Biometric
What does Biometrics mean?
Biometrics is a technological and scientific authentication method
based on biology and used in information assurance (IA). Biometric
identification authenticates secure entry, data or access via human
biological information such as DNA or fingerprints. Biometric systems
include several linked components for effective functionality.
Biometrics is used for security systems and replacement systems for ID
cards, tokens or PINs. A key difference between biometrics and other
systems is that biometric verification of physical information requires a
person to be present, which adds a layer of security because other ID
types can be stolen, lost or forged.
A biometric system includes the following components and features:
A sensor that grabs data and changes it into a usable, digital format
via software. This data may be from human behavioral or physical
characteristics, such as a fingerprint or retinal scan. An acquisition
device, such as a microphone or scanner, captures the data.
A biometric template developed via the biometric system’s signal
processing algorithms. These templates are compared to the
biometric system’s data storage, and data is usually encrypted for
added security. A matching algorithm compares new templates
with others held in the biometric system’s data storage facility.
A decision process uses matching event results.
Types of Biometrics
DNA Matching
Chemical Biometric The identification of an individual using the analysis
of segments from DNA.
Ear
Visual Biometric The identification of an individual using the shape of
the ear.
Eyes - Iris Recognition
Visual Biometric The use of the features found in the iris to identify an
individual.
Eyes - Retina Recognition
Visual Biometric The use of patterns of veins in the back of the eye to
accomplish recognition.
Face Recognition
Visual Biometric The analysis of facial features or patterns for the
authentication or recognition of an individual’s identity. Most face
recognition systems either use Eigen faces or local feature analysis.
Fingerprint Recognition
Visual Biometric The use of the ridges and valleys (minutiae) found on
the surface tips of a human finger to identify an individual.
Finger Geometry Recognition
Visual/Spatial Biometric The use of 3D geometry of the finger to
determine identity.
Gait
Behavioral Biometric The use of an individual’s walking style or gait to
determine identity.
Hand Geometry Recognition
Visual/Spatial Biometric The use of the geometric features of the hand
such as the lengths of fingers and the width of the hand to identify an
individual.
Odor
Olfactory Biometric The use of an individual’s odor to determine
identity.
Signature Recognition
Visual/Behavioral Biometric The authentication of an individual by the
analysis of handwriting style, in particular the signature. There are two
key types of digital handwritten signature authentication, Static and
Dynamic. Static is most often a visual comparison between one scanned
signature and another scanned signature, or a scanned signature
against an ink signature. Technology is available to check two scanned
signatures using advances algorithms. Dynamic is becoming more
popular as ceremony data is captured along with the X,Y,T and P
Coordinates of the signor from the signing device. This data can be
utilized in a court of law using digital forensic examination tools, and to
create a biometric template from which dynamic signatures can be
authenticated either at time of signing or post signing, and as triggers in
workflow processes.
Typing Recognition
Behavioral Biometric The use of the unique characteristics of a person’s
typing for establishing identity.
Vein Recognition
Vein recognition is a type of biometrics that can be used to identify
individuals based on the vein patterns in the human finger or palm.
Voice / Speaker Recognition
There are two major applications of speaker recognition:
Voice - Speaker Verification / Authentication
Auditory Biometric The use of the voice as a method of determining the
identity of a speaker for access control.
If the speaker claims to be of a certain identity and the voice is used to
verify this claim. Speaker verification is a 1:1 match where one
speaker's voice is matched to one template (also called a "voice print"
or "voice model"). Speaker verification is usually employed as a
"gatekeeper" in order to provide access to a secure system (e.g.:
telephone banking). These systems operate with the user's knowledge
and typically require their cooperation.
For example, presenting a person’s passport at border control is a
verification process - the agent compares the person’s face to the
picture in the document.
Voice - Speaker Identification
Auditory Biometric Identification is the task of determining an unknown
speaker's identity.
Speaker identification is a 1: N (many) match where the voice is
compared against N templates. Speaker identification systems can also
be implemented covertly without the user's knowledge to identify
talkers in a discussion, alert automated systems of speaker changes,
check if a user is already enrolled in a system, etc.
For example, a police officer compares a sketch of an assailant against a
database of previously documented criminals to find the closest match
(es).
In forensic applications, it is common to first perform a speaker
identification process to create a list of "best matches" and then
perform a series of verification processes to determine a conclusive
match.
Note: There is a difference between speaker recognition (recognizing
who is speaking) and speech recognition (recognizing what is being
said). These two terms are frequently confused, as is voice recognition.
Voice recognition is a synonym for speaker, and thus not speech,
recognition. In addition, there is a difference between the act of
authentication (commonly referred to as speaker verification or
speaker authentication) and identification
Privacy & Biometrics
The Biometrics Institute has always tried to ensure that its privacy
strategies match those challenges in the emerging biometrics
environment. Privacy protection is a critical component in the
responsible use and development of biometrics technologies.
The following initiatives have been approved by the Institute’s Board to
meet those challenges.
Biometrics Institute Privacy Impact Assessment (PIA) Model Template
and Trust Mark
During 2015-2017 the Biometrics Institute worked on a proposal for a
Biometrics Privacy Trust Mark issued for a biometric product or
service. In early 2017 it was decided to convert the self-assessment
questionnaire into a PIA Model Template.
Read the latest updates here.
Biometrics Institute Privacy Guidelines
The Biometrics Institute has launched a Biometrics Privacy Charter in
November 2011 and renamed it to Biometrics Privacy Guidelines
following a review in late 2012. Further reviews were undertaken in
December 2015 and April 2017.
It has been designed by the Biometrics Institute to provide a universal
guide for suppliers, end users, managers and purchasers of biometric
systems. It is the public’s assurance that the biometric managers and
data controllers have followed best practice privacy principles when
designing, implementing and managing biometric based projects.
Access more details here.
Biometrics Institute Privacy Checklist (PAC)
The Biometrics Institute launched its Privacy Awareness Checklist (PAC)
for members of the Biometrics Institute in May 2010 to assist members
in a quick an easy way to assess privacy impacts when using biometrics.
It provides a snapshot in time of where the organization sits in regards
to privacy. Members can access this PAC.
Biometrics Institute Privacy Code (revoked)
The Biometrics Institute Privacy Code was designed for the protection
of Institute members and their clients. It was approved by the
Australian Privacy Commissioner in 2006.
