Vein matching

Vein matching, also called vascular technology,[1] is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.[2] Though used by the Federal Bureau of Investigation and the Central Intelligence Agency,[3] this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.[2][4]

While other types of biometric scanners are more popular for security systems, vascular scanners are growing in popularity. Fingerprint scanners are more frequently used, but they generally do not provide enough data points for critical verification decisions. Since fingerprint scanners require direct contact of the finger with the scanner, dry or abraded skin can interfere with the reliability of the system. Skin diseases, such as psoriasis, can also limit the accuracy of the scanner, not to mention direct contact with the scanner can result in need for more frequent cleaning and higher risk of equipment damage. Vascular scanners do not require contact with the scanner, and since the information they read is on the inside of the body, skin conditions do not affect the accuracy of the reading. Vascular scanners also work with extreme speed, scanning in less than a second. As they scan, they capture the unique pattern veins take as they branch through the hand. Compared to the retinal scanner, which is more accurate than the vascular scanner, the retinal scanner has much lower popularity, because of its intrusive nature. People generally are uncomfortable exposing their eyes to an unknown light, not to mention retinal scanners are more difficult to install, since variances in height and face angle must be accounted for.[5]

History

Joe Rice, an automation controls engineer at Kodak's Annesley Factory, invented vein pattern recognition in the early 1980s in response to his bank cards and identity being stolen. He developed essentially a barcode reader for people and assigned the rights to the UK's NRDC (National Research Development Corporation).[6] The NRDC/ BTG (Thatcher privatised NRDC into BTG) made little headway in licensing vein pattern technology. The world was wedded to fingerprints and Iris patterns and Governments (the main buyers of biometric solutions) wanted open view biometrics for surveillance purposes, not a hidden, personal biometric solution.

In the late 1990s BTG said they were dropping vein patterns through no commercial interest. Rice was unhappy with the BTG's decision and their implementation of vein pattern technology so he gave a talk at the Biometric Summit in Washington DC, on how he would develop vein pattern recognition.[7] This view was countered by a following speaker from IBG (The US based international Biometric Group) who said there was insufficient information content in vein patterns for them to be used as a viable biometric.

In 2002 Hitachi and Fujitsu launched vein biometric products and veins have turned out to be one of the most consistent, discriminatory and accurate biometric traits.

In the mid 2000s, Rice received an invitation from Matthias Vanoni to partner in a Swiss company Biowatch SA to develop and commercialise the biowatch.

Commercial applications

Vascular/vein pattern recognition (VPR) technology has been developed commercially by Hitachi since 1997, in which infrared light absorbed by the haemoglobin in a subject's blood vessels is recorded (as dark patterns) by a CCD camera behind a transparent surface.[8] The data patterns are processed, compressed, and digitized for future biometric authentication of the subject. Finger scanning devices have been deployed for use in Japanese financial institutions, kiosks, and turnstiles.[9] Mantra Softech marketed a device in India that scans vein patterns in palms for attendance recording.[10] Fujitsu developed a version that does not require direct physical contact with the vein scanner for improved hygiene in the use of electronic point of sale devices.[11]

Computer security expert Bruce Schneier stated that a key advantage of vein patterns for biometric identification is the lack of a known method of forging a usable "dummy", as is possible with fingerprints.[12]

Forensic identification

According to a 31,000-word investigative report published in January 2011 by Georgetown University faculty and students,[13][14][15][16][17] U.S. federal investigators used photos from the video recording of the beheading of American journalist Daniel Pearl to match the veins on the visible areas of the perpetrator to that of captured al-Qaeda operative Khalid Sheikh Mohammed, notably a "bulging vein" running across his hand.[4] The FBI and the CIA used the matching technique on Mohammed in 2004 and again in 2007.[3] Officials were concerned that his confession, which had been obtained through torture (namely waterboarding), would not hold up in court and used vein matching evidence to bolster their case.[2]

Other applications

Some US hospitals, such as NYU Langone Medical Center, use a vein matching system called Imprivata PatientSecure, primarily to reduce errors. Additional benefits include identifying unconscious or uncommunicative patients, and saving time and paperwork.[18] Dr. Bernard A. Birnbaum, chief of hospital operations at Langone, says "vein patterns are 100 times more unique than fingerprints".[19] However, the newspaper reports of the use of vein matching to determine whether Khalid Sheikh Mohammed was Mr Pearl's murderer quoted FBI officials who described the technique as "less reliable" than fingerprints.

