0% found this document useful (0 votes)
118 views13 pages

Presented By: Biometric Technology To Distinctly

Biometrics refers to the automatic identification of individuals based on their physiological or behavioral characteristics. Common biometric traits include fingerprints, iris patterns, voice patterns, and facial features. Biometric systems work by capturing these traits from individuals and converting them into digital templates that can be stored and compared. Biometrics provides a more secure form of identification than passwords, ID cards, or tokens, which can be forgotten, stolen, or forged. However, biometrics also raises privacy issues since physical traits cannot be changed if compromised.

Uploaded by

manikumar147
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views13 pages

Presented By: Biometric Technology To Distinctly

Biometrics refers to the automatic identification of individuals based on their physiological or behavioral characteristics. Common biometric traits include fingerprints, iris patterns, voice patterns, and facial features. Biometric systems work by capturing these traits from individuals and converting them into digital templates that can be stored and compared. Biometrics provides a more secure form of identification than passwords, ID cards, or tokens, which can be forgotten, stolen, or forged. However, biometrics also raises privacy issues since physical traits cannot be changed if compromised.

Uploaded by

manikumar147
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Abstract

BIOMETRICS
PRESENTED BY J.SWATHi ECE CH.SAI LAXMI ECE science has been established whose products are likely to create a large market in the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his/her ''biological'' characteristics: voice, dynamics of movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from RISE GANDHI GROUP OF INSTITUTIONS ONGOLE one person to another. This property is made use of by Biometric technology to distinctly identify each person Biometric system is essentially a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Several important issues must be considered in designing a practical biometric system. First, a user must be enrolled in the system so that his biometric template can

email:jarubula.swathi

Over the last few years a new area of engineering

be captured. This template is securely stored in a central database or a smart card issued to the user. The template is retrieved when an individual needs to be identified. Depending on the context, a biometric system can operate either in a verification (authentication) or an identification mode. Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. identification advantages methods (tokens) the the person or to This offers over involving PIN be ID method of several traditional cards numbers identified is (ii)

laptops, and computer networks. Unlike biometric traits, PINs or passwords may be forgotten, and tokens like passports and driver's licenses may be forged, stolen, or lost. This paper gives an overview of key biometric technique technologies involved. for and basic are and The various

opportunities benefits, applications. Introduction:

biometrics

mentioned, followed by the uses, drawbacks,

The first modern biometric device was introduced on a commercial basis over 25 years ago when a machine that measured finger length was installed for a time the keeping ensuing application hundreds at of Shearson Hamil on Wall Street. In years, these hand geometry devices were installed at high security facilities operated by Western Electric, Naval Intelligence, over vaults, 20,000 the Department of Energy, and the like. There are now computer labs, rooms, care research day

(passwords) for various reasons: (i) required to be physically present at point-of-identification; based on identification biometric

techniques obviates the need to remember a password or carry a token. With of the increased and integration computers

Internet into our everyday lives, it is necessary to protect sensitive and personal data. By replacing PINs (or using PINs), biometrics biometric in addition to can techniques

centers, blood banks, ATMs and military installations to which access

potentially

prevent

unauthorized

access to ATMs, cellular phones,

is controlled using devices that scan an individual's unique physiological or behavioral prices this characteristics. have lead to with Reduced Why we need biometrics? In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.Ms, Airports etc.., you can unlock your houses, withdrawing money from a The term biometrics refers to the emerging devoted field to of the technology bank with just a blink of an eye, a tap of your finger or by just showing your face. Biometrics-what is it? Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: The person to be identified is required to be physically present at the point of identification. Identification Definition: The statistical use of the characteristic variations in unique elements of living organisms is known as biometrics. based on biometric techniques obviates the need to remember a password or carry a token. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or

increased awareness of biometric technologies; coupled lower overall prices will certainly bode well for this industry as we move through the new millennium. Biometrics:

identification of individuals using biological traits or behaviors. In practice, this means capturing an image of a unique feature of an individual such as a fingerprint, hand, eye or face, and comparing it with a template captured previously. For ease of explanation this has been over-simplified, but in essence this is how biometric technology works.

fraudulent use of A.T.Ms, Smart cards, computer networks. PINs passwords may be forgotten, and token based like methods passwords of and identification Thermalimage - Iris Pattern Personal traits -Voice pattern - Handwriting - Acoustic Signature

drivers licenses may be forged, stolen or lost. A biometric system is essentially a pattern by of or possessed recognition the system which makes a personal identification authenticity physiological characteristic user. Design systems: An determine identified they important an are issue in is by designing a practical system is to how and are: individual designed issues of biometric determining a specific behavioral by the

Depending on the context a biometric either verification(authentication) system or an identification system system can be a

