Jump to content

Soft biometrics

From Wikipedia, the free encyclopedia

Soft Biometrics traits are physical, behavioural or adhered human characteristics, classifiable in pre–defined human compliant categories. These categories are, unlike in the classical biometric case, established and time–proven by humans with the aim of differentiating individuals. In other words the soft biometric traits instances are created in a natural way, used by humans to distinguish their peers.[1]

Introduction

[edit]

The beginnings of Soft Biometrics can be identified as laid by Alphonse Bertillon in the 19th century. He first proposed a personal identification system based on biometric, morphological and anthropometric determinations.[2] The most common traits he introduced were colour of eye, hair, beard and skin; shape and size of the head; body characteristics like height or weight as well as indelible marks such as birth marks, scars or tattoos. A majority of these descriptors presently fall into the category of Soft Biometrics.

Jain lately redefined Soft Biometrics as a set of traits providing information about an individual, though these are not able to individually authenticate the subject because they lack distinctiveness and permanence.[3] Further research has shown that a larger set of soft biometric traits can be used to identify individuals. A redefinition of Soft Biometrics was proposed by Reid and Nixon as any characteristic which can be naturally described by humans.[4] Such soft biometrics are well suited to deployment in surveillance applications [5] and research is ongoing to capitalise on these developments.

Soft Biometric traits

[edit]

Traits which accept the above definition include, but are not limited to:

  • Physical: skin colour, eye colour, hair colour, presence of beard or moustache, height, weight, gender, race, ethnicity, wrinkles.
  • Behavioural: gait, keystroke, signature.
  • Adhered human characteristics: clothes colour, tattoos, accessories.

Soft Biometrics inherit a main part of the advantages of Biometrics and furthermore endorses by its own assets. Some of the advantages include non obtrusiveness, the computational, and time efficiency and human compliance. Furthermore, they do not require enrollment, nor the consent or the cooperation of the observed subject.

Usage

[edit]

Soft biometrics are used to identify humans and can be combined with biometric authentication systems to increase the amount of accuracy of recognition.[6] An example is visual surveillance, and soft biometric information can help identify people during the inconsistencies when faces are captured poorly on camera.[7]

See also

[edit]

References

[edit]
  1. ^ Dantcheva, A.; Velardo, C.; D'Angelo, A.; Dugelay, J.-L. (October 2010). "Bag of Soft Biometrics for Person Identification: new trends and challenges". Multimedia Tools and Applications. 51 (2): 739–777. doi:10.1007/s11042-010-0635-7. S2CID 38082731.
  2. ^ Rhodes, H.T.F. (1956). Alphonse Bertillon: Father of Scientific Detection. OL 18720791M.
  3. ^ Jain, A.K.; Dass, S.C.; Nandakumar, K. (2004). Soft biometric traits for personal recognition systems. International Conference on Biometric Authentication. doi:10.1007/978-3-540-25948-0_99.
  4. ^ Reid, D.A.; Nixon, M.S. (2011). Using Comparative Human Descriptions for Soft Biometrics (PDF). International Joint Conference on Biometrics. Archived from the original (PDF) on 2013-03-08.
  5. ^ Reid, D.A.; Samangooei, S.; Chen, C.; Nixon, M.S.; Ross, A. (2013), Soft Biometrics for Surveillance: An Overview. (PDF), Handbook of statistics, Vol. 31
  6. ^ Kathrine, G. Jaspher Willsie (2018-12-07), "Biometrics-Based Authentication Scheme for Cloud Environment", Cryptographic and Information Security, Boca Raton, FL: CRC Press, pp. 917–944, doi:10.1201/9780429435461-31, ISBN 978-0-429-43546-1, S2CID 196187324, retrieved 2020-10-25
  7. ^ James, Priyamol; Thomas, Jeena; Alex, Neena (February 2015). "A survey on soft Biometrics and their application in person recognition at a distance". 2015 International Conference on Soft-Computing and Networks Security (ICSNS). IEEE. pp. 1–5. doi:10.1109/icsns.2015.7292416. ISBN 978-1-4799-1752-5. S2CID 16114639.

Further reading

[edit]