Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Biometrics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Recent advances in emerging biometrics== In recent times, biometrics based on brain ([[Electroencephalography|electroencephalogram]]) and heart ([[Electrocardiography|electrocardiogram]]) signals have emerged.<ref>{{cite book | doi=10.1007/11875581_73 | chapter=Electroencephalogram Signals from Imagined Activities: A Novel Biometric Identifier for a Small Population | title=Intelligent Data Engineering and Automated Learning – IDEAL 2006 | series=Lecture Notes in Computer Science | date=2006 | last1=Palaniappan | first1=Ramaswamy | volume=4224 | pages=604–611 | isbn=978-3-540-45485-4 }}</ref><ref>{{cite book | doi=10.1109/SPCOM.2004.1458524 | chapter=Identifying individuals using ECG beats | title=2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04 | date=2004 | last1=Palaniappan | first1=R. | last2=Krishnan | first2=S.M. | pages=569–572 | isbn=0-7803-8674-4 | s2cid=16091945 }}</ref><ref>{{cite journal|last1=Arnau-González|first1=Pablo|last2=Katsigiannis|first2=Stamos|last3=Arevalillo-Herráez|first3=Miguel|last4=Ramzan|first4=Naeem | title=BED: A new dataset for EEG-based biometrics | journal=IEEE Internet of Things Journal | volume=(Early Access)|date=February 2021 |issue=15|pages=12219–12230|doi=10.1109/JIOT.2021.3061727 |s2cid=233916681|issn=2327-4662|url=https://ieeexplore.ieee.org/document/9361690 }}</ref> An example is [[finger vein recognition]], using pattern-recognition techniques, based on images of human vascular patterns. The advantage of this newer technology is that it is more fraud resistant compared to conventional biometrics like fingerprints. However, such technology is generally more cumbersome and still has issues such as lower accuracy and poor reproducibility over time. On the portability side of biometric products, more and more vendors are embracing significantly miniaturized biometric authentication systems (BAS) thereby driving elaborate cost savings, especially for large-scale deployments. ===Operator signatures=== An operator signature is a biometric mode where the manner in which a person using a device or complex system is recorded as a verification template.<ref name="langston2015" /> One potential use for this type of biometric signature is to distinguish among remote users of [[Telerobotics|telerobotic]] surgery systems that utilize public networks for communication.<ref name="langston2015">{{cite news |url=http://www.scientificcomputing.com/news/2015/05/researchers-hack-teleoperated-surgical-robot-reveal-security-flaws |title=Researchers hack Teleoperated Surgical Robot to Reveal Security Flaws |author=Langston, Jennifer |date=8 May 2015 |access-date=17 May 2015 |work=[[Scientific Computing]] |location=New Jersey |url-status=live |archive-url=https://web.archive.org/web/20160304050336/http://www.scientificcomputing.com/news/2015/05/researchers-hack-teleoperated-surgical-robot-reveal-security-flaws |archive-date=4 March 2016}}</ref> === Proposed requirement for certain public networks === [[John Michael McConnell|John Michael (Mike) McConnell]], a former vice admiral in the [[United States Navy]], a former director of [[United States Director of National Intelligence|U.S. National Intelligence]], and senior vice president of [[Booz Allen Hamilton]], promoted the development of a future capability to require biometric authentication to access certain public networks in his keynote speech<ref name="McConnell-Keynote">{{Cite conference |last1 = McConnell |first1 = Mike |title = KeyNote Address |conference = Biometric Consortium Conference |date = January 2009 |place = Tampa Convention Center, Tampa, Florida |url = http://www.boozallen.com/consulting-services/services_article/42861927 |access-date = 20 February 2010 |url-status = dead |archive-url = https://web.archive.org/web/20100218024851/http://www.boozallen.com/consulting-services/services_article/42861927 |archive-date = 18 February 2010}}</ref> at the 2009 Biometric Consortium Conference. A basic premise in the above proposal is that the person that has uniquely authenticated themselves using biometrics with the computer is in fact also the agent performing potentially malicious actions from that computer. However, if control of the computer has been subverted, for example in which the computer is part of a [[botnet]] controlled by a hacker, then knowledge of the identity of the user at the terminal does not materially improve network security or aid law enforcement activities.<ref name="Schneier-Anonymous">{{cite web |last = Schneier |first = Bruce |title = The Internet: Anonymous Forever |date = 12 May 2010 |url = http://www.schneier.com/essay-308.html |access-date = 1 October 2011 |url-status = live |archive-url = https://web.archive.org/web/20111012204958/http://www.schneier.com/essay-308.html |archive-date = 12 October 2011}} </ref> ===Animal biometrics=== Rather than tags or tattoos, biometric techniques may be used to [[animal identification|identify individual animals]]: zebra stripes, blood vessel patterns in rodent ears, muzzle prints, bat wing patterns, primate facial recognition and koala spots have all been tried.<ref>{{cite news |last1=White |first1=Anna |title=The High-Tech, Humane Ways Biologists Can Identify Animals |url=https://www.smithsonianmag.com/science-nature/high-tech-humane-ways-biologists-identify-animals-180971632/ |access-date=22 March 2019 |work=[[Smithsonian (magazine)|Smithsonian]] |date=April 2019}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)