Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Guided By
Submitted By
G.T.CHAUHAN
HARDIK ANIYALI
VIMAL JAVIA
------------------------------------------------BIO-METRICS----------------------------------------
WADHWAN CITY
DIST : SURENDRANAGAR
CERTIFICATE
Staff Incharge
Head of Dept.
(Miss Saroj Bodar)
Date : ___________
------------------------------------------------BIO-METRICS----------------------------------------
ACKNOWLEDGEMENT:We are thankful to our college to give us such opportunity. First of all we are
thankful to Saroj mam. We are also thankful to G.T.Chauhan Sir for providing us proper
guidance. Thanks are also due to Mitesh Sir for supporting us.
We are also very much thankful to our parents who encourage us and always
giving us the strong support.
Hardik Aniyali
Vimal Javia
------------------------------------------------BIO-METRICS----------------------------------------
Contents:-
page-no:-
2) Introduction to Bio-metrics
3) A Few Defination
------------------------------------------------BIO-METRICS----------------------------------------
4) History of Bio-metrics
7) Phases of Bio-metrics
7.1 Input
7.2 Process
7.3 Output
8) Bio-metrics Identification
8.1 Voice Print
8.2 Finger Print
8.3 Iris Pattern
8.4 Face Print
8.5 Hand Geometry
8.6 Retinal Scan
8.7 Keystroke Dynamics
8.8 Facial Recognition
8.9 Signature Recognition
10
19
20
23
------------------------------------------------BIO-METRICS----------------------------------------
Is DNA Bio-metrics ?
25
12)About Bio-metrics
13.1 Will Bio-metrics solve all security concerns ?
13.2 Which is the best identification technique ?
13.3 Is Bio-metrics more secure then password ?
13.4 Applications
13.5 New Opportunities
13.6 Future Technology
13.7 Benefits
26
15) Conclusion
30
16)
31
Reference
From the beginning of the human culture, people are always trying to secure their
properties. Because some people are always eager to snatch others properties.
Security refers to prohibit some unauthorized persons from some important data
or from some precious assets.
To restrict this kind of theft human beings are making special systems that can
prevent the thieves such systems are known as security systems.
------------------------------------------------BIO-METRICS----------------------------------------
We can consider the starting of these kinds of systems through lock and key.
A Frenchman Alexander Fish has made a strong, fire proof safe in 1844. And
Linas Yel an American, has invented a Pin lock kind of lock. Both these
equipments are used to provide security to money, important documents and
jewellary. So this is the first step in the world of security system.
At that point of time this arrangement for security was considered the best. But as
time passes it was found that any unauthorized person could access these through
duplicate keys or using any technique. So as the world progresses, the thieves
become more intelligent to break the security.
Thus, we always need a new and strong security system to protect our assets.
Today in the world of e-commerce and Internet this thing is becoming more and
more important because today the world is like village, from anywhere, any time,
any body can harm you.
e.g. :-If you are purchasing something from web and because of
lack of security someone come to know your bank account
number. Then that person will have all the information of your bank
account, which can perhaps put you in a big trouble!
Now a days, there are many security systems are available. But we shall
concentrate on BIO-METRICS.
2. INTRODUCTION
BIO=Pertaining to biology; MATRICS=Science and art of measurement.
o The term 'biometrics' is used to refer to any and all of a variety of
identification techniques which are based on some physical and difficultto-alienate characteristic.
o Today, the science of biometric technology refers to the "automated"
methods used to recognize a person based upon physiological or
behavioral characteristics.
------------------------------------------------BIO-METRICS----------------------------------------
3. A FEW DEFINATION
Biometrics Authentication
Person authentication or simply authentication is a task of confirming or denying
a persons claimed identity. Biometrics is a measurement using a persons behavioural or
physiological characteristics. Examples of these characteristics are fingerprints, face,
C.U.SHAH COLLEGE OF ENG. & TECH.
