Forensic Computing Authentication by Biometric Verification
Finger Scan is cost efficient and accurate. The finger print, the most common biometric measurement, has been in use for security measures by law enforcement agencies for more than 100 years (Johnathon, 2001). The fingerprint has come a long way from India paper cards and Ink. The way the finger scan works is, that it looks minutia, and it is the position of the end points and junctions of individual ridges that mutually form the finger print. Most commercial applications rely on the collection of approx 14 to 30 minutias though the number that can be tracked can run into the hundreds. The initial system for a finger scanner, consist of fixed CPU connected to a chip. The chip read your minutia when your finger is positioned on it. Once the scan is complete, the computer compares the minutia to a list of official users in its database. The stored record cannot be used to recreate a fingerprint, because the records doesnt store photographs, but instead reflect the information about the exact points of the finger (Thompson, 2001).
Financial Institutions One of the first financial institution to implement finger scans was the Purdue Employees Federal Credit Union in Lafayette, Indiana in 1996.
Using it for Authentication
The Commerce Community
The commerce community has also begun to use fingerprint scanning for (HRM) human resource management, scam, internal theft, and administration access codes. One main case is a co-worker punching in the time card for an absent co-worker. Hand, finger, and voice biometrics can put a stop to this scam and save the company cash. One more type of problem in which businesses lose cash is forging. One case of a companys attempt to stop forging through the use of biometrics is Walt Disney. In March 1996, Disney World began testing the use of 3-D finger geometry to reduce fraud and add ease for visitors. The theme park sales hundreds of dollars in passes and has suffered a profit lose through the criminal action of forging passes. The allegation of the biometric hand scan to verify pass holders, has stopped the previous serious of fake passes. The commerce community has also begun using biometrics systems for domestic theft. Every one in business knows that the greater part of theft comes from its own employees. Businesses have even prepared a group under decline to classify this type of lost inventory. With the use of biometrics, no employee can argue that some one cracked their code or that they dont know who had access to it. By eliminating this problem, shrinkage would decrease and profit would rise.
Health Care
One of the near futures incorporation with biometrics is in the medical field. There is an accurate use for this type of tools in health care, which would make authorization a stronger word. With the execution of biometrics there is an option for nurses to enter a patients Identity number, authenticate their access codes with the scan of their fingerprint, which in turn can download the patients file (Simpson, 2001). Signing out would be the similarity to giving a signature, clearing up the jumble of you did when and what Im sure that this example sounds a spot critical of todays medical procedure, but it has to be. Biometrics will not take over the method that the medical field has established slightly it will help to enforce tighter security.
Judicial system
Number of people agrees that fingerprinting should be allowed in our courtrooms just as it has been for so many years. With so much inquiry of the soundness of fingerprinting evidence, it cannot probably be allowed in our judicial system. In order for us to resolve whether or not fingerprint evidence is scientifically sound, we need to look at what forms a match. Fingerprints are exclusive. Every persons fingerprint is like a snowflake, there are millions of them, yet no two are accurately alike. If we personally find it hard to take a hidden print from the scene of a crime, and compare it to a record of millions of fingerprints. Fingerprint databases are built from police stations, jails, prisons, and credentials programs like Identi-Kid.
Advantages and possible Applications
Increase security - Provide a convenient and low-cost additional level of security.
Reduce fraud by employing hard-to-forge technologies and materials.
Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access
Unequivocally link an individual to a transaction or event.
DisadvantagesHurdles for implementation - Security and Consistent Accuracy
The finger prints of the persons working in Chemical industries are frequently affected. So these industries should not use the finger print mode of authentication.
It is notice that with the age, the voices of a person changes. Also when the person has throat infection or flu the voice changes or if there are too much sound in the environment this method may not validate correctly. So this method of verification is not practicable all the time
Biometrics is a costly security solution.
For people affected with diabetes, the eyes get affected resulting in differences (Ritter, 2002).
