Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SCHOOL
NOIDA
Assignment on:
Biometrics
Submitted to:
Mr. Gaurav Chandiok
S
ubmitted By:-
ALOK
(A16)
ABHIJEE
T (A 32)
Acknowledgement:
We, Alok and Abhijeet certify that we have made the project
on the topic “ Biometric “ on my own and by taking help from
the internet and books. I am thankful to my class teacher Mr
Gaurav Chandiok who encourages me to choose this topic. I have
tried my best to
GENERAL INTRODUCTION :
As we rapidly move towards the new millennium, Security and
access Control are becoming more important than ever before. Passwords,
though still extensively used, are fast becoming a hazard, requiring an
enhanced method of security. Positive Identification of individuals is now a
serious business considering the fact that people have to be allowed access
to areas only if they are authorized. Attendance is to be recorded in all
kinds of workplaces eliminating “buddy Punching” and “ghost workers”.
Money is to paid over “wires” - the internet obviating the need for people to
go to banks. Criminals have to be caught and proven guilty without a doubt
social and medical benefits have to be paid by the state. Newer chip
designs and supporting software, has spurred the development of solutions
based on these crucial needs beyond boundaries.
Parts of the human body - the hand, the iris/retina, the face and the
voice, all provide a means of positive verification. Commendable progress
has been made by various companies using the above parts of the human
body with various levels of success.
Although Card Based systems have been in the market for several
years now, the latest and most secure technology involves the use of the
human body - both physical and behavioral - for positive verification and
identification - known as Biometrics.
INTRODUCTION TO BIOMETRICS:
TYPES OF BIOMETRICS :
• Physical biometrics are the eye (iris and retina), face, finger
image, hand and voice (see authentication methods).
Stage 1 (lowest level of security) — something you have, such as photo id.
HOW IT WORKS:
If not, the system will not record a match and will not identify the
end user. This use of a threshold gives biometric technologies a significant
advantage over passwords, pins and id badges.
enrollment.
2. Extraction — unique data is extracted from the sample and a
template is created.
3. Comparison — the template is then compared with a new sample.
AUTHENTICATION METHODS:
Fingerprint ….
Iris patterns ….
The advantage of iris scanners is that they do not require the user to focus
on a target, because the pattern of flecks on the iris are on the eye's surface. In
fact, a video image of the eye can be taken from up to three feet away, which
allows for the use of iris scanners at ATM machines. In visually impaired persons
with intact irises, the iris can still be captured and encoded with iris imaging
products that have active iris capture (e.g., the ATM application). Since cataracts
are a malady of the lens, which is behind the iris, cataracts do not affect iris
scanning in any way.
Retinal patterns …
Voice patterns …
Facial features…
Keystroke dynamics…
Keystroke dynamics, also called typing rhythms, analyze the way a user
types at a terminal by monitoring keyboard input 1,000 times a second. This is
analogous to the early days of the telegraph, when users identified each other by
"the fist of the sender." the advantage in the computer environment is that
neither enrollment nor verification detracts from the regular work flow. Despite its
appeal, however, efforts at commercial technology have failed.
Signatures…
Voice recognition…
Voice recognition:
But the advantages don't stop with simply converting your voice
into printed words … MD Dictate also has the ability to create an unlimited
number of customized templates and macros. Many health care providers
have some form of common or repetitive documentation. An MD Dictate
template allows physicians to simply "talk" their way through that
repetitive documentation, changing only the patient variables. With MD
Dictate templates, a five-minute dictation can be reduced to 5 seconds. MD
Dictate macros are used where large blocks of text are employed to
describe a patient's "normal" condition. By identifying each ofthese normal
macros with a specific phrase, reams of supporting documentation can be
added to a patient's file with a single spoken word.
Face Recognition:
Technology:
Just as with finger scan and voice scan biometrics, there are various
methods by which facial scan technology recognizes people. All share certain
commonalities, such as emphasizing those sections of the face which are less
susceptible to alteration, including the upper outlines of the eye sockets, the areas
surrounding one's cheekbones, and the sides of the mouth. Most technologies are
resistant to moderate changes in hairstyle, as they do not utilize areas of the face
located near the hairline. All of the primary technologies are designed to be robust
enough to conduct 1-to-many searches, that is, to locate a single face out of a
database of thousands, even hundreds of thousands, of faces.
Hardware Requirements:
PIN, stands or sits in front of the camera for a few seconds, and is either verified or
rejected. This comparison is based on the similarity of the newly created, "live"
template against the template or templates on file. The degree of similarity
required for verification, also known as the threshold, can be adjusted for different
personnel, PC's, time of day, and other factors.