Authentication
4. HISTORY OF BIO-METRICS
------------------------------------------------BIO-METRICS---------------------------------------
10
------------------------------------------------BIO-METRICS---------------------------------------of quantitative theorgies and the development, application, and dissemination of effective
mathematical and statistical techniques.
5.1 Purpose
To this end, it welcomes to membership biologists, statisticians, and others
interested in applying statistical techniques to research data. The International
Biometric Society and its journal, Biometrics, serve as an invaluable means of
communication between the subject-matter specialists and the statisticians.
5.2 Journal
Biometrics is published quarterly. Its general objectives are to promote and extend
the use of mathematical and statistical methods in the various subject-matter
disciplines, by describing and exemplifying developments in these methods and
their application in a form readily assimilable by experimenters and those
concerned primarily with analysis of data. The journal is a ready medium for
publication of papers by both the experimentalist and the statistician. The papers
in the journal include statistical, authoritative expository or review articles, and
analytical or methodological papers contributing to the planning or analysis of
experiments and surveys, or the interpretation of data. Many of the papers in
Biometricscontain actual worked examples of the statistical analyses proposed.
5.3 Meetings
Encouragment is given the subject-matter experimenter by holding symposia
dealing with applied statistics as a part of annual meetings of the biological,
chemical, engineering, and physical science societies. Such symposia afford an
opportunity for subject-matter specialists and statisticians to discuss problems of
mutual interest. At Regional meetings of the Society, a member is afforded an
opportunity to present technical papers. This permits the exchange of ideas and
information through formal presentation and informal contacts with fellow
statisticians and experimentalists.
11
------------------------------------------------BIO-METRICS----------------------------------------
6.1 Data Acquisition:Data collection involves use of sensors to detect & measure an individuals
physiological or behavioral characteristics. The biometric feature must have the
following characteristics:(a) Universality, which means that every person should have the characteristic,
(b) Uniqueness, two persons should not have the same term or measurement of
characteristic,
(c) Permanence, the characteristic should be invariant with time,
(d) Measurability, the characteristic can be quantified that is the origin of the
Cameras used in biometric systems are generally either CCD(charge couple device) or
CMOS(combined metal oxide semiconductor) image sensors.CCDs are comparatively
more costlier than CMOS. The cost of CCD is nearly 2500 Rs. And CMOS is about 800
to 1000 Rs. Price depends on the resolution which reflects the accuracy of biometric
system.
6.2 Transmission: Not all the biometric systems process and store data on the measuring device.
Often measurement is made using relatively simple device to a computer or server for
processing and/or storage. Depending on the system, the data may be relatively large
and thus would need to be compressed for quick transfer. The compression algorithm
12
------------------------------------------------BIO-METRICS---------------------------------------needs to be selected carefully; otherwise it may introduce some artefacts that could
impact the decision process.
In any image scanning Biometric system, JPEG compression is preferred due to
the blockness it produces at high compression ratios. The data can also be transmitted
to the database for storage as raw data.
6.3 Signal Processing:The signal processing unit uses features extraction algorithms to extract true
biometric information from the sample in presence of noise introduced during data
collection and transmission. Additional measurements are made if any flaw or
corruption is noted, to ensure good quality.
Pattern matching involves comparing the feature sample to a stored sample.
(The biometric data can be stored locally on the biometric data can be stored locally on
the biometric device, some central database/server, or on a smart card issued to users.)
The result of the comparison is sent to the decision system to determine the match.
6.4 Decision Making:The final step is the decision to accept or reject user, and is based on a security
threshold. The threshold value is either a parameter of comparison process itself, or the
system compares the resulting match value with the threshold value. If for example, in
a system performing identity verification, the match value is equal to or higher than the
threshold value, the user is accepted. In an identification system, acceptance might
require a match value that is both higher than threshold value and higher than the
second-best match by a specific amount.
6.5 Data Storage:After extracting the biometric features, the system stores and maintains the new
master template. Choosing proper discriminating characteristics for categorizing
records can facilitate future searches. The system stores the templates in one of four
locations: a card, a servers central database, a workstation, or an authentication
terminal. If privacy is a concern, a card is the only choice because sensitive biometric
data should not be stored (and potentially misused) in a central database.
