Difference between revisions of "Iris Recognition"

From SI410
Jump to: navigation, search
(quick edit)
(Examples)
Line 15: Line 15:
  
 
'''Country border controls''' also have the ability to utilize this technology. The United Arab Emirates employs this when any passengers enter through air, land or sea. <ref> https://trid.trb.org/view/741851 "IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE" </ref>
 
'''Country border controls''' also have the ability to utilize this technology. The United Arab Emirates employs this when any passengers enter through air, land or sea. <ref> https://trid.trb.org/view/741851 "IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE" </ref>
 +
 +
'''Airport Security''' is now utilizing iris recognition. A company called Clear has come into play in airports in attempts to simplify and save time. Customer's eyes are scanned as a means of identity verification, saving them the time of having to take out their ID and have it checked by a TSA officer.<ref> https://www.travelandleisure.com/airlines-airports/clear-airport-security "A Full Guide to Clear Airport Security: How It Works and Where You Can Use it" </ref>
  
 
== Advantages ==
 
== Advantages ==

Revision as of 12:23, 17 April 2019

Iris recognition is a biometric verification method that utilizes the unique pattern of an individual's iris, the colored circular structure in the eye, to confirm one’s identity. The authentication process begins by scanning an iris at a reasonable distance with near-infrared light to construct a template and comparing the acquired template to the individual's already existing templates in a database[1].

Similar to face recognition and fingerprinting, iris recognition uses human biological characteristics to distinguish one person from another for security purposes and efficiency. It is sometimes preferred over both face recognition and fingerprinting techniques due to the more unique structural attributes of the iris. As iris recognition is becoming more widely used, ethical concerns of identity, privacy, and consent have also come into view.

iris recognition [2]

History

John Daugman is the first person credited with creating iris recognition algorithms with the ability to be used in new technologies. In his paper, "How iris recognition works", his statistical analysis of iris patterns successfully distinguished and identified individuals and with high accuracy[3]. These findings paved the way for iris recognition technologies to be used by companies across different industries. Currently, the companies Iris ID Systems, CMITECH, Princeton Identity, Sensor Access Technology, Argus Global Limited, and EFG GZ all specialize in recognition technology utilizing some version of these iris identification algorithms[4].

Since the adoption of iris recognition technology and the value of being able to produce it has risen, iris recognition has found many different usages with potential for monetary gains. Banks and various financial institutions have implemented iris scanning over other more traditional forms of authentication due to its convenience of use and higher security[5]. Phone companies like Samsung have even employed iris scanning as a means of accessing one's phone. This technology has also been found to be increasingly helpful in law and border enforcement agencies, which prioritize quickly and correctly identifying individuals[5].

Examples

TSB Bank in the United Kingdom was one of the first banks, in September 2016, to incorporate Iris Recognition into their day to day banking operations. In order to log into the TSB application, you are now able to just glance at your mobile device. Iris Recognition is the next step in login technology after mobile fingerprints. Compared to the four traits the fingerprint scans for, Iris recognition is able to recognize two hundred and sixty-six. [6]

Apple's' iPhone XR includes a facial recognition software which incorporates iris recognition. Like the banks' technology, you know longer have to touch your phone to utilize the device.

Country border controls also have the ability to utilize this technology. The United Arab Emirates employs this when any passengers enter through air, land or sea. [7]

Airport Security is now utilizing iris recognition. A company called Clear has come into play in airports in attempts to simplify and save time. Customer's eyes are scanned as a means of identity verification, saving them the time of having to take out their ID and have it checked by a TSA officer.[8]