Due to the delays in finalizing the privacy legislation in Australia and the
more international outreach of the Biometrics Institute, we decided to
be proactive and upgrade our suite of privacy protection and
awareness measures through a Privacy Guideline and other related
information. The Biometrics Institute therefore requested a review of
the Code and the potential need to de-register it (details about the
consultation). On the 10 April 2012 the Australian Privacy
Commissioner granted the revocation of the Code. Read more about
the Privacy Code.
Biometrics Institute Information Sheet "Using Biometrics in Licensed
Premises and Clubs – Are you protecting your patrons' privacy and
reducing risk of litigation?"
The Biometrics Institute has been following the public debate about the
introduction of biometrics into clubs in Australia including the Coo gee
Bay Hotel (“Fingerprint scanners concern privacy watchdog”,
New.com.au, 9 July 2010,). If your organization is a club or pub with a
turnover greater than $3 million per year and is using, or considering,
biometrics (i.e. finger scans, iris scans, voice prints or facial scans), then
the organization must comply with the National Privacy Principles
(NPPs) of the National Privacy Act.
These questions may be too difficult for a small organization to address.
But nevertheless they should consider all privacy and legal implications
before introducing biometrics. Otherwise many clubs may get into
great difficulty. We provide technical and procedural privacy guidance
to members and other interested stakeholders. We suggest that any
company considering the use of biometrics should seek our advice in
order to ensure that the technology is implemented in a responsible
way and with due consideration to privacy and in line with the
Australian Privacy Act. We have developed an Information Sheet to
help guide Pubs, Clubs & other licensed premises on the introduction of
biometrics.
Refer by biometric institute.
Face Recognition
A facial recognition system is a technology capable of identifying or
verifying a person from a digital image or a video frame from a video
source. There are multiple methods in which facial recognition systems
work, but in general, they work by comparing selected facial features
from given image with faces within a database. It is also described as a
Biometric Artificial Intelligence based application that can uniquely
identify a person by analyzing patterns based on the person's facial
textures and shape.
History
During 1964 and 1965, Bledsoe, along with Helen Chan and Charles
Bisson, worked on using the computer to recognize human faces
(Bledsoe 1966a, 1966b; Bledsoe and Chan 1965). He was proud of this
work, but because the funding was provided by an unnamed
intelligence agency that did not allow much publicity, little of the work
was published.[6] Based on the available references, it was revealed that
the Bledsoe's initial approach involved the manual marketing of various
landmarks on the face such as the eye centers, mouth, etc., and these
were mathematically rotated by computer to compensate for pose
variation.[6] The distances between landmarks were also automatically
computed and compared between images to determine identity.
“
This recognition problem is made difficult by the great variability in head
rotation and tilt, lighting intensity and angle, facial expression, aging, etc. Some
other attempts at face recognition by machine have allowed for little or no
variability in these quantities. Yet the method of correlation (or pattern matching)
of unprocessed optical data, which is often used by some researchers, is certain to
fail in cases where the variability is great. In particular, the correlation is very
low between two pictures of the same person with two different head rotations. ”
— Woody Bledsoe, 1966
2-Dimensional recognition
Some face recognition algorithms identify facial features by extracting
landmarks, or features, from an image of the subject's face. For
example, an algorithm may analyze the relative position, size, and/or
shape of the eyes, nose, cheekbones, and jaw.[12] These features are
then used to search for other images with matching features.[13]
Other algorithms normalize a gallery of face images and then compress
the face data, only saving the data in the image that is useful for face
recognition. A probe image is then compared with the face data.[14] one
of the earliest successful systems [15] is based on template matching
techniques [16] applied to a set of salient facial features, providing a sort
of compressed face representation.
Recognition algorithms can be divided into two main approaches,
geometric, which looks at distinguishing features, or photometric,
which is a statistical approach that distills an image into values and
compares the values with templates to eliminate variances. Some
classify these algorithms into two broad categories: holistic and
feature-based models. The former attempts to recognize the face in its
entirety while the feature-based subdivide into components such as
according to features and analyze each as well as its spatial location
with respect to other features.[17]
Popular recognition algorithms include principal component analysis
using Eigen faces, linear discriminant analysis, elastic bunch graph
matching using the Fisher face algorithm, the hidden Markov model,
the multilinear subspace learning using tensor representation, and the
neuronal motivated dynamic link matching.
3-Dimensional recognition
Three-dimensional face recognition technique uses 3D sensors to
capture information about the shape of a face. This information is then
used to identify distinctive features on the surface of a face, such as the
contour of the eye sockets, nose, and chin.[8]
One advantage of 3D face recognition is that it is not affected by
changes in lighting like other techniques. It can also identify a face from
a range of viewing angles, including a profile view.[13] [8] Three-
dimensional data points from a face vastly improve the precision of
face recognition. 3D research is enhanced by the development of
sophisticated sensors that do a better job of capturing 3D face imagery.
The sensors work by projecting structured light onto the face. Up to a
dozen or more of these image sensors can be placed on the same
CMOS chip—each sensor captures a different part of the spectrum....[11]
Even a perfect 3D matching technique could be sensitive to
expressions. For that goal a group at the Technion applied tools from
metric geometry to treat expressions as isometries [18]
A new method is to introduce a way to capture a 3D picture by using
three tracking cameras that point at different angles; one camera will
be pointing at the front of the subject, second one to the side, and third
one at an angle. All these cameras will work together so it can track a
subject’s face in real time and be able to face detect and recognize.[19
Face ID
Apple introduced Face ID on the flagship iPhone X as a biometric
authentication successor to the Touch ID, a fingerprint based system.
Face ID has a facial recognition sensor that consists of two parts: a
"Romeo" module that projects more than 30,000 infrared dots onto the
user's face, and a "Juliet" module that reads the pattern.[31] The pattern
is sent to a local "Secure Enclave" in the device's central processing unit
(CPU) to confirm a match with the phone owner's face.[32] The facial
pattern is not accessible by Apple. The system will not work with eyes
closed, in an effort to prevent unauthorized access.[32]
The technology learns from changes in a user's appearance, and
therefore works with hats, scarves, glasses and many sunglasses, beard
and makeup.[33]
It also works in the dark. This is done by using a "Flood Illuminator",
which is a dedicated infrared flash that throws out invisible infrared
light onto the user's face to properly read the 30,000 facial points.
Adaptive recognition.
Face ID uses advanced machine learning to recognize changes in your
appearance. Wear a hat. Put on glasses. It even works with many types
of sunglasses.
