Introduction
Biometrics entail a technology that is used in many areas in contemporary societies all over the world. This is because the modern society now-a-days has enhanced the use of dissimilar system with an aim of providing secure surroundings that is sound and worth living in. In addition, the current situations and advancement in technology offer a better platform for improved services to individuals, something that is readily realized by the implication and the use of biometrics. As Bhattacharyya, Ranjan, Alisherov and Choi (2009) have observed, security of information assures a lot in terms of integrity and confidentiality as well as the provision of the same information at any moment that an individual wishes to access it. Biometrics involves varied recognitions that are indeed illustrated as automated methods that perfectly recognize individuals by identifying them through their distinctive behavioral traits or even those traits associated with their physiological outlooks. Additionally, it supports the feature of detection, non-repudiation in information security as well as authentication.
Use of Biometrics
The use of biometrics in technology is quite advanced but easy to understand, to be precise, it is reasonably user friendly. It uses certain basics that identify an individual’s validity upon an attempt of them to access it. To achieve this, some sort of information is obtained from the individuals that are verified against the ones that are contained in the system which has all the necessary data about official users. Biometric identification is therefore a key type of authentication that is widely used in various applications initiated by algorithms of advanced pattern recognition. The systems involved in biometrics have a wide range of areas to focus on. For instance, this wide field is laden with suchlike technologies involving fingerprint and palm reading, face identification and speech recognition as Danielyan (2011) noted in his study. Others are also capable of identifying and analyzing DNA make up of an individual, recognizing their iris, signatures and keystroke dynamics accurately.
In an extended understanding, biometrics in itself bears an immense significance for security both nationally and internationally (Hossain & Chetty, 2011). As the two authors rightfully observe, almost every part of human body is unique in its own way, a principal that biometrics takes advantage of and explores in a great depth. As earlier mentioned, the body parts involved are palm print, fingerprint and the likes. It is amazing to note that biometrics has gone as far as not only identifying the makeup or structure of an individual’s ear but also does analysis made easier by technologies regarding authentication (Hossain & Chetty, 2011).
On the other hand, not all behavioral or physiological characteristics of dissimilar individuals qualify them to be used in biometrics. Irish Council for Bioethics (2009) has all that it takes to qualify for the same; they refer to them as the seven pillars of biometrics which include acceptability, resistance to circumvention, universality, permanence, distinctiveness, collectability and performance. Amongst all these required qualifications, no modality of biometrics fulfills them but some have got most of them as compared to others. The ones with the most acquisition of the required characteristics will therefore be preferred to those that posses few of them, and this is what makes the difference between a better biometrics system from a rather ineffective kind.
Advantages of using Biometrics
Use of biometrics has numerous advantages over other types of security measures that might be put in place in on a national scale or globally. To begin with, the Irish Council for Bioethics (2009) has identified aspects and failures associated with other security measures that include password use, cryptographic key, PIN or possession of identity card or smart card. Many a times, integrity of security systems is compromised when PIN and passwords are shared, forgotten or accidentally lost. The only sure way to curb them is by the use of biometrics operating on the basis of an individual and their own characteristics since they are part of the individuals. Further advantages linked with the use of biometrics include that they are difficult to forge or copy and more importantly, they need the presence of that individual for identification (Irish Council for Bioethics, 2009).
The Use of Biometrics at ATMs
In enhancing automatic teller machine (ATM) security, the use of biometrics has done a lot that needs to be appreciated. It has been an achievement in most banking system as biometric itself has replaced password related authentication methods. Das and Debbarma (2011) have advanced knowledge over this issue of the banking system as they have done an intense research to explore biometrics in the same area. At the outset, they describe ATM as a device based on mechanical operation which has linkages with banking institutions’ accounts and records. This machine as they further describe has the capabilities of letting any customers carry out different transactions ranging from depositing money in their respective bank accounts as well as making transfers, withdrawals or even inquiring for their balance in the same bank accounts.