Advantages

High Accuracy

Iris recognition is not guaranteed to be entirely correct or effective every time. Factors like lighting and different algorithms may affect accuracy. However, there is less room for deceit because it is more difficult to alter iris than other body parts. Iris traits are more permanent and stable.[9] The high error rate of face recognition is accounted for by the change of facial features across conditions and the similarities existing among people, for example, twins.[10] Facial features may change over time which poses a problem for facial recognition technology. Moreover, the advancement of cosmetic surgery techniques makes face recognition impractical to use. The first documentation of appearance-altering surgery (to help people recover from injuries) can be dated back to more than four thousand years ago, and within the recent decades, more people have adopted cosmetic surgery to change or improve their facial appearance. In addition to altering one's face, there are also multiple ways of altering one’s fingerprints which creates an opportunity for ill-intentioned actors to successfully sneak through security checkpoints. According to a report in Forensic magazine, the FBI has caught hundreds of suspects who tried to alter their distinctive marks at their fingertips by deep cuts, burning, biting, or using sandpaper to avoid identification.[11] Further limitations include Genotypic and Phenotypic Limitation on Biometric Performance, where genetic penetrance describes heritability of factors or "the extent to which the features expressed are genetically determined." For example, blood group and DNA sequence would fall under genotypic features, and fingerprints and iris patterns would fall under phenotypic features. The importance of these features is how they influence two error rates, genotypic error rate, and phenotypic error rate, where there is a concern for mitigating the risk of Genotypic penetrance causing a high False Match Rate and mitigating the risk of Phenotypic features from causing a high False Reject Rate. [12]

Because iris recognition identifies individuals based on an unchangeable aspect of their physical identity, it proves to be extremely difficult for individuals to circumvent some security checkpoint. One might argue that each person has the right to alter their identity to reflect who they are. By preventing such an action, we are restricting autonomy and may even be violating the individual's privacy, but we are also providing security enforcement a more reliable enforcement system.[13]

Remote Scan

The way that the iris is scanned makes iris recognition technologies more efficient than other facial recognition software. While an iris scanner only needs to convert iris patterns to data and can do so at a considerable distance, face recognition demands close-proximity in order to scan many facial parts to collect essential features, and fingerprint detection requires people to physically press their fingers onto the machines. Iris recognition is only getting more remote. Researchers at Carnegie Mellon University have increased the distance from which iris recognition is able to work to more than ten meters away from a moving subject. This means that, in the future, it is very possible that an iris recognition surveillance camera can easily identify people from a far distance: as they walk through an airport or glance into a rear-view mirror while driving.[14]

Ethical Issues

Identity

Due to the high accuracy of iris recognition, many countries including the UK and the United Arab States are currently using this technology as a national ID for citizens and as a passport for travelers. Like Wikipedia bots and cyborgs, which combat vandalism more effectively than humans (though they also can create chaos when used inappropriately by malicious users), the high accuracy of iris recognition brings about serious consequences such as the ease of identity theft by using high-resolution photos of someone else's iris.[15] It is very likely that iris recognition will become a substitute for other legal documents - like drivers’ licenses - and will be applied to any situation that requires ID. Irises are not like fake paper documents that can be assessed without much effort or pain. If someone’s iris pattern is stolen, it is potentially more dangerous since the issue cannot be resolved as easily as getting a new driver's license. It is near impossible for people to receive new iris patterns or alter their eyes completely. If iris recognition were to be widely implemented in our day-to-day activities, cases of stolen iris patterns would likely be devastating for victims and basically irreversible.

Privacy

iris recognition used by the U.S. military in Afghanistan[14]

Until recently, iris recognition has been used mainly by
the U.S. military to identify captives taken from foreign battlefields,
police departments to surveil law-breakers,
the Department of Homeland Security to spot suspects on watch lists,
law enforcement at borders to identify smugglers and terrorists.[14] As more iris data is collected, and commercial iris scanners become cheaper and more accessible, iris scanning could be utilized for stalking. Imagine walking down a street, surrounded by cameras that know everything about each passerby (who they are, whom they have met, who their friends are, where they have been, and what their daily routines are).[16] Such a use of this technology would be dangerous in the hands of organizations, governments, and malicious people. Furthermore, with the improvement of resolution techniques, it could be possible to use iris recognition to match and combine someone's online and offline identities. For example, how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". This sort of technology is increasingly blurring the line between people's life online and offline, and calls for our attention in solving the rising privacy matters.[17]