The technology behind simplicity.
The innovative technologies in the True Depth camera system work
together in real time to recognize you in an instant.
Infrared camera
An infrared camera reads the dot pattern, captures an infrared image
then sends the data to the Secure Enclave in the A12 Bionic chip to
confirm a match.
Flood illuminator
Invisible infrared light helps identify your face even when it’s dark
Dot projector
More than 30,000 invisible dots are projected onto your face to build
your unique facial map.
Anti-facial recognition systems
In January 2013 Japanese researchers from the National Institute of
Informatics created 'privacy visor' glasses that use nearly infrared light
to make the face underneath it unrecognizable to face recognition
software.[97] The latest version uses a titanium frame, light-reflective
material and a mask which uses angles and patterns to disrupt facial
recognition technology through both absorbing and bouncing back light
sources.[98][99][100][101] In December 2016 a form of anti-CCTV and facial
recognition sunglasses called 'reflectance’s' were invented by a custom-
spectacle-craftsman based in Chicago named Scott Urban.[102] they
reflect infrared and, optionally, visible light which makes the users face
a white blur to cameras.[103]
Another method to protect from facial recognition systems are specific
haircuts and make-up patterns that prevent the used algorithms to
detect a face.[
Advantages and disadvantages
Compared to other biometric systems
One key advantage of a facial recognition system that it is able to
person mass identification as it does not require the cooperation of the
test subject to work. Properly designed systems installed in airports,
multiplexes, and other public places can identify individuals among the
crowd, without passers-by even being aware of the system. [61]
However, as compared to other biometric techniques, face recognition
may not be most reliable and efficient. Quality measures are very
important in facial recognition systems as large degrees of variations
are possible in face images. Factors such as illumination, expression,
pose and noise during face capture can affect the performance of facial
recognition systems.[61] Among all biometric systems, facial recognition
has the highest false acceptance and rejection rates,[61] thus questions
have been raised on the effectiveness of face recognition software in
cases of railway and airport security.[citation needed]
Weaknesses
Ralph Gross, a researcher at the Carnegie Mellon Robotics Institute in
2008, describes one obstacle related to the viewing angle of the face:
"Face recognition has been getting pretty good at full frontal faces and
20 degrees off, but as soon as you go towards profile, there've been
problems."[8] Besides the pose variations, low-resolution face images
are also very hard to recognize. This is one of the main obstacles of face
recognition in surveillance systems.[62]
Face recognition is less effective if facial expressions vary. A big smile
can render the system less effective. For instance: Canada, in 2009,
allowed only neutral facial expressions in passport photos.[63]
There is also inconstancy in the datasets used by researchers.
Researchers may use anywhere from several subjects to scores of
subjects, and a few hundred images to thousands of images. It is
important for researchers to make available the datasets they used to
each other, or have at least a standard dataset.[64]
Data privacy is the main concern when it comes to storing biometrics
data in companies. Data stores about face or biometrics can be
accessed by third party if not stored properly or hacked. In the Tec
world, Parris adds (2017), “Hackers will already be looking to replicate
people's faces to trick facial recognition systems, but the technology
has proved harder to hack than fingerprint or voice recognition
technology in the past.”
Ineffectiveness
Critics of the technology complain that the London Borough of Newham
scheme has, as of 2004, never recognized a single criminal, despite
several criminals in the system's database living in the Borough and the
system having been running for several years. "Not once, as far as the
police know, has Newham's automatic face recognition system spotted
a live target."[49] [65] this information seems to conflict with claims that
the system was credited with a 34% reduction in crime (hence why it
was rolled out to Birmingham also).[66] However it can be explained by
the notion that when the public is regularly told that they are under
constant video surveillance with advanced face recognition technology,
this fear alone can reduce the crime rate, whether the face recognition
system technically works or does not. This has been the basis for
several other face recognition based security systems, where the
technology itself does not work particularly well but the user's
perception of the technology does.
An experiment in 2002 by the local police department in Tampa,
Florida, had similarly disappointing results.[49]
A system at Boston's Logan Airport was shut down in 2003 after failing
to make any matches during a two-year test period.[67]
In 2014, Facebook stated that in a standardized two-option facial
recognition test, its online system scored 97.25% accuracy, compared
to the human benchmark of 97.5%.[68]
In 2018, a report by the civil liberties and rights campaigning
organization Big Brother Watch revealed that two UK police forces,
South Wales Police and the Metropolitan Police, were using live facial
recognition at public events and in public spaces, but with an accuracy
rate as low as 2%.[38] Their report also warned of significant potential
human rights violations.[38] It received widespread press coverage in the
UK.[69]
Systems are often advertised as having accuracy near 100%; this is
misleading as the studies often use much smaller sample sizes than
would be necessary for large scale applications. Because facial
recognition is not completely accurate, it creates a list of potential
matches. A human operator must then look through these potential
matches and studies show the operators pick the correct match out of
the list only about half the time. This causes the issue of targeting the
wrong suspect.
Refer by Wikipedia and apple website
Fingerprint Recognition
A fingerprint looks at the patterns found on a fingertip. There are a
variety of approaches to fingerprint verification. Some emulate the
traditional police method of matching pattern; others use straight
minutiae matching devices; and still others are a bit more unique,
including things like moiré fringe patterns and ultrasonic characteristics.
A greater variety of fingerprint devices is available than for any other
biometric technology.
Overview of Fingerprint Biometric Technology.
Biometrics measure individuals’ unique physical or behavioral
characteristics to recognize or authenticate their identity. Common
physical biometrics include fingerprints; hand or palm geometry; and
retina, iris, or facial characteristics. Behavioral characters include
signature, voice, keystroke pattern, and gait. Of all these, fingerprint
biometrics is the most developed. Of all the above, a biometric is the
most secure and convenient authentication tool. It can’t be borrowed,
stolen, or forgotten, and forging one is practically impossible.
Biometrics can be integrated into any application that requires security,
access control, and identification or verification of people.
How it works
Fingerprint systems translate illuminated images of fingerprints into
digital code for further software such as enrolment (fingerprint
registration) and verification (authentication or verification of registered
users).
The scanner uses an advanced CMOS image sensor to capture high
contrast, high resolution fingerprint images that are virtually distortion-
free. A series of powerful algorithms extract data from the image,
mapping the distinguishing characteristics of the fingerprint.
