Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
d -
RAMSWAROOP SINGH T PRAMOD KUMAR REDDY P
BRANCH: CSE BRANCH: CSE
ROLL NO: 05C71A0547 ROLL NO: 05C71A0514
CONTACT NO: 9966952101 CONTACT NO: 9866562166
EMAIL ID: ram_fr_547@yahoo.co.in
ELLENKI COLLEGE OF ENGG. & TECH., PATEL
GUDA
Abstract
“Biometrics” is a general term used Registered Traveler (RT) program.
alternatively to describe a Many companies are also
characteristic or a process. implementing biometric technologies
As a characteristic: to secure areas, maintain time records,
1. A measurable biological and enhance user convenience. For
(anatomical and physiological) and example, for many years Disney World
behavioral has employed biometric devices for
characteristic that can be used season ticket holders to expedite and
for automated recognition. simplify the process of entering its
As a process: parks, while ensuring that the ticket is
2. Automated methods of used only by the individual to whom it
recognizing an individual based on was issued.
measurable A typical biometric system is
biological (anatomical and comprised of five integrated
physiological) and behavioral components: A sensor is used to
characteristics. collect the data and convert the
Biometric systems have been information to a digital format. Signal
researched and tested for a processing algorithms perform
few
decades, but have only recently entered quality control activities and develop
into the public consciousness because the biometric template. A data
of high profile applications, usage in storage component keeps information
entertainment media (though often not that new biometric templates will be
realistically) and increased usage by compared to. A matching algorithm
the public in day-to-day activities. compares the new biometric template
Example deployments within the to one or more templates kept in data
United States Government include the storage. Finally, a decision process
FBI’s Integrated Automated (either automated or human-assisted)
Fingerprint Identification System uses the results from the matching
(IAFIS), the US-VISIT program, the component to make a system-level
Transportation Workers Identification decision.
Credentials (TWIC) program, and the
Biometric Modalities
Commonly implemented or studied implementing a biometric device
biometric modalities include including location, security risks, task
fingerprint, face, iris, voice, signature (identification or verification),
and hand geometry. Many other expected number of users, user
modalities are in various stages of circumstances, existing data, etc. It is
development and assessment. There is also important to note that biometric
not one biometric modality that is best modalities are in varying stages of
for all implementations. Many factors maturity.
must be taken into account when
Dynamic Signature
Introduction signature and are common in locations
“Dynamic Signature” is a where merchants are capturing
biometric modality that uses, for signatures for transaction
recognition purposes, the anatomic and authorizations. Data such as the
behavioral characteristics that an dynamically captured direction, stroke,
individual exhibits when signing his or pressure, and shape of an individual’s
her name. Dynamic devices should not signature can enable handwriting to be
confuse with the electronic signature a reliable indicator of an individual’s
capture systems that are used to identity
capture a graphic image of the
Face Recognition
Introduction verification and identification
face images have many non-linear filter, which is used to detect shapes
characteristics that are not addressed and to extract features using image
straight vs. leaning over) and of the Gabor filter response at each
link architecture that projects the face executed in the visual cortex of higher
onto an elastic grid. The Gabor jet is a mammals. The difficulty with this
Fingerprint Recognition
Introduction biometric) due to advancements in
Fingerprint identification is one of the computing capabilities. Fingerprint
most well-known and publicized identification is popular because of the
biometrics. Because of their inherent ease in acquisition, the
uniqueness and consistency over time, numerous sources (ten fingers)
fingerprints have been used for available for collection, and their
identification for over a century, more established use and collections by law
recently becoming automated (i.e. a enforcement and immigration.
Approach
Concept characteristics sometimes used during
A fingerprint usually appears as the automatic classification and
a series of dark lines that represent the minutiae extraction processes. The
high, peaking portion of the friction types of information that can be
ridge skin, while the valleys between collected from a fingerprint’s friction
these ridges appears as white space and ridge impression include the flow of
are the low, shallow portion of the the friction ridges (Level 1 Detail), the
friction ridge skin. Fingerprint presence or absence of features along
identification is based primarily on the the individual friction ridge paths and
minutiae, or the location and direction their sequence (Level 2 Detail), and
of the ridge endings and bifurcations the intricate detail of a single ridge
(splits) along a ridge path. The images (Level 3 Detail). Recognition is
below present examples of fingerprint usually based on the first and second
features: (a) two types of minutiae and levels of detail or just the latter.
(b) examples of other detailed AFIS technology exploits some of
these fingerprint features. Friction overall ridges to assign a fingerprint
ridges do not always flow continuously classification and then extract the
throughout a pattern and often result in minutiae detail – a subset of the total
specific characteristics such as ending amount of information available yet
ridges, dividing ridges and dots, or enough information to effectively
other information. An AFIS is search a large repository of
designed to interpret the flow of the fingerprints.
Hand Geometry
Introduction 1980s. The systems are widely
Hand geometry recognition is the implemented for their ease of use,
longest implemented biometric type, public acceptance, and integration
debuting in the market in the late capabilities. One of the shortcomings
of the hand geometry char acteristic is systems use a camera to capture
a
that it is not highly unique, limiting the silhouette image of the hand (Figure
applications of the hand geometry 2). The hand of the subject is placed on
system to verification tasks only. the plate, palm down, and guided by
five pegs that sense when the hand is
Approach in place. The resulting data capture by
The devices use a simple concept of a Charge-Coupled Device (CCD)
measuring and recording the length, camera of the top view of the hand
width, thickness, and surface area of an including example distance
individual’s hand while guided on a measurements
plate (Figure 1). Hand geometry
The image captures both the top storage needs of other biometric
surface of the hand and a side image systems.
that is captured using an angled mirror
(Figure 3). Upon capture of the The enrollment process of a hand
silhouette image, 31,000 points are geometry system typically requires the
analyzed and 90 measurements are capture of three sequential images of
taken; the measurements range from the hand, which are evaluated and
the length of the fingers, to the measured to create a template of the
distance between knuckles, to the user’s characteristics. Upon the
height or thickness of the hand and submission of a claim, the system
fingers (Figure 4). This information is recalls the template associated with
stored in nine bytes of data, an that identity; the claimant places
extremely low number compared to the his/her hand on the plate; and the
system captures an image and creates a
verification template to compare to the on the threshold of the system; the
template developed upon enrollment. A claim is either accepted or rejected
similarity score is produced and, based
.
