual as well as organizational
information, assets, and identity. Instant
secure personal identification is crucially important
in controlling access to computer systems. Existing biometric identification systems increase the
security of computer systems. However, numerous inadequacies compromise the main purpose
of such device
Existing Biometric Identifiers are static.
The main goal of this project is to create a device to capture a non
static biometric identifier for
the purpose of authentication. The innovative component of this project is the use of light
varied intensity applied to fingertip in order to produce an image. The end result is a
static biometric identifier. Each pass through the scanner is random and the image created to
for comparison is dynamic. Traditional phys
iological biometrics use s
are compared to
a static template in order to
. This makes them more susceptible
for spoofing. Spoof resistance is one of the key benefits to our non
static biometric identifier.
secondary method of authentication
utilizing sensory response is integrated in to the process in
order to create a two
factor authentication mechanism. This secondary innovative component
also provides proof of life.
automated biometric identification
system (ABIS), biometric data,
biometric algorithm, common biometric exchange file format (CBEFF), one
image recognition, network security, digital image,
computer, digital camera, facial features reco
gnition, fingerprints, iris
, static, non
and Prior Art
The term “Biometrics” is derived from the two Greek words “Bio” that means “life” and
“metrics” that means (measure).
defines Biometrics as “a technological and
scientific authentication method based on biology and used in information assurance (IA).
Biometric identification authenticates secure entry, data or access via human biological
information such as DNA or finger
Rajan (2011) describes Biometrics or Life Measurement as “the use of unique physical features
such as fingerprints, facial features, retina or iris to identify an individual. A concise definition of
biometrics is “the automatic recognition of a pe
rson using distinguishing traits.” A more
expansive definition of biometrics is “any automatically measurable, robust and distinctive
physical characteristic or personal trait that can be used to identify an individual or verify the
claimed identity of an
Woodward at all, 2003).
The most important Biometrics’
application is security.
The history of Biometrics is traced to prehistoric times when cavemen signed their drawings with
their handprints. In Babylon, 2,000 years ago,
fingerprints were used for business transactions. In
ts were used since XIV century.
The first finger print identification system was developed in XVIII century by Azizul Haque for
Edward Henry who at that
was Inspector General in India.
In his system Edward Henry
assigned numerical value to each individual finger, beginning with the right thumb and ending
with the left
pinky. Fingerprint records are grouped based upon pattern types such as “arch,”
and “loop.” Henry’s
system had been
law enforcement agencies
around the world.
In 1969 FBI contracted the National Institute of Standards and Technology to develop a system
to automate the process of fingerprint identification
The first device for hand identification purpose was invented and patented by David Sidlauskas
Since that time, new technologies were developed and commercialized for
providing secure access to computer network.
Biometrics by definition utilizes some unique biological
characteristics such as fingerprints, iris,
facial features, voice,
DNA, behavioral patterns, and or a
of these features
method is more
than traditional password and PIN based methods that
can be stolen
However, some biometrics techniques can be spoofed using various methods. The most
secure biometrics techniques utilize a combinati
on of static biometric samples and a proof of life
test requiring the physical
at the time of execution
dentification devices are widely applied
in corporate, governmental, and military
settings. Such devices usually consist of a scanner or video camera as a biometric input, software
that translates biometric information into digital form and indexes it or compares it to the
existing information an
d a database of the stored biometric information.
Attributes and Features
A biometric system is essentially a pattern recognition system which makes a personal
identification by determining the authenticity of a specific physical or behavioral character
possessed by the user. Biometric technologies are thus defined as the "automated methods of
identifying or authenticating the identity of a living person based on a physical or behavioral
characteristic" (Rutter, 2012).
The biometric system
connects an event to a single person, whereas other ID forms, such as a
personal identification number (PIN), may be used by anyone.
The Biometric Identifier has two modules
Database Preparation Module (DPM) and
Verification Module (VM). The DPM consist
s of two sub
Enroll Module (EM) and
Training Module (TM). VM comprises two sub
Matching Module (MM) and
Decision Module (DM). Each module will be modified and simplified (
A biometric system includes the following components and
A silicon sensor that reads data
A capacitance determines the pattern of ridges and valleys at any point during a cycle of
charging and discharging the capacitor array
Verification Module (VM)
The data are scanned
via software convert
into digital format
A map of
unique finger characteristics is created on the basis of minutia detection.
A biometric template
signal processing algorithms.
Biometric templates are compared to the data storage that is encrypted for added security.
A decision process uses
matching event results and allows or denies access to the
Biometric security device can be set up to either authenticate or identify a person using different
logic while matching input with the stored data.
Strengths and Weaknesses of
the Existing Biometric Identifiers
The Biometric Identifiers meet most of the ASTM conceptual characteristics.
The device has a potential to provide identification of a person with high accuracy rate.
The Biometric tools are difficult to duplicate or steal.
Application of Biometric Identifier increases overall security.
A user is identified with the help of his/her own unique parameters.
repudiation of transactions confirmed by means of biometric i
Users cannot share access rights.