Clearing the Hurdles
Skilled assessor of fingerprint verification agrees that the process of comparing hidden fingerprints of unknown origin with inked impressions of known origin is an art rather than a science. It requires an examiner to assess, on the basis of knowledge in dealing with thousands of fingerprints, what parts of an incomplete and partially blurred hidden print show detectable friction ridge detail that can be used for identification purposes. But whether fingerprint identification is art or science is undoubtedly no longer applicable to a Daubert inquiry (Meagher, n.d.). What needs to be observed is whether the underlying premises upon which fingerprint detection are based have been experimentally authenticated. And these premises are of three kinds
(1) Friction ridge detail of the epidermis on the palm side remains unchanged of the hands during the lifetime of a person, except for accidental or alteration.
(2) Friction ridge pattern areas shows so much variety of detail that no two patterns are ever found to be accurately the same on the digits (or palms or soles of feet) of one individual or on the digits (or palms or soles of feet) of further individuals.
(3) While these friction ridge patterns shows an endless variety of detail, they nevertheless fall within certain wide classes or categories that permit police to store and recover millions of prints according to categorization formulae (Moenssens, 2002).
There is, however, reputable empirically established evidence of the uniqueness of fingerprint patterns. Research by many examiners has shown that the fingerprints of identical twins are dissimilar, as are the prints of triplets, quadruplets, and quintuplets. In that sense, fingerprint recognition has been found to be even more discriminating than the vaunted DNA (deoxyribonucleic acid) fingerprinting technique, which cannot differentiate, by todays technology, between the DNA of identical twins. Since inherited behaviour for similarity in patterns and sub-pattern types are the most common among people who are related closely to each other, the dissimilarity in the prints of such persons definitely can be taken as pragmatic evidence of fingerprint individuality (Moenssens, 2002).
Conclusion
Where we talk about conclusion of the Forensic Computing Authentication by Biometric Verification we came to realize that finger print, the most common biometric measurement, has been in use for security measures since years. Forensic computing is really very important in todays world, as we already know that internal theft and scam is very common in industries, if a person punching in the time card for an absent person. Hand, finger, and voice biometrics can put a stop to this scam and save the money of the company. Different types of industries like Health Care departments, Judiciary department and business communities are using the methods of authentication of Biometric Verification just because to stop scam, reduce fraud and unusual benefits taken by employees. There are some disadvantageshurdles for implementation- Security and consistent accuracy like Biometric authentication systems are cost effective and in rear cases it not works perfectly because there are some skin infection which changes the finger ridges and if we talk about voice biometric authentication system so some diseases like Flu and throat infection can change the persons voice. In spite of these disadvantages we have to focus on benefits of the Forensic Computing Authentication by Biometric Verification and in near future technology will definitely resolve these disadvantages.
Financial Institutions One of the first financial institution to implement finger scans was the Purdue Employees Federal Credit Union in Lafayette, Indiana in 1996.
Using it for Authentication
The Commerce Community
The commerce community has also begun to use fingerprint scanning for (HRM) human resource management, scam, internal theft, and administration access codes. One main case is a co-worker punching in the time card for an absent co-worker. Hand, finger, and voice biometrics can put a stop to this scam and save the company cash. One more type of problem in which businesses lose cash is forging. One case of a companys attempt to stop forging through the use of biometrics is Walt Disney. In March 1996, Disney World began testing the use of 3-D finger geometry to reduce fraud and add ease for visitors. The theme park sales hundreds of dollars in passes and has suffered a profit lose through the criminal action of forging passes. The allegation of the biometric hand scan to verify pass holders, has stopped the previous serious of fake passes. The commerce community has also begun using biometrics systems for domestic theft. Every one in business knows that the greater part of theft comes from its own employees. Businesses have even prepared a group under decline to classify this type of lost inventory. With the use of biometrics, no employee can argue that some one cracked their code or that they dont know who had access to it. By eliminating this problem, shrinkage would decrease and profit would rise.
Health Care
One of the near futures incorporation with biometrics is in the medical field. There is an accurate use for this type of tools in health care, which would make authorization a stronger word. With the execution of biometrics there is an option for nurses to enter a patients Identity number, authenticate their access codes with the scan of their fingerprint, which in turn can download the patients file (Simpson, 2001). Signing out would be the similarity to giving a signature, clearing up the jumble of you did when and what Im sure that this example sounds a spot critical of todays medical procedure, but it has to be. Biometrics will not take over the method that the medical field has established slightly it will help to enforce tighter security.