Consent

From a security point of view, iris records help police keep track of specific suspects that were trying to escape from charges. However, the data could be used to track defendants even after the charge is dropped or the case is closed. The United States' New York City police department faced criticism in 2010 when reports were released stating that some police officers would hold detainees longer than necessary because those people refused to have their iris photographs taken.[18] The ethical issue of collecting iris data without consent is further complicated by the lack of transparency governments and organizations often employ when handling such data. Companies and legislation that fail to display transparency and make information invisible - or difficult to access - prevent individuals from exerting control over their personal data and from consenting to the dissemination of that information.[19] Transparency enables the ethical concern of consent to persist among biometric identifiers, but groups like the Federal Trade Commission (FTC) have made efforts to improve this problem. In 2012, the FTC issued a report with recommended principles for companies and organizations to adopt such as practices related to the transparent information collection and use, the inclusion of privacy protections during product development, and providing consumers with more contextualized and timely information regarding the collection of their personal data.[20]

Reference

  1. Wildes, Richard. Iris Recognition: an Emerging Biometric Technology - IEEE Journals & Magazine, Sept. 1997, ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=628669.
  2. Thakkar, Danny. “Retinal vs. Iris Recognition: Your Eyes Can Get You Identified?” Bayometric, Bayometric, 8 Aug. 2018, www.bayometric.com/retinal-vs-iris-recognition/.
  3. J. Daugman, "How iris recognition works," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004. doi: 10.1109/TCSVT.2003.818350
  4. "Iris Recognition". IFSEC Global Directory. https://directory.ifsecglobal.com/iris-recognition-code004809.html
  5. 5.0 5.1 Thakkar, Danny. “Biometric Iris Recognition and Its Application.” Bayometric, Bayometric, 15 Aug. 2018, www.bayometric.com/biometric-iris-recognition-application/.
  6. https://www.bbc.com/news/technology-40663365 "TSB to roll out iris scanning tech" Rory Cellan-Jones, July 20 2016.
  7. https://trid.trb.org/view/741851 "IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE"
  8. https://www.travelandleisure.com/airlines-airports/clear-airport-security "A Full Guide to Clear Airport Security: How It Works and Where You Can Use it"
  9. Jain, Anil K., and Sharath Pankanti. “BEYOND FINGERPRINTING.” Scientific American, vol. 299, no. 3, 2008, pp. 78–81. JSTOR, www.jstor.org/stable/26000805.
  10. Daugman, John. “Iris Recognition: The Colored Part of the Eye Contains Delicate Patterns That Vary Randomly from Person to Person, Offering a Powerful Means of Identification.” American Scientist, vol. 89, no. 4, 2001, pp. 326–333. JSTOR, www.jstor.org/stable/27857501.
  11. Augenstein, Seth. “FBI Warns About Altered Fingerprints.” Forensic Magazine, 14 June 2016, www.forensicmag.com/article/2015/05/fbi-warns-about-altered-fingerprints.
  12. Daugman, MSU, Recognizing Persons By Their Iris Patterns http://www.cse.msu.edu/~stockman/Book/projects.html/F09Docs/Readings/daugemanRecognizingPersons.pdf
  13. Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008
  14. 14.0 14.1 14.2 Stone, Jeff. “Iris Scanners, Widely Used By US Military, Could Be Coming To A Police Department Near You.” International Business Times, 12 May 2015, www.ibtimes.com/iris-scanners-widely-used-us-military-could-be-coming-police-department-near-you-1917018.
  15. Halfaker, Aaron, and John Riedl. “Bots and Cyborgs: Wikipedia's Immune System.” Computer, vol. 45, no. 3, 2012, pp. 79–82., doi:10.1109/mc.2012.82.
  16. Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.
  17. Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.
  18. Moynihan, Colin. “Some Who Decline an Optional Iris Photo Are Kept Longer in Jail, Critics Say.” The New York Times, The New York Times, 13 Feb. 2012, www.nytimes.com/2012/02/13/nyregion/new-objections-to-nypds-iris-photographing-program.html.
  19. Turilli, M. & Floridi, L., "The ethics of information transparency", March 2009, p. 105-112
  20. United States Government Accountability Office, "Facial Recognition Technology", July 2015, p. 23-24