It prevents of usage of stolen or lost identifiers.
A devise optimizes administration.
time required to access the protected resources
the overall sys
Static Biometric Identifier reduces
related to administration of the access
The device is e
no need to
type or change multiple passwords.
It requires one
It provides q
uick authorization, user conv
enience and workflow efficiency.
Identification of a person requires special equipment, computer software and expertise.
Identification process is a time consuming and can affect the user’s performance.
It requires special technology infrastructure and administration.
Existing devices have a high cost of purchase
Existing systems require data tem
plates of many thousands of bytes, expensive storage
media and slowing process time.
Insertion of the missing components and characteristics.
Proximity and dynamics measurement.
Potential threat of violation of an individual’s
Project Description and Innovation Claim
As Richards (2010) pointed out,
“Some of the most important factors necessary for any effective
biometric system are: accuracy, speed and throughput rate, acceptability to users,
the biometric organ and action, resistance to counterfeiting, reliability, data storage requirements,
enrollment time, intrusiveness of data collection, and subject and system contact requirements
The attempt was made
to create a device to capture a non
static biometric identifier for the
purpose of authentication. The innovative component of this project is the use of light patterns at
varied intensity applied to
fingertip in order to produce a non
end result is a
static biometric identifier. Each pass through the scanner is random and the image created to
for comparison is dynamic. Traditional physiological biometrics
a static image to a
static template in order to compare for match. T
his makes them more susceptible for spoofing.
Spoof resistance is one of the key benefits to our non
static biometric identifier.
of the secondary innovation component of secure rolling codes communicated via the sense of
touch adds a proof
of life test and a second authentication mechanism.
In order t
o create the prototype
Static Biometric Identifier,
controller, high intensity LED lights, a TTL Jpeg camera board, an IR proximity sensor, a small
project box and a PC to receive and process image data
. Each device must be coded in
order to function properly. For the purpose of thi
s sprint, we have attempted to achieve base
functionality in using the device to capture images to the PC. The LED light bed will be used to
produce the random intensity light patterns.
To provide automation, the IR Proximity sensor will
have a range value
in order to detect a finger being present in the scanner.
This will act as the
trigger for the device. Once triggered, Processing code on the PC side will send information
needed for producing light pa
tterns and the internal camera will capture the image
to the onboard
SD storage device. A total of five samples are captured each having a unique light pattern. At the
conclusion of the capture sequence, the Processing code executing on the PC will begin sending
the secure via the small vibration device embed
ded in the device. This will only occur if the
user’s finger has remained in the device. The rolling codes are one time use only and the IR
sensor must sense the finger for the duration of their validity and until the user enters the proper
are the circuit
for the actual prototype device.
Finger is inserted into device.
An LED matrix produces a random pattern of light on the finger at various intensities.
The internal camera
If image is a match, the rolling code is transmitted to the user
The user enters the proper code and access is granted
Biometric Identifier will be evaluated using
measured by the likely hood that an identical sample could exist in nature.
For example, 1 in 10,000 people born are identical twins, therefor; any identical shared
features would decrease the uniqueness of the identifier as a biometric sample (Sussman,
a biometric trait must be sufficiently invariant over time
aymire & Zektser, 2009). For example, a biometric process that measured something
such as finger nail patterns would not be practical. Baseline images would need to
established on a weekly basis. This would not be easy to maintain or administrate.
Practical/Ease of Use
ow easy a process is to perform, has a large impact on its
implementation. If a procedure is lengthy or difficult, it may be counterproductive to
any biometric identification process must be non
invasive, safe and
utilizes biological features that do not make the individual uncomfortable. For example, it
would be questionable to use a biological characteristic such as
the circumference of an
individual’s waist as a method of identification. The biometric identifier should be
something that will be acceptable to any individual regardless of their appearance or
any biometric device or proces
s must with stand the scrutiny of
circumvention as a criterion for evaluation. Spoofing or emulating a biometric trait in
order to fool a device is just one way that a process might be circumvented.
Circumventing in essence refers to the ease with which a
trait of an individual can be
imitated. This may include but is not limited to fake fingers or voice pattern replicating
software (Bartlow, Waymire & Zektser, 2009).
To be viable, a biometric device must needs to be cost effective. If a
system is too expensive it is less likely to be adopted by the industry or consumers.
Consumers also demand aesthetically pleasing form factors for these types of devices.
For example, if a biometric device was a large as a computer desk, it is unlikely to
become a popular method for home computer users. Users demand systems and devices
that are well documented, fool proof, safe, ergonomic, and provide status information
about the devices current state (Nielsen, 1995). For example, if you entered your
ame and password into a system and it simply did not respond with any feedback, a
user would most likely become frustrated.
Project Logic Model
The main goal of this project is to
create a device to capture a non
static biometric identifier
on random light intensity images of the fingertip for verification and authentication
The following objectives reflect areas of the device
in the behavioral ground, in its
performance, in the process of image recognition, product’s appearance and its possible
application beyond network security settings. All objectives presented are measurable.