This data is then converted into an encoded binary string known as a
digital template, and stored in a database. The actual fingerprint image is
never stored. To identify or verify a fingerprint, a proprietary matching
algorithm compares the new template made from the extracted
characteristics from the input fingerprint on the optical module to a
previously stored sample. The entire matching process takes roughly one
second. Authentication takes place locally at the device or on a server,
depending on system configuration.
Terminology
Identification vs. Verification
There is two primary functions offered by any biometric system. One is
identification, a one-to-many (1: N) matching process wherein a
biometric sample is compared to a set of stored samples in a database.
The other is verification, a one-to-one (1:1) matching process in which
the biometric system compares an individual’s biometric sample to
previously enrolled data for that user. The process of verification
narrows the biometric database search by including other identifiers such
as names or IDs. The terms “verification” and “authentication” are
sometimes used interchangeably because both terms are used primarily
to establish a specific user’s validity rather than to identify users by
querying an entire database of biometric samples.
Authentication
Any systematic method of confirming the identity of an individual.
Some methods are more secure than others. Simple authentication
methods include user name and password, while more secure methods
include token-based one-time passwords. The most secure authentication
methods include layered “multimodal” biometric procedures. This is
independent of authorization.
FAR and FRR
Most modern biometric security systems can be fine-tuned to fit the
needs of either high security or low security environments. Increasing
security in biometric systems sometimes makes them more finicky,
resulting in an increased False Rejection Rate (FRR) – this is manifested
when a registered user’s biometric data (e.-g. fingerprint minutiae data)
is rejected by the system. In these cases, emphasis on ambient lighting,
climate, or user training may be needed. The net effect of FRR is usually
nothing more than inconvenience to users. However, if security is set too
low, the False Acceptance Rate (FAR) may increase. This is potentially
far more serious, since it involves an unauthorized person gaining access
to protected resources. The FAR and FRR varies widely between
biometric systems.
Do You Need A Biometric Solution?
How do you determine if a biometric solution is right for you? You
firstly need to have a solid understanding of your needs. The first thing
an end user needs to look for in a biometric solution is the software; it’s
too easy to identify a time and attendance system by its clock. In most
cases, the clock will need to be replaced. Finding the right software for
an installation is an integral piece of the puzzle. Also, end users need
software that will meet the needs of the organization. Look for open
systems that won’t limit future enhancements or the addition of other
application modules, like job costing or labor accounting. End users
should find vendors that can provide a future upgrade path at the time of
purchase.
End users should also remember to include maintenance and training
as part of their solutions, system costs will vary depending upon the
software, installation, and training. Look for a cost of ownership over
the life of the system — not just the initial price. If end users only pay
attention to the initial cost, the ongoing maintenance charges could be
a real surprise.
End users must know how they will be using the biometric system;
will the system be tied into access control? What is the flexibility of
the software? One solution is not for all people. It is also smart to
avoid complex systems. Look for what can be upgraded easily. The
technology is changing quickly enough that there’s a good chance
you will want to upgrade in three to five years anyway.
End users need to have a relatively clean environment if they plan to
use fingerprint recognition, while market opportunities are increasing,
the technology is not for every market. For example, fingerprinted
identification isn’t going to work well with migrating workers or
mechanics with dirty hands.
There are several different types of biometric technology to choose
from. A solid understanding of your needs can go a long way to
ensure your installation is successful.
Important Notes on Biometric Technology
Facts:
Fingerprint technology is NOT new! The commercial technology used
by reputable products has evolved over the last 25 years, to the degree
where through advances in technology and greater market acceptance,
high quality scanners are now available at a far more affordable price.
Fingerprints have been used as a form of identification for more than
200 years and are recognized as an acceptable form of identification by
police services (AFIS) worldwide.
Not all Biometric Readers are the same. Just like any other product,
you get well designed product, manufactured with high standards and
then on opposite side of the spectrum, you get poorly designed and
poorly produced technology.
Not all Biometric scanners are equal. There are also many variations
of Biometric technology (Finger Scan, Iris, Face, and Hand
Geometry), each variation has been designed for a particular
application.
Optical Finger Scanners are the predominant technology in the
Biometric Time and Attendance market. The durability and the ease
of use of these devices make them ideal for all applications.
Not all Biometric algorithms are the same. An algorithm is a formula
used to calculate the characteristics of a scanned image and search for
the best match. Well-designed algorithms, give you accurate search
facilities at high speed.
Why should your company use Biometric technology in place of
traditional ID cards?
Essentially there are four main reasons.
1. Your company needs to eliminate “buddy clocking“, where one
employee clocks for two or more staff members.
2. You have more than 150 employees using a clocking terminal and
want to save on the additional costs involved in issuing ID cards.
3. You need to validate for security or health and safety reasons, that the
correct person, with the correct skill and personal profile has access
to your site.
4. You make use of contract/seasonal labor and cannot always ensure
the ID cards will be returned.
When does Biometric technology not work?
Biometric Technology is not the answer for every type of industry, when
it is used in the right application, it works perfectly. However, in some
businesses, it will never work. The main issue to consider is whether or
not your staff’s fingerprints remain consistent.
When you enroll a finger on the system, a master file image is stored.
Thereafter, every time that finger transacts, the system compares the
current image against the master file image. If there is a difference, then
the system will NOT accept that transaction. Therefore, a builder who is
laying bricks will not be consistently read by the system, as the
characteristics of the finger change on a daily basis due to damage to the
physical characteristics of the finger.
Exposure to abrasive surfaces, glues, solvents, powders, cement,
excessive moisture and cut/damaged fingers all constitute environmental
issues which are detrimental to the success of a Biometric installation.
Some people genetically have difficult to read fingerprints, aspects, such
as, extremely dry or extremely moist fingers, small fingers or previous
exposure to harsh chemicals all affect the enrolment and future success
of transactions.
Will you get immediate benefit from a Biometric Device?
There are a number of important issues to consider.
1. User education is paramount to ensure the success of the installation.
2. The first time enrolment of your staff rarely results in the best master
file image. The reason for this, comes down to user education, if the
staff member does not consistently place their finger on the scanner
during the enrolment the master file will not have an accurate
template to compare each future transaction against.
3. Your staff need an opportunity to experiment with
clocking/transacting on a Biometric Scanner; this will build their
confidence levels, as well as improve their enrolment / transaction
technique.
