Feeds

Knee X-ray biometrics plan to fight spoofing

Accuracy is 'much better than random', apparently

Protecting against web application threats using SSL

US federal eggheads have proposed a novel method of preventing biometric ID systems being spoofed by the use of such things as contact lenses, fake fingerprints etc. Instead of easily-fooled systems of this sort, people should instead be identified using X-ray photographs of their knees.

Lior Shamir of the US National Institutes of Health and computer engineer Salim Rahimi of the State University of New York propose that knee X-rays be analysed automatically by the publicly-available "wnd-charm" algorithm, normally used for diagnosing medical problems in the knee joints.

According to the two researchers:

The advantage of using a biometric identification process based on this kind of imaging is that it would be so much more difficult for a fraudster to spoof the knees or other internal body part in the way that they might with artificial fingerprints or contact lenses ... the algorithm can correctly identify a given pair of knees and match it to a specific individual in the database even if the original X-ray were taken several years earlier. Identifiable features correspond to specific persons, rather than the present clinical condition of the joint.

Shamir and Rahimi tried out their theory on a dataset of 1700 kneebone X-rays, scanning them as 8 megapixel images and using the algorithm on a central area of 700x500 pixels.

Apparently the below-the-belt bone probe gear isn't actually very reliable: it isn't as accurate as iris or fingerprint scans. But it is "much better than random results", according to the two men.

They suggest that accuracy could be improved by refining the algorithm. The problem of possible knee cancer in frequent flyers caused by incessant kilt-level X raying at passport control might be dealt with using "an alternative imaging process such as terahertz".

Shamir and Rahimi's paper Biometric identification using knee X-rays is to be published in the International Journal of Biometrics. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.