7. PHASE OF BIO-METRICS
7.1 Input
Using appropriate input device it will collect the data of the persons
biological features. These features are known as the master key for
13
------------------------------------------------BIO-METRICS---------------------------------------the computer.
For recording and converting biometric traits to usable computer data, one needs an
appropriate sensor (see table). Of course, costs can greatly vary for different sensors.
However, we can't forget that many technical devices already have sensors built in, and
therefore, offer possibilities to measure biometric features nearly free of cost.
Biometric Trait
Fingerprint (Minutia)
Signature (dynamic)
Facial Structure
Iris pattern
Retina
Hand geometry
Finger geometry
Vein structure of the back of the
Hand
Ear form
Voice (Timbre)
DNA
Odor
Keyboard Strokes
Comparison: Password
Sensor
capacitive, optic, thermal, acoustic, pressure
sensitive
Tablet
Camera
Camera
Camera
Camera
Camera
Camera
Camera
Microphone
Chemical Lab
Chemical sensors
Keyboard
Keyboard
7.2 Process
Processes the input data. Here, computer takes the measurement of inputed
Biological features.
No two persons have same finger print. So, computer joins the points of that finger
print features and make the pattern of it and it will store that pattern into its memory.
Then computer compares this pattern against the master keys.
14
------------------------------------------------BIO-METRICS----------------------------------------
7.3 Output
Testing of processed data and give the access rights to the person. Here,
When any person scanned his/her finger print , computer will
store a Bio-logical featured pattern and compares it against the stored masterkey in its memory. And if it is matched, then permission granted else not.
8.BIO-METRICS IDENTIFICATION
CONVENTIONAL METHODS OF BIOMETRIC IDENTIFICATION ARE.
1 VOICE PRINT
2 FINGER PRINT
3 IRIS PATTERN
4 FACE PRINT
15
------------------------------------------------BIO-METRICS---------------------------------------5
6
7
8
9
HAND GEOMETRY
RETINAL SCAN
KEYSTROKE DYNAMICS
FACIAL RECOGNITION
SIGNATURE RECOGNITION
The computer converts the voice pattern into 0 & 1.After taking the
input that input is also converted into 0 & 1.If the both code matches
the person is authorized.
16
------------------------------------------------BIO-METRICS----------------------------------------
17
------------------------------------------------BIO-METRICS---------------------------------------
18
------------------------------------------------BIO-METRICS----------------------------------------
entire planet could be enrolled into an iris database and there would
still be a minute chance of false identification or rejection. In finger
print technique there are only 90 special features, but in iris pattern
there are 266 special features.
In 1998, Dr. John Daugman. -inventor of Cambridge University of
Britain has compared the approx 3,00,00,000 the iris but he couldnt
find at least one similarity.
In this technique CCD camera, which looks like small camcorders,
scans the eyes iris pattern.
The iris pattern of a persons left and right eyes are different.
19
------------------------------------------------BIO-METRICS----------------------------------------
over time since two or three years after the birth, so it might be called
as a kind of optical finger print
The Iris Code is so specialized that the chances of two irises having
the same code are 1 in 1052 !
Internet security.
20
------------------------------------------------BIO-METRICS---------------------------------------
21
------------------------------------------------BIO-METRICS----------------------------------------
8.5 Hand Geometry: Hand geometry is by far the most widely used
biometric system. The ID3D Hand key system from
Recognition Systems, Inc. is the most popular.
Various methods are used to measure the hand; these
methods generally fall into one of two categories :
1. Mechanical
2. Image-edge detection
Either method produces estimates of certain person.
Key measurements of the hand (length of fingers and thumb,
widths, etc.); this data are used to "categorize" a person.
22
8.
6 Retinal Scan: Retinal Scan technology is based on the blood vessel pattern in the retina of the
eye. A retinal scan can produce almost the same volume of data as a fingerprint image
analysis.