4. A future re-enrolment of the master file image will result in improved
transaction performance, both in speed and the false rejection rate.
When implementing a new Biometric System the following
guidelines should be followed.
The location of the reader must be identified taking cognizance of the
following issues:
The fingerprint scanner should not be exposed to direct sun light or
harsh industrial lighting, this may result in an “over exposed image”
(like a photograph). – Please note, the position of the sun changes during
the day and also changes between seasons (summer high on the horizon,
winter low on the horizon).
The floor surface must be flat and level.
There must be sufficient elbow room for the users to transact in a natural
fluid movement.
The reader should be mounted at a height of 1.5m, it is better for the
reader to be mounted higher rather than lower.
The reader must not be exposed to moisture, i.e. rain, mist, high
humidity or water spray unless it has a weather-proof or IP65 rating
2. The users must be properly trained, this involves:
1. Informing the users of the plan to implement a biometric system.
2. Correctly demonstration how they are to transact on the system
during the enrolment phase.
3. Correctly demonstration how they are to transact for the clocking IN
and OUT procedure.
4. Instructing the user on the issues which will result in a “failed”
transaction.
3. The users must feel comfortable with the technology, the
following practice assists with this process:
1. Educate the users.
2. Take your time with enrolment.
3. Consider a re-enrolment at a later stage.
4. Look out for the following tell-tale problem signs:
Employees who do not get a high enrolment score.
Employees who have particularly small fingers, you will notice that
the scanner is not covered. – Try and use a thumb.
Employees who have thin fingers, you will notice that the red LED
light penetrates the finger. – Ask the user to place one finger on top of
another (cross fingers).
Employees who do not have clearly defined fingerprints.
Employees with particularly dry skin. – This is an indication of poor
health, the employee should seek medical treatment, and however the
use of a moisturizer or oil from the forehead does help.
Employees who arrive with clean hands and end their day with
exceptionally dirty or damaged hands.
Employees who work in wet environments and end the day with
wrinkled fingers.
How fingerprints are stored and compared
When fingerprints were first used systematically for criminal
investigation in 1900, by Sir Edward Henry of the Metropolitan
Police in London, England, they were compared slowly and
laboriously by hand. You took a fingerprint from a crime scene
and another fingerprint from your suspect and simply compared
them under a magnifying glass or microscope. Unfortunately,
fingerprints taken under different conditions can often look quite
different—the one from the crime scene is much more likely to be
incomplete or smudged—and comparing them to prove that they
are identical (or different) sometimes takes great skill. That's
why forensic scientists (people who study evidence collected from
crime scenes) developed a reliable system for matching
fingerprints where they looked for between eight and sixteen
distinct features. In the UK, two fingerprints need to match in all
sixteen respects for the prints to be judged the same; in the
United States, only eight features need to match.
Photo: A computer can compare fingerprints by identifying key
features, then measuring the distances and angles between them.
Algorithms can turn patterns like this into unique numeric codes.
When a computer checks your fingerprints, there obviously isn't a
little person with a magnifying glass sitting inside, comparing your
fingerprints with all the hundreds or thousands stored in the
database! So how can a computer compare prints? During
enrollment or verification, each print is analyzed for very specific
features called minutiae, where the lines in your fingerprint
terminate or split in two. The computer measures the distances
and angles between these features—a bit like drawing lines
between them—and then uses an algorithm (mathematical
process) to turn this information into a unique numeric code.
Comparing fingerprints is then simply a matter of comparing their
unique codes. If the codes match, the prints match, and the
person gains access.
Fingerprint scanner
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
A stand-alone fingerprint scanner, such as one used at
the entrance to a building
Fingerprint scanners are security systems of biometrics. They
are used to unlock doors and in other security applications.
During the 2010s fingerprint scanners became commonplace
on mobile phones.
People have a pattern of ridges on their fingers.
This fingerprint cannot be removed or changed. Every fingerprint
is different from any other in the world. Because there are
countless combinations, fingerprints are much used for
identification.
Contents
1Types
o 1.1Optical reflexive
o 1.2Capacitive
o 1.3Mechanical
o 1.4Thermal
o 1.5Dynamic output
2Use
3Construction forms
Types[change | change source]
Optical reflexive[change | change source]
They are based on the oldest technique, that consists of placing
your finger on a glass surface or a prism that is illuminated by a
led diode. When the ridges of fingerprints touch the surface, the
light is absorbed, while between these crests a total reflection
occurs. The resulting light and dark areas are recorded in an
image sensor.
In practice there are some difficulties with this technique: the
images obtained with wet and dry fingers are very different and, in
addition, the system is sensitive to dust and dirt on the surface.
The unit has a considerable size, impractical and expensive. This
system is easy to cheat and if the skin is damaged, the fingerprint
is not recognized correctly. The recognition of the fingerprint of
older people is also difficult to do because the skin is not elastic
enough. In some circumstances this may result in false
recognition. If the stored fingerprint was taken with less pressure,
false acceptances may occur.
Capacitive[change | change source]
The sensor is a silicon integrated circuit with a surface that is
covered by a large number of transducer elements (or pixels),
with a typical resolution of 500 dpi. Each element contains two
adjacent metal electrodes. The capacity between the electrodes,
which forms a feedback path for an inverting amplifier, is reduced
when the finger is applied to said surface: it is further reduced
when it detects ridges and less reduced when it detects the space
between them.
The sensor is susceptible to electrostatic discharge. These
sensors only work with normal healthy skins, they are not
operative being used on skins with hard areas, calluses or scars.
Moisture, grease or dust can also affect its operation.
Mechanical[change | change source]
It consists of tens of thousands of tiny pressure transducers that
are mounted on the surface of the sensor. An alternative design
uses switches that are closed when pressed by a ridge, but that
stay open when they are under a valley. This only provides one
bit of information per pixel, instead of working with a gray scale.
Thermal[change | change source]
In this case the heat driven by the finger is detected, which is
greater when there is a ridge than when there is a valley. A silicon
component has been developed with a matrix of pixels called
"FingerChip", that is, "finger integrated circuit", each of which is
covered with a layer of pyroelectric material in which a change in
temperature translates into a change in the load distribution of its
surface. The image is in the gray scale that has the right quality
even with the finger worn, with dirt, with grease or with humidity.
The sensor has a robust protective layer and can provide a
dynamic output.