As a matter of fact, many individuals would not like to get delayed by long queues that have for a long time been witnessed in different banking systems. As Das and Debbarma (2011) have realized, an introduction of these ATMs is a relief to that burden of waiting for too long to be served by individuals whereas they can do the same by themselves in the banking systems, to be specific, through the ATM. It is via the same ATMs that customers receive fast cash after a short while of doing a transaction. All this is about efficiency guaranteed by the presence of ATMs that serve individuals diligently.
As much as the introduction and use of ATMs has brought a lot of relief and ease to the customer, it is faced with a lot of insecurity and is vulnerable to theft. There are other individuals that have come up with varied means of accessing bank accounts that they do not own due to fraud involved in accessing PIN of other people. This is the sole reason that has facilitated another system of enhanced security in the banking systems that will for sure curb customers’ fear of unsafe money in their bank accounts while using the ATM card. The system is a combination of two security requests at any time that an individual wants to perform any transaction via the ATMs. In this regard, an individual would first be requested to input their PIN and after its verification and security is approved, another second security request is needed for a second verification and this time round it is based on biometric fingerprint in particular (Das & Debbarma, 2011). BanCafe Bank and Dayton in Colombia, Federal Credit Union of South Carolina, Suruga Bank in Japan, and BPS Bank in Poland are examples of financial institutions that use biometrics at their ATMs (Onyesolu and Ezeani, 2012).
Speaking about fingerprints, there is a lot that needs to be understood as much as the technology used is concerned. Bhattacharyya, Ranjan, Alisherov and Choi (2009) define a fingerprint to be something associated with the impression from ridges caused by friction on any part of any finger. A valid use of PIN and a fingerprint as a biometric allows the customer to access their bank details as well as to perform a range of available transaction like cash withdrawals, deposits, balance inquiry and mini statements. Using fingerprint technology assures customers enhanced security as compared to being without them. In fact, Heckle, Patrick and Ozok in their research work about the same issue of fingerprints came out with encouraging results about acceptability of the use of fingerprint biometrics. They say that the ultimate important factors that are manifested in this use of fingerprint biometrics are all about distinguishable advantage to the users and perceived privacy risk. In their meaning, there are obvious benefits and significant low risks which arise from the use of fingerprint biometrics (Drew & Alhussain, 2009).
The ATM banking system also uses another technology that is embraced by so many due to its positivity and a well enhanced security system. Iris identification has been employed in various banking network systems; this allows for the bank customers to access their accounts with little or no difficulty at all. As Bolle (2004) has noted, iris recognition biometric technology offers not only a great deal of convenience but also assured security and privacy. This is further supported by Reid (2004) who claims that the use of the biometric trait offers expediency with increased security. The two biometric technology products used in the banking system that entails ATMs has so far singled out benefits of significant considerations. Some of the legal-privacy mandates involved in the use of biometrics at ATMs include the protection of information about customers that is stored in the database in the banking systems.
Venkatraman & Delpachitra, (2008) in their article have also provided the required insight about biometrics in the area of ATM and banking sector. They additionally inform about iris scanners used in the identification of individuals interested in doing transactions using the ATMs that are available in various banking systems. According to the two authors, iris scanners together with fingertip readers as they refer to them are becoming normal on top of gaining popularity owing to their use. In truth, these two technologies employed in biometrics have gained popularity in Japan. Moreover, the same biometric area of technology that involves fingerprint-identification and iris recognition, systems that are used in different banking are perceived positively in most banks in states found in the Middle East, Africa, Mexico, and South America. The main reason behind this is its attractiveness and identification by bucolic consumers who are not subjected to carrying bank cards and other credentials. It is worth noting that so far in the contemporary market, many financial institutions and Western banks are ready to amalgamate these two biometric technologies as well as others that will fit their areas of interest. Venkatraman & Delpachitra (2008) have additionally singled out that iris identification and fingerprint recognition are technologies that are going to be quite considerate in mass banking system. This means that in the international banking sectors and many marketing businesses, that go hand in hand with the usage of ATMs, will hold on to these technologies for the betterment of their businesses.