gollark: I mean, they might be reading your crypto secrets out of RAM, and... do you just assume that *some* of them won't be evil and just rerun the computation if the result don't match, or something?
gollark: If you don't trust your compute nodes, you basically can't do anything.
gollark: > The Internet Computer is a decentralized cloud computing platform that will host secure software and a new breed of open internet services. It uses a strong cryptographic consensus protocol to safely replicate computations over a peer-to-peer network of (potentially untrusted) compute nodes, possibly overlayed with many virtual subnetworks (sometimes called shards). Wasm’s advantageous properties made it an obvious choice for representing programs running on this platform. We also liked the idea of not limiting developers to just one dedicated platform language, but making it potentially open to “all of ’em.”How is *that* meant to work?
gollark: ... "internet computer"? Oh bees.
gollark: https://git.osmarks.tk/mirrors/rpncalc-v4

See also

References

  1. Finn, Peter (20 January 2011). "Report: Top al-Qaeda figure killed Pearl". The Washington Post. Retrieved 21 January 2011.
  2. Blackburn, Bradley (20 January 2011). "Report Says Justice Not Served in Murder of Daniel Pearl, Wall Street Journal Reporter". ABC News. pp. 1–2. Retrieved 20 January 2011.
  3. Cratty, Carol (20 January 2011). "Photos of hands backed up Pearl slaying confession, report finds". CNN. Retrieved 21 January 2011.
  4. Ackerman, Spencer (20 January 2011). "Qaeda Killer's Veins Implicate Him In Journo's Murder". Wired. Retrieved 21 January 2011.
  5. Bryn Nelson (30 June 2008). "Giving biometrics a hand". nbcnews.com. Retrieved 17 May 2018.
  6. See his website from 1993 onwards at: https://sites.google.com/site/veinpatternhome/
  7. ""A Third Way for Biometrics" –Google Groups". groups.google.com.
  8. "HRSID Vein Recognition overview".
  9. "Finger Vein Authentication Technology". Hitachi America, Ltd. Retrieved 21 January 2011.
  10. "PV2000". India: Mantra Softech Pvt. Ltd. Retrieved 21 January 2011.
  11. "Your hand is the key: The world's first contactless palm vein authentication technology". PalmSecure. Fujitsu. Retrieved 21 January 2011.
  12. Schneier, Bruce (8 August 2007). "Another Biometric: Vein Patterns". Schneier on Security. Retrieved 21 January 2011.
  13. Stanglin, Douglas (20 January 2011). "Report: Forensic evidence ties 9/11 plotter to Pearl's killing". USA Today. Retrieved 21 January 2011.
  14. Benjamin Wittes (20 January 2011). "So KSM Really Did Kill Daniel Pearl". Lawfare. Retrieved 10 October 2013. The investigation produced a lengthy report concluding, among other things, that Khalid Sheikh Mohammed was telling the truth when he boasted at his CSRT hearing of “decapitat[ing] with my blessed right hand the head of the American Jew, Daniel Pearl.”
  15. Asra Q. Nomani; et al. (20 January 2011). "The Pearl Project". The Center for Public Integrity. Retrieved 10 October 2013.
  16. Peter Finn (20 January 2011). "Khalid Sheik Mohammed killed U.S. journalist Daniel Pearl, report finds". Washington Post. Retrieved 10 October 2013. A recently completed investigation of the killing of Daniel Pearl in Pakistan nine years ago makes public new evidence that a senior al-Qaeda operative executed the Wall Street Journal reporter.
  17. Ben Farmer (20 January 2011). "Daniel Pearl was beheaded by 9/11 mastermind". The Telegraph (UK). Retrieved 10 October 2013. They replied: 'The photo you sent me and the hand of our friend inside the cage seem identical to me.' Both the CIA and FBI use the mathematical modelling technique, though it is not considered as reliable as fingerprinting.
  18. Allen, Jonathan (28 July 2011). "New York hospital using palm-scanners". Stuff.co.nz. Retrieved 30 July 2011.
  19. By Plasencia, Amanda (28 July 2011). "Hospital Scans Patient Hands to Pull Medical Info". NBC New York. Retrieved 30 July 2011.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.