Dynamic output[change | change source]
Most of the sensors described have been altered in the past. To
avoid this, a new operating mode has been added. Instead of
simply placing your finger statically on the sensor, the finger
moves slowly along it. The sensor only has a narrow sensitive
area, and generates a complete sequence of images, which can
be reassembled, by means of a processor, in a complete image.
The benefits are improved appreciably and the elimination of any
residual grease is guaranteed.
Use[change | change source]
The most important use area is in access control for computers.
This is especially important for laptops and PDAs. Thanks to the
price falling, more and more devices are equipped with sensors.
Other devices with built-in fingerprint sensors include USB hard
drives, USB memory modules and card readers. They are also
available in mice and keyboards.
Sensors are increasingly used to secure financial transactions
and change machines for "online" banking. In the future, the
owner's fingerprint will be stored securely on identity cards and
credit cards and may also be used for authentication of emails
using digital signatures.
Direct physical access to rooms and devices can also be ensured
by coupling fingerprint sensors with door opening systems.
Construction forms[change | change source]
There are two construction forms: the stagnant and
the moving fingerprint scanner.[source?]
Stagnant: The finger must be dragged over the small scanning
area. This is cheaper and less reliable than the moving form.
The image is not very good when the finger is not regularly
dragged over the scanning area.
Moving: The finger lies on the scanning area, while the scanner
runs underneath. Because the scanner runs regularly over the
fingerprint, the images are better.
Fingerprint Scanner in smartphone
In-display fingerprint
In-display fingerprint readers: How do they work and what phones will
we see them in?
POCKET-LINT
- Under-display fingerprint readers will be everywhere over the next
few months.
Facebook Here's
Twitter why LinkedIn Google+ Mail
Pintrest
0 Comments
The Mate 20 Pro, OnePlus
6T and Xiaomi Mi 8 Pro all
feature an in-display fingerprint
reader. But how do they work,
and how will the tech evolve over
the coming months?
Although the iPhone has moved
to Face ID and others have
experimented with facial and iris
recognition, it seems that many
of the big Android phones of the
next year will stick with
fingerprint ID as the main
biometric entry point to your
phone – even if they also hedge
their bets in terms of supporting
improved facial recognition as
well.
Huawei’s in-display fingerprint
sensor features on the new Mate
20 Pro and sister Honor Magic
2 phone following up on its
previous patchy integration
within the Mate RS (see below).
Huawei wasn't the first
manufacturer to plump for an in-
display fingerprint reader though
- see Vivo’s Nex S.
Optical vs ultrasonic
The scanners we've seen so far
are optical scanners – these use
some light to illuminate your
finger. A tiny camera under the
screen takes an image of your
finger which is then compared to
the stored image.
Moving into 2019, in-display
fingerprint scanners will
increasingly also be ultrasonic
instead of optical – these more
expensive units work using
ultrasound to build up an image
of your fingerprint (yes, really)
and work better with
contaminated fingerprints - if
they're wet or oily with sun
cream, for example. They're
essentially 'Face ID for your
finger'.
Qualcomm has just announced
the third-generation version of
its existing ultrasonic scanner at
its annual Tech Summit.
Called the 3D Sonic sensor, the
tech is a new version of
Snapdragon Sense ID which was
originally shown off in 2015.
The road to ultrasonic
fingerprint readers has been
reasonably long. In 2013
Qualcomm acquired a company
called Ultra-Scan, a small
company with “very good IP for
ultrasonic waveform” and with a
background in producing
ultrasonic readers for the US
Government.
"We took that and found a way to
manufacture in the millions to
keep the costs down," explained
Qualcomm's Alex Katouzian at
its recent tech summit. "We
don’t need to shine a light source
through the display. The light
source over time can degrade the
LCD...it’s very similar to a
photocopier.
Ultrasonic fingerprint readers
are also more accurate than their
optical counterparts and more
secure because of the 3D
impression that the reader
creates of your finger. It's not
just an image as with optical. It's
theoretically possible that you
could fool an optical sensor with
an image of a fingerprint.
We're expecting an ultrasonic
fingerprint reader to feature in
Samsung's Galaxy S10 which
should launch at or
around Mobile World Congress.
Current ultrasonics can
penetrate through glass (up to
800 µm or microns thick) and
metal (up to 400 µm). We expect
Qualcomm's new sensor to be
able to work through thicker
materials but we haven't got
confirmed details as yet.
Qualcomm certainly isn't the
only name in fingerprint sensors
though; Synaptics is another and
their tech is behind Xiaomi's
fingerprint sensor in the Mi 8
Pro (called Clear ID by
Synaptics) as well as the
previously-mentioned Vivo
handset.
Synaptics is a company that's
been involved in computing and
phone interfaces for more than
30 years; it developed the first
computer touchpad and the
touch tech for the click wheel on
the iPod. Its tech is also used for
many standard external
fingerprint sensors on phones.
More about the latest fingerprint readers
We do know that Huawei said its
fingerprint reader features 10
level dynamic pressure sensing
(dps) for improved accuracy. The
Chinese handset maker says this
can improve the unlock speed by
up to 30 percent compared with
the Mate 10 but it didn’t make
any claims for improved
accuracy.
In our Mate 20 Pro review, our
reviews editor Mike Lowe called
it the best fingerprint reader of
its kind – it’s responsive and
accurate. One thing that we did
notice was that it takes a while to
set up; that’s because you need to
enable it to read your fingerprint
thoroughly to improve accuracy.
We’d previously used the reader
on the Porsche Design Mate RS
equivalent and our experience
with that reader wasn’t that great
since it didn’t work for each
possible instance. That’s not the
case with the Mate 20 Pro.
The OnePlus 6T fingerprint
reader is equally impressive. As
with the Huawei version, the
setup feels a little involved as you
need to enable the sensor to
capture a lot of detail. But once
done the experience is
beautifully responsive - almost
as much as a physical fingerprint
reader.
OnePlus told us: "The particular
coloured light chosen has been
tested and deemed the best for
accuracy and the durability of
the tech used has passed 300
thousand taps and has shown no
sign of deterioration"
Apple’s iPhone 5s started the whole smartphone biometrics saga with
the introduction of Touch ID. The fingerprint scanner element is now
ubiquitous, embedded in home buttons, mounted on the back side of
mobile phones and even placed on the side beneath the home button of
handsets. Naturally, the development of faster and more accurate
fingerprint readers led to the makings of newer ways of unlocking your
smartphone.
