Running Head: PROSPECTUS 1
Running Head: PROSPECTUS 1
Running Head: PROSPECTUS 1
Improvising Biometric and Biometric Data Using Combination of Behaviour Identifier and
Prospectus
Name
Institution Affiliation
PROSPECTUS 2
people. Biometric data is a general term used to refer to any computer data that is created
fundamental human attribute to distinguish and recognize other people as individual and
individuals based on some physical or behavioural characteristics that are intrinsically unique
for each individual[ CITATION Nik10 \l 2057 ]. Examples of these biometric identifiers are facial
patterns, fingerprints, typing cadence or voice. Each of these identifiers is considered unique
to the individual, and they may be used in combinations to ensure greater accuracy of
identification.
The applications of biometrics ranges from access control, military and surveillance to
banks and multimedia copyright protection. The first time you use the biometric system, it
collects basic information about you[ CITATION Rob101 \l 2057 ]. It then captures by taking a
picture or recording of your particular characteristic by recording it. It then stages to storing,
Contrary to what you can see in films, most applications do not store the entire image or
video. Instead, they analyze and translate your trait into a code or a graph. Some systems also
store this data on a smart card with you. The next time you use the system it compares the
function you present to the file data the next time you use the program. Then it either accepts
or denies what you want to be who you are[ CITATION Joh07 \l 2057 ]. The system also uses
three components;
A sensor that has the purpose of detecting the characteristic being applied or used for
identification
A computer that is responsible for acquiring, interpreting and storing the information
PROSPECTUS 3
The main goal of this Thesis will be to provide an improvised biometric data system
that is more durable and prone to data breaching in healthcare facilities, (using behaviour
identifier) in order to reach an absolute security of data for health facilities and other related
engagement combination of patterns that include the mouth lips while talking, mouth and
teeth structure, tongue shape and the size and shape of the mouth (Mouth identifier). Despite
the recent report of data bleaching where by researchers managed to access gigabyte of
database of millions of people, applying the use of behaviour identity like physical patterns,
navigation patters, physical movements and engagement patterns would best suit to curb such
cases of theft.
The proposed improvised biometric will provide sustainability and a fast access to
information in hospitals and other health facilities to patients whose health data are
PROSPECTUS 4
electronically stored. To make the four features as of the mouth identifier stronger, first is
applying a one simple way password. Storing passwords by first encrypting them and
which turns passwords into a string of characters known as a message digest which
decryption is nearly impossible. It means that attackers/hackers can't get the passwords even
if the coded keys were released. With their original plain text format, modern systems would
never store passwords. In the recent biometric database breach, the data was stored in raw
format without authentication. This means that hackers can directly access and duplicate
The other combination would be use of block chain, the system behind
cryptocurrencies like Bitcoin, which would be another way to make biometric systems more
secure[ CITATION Emm18 \l 2057 ]. With blockchain technology, you can store customer data in
multiple computers around the world in a distributed ledger that is protected by cryptography.
It ensures that only the data (or data blocks) can be accessed by licensed parties and any
attempt to change the information will be identified by any other user subscribing to the
blockchain[ CITATION Jav19 \l 2057 ]. It is also possible to create shared private ledgers that can
Methods
Experiments:
The experiment will assess the use of behaviour identifier that is designed to capture
on the speed of talking, mouth and teeth structure, tongue shape and the size and shape of the
mouth and after capturing the data, technologies it by building and attaching it to blockchain.
This process is chosen due to its higher efficiency capturing and storing. The assessment will
involve healthcare fraternities like hospital, with participants who will carry out the tests to
PROSPECTUS 5
find the result of the improvisation. Three tests will be carried on that will distinguish how
secure the platform is over the other. The first test will be using the usual biometrics
securities entries; the physical identifier that includes facial patterns, voice or typing cadence,
and finger print. The second test will include usual behavioural biometrics that include
keystroke dynamics, gait analysis, mouse use characteristics and cognitive biometrics. The
third and the final will text concerning the biometric with a combination of behavioural and
block chain system. All these tests will go through scanning to prove their efficiency.
Participants:
To test on the efficiency of the improvisation, it will sample willing participants who
have health statistics, and their records will be re-administered afresh, so that they can meet
the expectance of the behaviour identifiers of the mouth scan. The patients will be guided
through a process of their behaviour change in regard to their mouth. After capturing the data,
it will be taken through a process of storage and the patient will provide a password to the
records, then the data will be encrypted and hashed them is a common practice. In this case,
Procedure:
In order to determine the operation degree to which the information or data of patient
is secure, and the platform cannot be easily breached, two processes must be undergone.
First, the patient data is be acquired, and entered in to the new system for application
assessment. Second, the patient is to pass through scanning process. After the scanning, the
information acquired will be used as the entry login password to retrieve the data to the
patient portal.
The results obtained from the three tests will be used to evaluate the durability and
flexibility levels of the usual and the improvised biometrics, and determine the best efficiency
PROSPECTUS 6
of the improvised biometric. Measuring if it meets the standards needed for security of the
information storage.
Results:
The results of the experiment could indicate three possible results. Results one to the
first test could indicate that after scanning the patient and applying the physical identifiers,
the biometric was easily prone to threats and wasn’t strong to resist appliance of strong
hacking threats. The second test on the physical and behavioural identifiers would display
slight strength to resistance against threats, though after appliance of strongest threats the
biometric will be breached. The third test, combination of behavioural and use of block chain
systems would show how strong the biometric is strong against hacking and any other mode
methods, and applications. Piscataway, N.J: IEEE Press ; Hoboken, N.J. : Wiley.
Dunstone, T., & Yager, N. (2009). Biometric system and data analysis : design, evaluation,
Ganne, E., & World Trade Organization. (2018). Can blockchain revolutionize international
Newman, R. (2010). Security and access control using biometric technologies. Boston, Mass:
Course Technology.
Prieto, J., Das, A. K., Ferretti, S., Pinto, A., & Corchado, J. M. (2019). Blockchain and
Butterworth-Heinemann/Elsevier.