Feeds

Knee X-ray biometrics plan to fight spoofing

Accuracy is 'much better than random', apparently

Providing a secure and efficient Helpdesk

US federal eggheads have proposed a novel method of preventing biometric ID systems being spoofed by the use of such things as contact lenses, fake fingerprints etc. Instead of easily-fooled systems of this sort, people should instead be identified using X-ray photographs of their knees.

Lior Shamir of the US National Institutes of Health and computer engineer Salim Rahimi of the State University of New York propose that knee X-rays be analysed automatically by the publicly-available "wnd-charm" algorithm, normally used for diagnosing medical problems in the knee joints.

According to the two researchers:

The advantage of using a biometric identification process based on this kind of imaging is that it would be so much more difficult for a fraudster to spoof the knees or other internal body part in the way that they might with artificial fingerprints or contact lenses ... the algorithm can correctly identify a given pair of knees and match it to a specific individual in the database even if the original X-ray were taken several years earlier. Identifiable features correspond to specific persons, rather than the present clinical condition of the joint.

Shamir and Rahimi tried out their theory on a dataset of 1700 kneebone X-rays, scanning them as 8 megapixel images and using the algorithm on a central area of 700x500 pixels.

Apparently the below-the-belt bone probe gear isn't actually very reliable: it isn't as accurate as iris or fingerprint scans. But it is "much better than random results", according to the two men.

They suggest that accuracy could be improved by refining the algorithm. The problem of possible knee cancer in frequent flyers caused by incessant kilt-level X raying at passport control might be dealt with using "an alternative imaging process such as terahertz".

Shamir and Rahimi's paper Biometric identification using knee X-rays is to be published in the International Journal of Biometrics. ®

Internet Security Threat Report 2014

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
Human spacecraft dodge COMET CHUNKS pelting off Mars
Odyssey orbiter yet to report, though - comet's trailing trash poses new threat
You can crunch it all you like, but the answer is NOT always in the data
Hear that, 'data journalists'? Our analytics prof holds forth
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.