This includes facial recognition like Face ID and something that we will
be discussing in detail today; the in-screen fingerprint reader. As we see
more high screen-to-body ratio smartphones getting released, a
consequence of this action is the where to put the fingerprint reader,
which is often moved to the back of the phone to compensate for those
‘all screen’ handsets.
However, having an in-screen fingerprint reader will forego this change
and we will explain what its internals are like and what are the
possibilities for the future of smartphones.
Synaptics Hard at Work With Its Clear ID FS9500 Intended for
High-End Smartphones
Synaptics and Vivo have this long-term partnership that enabled the
making of the Clear ID FS9500, which is an optical sensor that can be
placed beneath the display of the smartphone. In short, it is an optical
sensor, or a CMOS sensor, the kind that you find in regular or
smartphone cameras. In order for it to work, there are going to have to
be some requirements.
RELATEDSamsung’s Galaxy S9 Will Not Tout a
Fingerprint Sensor Underneath the Display – Different
Manufacturer Will Get That Privilege
The display on the smartphone needs to be an OLED panel, which is
why you are only going to find it on devices that are touting OLED
screens and that can only mean that for now, high-end phones will come
bearing this security addition. Goodix is also working to bring in-display
fingerprint scanners to manufacturers so more suppliers also mean that
companies will be able to negotiate better pricing for this component.
How Does the in-Screen Fingerprint Reader Work?
When you hold up the phone, the fingerprint sensor indicator will light
up, meaning that you can now unlock your smartphone using this part of
the biometrics. According to videos seen online, it is definitely slower
than regular fingerprint readers so improved iterations of the scanner
will have to be introduced to make it faster. This is possibly the reason
why Samsung might have refused to incorporate this sensor on the
Galaxy S9 and Galaxy S9 Plus.
As thin as it might be to fit inside the display, it is quite slow, and
though it is present at an ‘easy to reach’ location, users will definitely
complain about the speed problems. Coming back to unlocking the
device, after you have placed your fingerprint on the scanner, a light will
shine on the sensor to capture your fingerprint and unlock the
smartphone. However, this is just the beginning of such sensors because
it does not have to be located in a single region on the phone.
What Are the Possibilities of the in-Display Fingerprint Scanner
for Future Smartphones?
As we said before, the sensor does not have to be placed at a single
location. During the announcement of the Vivo APEX, which is
honestly the first glimpse into the future of what bezel-less smartphones
will look like, it too features an in-glass fingerprint reader, but here’s the
catch.
The bottom half of the phone is covered by this CMOS sensor, which
the company is calling it the ‘Half-Screen Fingerprint Scanning
Technology’. This means that you place your finger anywhere at the
bottom half and if your fingerprint is registered, the phone will unlock
seamlessly.
This development also means that there is a future where we might get
to see smartphones with their entire displays being covered with the
sensor.
All you will have to do is whip it out, place your finger anywhere and
immediately, the phone will be unlocked. That is certainly a future that
we will look forward to witnessing but for that specific future to
materialize and become a reality, better versions of the fingerprint are
going to have to be released.
Technology is a never-ending game of innovation. In less than a
decade, we've moved from punching PINs to using Face Unlock
as authentication measure on our phones. And just as we were
thinking that it couldn't get better, we have a brand new
innovation which is taking the tech world by storm: the in-display
fingerprint sensor.
In-display fingerprint scanners have been a buzzword for quite
some time now. After years of rumors and whispers, it's finally
here. Hence it begs the question of how is it different from the
conventional capacitive sensors and, more importantly, how does
it work.
In 2016, LG Innotek announced a new fingerprint sensor which
would sit on the phone's bezelsFinally, the world's first
commercial phone with the in-display fingerprint sensor was
the Vivo X21. And since then, it has been seen in the hugely
expensive Huawei Porsche Design Mate RS and will be seen in
the upcoming Xiaomi Mi 8.
HOW DOES THE IN-DISPLAY FINGERPRINT SENSOR
REALLY WORK
An in-display fingerprint sensor uses an optical fingerprint sensor
to capture the fingerprint data and is embedded under the
phone's screen. The Vivo X21 and the Xiaomi Mi 8 use Synaptics'
Clear ID sensor for high-resolution fingerprint scanning. The Clear
ID sensor, which is a CMOS chip named Clear ID FS9500, is
supported only on OLED and AMOLED displays.
The Vivo X21 uses Synaptics' Clear ID sensor for high-resolution
fingerprint scanning
It works by capturing the reflected light of the fingerprint through
the OLED pixels. So, when you touch the phone's screen, the
display lights up to illuminate the fingerprint. The sensor then
captures a high-res scan of your fingerprint through the light
reflected from the gaps between the pixels.
To ensure that the fingerprint data is being read accurately by the
sensor, you'd need to press the screen slightly. This is done so
that the sensor is able to differentiate between the ridges and
valleys of each fingerprint.
To ensure that the fingerprint data is being read accurately by the
sensor, you'd need to press the screen slightlyInterestingly, the
fingerprint matching is done through Synaptics' Quantum Matcher
software, instead of the in-house Match-In-Sensor technology.
Meanwhile, the fingerprint sensor uses the host's sensors to
illuminate the area and activate the scanner.
HERE'S A VIDEO SHOWING TEARDOWN OF THE IN-
DISPLAY FINGERPRINT SENSOR
However, Synaptics' Clear ID optical sensor is not the only one in
the market. In March 2018, Goodix started shipping its own
version of an optical in-display fingerprint reader. The Huawei
Porsche Design Mate RS is the first commercially available phone
to feature Goodix's in-display fingerprint sensor.
This sensor also works in a similar way to the Synaptics's FS9500
and claims to have a false acceptance rate of 0.002%.
ALSO ON GUIDING TECH
5 Groundbreaking Innovations That Changed Smartphones
Forever
READ MORE
ADVANTAGES OF IN-DISPLAY FINGERPRINT SENSOR
Magically activating the fingerprint sensor on the phone's screen
when needed is a fascinating tech. With many manufacturers
opting to shift the fingerprint sensors to the rear of the phone, it
raised quite a number of issues.
The rear fingerprint sensor of the Galaxy S9
For one, if the phone is lying on your desk then you'd have to pick
it up to unlock it. The situation gets worse if the phone is hooked
to a car mount.
Secondly, with rear fingerprint sensors, you can never be sure
that you're hitting the right spot. After all, even seasoned phone
manufacturers (read Samsung and Nokia) can sometimes mess
up the position of the fingerprint reader.