Iris Recognition
Introduction iris is a muscle within the eye that
Iris recognition is the process of regulates the size of the pupil,
recognizing a person by analyzing the controlling the amount of light that
random pattern of the iris (Figure 1). enters the eye. It is the colored portion
The automated method of iris of the eye with coloring based on the
recognition is relatively young, amount of melatonin pigment within
existing in patent only since 1994.The the muscle (Figure 2).
Figure 1: Iris Diagram. Figure 2: Iris
Structure
Iris imaging requires use of a high the subject. Upon imaging an iris, a 2D
quality digital camera. Today’s Gabor wavelet filters and maps the
commercial iris cameras typically use segments of the iris into phasors
infrared light to illuminate the iris (vectors). These phasors include
without causing harm or discomfort to information on the orientation and
spatial frequency (“what” of the information is used to map the Iris
image) and the position of these areas Codes® (Figures 4 & 5).
(“where” of the image).This
Iris patterns are described by an Iris two Iris Codes. If the HD indicates that
Code using phase information less than one-third of the bytes in the
collected in the phasors. The phase is Iris Codes are different, the Iris Code
not affected by contrast, camera gain, fails the test of statistical significance,
or illumination levels. The phase indicating that the Iris Codes are from
characteristic of an iris can be the same iris. Therefore, the key
described using 256 bytes of data using concept to iris recognition is failure of
a polar coordinate system. Also the test of statistical independence.
included in the description of the iris
are control bytes that are used to Iris vs. Retina Recognition
other unwanted data. To perform the recognition utilizes the iris muscle to
recognition, two Iris Codes are perform verification. Retinal
compared. The amount of difference recognition uses the unique pattern of
Figure 1: Fingerprint Ridges (Dark Lines) vs. Fingerprint Valleys (White Lines)
Palm recognition technology exploits effectively search a large repository of
some of these palm features. Friction palm prints. Minutiae are limited to
ridges do not always flow continuously the location, direction, and orientation
throughout a pattern and often result in of the ridge endings and bifurcations
specific characteristics such as ending (splits) along a ridge path. The images
ridges or dividing ridges and dots. A in Figure 2 present a pictorial
palm recognition system is designed to representation of the regions of the
interpret the flow of the overall ridges palm, two types of minutiae, and
to assign a classification and then examples of other detailed
extract the minutiae detail — a subset characteristics used during the
of the total amount of information automatic classification and minutiae
available, yet enough information to extraction processes
Figure 2: Palm Print and Close-up
Hardware slow to adapt to the larger capture
areas required for digitizing palm
A variety of sensor types — capacitive,
prints. Challenges for sensors
optical, ultrasound, and thermal — can
attempting to attain high-resolution
be used for collecting the digital image
palm images are still being dealt with
of a palm surface; however, traditional
today.
live-scan methodologies have been
Speaker Recognition
Introduction shape of an individual’s vocal tract,
Speaker, or voice, recognition is a which consists of an airway and the
biometric modality that uses an soft tissue cavities from which vocal
individual’s voice for recognition sounds originate. To produce speech,
purposes. The speaker recognition these components work in combination
process relies on features influenced by with the physical movement of the jaw,
both the physical structure of an tongue, and larynx and resonances in
individual’s vocal tract and the the nasal passages. The acoustic
behavioral characteristics of the patterns of speech come from the
individual. A popular choice for physical characteristics of the airways.
remote authentication due to the Motion of the mouth and
availability of devices for collecting pronunciations are the behavioral
speech samples and its ease components of this biometric. There
of
integration, speaker recognition is are two forms of speaker recognition:
different from some other biometric text dependent (constrained mode) and
methods in that speech samples are text independent (unconstrained
captured dynamically or over a period mode). In a system using “text
of time, such as a few dependent” speech, the individual
seconds.
Analysis occurs on a model in which presents either a fixed (password) or
changes over time are monitored, prompted (“Please say the numbers
which is similar to other behavioral ‘33-54-63’”) phrase that is
biometrics such as dynamic signature, programmed into the system and can
gait, and keystroke recognition. improve performance especially with
Approach cooperative users. A “text
The physiological component of voice independent” system has no advance
recognition is related to the physical knowledge of the presenter's phrasing
and is much more flexible in situations axis and loudness on the vertical
where the individual submitting the access. The speaker recognition
sample may be unaware of the system analyzes the frequency content
collection or unwilling to cooperate, of the speech and compares
which presents a more difficult characteristics such as the quality,
challenge. Speech samples are duration, intensity dynamics, and pitch
wavefor ms with time on the horizontal of the signal.
Figure: Voice Sample: The voice input signal (top of image) shows the input loudness with
respect to the time domain. The lower image (blue) depicts the spectral information of the
voice signal. This information is plotted by displaying the time versus the frequency
variations
bank of light emitting diodes (LEDs) captured image. Next this pattern is
digitized and compressed so that it can
penetrate the skin of the back of the
be registered as a template.
Figure 1. Transmittance Images of a Hand. Figure 2. Principle of Transmittance Imaging.
Conclusion