The eyes have it – or do they? Make sure your iris scanning is up-to-date and spoof proof
In the 2002 sci-fi movie "Minority Report," Tom Cruise plays a futuristic police officer on the run who has eye transplants to conceal his identity from iris scanning. He also keeps his old eyes with him so he can log into the police network when needed. (This could actually work for a few days.)
Today, police have access to handheld devices that can attach to a cellphone and collect and interface iris scans, facial recognition, fingerprints and identifying information.
This has largely occurred with little public debate or oversight. A look into these developments can help law enforcement plan its use of the evolving technology so as not to lose in the public arenas. This article addresses concerns about the technology's reliability. Another article addresses privacy concerns.
Iris scanning is no longer science fiction. (Photo/Pixabay) Related articles Related content sponsored by UNDERSTANDING IRIS SCANNING TECHNOLOGYAn iris scan takes a detailed image of the ridges in the colored part of the eye, usually through infrared photography. These genetically determined ridges are complex and unique. Their advantages over fingerprints include:
When someone's iris is scanned, a binary code of the image is created. It is this iris code of about 5,000 bits of data that is stored in a database. When that person later goes before an iris-recognition scanner, the iris is scanned and measured against the code in the database to authenticate identity.
One such scanner developed by Biometric Intelligence & Identification Technologies (BI2) is called IRIS (Inmate Recognition & Identification System). Sheriffs and correctional facilities are using IRIS for purposes such as arrest, intake and booking, visitation, work release, etc.
BI2 says its iris recognition technology requires conscious participation. The subject must present their eye to the camera within a designated capture zone approximately 10 to 18 inches away.
But iris scanning technology is fast evolving. Carnegie Mellon engineering professor Marios Savvides says he's invented the first long-range iris scanner, which can identify someone as they glance at their rear-view mirror before a police officer even gets out of the car, or while the person is moving. He demonstrates it in this video.
Technology to defeat iris scanners is also advancing. Hackers have been able to fool scanners using Google Images photos. Researchers have been able to create synthetic iris images not connected to real people that can fool a scanner. These images can be transposed onto contact lenses. As in "Minority Report," irises can be used as biometric identifiers for at least a few days after death.
Dr. Leonard Flom, who shares the patent for the original iris scanning technique, is also countering the fakers. Some of the foils, he says, can be defeated by a simple pen light shone in the eyes, or a light and pupil reflex monitor in the scanner. Others are developing fake iris detection technology.
Recently, researchers have reverse-engineered iris codes to create iris images that closely match the eye images of real subjects. This creates the possibility of stealing someone's identity through their iris code.
THE PUBLIC DEBATE ABOUT IRIS SCANNINGA 2016 Government Accountability Office's (GAO) report threw a critical spotlight on the FBI's Next Generation Identification (NGI) program which is amassing multimodal biometric identifiers such as iris scans, palm prints, face-recognition-ready photos and voice data, and making that data available to other agencies at the state and federal levels.
One of the report's criticism was NGI's absence of reliability testing. Concerns include:
a. Have your scanning algorithms been accuracy tested for "false negatives" (failing to find a match when one exists) and "false positives" (an incorrect match)?
b. What were the results?
c. Do you have fake iris detection technology – including "liveness" detection such as pupil reflex monitoring?
d. What database do you use?
e. How big is it?
f. Who uses it?
g. What measures – like encryption – are in place to secure the database?
Author's note: Thanks to Yavapai County Sheriff Scott Mascher and his Chief Deputy, David Rhodes. Both gentlemen are a gold standard of transparency and civic concern. With no pre-conditions, they opened their office and jail doors to answer all my questions about their use of iris scanning and to observe it during booking. Both expressed a genuine concern about indiscriminate use of iris scanning by police.
About the author As a state and federal prosecutor, Val's trial work was featured on ABC'S PRIMETIME LIVE, Discovery Channel's Justice Files, in USA Today, The National Enquirer and REDBOOK. Described by Calibre Press as "the indisputable master of entertrainment," Val is now an international law enforcement trainer and writer. She's had hundreds of articles published online and in print. She appears in person and on TV, radio, and video productions. When she's not working, Val can be found flying her airplane with her retriever, a shotgun, a fly rod, and high aspirations. Visit Val at www.valvanbrocklin.com and info@valvanbrocklin.comSource: 5 things to consider before implementing iris scanning technology
No comments:
Post a Comment