Verification Vs Identification: There are two different ways to resolve a persons identity: verification and identification. confirming one one has of its are to Verification (Am I whom I claim I

keeping two characteristics in mind, Physical characteristics -Fingerprint, Handprint -Face -Scent,

am?) In am

involves

denying a persons claimed identity. identification, I?). Each establish a persons identity (Who these own approaches has

complexities and could probably be

solved best by a certain biometric system.

contain Minutiae

patterns points

of are

ridges local

and ridge

valleys as well as minutiae points. characteristics that occur at either the ridge bifurcation or a ridge

Types of biometric devices and their services: Now lets see some of the biometric devices being widely used in many areas like security, organizations, computer/network government prisons. They are: Fingerprint identification. Face recognition. Iris recognition. Hand geometry. Signature recognition. Retinal scanning Voice verification. And now lets see some of these biometric devices, their services, advantages and disadvantages in detail. Fingerprint recognition: Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometric being among the technology Fingerprints used today.

ending.

There are three methods for scanning finger prints: (1) Optical scanners, (2) Thermal scanners and (3) Capacitance (solid state) scanners Currently, there are two accepted methods for extracting the fingerprint data (I) (II) Minutia-based and Correlation-based is the more

Minutia-based locates the

microscopic of the two. This method ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file. The correlation-based method looks at the entire pattern of ridges and

valleys

in

the

fingerprint.

The

Disadvantages: Actual finger scan images cannot be recreated from a template image Users relate fingerprint recognition to criminal activity. Face (or Facial) recognition: Face recognition is one of the newer biometrics technology characteristics pictures. This technologies. analyzes and attempts The facial to is the has

location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints. Once the scanning is complete, the analysis is done by a comparison of several features of the fingerprint know as minutia. Investigators are systems look at where the ridge lines end or where one ridge splits into two (bifurcation). The scanning system uses complicated algorithms to recognize and analyze the minutia. If two prints have three ridge endings, two bifurcations, and form the same shape with the same dimensions, then it is likely the same persons fingerprints. Advantages: High accuracy rate. Can perform 1-to-many comparisons. Inexpensive equipment. Easy to use (samples are easy to capture and maintain). Most established and oldest of the biometric technology.

match it to database of digitized technology since relatively new and has only been commercially 1990s. Face available recognition

received a surge of attention since of disaster of 11/9 for its ability to identify criminals. Face recognition uses distinctive features of the face including the upper outlines of the eye socket, the areas surrounding the cheekbones, the sides of the mouth, and the location of the nose and ears to perform verification and identification. The first step in the face recognition is to obtain an image of an individual and store it in a database for later use. Usually, several pictures (or video images) at different angles are taken. known terrorists and

Individuals may also be asked to make different facial expressions for the data base. Next, the images are analyzed and extracted to create a template. The last step is to verify the individuals identity by matching images to those images that been stored in database. There are four main methods being used for facial recognition: Eigenfaces: a tool developed by MIT that extracts characteristics through the use of two-dimensional grayscale imagery. Feature Analysis (also known as Local Feature Analysis (LFA)): is the most widely used technique because of its for ability facial to accommodate changes Advantages: High accuracy rate. Can be performed from a distance. Accepted by most users. Non-intrusive. Hands-free. Disadvantages: Cannot not always account for the effects of aging. Sensitive to lighting conditions. Can perform limited 1-to-many comparisons.

and aspect. LFA uses an algorithm to create a face print (84 bytes in size) for comparison. Neural network: a method that extracts features from the face and create a template of contrasting elements that is then matched to a template in database. Automated Face Processing (AFP): a technique that looks for distances and ratios between certain facial features, and is more ideal for poorly lit areas. Iris recognition: No two irises are alike, not even in one individual or in identical twins. The iris consists of over 400 distinguished characteristics.

Compared to the 40 or 50 points of distinct fingerprint characteristics, the iris has more than 250 distinct features. Therefore, iris scanning is much more accurate than

fingerprints or even DNA analysis of the distinguishing features. Iris scanning the is executed of by the

and focus in on the users iris. The passive system allows the user to be anywhere from one to three feet away from the camera(s) that

scanning

measures

locate and focus in on the iris. This technologys main uses are for authentication, Advantages: identification, and verification of an individual. High accuracy rate Imitation is almost impossible Disadvantages: perceived to be intrusive and invasive Can be done from a short distance optical readers are difficult to operate requiring employees Hand geometry: Hand geometry is concerned with measuring the physical characteristics of the users hand and fingers and it is believed to be sufficiently unique for use as a means of biometric authentication. The technology records various dimensions of the human hand, it is relatively easy to use, and offers a good balance of vary performance Reader among a characteristics. configurations advanced training for

colored circle that

surrounds the pupil. With video technology, a camera scans the iris pattern, which consists of corona, pits, filaments, crypts, striations, and radial furrows (page). The system software then digitizes the unique information of the iris and stores it for authentication at a later time. Iris scanning and is downfall the they are is of easy, One Iris startup accurate, significant recognition costs high. In identifying ones Iris, there are two types of methods that are used by Iris identification systems, passive and active. The active Iris system method requires that a user be anywhere from six to 14 inches away from the camera. It also requires the user to move back and forth so that the camera can adjust as convenient. initial

extremely

softball-shaped device which the

subject grabs in his hand and a flat plate his/her which hand, the a subject bar places the which

subject grabs as if opening a door, and a flat plate which the subject places his/her hand on.