Even seasoned phone manufacturers can sometimes mess up
the position of the fingerprint reader
Since in-display fingerprint scanners are usually situated at the
bottom of the screen, it's easily accessible and more convinient.
In-display fingerprint sensors claim to work for both dry, wet or
cold fingers
Other than that, in-display fingerprint sensors claim to work for
both dry, wet or cold fingers. Plus, optical sensors are thin and
don't contribute much to the thickness of the phone.
More importantly, they are fast. In fact, Synaptics's Clear ID
claims to match the fingerprints in 0.7 seconds flat. If you were to
compare it with Face Unlock, it takes an average of 1.4 seconds
to scan a face.
WHAT ARE ITS LIMITATIONS
As with any new tech, it takes a few iterations to get refined and
the same holds true for the in-display fingerprint sensor. It's
marginally slower compared to traditional fingerprint scanners.
And sometimes, the reader doesn't seem to recognize the
registered fingerprints.
In-Display Fingerprint scanners are marginally slower compared
to conventional scannersMeanwhile, application of any type of
tempered glass may most likely give inaccurate results or will
cause the sensor to misbehave.
ARE THERE ANY POTENTIAL SECURITY ISSUES
On the security front, the Clear ID in the Vivo X21 is accompanied
by a robust anti-spoofing system. Since it's an optical sensor and
not a capacitive one, it won't be able to sense a pulse, due to
which it can be duped with fake scans.
Thankfully, the onboard security measures are smart enough to
detect spoofed fingerprints. Other than that, it also depends on
the OEMs on how they scale up the authentication measures.
However, it's a bit early to comment on the security of these
scanners. Time and additional security tests will undoubtedly yield
a far better picture.
OUR EXPERIENCE WITH THE IN-DISPLAY FINGERPRINT
SENSOR
We tried the in-display fingerprint sensor on the Vivo X21 and
needless to say, the experience was almost surreal! To be able to
place your finger on the glass while the screen and the sensor do
its mumbo-jumbo is a one-of-a-kind experience.
The Vivo X21 has a thumb-size icon which stays lit most of the
timeThe phone has a thumb-size icon which stays lit most of the
time. All you have to do is place your registered finger on top of it.
Once the phone unlocks, you won't know where the sensor is until
you use an authentication app like LastPass which requires your
fingerprints.
Unlike the conventional scanner, the in-display fingerprint
doesn't always work accurately. One out of seven times the
scanner refused to open the door to the phone.
HELLO, FUTURE!
With full view display becoming a ubiquitous feature in
smartphones, it was high time that the handy fingerprint
sensor saw a major upgrade. And with Qualcomm introducing its
own variant of ultrasonic in-display fingerprint sensors, there's no
doubt that the in-display fingerprint sensor will most likely be the
newest trend in the smartphone world.
DNA Biometrics
DNA is an increasingly useful biometric, and is encountered most
often in forensics and healthcare.
For forensics, current DNA identification technologies measure
short tandem repeat sequences (STRs) in the nuclear or
mitochondrial DNA. The chosen STR sequences (typically 13 or
more) are not linked to any known genetic characteristic, but vary
from person to person in accordance with well-known population
statistics. For this reason, measuring the lengths of these STRs
provides a highly accurate and easily stored attribute that can be
compared to others for potential identification, lead generation,
exclusion, or family matching of an individual or individuals.
Determining the lengths of the STRs in a DNA sample involves
some fairly advanced chemistry and associated processes.
Before the advent of rapid DNA identification technology, this
work was confined to certified laboratories with trained
technicians and six different specialized laboratory instruments.
Results usually came back after several days. Recent rapid DNA
identification technologies have reduced this process down to one
portable desktop instrument with automated processing taking
about 90 minutes.
A feature of DNA identification, unique among the biometrics, is
the ability to infer familial relationships via DNA testing. Through
comparison of STRs, DNA technologies can confirm or deny
blood relationships – an extremely valuable tool in scenarios such
as missing person and disaster victim identification, lost-child and
counter-human-trafficking applications, paternity and maternity
testing, and determinations of eligibility for immigration benefits.
Advantages of DNA as a biometric:
DNA is the only biometric that provides the possibility of
linking relatives to an unknown person
Like fingerprints, DNA is one of the few biometrics that can
be “left behind”, like at a crime scene
DNA testing is a relatively mature but dynamically evolving
technology that is becoming widely used and is familiar to
the public
Rapid DNA identification devices are making positive
identifications possible in as little as 90 minutes
Ability to easily store large numbers of DNA results in
databases increases the possibility of matches
Standardized test chemistries and results file formats allow
for interoperability between systems
Well-known population statistics for human DNA markers
provide high confidence in matching operations
Advances in healthcare genomics offer promise that
unknown (not in a database) forensic DNA samples can be
characterized well enough to identify the owners
Why is DNA Biometric Technology The Most Commonly Used
by Dario J. Betancourt | Oct 5, 2017 | Biometric
Issues, Technology | 0 comments
If you know anything about biometric technology or even if you
don’t, you most likely know what a DNA is or at least you have
heard about it. DNA is one of the most commonly used biometric
technologies around the world and there are few reasons why is
that. The first reason is that a lot of people agree on that DNA is
the most accurate technology that never fails. Of course, there is
no such thing as 100% accurate because something can go wrong
at any time and errors happen. however, when they happen it is
usually recognized as an error and the tests are done once again to
get the correct results.
Linking Relatives
One of the things why DNA technology is more commonly used is
because this is the only biometric process that allows us to link
relatives to a person. This means that with a proper DNA test we
are able to tell if two people are related. This type of option has
changed a lot of things in the world because now we are able to
tell exactly who is related. From a palm biometric technology, you
get a lot of information about a person, but you don’t get anything
else from the patterns that he has in his palm. However, with the
DNA technology, you get to see some very unique things and
information about a person.
Fast Results
DNA is very similar to the fingerprint biometric because it can be
also found anywhere. A fingerprint can be found anywhere if a
person has touched something, a DNA can be easily found if you
see blood, urine or any other liquid that has come from a human.
One more cool thing about DNA technology is the speed of it. This
means that the results of a DNA test will be available in as little as
90 minutes. This gives a huge advantage, for example, some crime
investigator and police who need to track down a killer. Getting
fast biometric results is a key thing for people that are solving
crime cases.