When banks adopt biometric technology such as iris recognition or individual fingerprint identification at ATMs, they will be assured a fair means of curbing fraud that comes from unexpected ways and means. Onyesolu and Ezeani (2012) in their journal have also observed that the crimes at ATMs are not only a nationwide issue but also an international one that needs to be dealt with accordingly. The only sure way of achieving this is through the use of these biometric technologies, which will see the same crimes diminished in a greater percentage.
In the past, not so many individuals in the United States could consider the use of biometrics. The only grounds behind this was the cost associated with the installation of the machines all over in addition to the views of many single individuals who were uncertain of the security that it could offer them. Currently, use of biometric technologies has gained popularity in the United States, a platform that is set by the customers as they are willingly voting for the installation of the same machines in their banking system.
The future trends of ATMs access by means of biometric technology gives surety of a fraud free operation, timely access of individual information at will and at any time and place. In the past, cost of fingerprint scanners and their installation in the ATMs was not effective. Today, advances in technology have given rise to cost effective machines that are also full of efficacy and timeliness in all operational aspects of biometric technology. However, as Venkatraman and Delpachitra (2008) observed, future use of fingerprint is endangered for research shows that fingerprints can be uplifted and even replicated. This only leaves a single sure way of securing the future from fraud that had been witnessed in the past; the use of iris scan identification of individuals for this has powerful and varied ways of identifying individuals in their uniqueness.
Conclusion
In conclusion, biometric technology is regarded as a growing technology that will soon be embraced by most individuals who are willing to use ATMs that according to Das and Debbarma (2011) have become a mature technology globally. The fact that fingerprint identification and iris recognition have been used in the banking systems especially the automatic teller machines renders them the most effective way in this area of the banking network system. The future of biometric system is quite dynamic to predict and to know at hand the very outcomes that will be achieved as time goes by.
As Bhattacharyya, Ranjan, Alisherov and Choi (2009) have foreseen, current threats that are seen and experienced will soon be put to rest due to advancing technologies that are aimed at getting rooted in bringing up the best to realize this. For instance, there is so much that is advancing in the use of biometric technology. These vary from a strategy based on an individual walking style referred to as gait, identification of an individual’s retina, DNA make up, scent and odor as well as a facial thermo-gram and hand veins identification. There is also the use of palm prints which bear individual’s unique characteristics.
References
Das, S. S., & Debbarma, J. S. (2011). Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System. International Journal of Information and Communication Technology Research,1(5)
Bhattacharyya, D., Ranjan, R., Alisherov,A., F., & Choi, M. (2009). Biometric Authentication: A Review. International Journal of u- and e- Service, Science and Technology, 2(3).
Hossain, S., M., E., & Chetty, G. (2011). Next Generation Identity Verification Based on Face- Gait biometrics. International Conference on Biomedical Engineering and Technology, 11.
Onyesolu, O., M., & Ezeani (2012). ATM Security Using Fingerprint Biometric Identifer: An Investigative Study. International Journal of Advanced Computer Science and Applications, (IJACSA), 3(4).
Irish Council for Bioethics (2009). Biometrics: Enhancing Security or invading Privacy? Dublin: Irish Council for Bioethics
Venkatraman, S. & Delpachitra, I. (2008). Biometrics in banking security: a case study. Information Management & Computer Security, 16(4), 415 – 430
Bolle, R. (2004). Guide to Biometrics. New Jersey: Springer
Reid, P. (2004). Biometrics for Network Security. New York: Prentice Hall.
Danielyan, E. (2011). The Lures of Biometrics. The Internet Protocol Journal,7(1).
Drew, S., Alhussain, T. (2009). Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia. IFIP Advances in Information and Communication Technology,309, 26-38. DOI: 10.1007/978-3-642-04280-5_3