Biometrics for Forensic Identification in Web Applications and Social Platforms Using Deep Learning

Biometrics for Forensic Identification in Web Applications and Social Platforms Using Deep Learning

Shefali Arora, M. P. S. Bhatia
DOI: 10.4018/978-1-5225-9554-0.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Biometric authentication is being increasingly used in various applications to identify people using various traits. This can be of use in various applications like forensics, passport control, etc. In the rapidly growing era of internet, it is necessary to restrict access to data on the web. Security and customer usage are some of the essential parameters which should be taken care of in a web biometric system. Also, biometric technology has been implemented on social media platforms so as to save users from cyber-attacks and breach of privacy. This chapter provides an overview of how a web biometric system works, with an approach to use deep learning algorithms to identify traits like face, iris, and fingerprints. Such techniques can also be used to authenticate people in e-commerce applications. Further, the authors discuss the implementation of biometric verification techniques on social networking platforms like Facebook, Twitter, etc.
Chapter Preview
Top

Introduction

As the popularity of the Internet has increased, there is a growing need to identify people who access sensitive content on the Web. Most of the web applications ensure the security of their services by using passwords (Duic, Cvrtila & Ivanjko, 2017). However, it is easy to intercept passwords of people. Moreover, intrusion into personal accounts has become common, thus leading to cybercrimes. Therefore, the concept of using biometric authentication is gaining popularity in web systems because biometric authentication is reliable and is an important technique (Saini & Kumar Kapoor, 2016) to identify criminals by using physical traits (such as fingerprints, facial patterns and iris scans) and behavioural traits (such as signature and voice).

The choice of a biometric trait depends on the following factors:

  • Universality: Every individual should possess the biometric trait.

  • Uniqueness: Each should have a unique trait.

  • Permanence: The trait should not change over time.

  • Performance: Given the limitations of an individual, the traits should be recognized with high accuracy.

Thus, a biometric system acquires data from an individual, extracts features from the available data, and compares these features with a set of templates that are already input in the system database (Mayron 2015). Biometric systems can be divided into two categories based on the mode of application:

  • Identification: A biometric system searches among all the existing templates stored in its database and compares the features to prove a person’s identity. Thus, the system performs a 1:N comparison, and this process is slower than verification because the template is matched with all other templates in the database. The response validates the identity of the individual.

  • Verification: This is a one-to-one comparison technique in which an individual’s information is compared with his template in the database. For example, an individual’s fingerprint is captured digitally through an application. The system then compares the fingerprints to verify if the fingerprint belongs to this individual.

Figure 1 displays the working of a biometric matcher in a web application. In a biometric matcher, features are either extracted and identified or verified through templates that are already stored in the database to allow access to a user.

Figure 1.

Biometric authentication

978-1-5225-9554-0.ch004.f01

Biometric technologies are sufficient to perform forensic analysis and detect crimes in web applications because they overcome the limitations of human abilities and increase the effectiveness of an investigation. By applying various techniques, a considerable amount of data can be easily analysed on a scientific basis in crime investigations, which would not have been possible otherwise. Moreover, the analysis results obtained can be easily visualised and documented.

The performance of a biometric system can be analysed using various metrics such as false match rate or false accept rate, which finds the percentage of unauthorised access in a system, and false rejection rate or false non-match rate, which analyses the number of authorised inputs falsely rejected by a system. Thus, there is a need to find a balance point at which the false match rate is equal to the false non-match rate, also known as equal error rate (Marasco & Ross 2014). The representation of the rates is presented in Figure 2.

Figure 2.

Performance metrics in a biometric system

978-1-5225-9554-0.ch004.f02

Key Terms in this Chapter

Soft Biometrics: These are the physical or behavioral traits that help to differentiate between individuals, for example, age, gender, and ethnicity.

Software Development Kit: A software development kit or SDK is a set of software development tools used by software packages, operating system, software frameworks and other development platforms for the creation of applications.

Liveness Detection: It is the process of using biometric identification to ascertain the identity of an individual. This also involves the verification that the user is a real person or the same person who was enrolled in the database.

Cybercrime: It is a computer related crime, done against an individual or group of individuals to harm the reputation or cause mental and physical harm.

Application Programming Interface: It is a set of procedures or functions used in the creation of applications that help to access data of any particular service.

Deep Learning: It is the broader family of machine learning which makes use of methods to learn features and representations from data, unlike task specific algorithm.

Complete Chapter List

Search this Book:
Reset