To simplify user
n by creating
software and a hardware
to eliminate several steps that existing devices require and design reliable and low
maintenance solutions to access the system.
. To increase security, accuracy and reliability of Biometric Identifier b
using random intensity light patters to produce
a unique image of the fingertip.
. To design non
static biometric identifier that provides the access to the network
only during physical presence of a user.
. To change the appearance of the
existing device by making it more aesthetic
and high tech.
. To expand the application of the product in the variety of settings.
In order to complete this project the following activities need to take place:
Building a team of n
etwork security and programming students.
Complete the research on
existing similar products.
Analyze the existing product and distinguish its shortcoming and
Create a data base of devices that perform functions required for non
Simplify authorized user’s access to the computer system:
Design a device to analyze and determine the user’s identity automatically.
Order the parts necessary to build a prototype such as hardware, the
camera sensors and LED lights, LCD Touch screen
Create a rough drawings of each circuit
Download the necessary libraries to make each circuit work
Assemble the I/O boards
Design a circ
uit using IR proximity to automatically sense the user and
activate the system.
Satisfy a network security professionals by increasing the level of security and reliability
of the system’s access:
Design a device that uses an accurate method of identifyin
g the end user.
Design an LED light bed
Design a camera circuit
Create a circuit to integrate camera and LED light bed
Build these circuits and combine them into a working prototype
Code the functionality of the each circuit
Tie the functions together as a
For CIO’ satisfaction, provide reliable and low maintenance solutions to access the
Design a device using proven technologies in a simple configuration.
Design all the circuits in the most efficient and logical manner.
satisfaction, provide an affordable solution to access the system:
Design a device that could be cheaply produced on a large scale.
Use parts that are common place and inexpensive in the design.
For CEO satisfaction, design a device with a strong network
Design a device that can be proven and accepted by industry.
Debug device function and code
Beta test device
Monitor the process of the device improvement and correct the mistakes.
Create a prototype of the
Make new aesthetically appealing design of the product.
Run multiple tests and correct mistakes modifying the software
as well as hardware
Present the Non
Static Biometric Identifier to a group of network security experts.
Description of Design Prototype
Prototype will utilize and Arduino Uno R3 microcontroller, a TTL camera sensor,
IR proximity sensor, LED matrix, a shift register
for the LED array and the LCD, small
motor, various diodes, resistors, and ca
and a small project box to house the circuits with
an opening for finger insertion. Current prototype focuses on random patterns of light at various
intensities to produce a
static biometric identifier and code communication via the sense of
The primary innovative component is functional to the degree that it performs the tasks
described. The secondary innovative component functions perfectly as designed. There have
been numerous test runs of both the device and the software
in tandem and separately. During
final testing all the basic functions worked during every procedure.
Project Completion Assessment
This project has been a success with room for refinement. Some of the components needed to
make the images more clear and accurate for comparison are simply
expensive for a student
project. For example a sensor capable of macros and a
mechanism are a few of
the items lacking to bring the prototype full
block was the lack of
tooling available in my shop. The project is
to prove that the primary innovation
concept is viable. I am quite pleased with th
e performance of the secondary innovation
component. Several test subjects tested the prototype and 100% of those participants were able to
receive the code correctly and enter it in order to gain access to the system. The entire
mechanical and electrical
function of the device and the software is a 100% complete.
ASTM International. Retrieved on October 18, 2012 from
Bartlow, N., Waymire, D., & Zektser, G. (2009, October 1).
Holistic evaluation of
. Retrieved February 7, 2012, from NIST:
Biometric History. Retrieved on October 31, 2012 from:
. (2002, June 5). Retrieved February 7, 2012, from ieee.org:
Gompers, J. (2003). Biometrics: The Basics. Retrieved on October 17, 2012 from:
Lerner, E. (2011). Biometric Identification. Retrieved on November 2, 2012 from:
Nielsen, J. (1995, January 1).
10 usability heuristics
. Retrieved February 7, 2012,
Phillips, J. P., Martin, A., Wilson, C
., & Przybocki, M. (2000, February 1).
introduction to evaluating biometric systems
. Retrieved February 7, 2012, from epic:
Rajan, V. (2011). What Is Biometrics? Retrieved on October 18, 201
Richards, D. (2010). Biometric Identification. Retrieved on October17, 2012 from:
Rutter, J. (2012). Biometric Tools Used for Network Security. Retrieved on October
12, 2012 from:
Sidlauskas, D. United States Patent and Trademark Office. “Patent 4,736,203: 3D
and profile identification apparatus.” 5 April 1988.
Sussman, A. (2010, October 7).
Methodology for evaluating multi
Retrieved February 7, 2012, from
Technopedia. Retrieved on October 31, 2012 from:
Woodward, J., Horn, C., and Gatune
, J. (2003). Biometrics. Retrieved on October 12,
Woodward, J., Orlans, M., and Higgins, P. (2003). Biometrics. New York: McGraw