It works as follows:
The user positions their head against a support, and a low power infrared light is
directed against the back of the retina. The image of the pattern of veins is reflected back
to a camera.
8.7 Keystroke Dynamics: This method analyzes the way in which a user types at a computer keyboard. The
input is monitored thousands of times a second, and the durations of keystrokes and the
latencies between them are recorded.
The goal for keyboard dynamics is continual authentication of the user while at a
computer; so that if an intruder user had access to the users session while they were
away, the machine would eventually be able to recognize the discrepancy. Even though
typing patterns are behavioral characteristics, they are very hard to mimic.
23
------------------------------------------------BIO-METRICS----------------------------------------
8.8 Facial Recognition: Facial recognition technology has recently developed into two areas of study:
1. Facial metrics
2. Eigenfaces.
Facial metrics technology relies on the measurement of specific facial features
(e.g., the distance between the inside corners of the eyes, the distance between the outside
corners of the eyes and the outside corners of the mouth, etc.) and the relationship
between these measurements. Within the past two years, an investigation has been made
into categorizing faces according to the degree of fit with a set of "eigenfaces". It has
been postulated that every face can be assigned a "degree of fit" to each of 150
eigenfaces; further, only the template eigenfaces with the 40 highest "degree of fit" scores
are necessary to reconstruct a face with over 99% accuracy. The difference between the
eigenface method of facial categorization and the police artist method of building a face
from template parts is that the eigenface method is based upon an actual photo of the
individual and the "eigenface" information is derived from a computer-based analysis of
the digital image of the photo. Eigenfaces are (reportedly) highly repeatable and are not
affected by human subjectivity.
Eigenface technology has some promise, but it is a technique that is just in the
infancy stage of development. Very little data regarding eigenface error rates (false
negative, false positive) exists at this point.
8.9 Signature Recognition: Signature recognition is based on the dynamics of making the signature, i.e.,
acceleration rates, directions, pressure, stroke length, etc., rather than a direct comparison
of the signature after it has been written.
The problems with signature recognition lie in the means of obtaining the
measurements used in the recognition process and the repeatability of the signature. The
instrumentation cannot consistently measure the dynamics of the signature. Also, a
person does not make a signature in a fixed manner; therefore, the data obtained from any
one signature from an individual has to allow for a range of possibilities.
Signature recognition has the same problem with match discrimination (i.e.,
finding a match in a large database) as does hand geometry.
24
------------------------------------------------BIO-METRICS----------------------------------------
(a)
(b)
(d)
(c)
(e)
25
------------------------------------------------BIO-METRICS----------------------------------------
Biometrics
Crossover Accuracy
Retinal Scan
1:10,000,000+
Iris Scan
1:131,000
Fingerprints
1:500
Hand Geometry
1:500
Signature Dynamics
1:50
Voice Dynamics
1:50
26
------------------------------------------------BIO-METRICS---------------------------------------Retinal scan has high accuracy but also has a high data collection error rate and
low user acceptability. For this reason, retinal scan exists only in science fiction movies
but not in real life applications!
The fingerprint biometric has a low data collection error rate and high user
acceptability. Further, fingerprint technology has had the most research and development
money applied to both identification and authentication problem. Finally, fingerprint
biometrics has the highest acceptance in the identification community and virtually every
large biometrics system in operation today uses fingerprint biometrics. Notwithstanding
it's association with "criminal" applications, fingerprint biometrics is generally accepted
by clients.
The chosen biometrics in this project, i.e., face and voice, are based on user
acceptability and another important factor, the availability of resources in the laboratory.
Once the system is established, moving into other biometrics would be easier.
Table 3 : Comparison of biometrics technologies based on perception of three biometrics
experts according to [Jain, 1999]
27
------------------------------------------------BIO-METRICS----------------------------------------
28
------------------------------------------------BIO-METRICS----------------------------------------
11.1
allow
an
False Accept Rates claimed for today's biometric access systems range
from 0.0001% to 0.1%.