Hand geometry readers are developed in a wide range of scenarios, including time and attendance recording where they have proved extremely popular. The methodology may be suitable where there is a large user base or there are users who access the system infrequently. Accuracy can be very high if desired. Hand geometry readers are relatively large and expensive but the ease of integration into other systems and processes, small template size (only 9 bytes for pure hand geometry template) and ease of use makes it a good choice for many projects. Hand geometry Vs Fingerprints: Unlike fingerprints the human hand isnt unique. One can use finger length, thickness and curvature for the purposes of verification but not for identification. For some kinds of access control like immigration and border control, invasive biometrics

(e.g., fingerprints) may not be desirable as they infringe on privacy. In such situations it is desirable to have a biometric system that is sufficient for verification. As hand geometry is not distinctive, it is idle choice. Further more, hand geometry data is easier to collect. With fingerprint collection good frictional skin is required by imaging systems, and with retina-based recognition systems, special lighting is necessary. Additionally, hand geometry can be easily combined with other biometrics, namely fingerprint. One can envision a system where fingerprints are used for (in frequent) identification and hand geometry is used for (frequent) verification. Application Areas: The uses for biometric security are varied associate and growing. It was with developed in response to a need to human action identity whether conducting a transaction, accessing a computer or a critical information system, or entering secure physical area. Some of the existing and proposed applications in general we use are described below: Computer/Network security: Many and stand-alone sensitive and network computer systems carry valuable information. Controlling access to these systems

is another major use of biometric authentication systems. Internet transactions: Due to growing security requirements that results from the boom in e-commerce, many think of on-line transactions as being an obvious area for biometrics. The biometric authentication generates a greater that degree the of vendor at the confidence because he knows that person person terminal is he who he claims to be. Physical area security: Military, Commercial sufficiently Government, installations strong and have

politicians are required to verify their identity. This is intended to stop proxy voting. Prisons: An interesting use of biometrics is particular characteristics. The limiting factors of speed and band width are now a thing of the past and than their practical performance it is an might in many instances be better expected. Today, efficient and effective method of replacing passwords, tokens and smart cards. It authentication extensively is its still in is important has high to recognize that although biometric served security in and

confidentiality

concerns. The biometric identifiers play a major role in controlling physical installations. Banking: Many leading banks have been experimenting with biometrics for ATM use as a means of combating card fraud. Beginning 2002, some companies will being issuing smart credits Voting: A logical use of biometrics is in voting process where eligible cards, with customers fingerprint information embedded. access to these

applications in defense industry, it fledgling technology commercial world, both in terms of technical sophistication current extent of deployment. There are no established standards for biometric system architecture, for template formation, or even for biometric reader testing. It is also not clear as which technology or technologies will dominate the customer market. In the absence of standards and direction, the rapid and wide spread deployment of

biometric could problematic people.

authentication easily facilitate proliferation

system the of

geometry,

signature

verification,

voice verification and others are all well established with their own particular characteristics. The limiting factors of speed and band width are now a thing of the past and than their practical performance it is an might in many instances be better expected. Today, efficient and effective method of replacing passwords, tokens and smart cards. It is important to recognize that biometric authentication has served extensively in high although security applications in defense industry, it is still fledgling technology in commercial world, both in terms of its technical sophistication and current extent of deployment. There are no established standards for biometric system architecture, for template formation, or even for biometric reader testing. It is also not clear as which technology or technologies will dominate the customer market. In the absence of standards and direction, the rapid and wide spread deployment of biometric authentication system could easily facilitate the problematic proliferation of authentation and tracking of the people.

authentication and tracking of the

in prisons where the visitors to a prisoner identities are may subjected not be to verification procedures in order that swapped during the visit. Leading products in biometrics: Biometric is a new but promising technology and therefore a number of companies have appeared in the market in a very short period of time. Some of those products are:

Conclusion: The advances in accuracy and usability and decreasing cost have made the biometric technology a secure, affordable and cost effective way of identifying individuals. scanning, Biometric retinal parameters hand such as fingerprint scanning, iris scanning,

REFERENSES: www.wikipeadia.com www.biometrics.org

You might also like