Judicial system
Number of people agrees that fingerprinting should be allowed in our courtrooms just as it has been for so many years. With so much inquiry of the soundness of fingerprinting evidence, it cannot probably be allowed in our judicial system. In order for us to resolve whether or not fingerprint evidence is scientifically sound, we need to look at what forms a match. Fingerprints are exclusive. Every persons fingerprint is like a snowflake, there are millions of them, yet no two are accurately alike. If we personally find it hard to take a hidden print from the scene of a crime, and compare it to a record of millions of fingerprints. Fingerprint databases are built from police stations, jails, prisons, and credentials programs like Identi-Kid.
Advantages and possible Applications
Increase security - Provide a convenient and low-cost additional level of security.
Reduce fraud by employing hard-to-forge technologies and materials.
Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access
Unequivocally link an individual to a transaction or event.
DisadvantagesHurdles for implementation - Security and Consistent Accuracy
The finger prints of the persons working in Chemical industries are frequently affected. So these industries should not use the finger print mode of authentication.
It is notice that with the age, the voices of a person changes. Also when the person has throat infection or flu the voice changes or if there are too much sound in the environment this method may not validate correctly. So this method of verification is not practicable all the time
Biometrics is a costly security solution.
For people affected with diabetes, the eyes get affected resulting in differences (Ritter, 2002).
Clearing the Hurdles
Skilled assessor of fingerprint verification agrees that the process of comparing hidden fingerprints of unknown origin with inked impressions of known origin is an art rather than a science. It requires an examiner to assess, on the basis of knowledge in dealing with thousands of fingerprints, what parts of an incomplete and partially blurred hidden print show detectable friction ridge detail that can be used for identification purposes. But whether fingerprint identification is art or science is undoubtedly no longer applicable to a Daubert inquiry (Meagher, n.d.). What needs to be observed is whether the underlying premises upon which fingerprint detection are based have been experimentally authenticated. And these premises are of three kinds
(1) Friction ridge detail of the epidermis on the palm side remains unchanged of the hands during the lifetime of a person, except for accidental or alteration.
(2) Friction ridge pattern areas shows so much variety of detail that no two patterns are ever found to be accurately the same on the digits (or palms or soles of feet) of one individual or on the digits (or palms or soles of feet) of further individuals.
(3) While these friction ridge patterns shows an endless variety of detail, they nevertheless fall within certain wide classes or categories that permit police to store and recover millions of prints according to categorization formulae (Moenssens, 2002).
There is, however, reputable empirically established evidence of the uniqueness of fingerprint patterns. Research by many examiners has shown that the fingerprints of identical twins are dissimilar, as are the prints of triplets, quadruplets, and quintuplets. In that sense, fingerprint recognition has been found to be even more discriminating than the vaunted DNA (deoxyribonucleic acid) fingerprinting technique, which cannot differentiate, by todays technology, between the DNA of identical twins. Since inherited behaviour for similarity in patterns and sub-pattern types are the most common among people who are related closely to each other, the dissimilarity in the prints of such persons definitely can be taken as pragmatic evidence of fingerprint individuality (Moenssens, 2002).
Conclusion
Where we talk about conclusion of the Forensic Computing Authentication by Biometric Verification we came to realize that finger print, the most common biometric measurement, has been in use for security measures since years. Forensic computing is really very important in todays world, as we already know that internal theft and scam is very common in industries, if a person punching in the time card for an absent person. Hand, finger, and voice biometrics can put a stop to this scam and save the money of the company. Different types of industries like Health Care departments, Judiciary department and business communities are using the methods of authentication of Biometric Verification just because to stop scam, reduce fraud and unusual benefits taken by employees. There are some disadvantageshurdles for implementation- Security and consistent accuracy like Biometric authentication systems are cost effective and in rear cases it not works perfectly because there are some skin infection which changes the finger ridges and if we talk about voice biometric authentication system so some diseases like Flu and throat infection can change the persons voice. In spite of these disadvantages we have to focus on benefits of the Forensic Computing Authentication by Biometric Verification and in near future technology will definitely resolve these disadvantages.