It's important to remember that the only way an unauthorized person
can get access is if a unauthorized person tries. Thus, the False Accept
Rate must be multiplied by the number of attempts by unauthorized
person to determine the number of possible occurrences.
The point where false accept and false reject curves cross is called the
"Equal Error Rate.
29
------------------------------------------------BIO-METRICS---------------------------------------
Here, it checks for validity of the processed data and decides whether
the person is authorized or not.
Testing biometrics is difficult, because of the extremely low error rates
involved. To attain any confidence in the statistical results, thousands
of transactions must be examined.
It's important to remember that error rates are statistical: they are
derived from a series of transactions by a population of users.
In general, the larger the population and the greater the number of
transactions, the greater the confidence level in the accuracy of the
results.
If the reported error rate is 1:10, then a sample of 100 transactions may
provide a sufficient confidence level. Conversely, a 100-transaction
sample would be too small if the error rate was reported as 1:100,000.
Biometric devices are extremely secure, thanks to the combination of low False Accept
Rates at moderate sensitivity settings, combined with a short user keypad code.
At the same time, biometrics are extremely convenient and error-free, thanks to low False
Reject Rates.
30
------------------------------------------------BIO-METRICS----------------------------------------
31
------------------------------------------------BIO-METRICS----------------------------------------
13.ABOUT BIO-METRICS
13.1 WILL BIO-METRICS SOLVE ALL SECURITY CONCERNS?
13.2 WHICH IS THE BEST IDENTIFICATION TECHNIQUE ?
13.3 IS BIO-METRICS MORE SECURE THEN PASSWORD?
13.4 APPLICATION
13.5 NEW OPPORTUNITIES
13.6 FUTURE TECHNOLOGY
13.7 BENEFITS
32
------------------------------------------------BIO-METRICS----------------------------------------
33
------------------------------------------------BIO-METRICS---------------------------------------attacks, keyboard dummies (e.g., false ATMs), wiretapping etc. Even biometric features
have to cope with such problems. However, it can be assumed that the protection of
biometric feature acquisition is not easier than the acquisition of the password, provided
the implementation expense is comparable!
The unfortunate events of September 11,2001 have placed the recent focus on
creating new systems and installations employing biometrics.
Examples include facial recognition at airports and fingerprint and iris scanning
solutions at new government facilities.
34
------------------------------------------------BIO-METRICS---------------------------------------biometric reader network. Enrolled users present their smart card to the
biometric reader at any location where the card is valid. The biometric
template stored on the card (which is usually encrypted) is compared to
the live biometric. If the two match, the system grants the user access.
o Another benefit of combining biometrics with smart cards pertains to dualtechnology cards that are embedded with a smart chip. These combination
cards function as both smart cards and proximity cards. This grouping
permits organizations currently using proximity-based access control to
incorporate biometric security and limit card issuance to users who are
permitted access to the biometrically secured area.
o Lastly, since the biometric templates are stored on individual cards, the
number of users for any particular biometric reader is unlimited. This
scenario differs from biometric readers that store the template, thereby
limiting the template capacity to the reader's storage capacity.
This Bio-chip concept is recently used in an African Safaris to trap the activities
and diseases of animals. For this every animal has a Bio-chip in its body.
So, in future it may not require to ask What is your name? just make a shake
hand and allow the Bio-chips to interact and will know the persons
Identification.
35
------------------------------------------------BIO-METRICS----------------------------------------
36
------------------------------------------------BIO-METRICS----------------------------------------
14. CONCLUSION :We conclde that for biometrics is better technique for any security. This technique is
improve then unauthorized person can not access any thing our assets. It
depends on physical behavior. This technique is possible only on the man
identification not its document needed for it.
37
------------------------------------------------BIO-METRICS----------------------------------------
CONCLUSION :We conclde that for biometrics is better technique for any security. This technique is
improve then unauthorized person can not access any thing our assets. It
depends on physical behavior. This technique is possible only on the man
identification not its document needed for it.
38