One variant of this process is the use of facial scan technology in forensics.
Biometric templates taken from static photographs (mug shots) of known
criminals are stored in large databases. These records are searched, 1-to-many, to
determine if the detainee is using an alias when being booked.
Verification vs. Identification
The system designs for facial scan verification vs. identification differ in a
number of ways. The primary difference is that identification does not require a
claimed identity. Instead of employing a PIN or user name, then delivering
confirmation or denial of the claim, identification systems attempt to answer the
question "Who am I?" If there are only a handful of enrollees in the database, this
requirement is not terribly demanding; as databases grow very large, into the tens
and hundreds of thousands, this task becomes much more difficult. The system
may only be able to narrow the database to a number of likely candidates, then
require human intervention at the final verification stages.
A second variable in identification is the dynamic between the target subjects and
capture device. In verification, one assumes a cooperative audience, one
comprised of subjects who are motivated to use the system correctly. Facial scan
systems, depending on the
Cost Effective Pure software that uses low cost, off-the-shelf hardware.
High User
Non-invasive, simple and hands-free.
Acceptance
Human-Readable
Keeps a time/date stamped facial image of every event.
Audit Trail
Uses Existing Can work from existing images, does not require new
Databases enrollment.
. eigenfaces
. feature analysis
. neural network
Some types of facial scan technology are more suitable than others for
applications such as forensics, network access, and surveillance."Eigenface,"
roughly translated as "one's own face," is a technology patented at MIT which
utilizes two dimensional, global grayscale images representing distinctive
characteristics of a facial image. Variations of Eigen face are frequently used as
the basis of other face recognition methods.
As suggested by the graphic, distinctive characteristics of the
entire face are highlighted for use in future authentication. The vast
majority of faces can be reconstructed by combining features of
approximately 100-125 eigenfaces. Upon enrollment, the subject's
eigenface is mapped to a series of numbers (coefficients). For 1-to-1
authentication, in which the image is being used to verify a claimed
identity, one's "live" template is compared against the enrolled template to
determine coefficient variation. The degree of variance from the template,
of course, will determine acceptance or rejection. For 1-to-many
identification, the same principle applies, but with a much larger
comparison set. Like all facial recognition technology, eigenface technology
is best utilized in well-lit, frontal image capture situations.
Feature analysis is perhaps the most widely utilized facial recognition
technology. This technology is related to Eigenface, but is more capable of
accommodating changes in appearance or facial aspect (smiling vs. frowning, for
example). Visionics, a prominent facial recognition company, uses Local Feature
Analysis (LFA), which can be summarized as an "irreducible set of building
elements." LFA utilizes dozens of features from different regions of the face, and
also incorporates the relative location of these features. The extracted (very
small) features are building blocks, and both the type of blocks and their
arrangement are used to identify/verify. It anticipates that the slight movement of
a feature located near one's mouth will be accompanied by relatively similar
movement of adjacent features. Since feature analysis is not a global
representation of the face, it can accommodate angles up to approximately 25° in
the horizontal plane, and approximately 15° in the vertical plane. Of course, a
straight-ahead video image from
a distance of three feet will be the most accurate. Feature analysis is robust
enough to perform 1-1 or 1-many searches.
Applications:
Limited size storage devices: Face recognition system can compress a face
print to as low as 84 bytes for use in smart cards, bar codes and other limited size
storage devices.
This is possible because in most countries the so-called breeder documents such
as birth certificates are very easy to fake. (In the US alone, there are nearly
10,000 different forms of acceptable birth certificates.) Databases may contain
facial photographs - the information required to prevent duplication. However, in
practice, it is impossible for a human to search over millions of photos to find
those duplicates.
Criminal Investigation:
Often times, law enforcement officials have no more than a facial image to
link a suspect to a particular crime or previous event. Up to now, database
searches were limited to textual entries (i.e., name, social security number, birth
date, etc.) leaving room for error and oversight. By conducting searches against
facial images, face recognition systems yields instant results, verifying the identity
of a suspect instantly and checking through millions of records for possible
matches quickly, automatically and reliably. No other technology gives law
enforcement the ability to identify suspects without their active participation. No
other technology is as widely used by local law enforcement and in secure internet
booking systems.
Online authentication:
Our service provides the most secure and easiest-to-use method to verify
user IDs with the least amount of capital outlay, integration effort, administration,
maintenance and risk. Applications include:
How can hospitals be sure that only authorized people can access patient records
or prescribe drugs online? Passwords alone are inadequate.
Online learning and testing is growing quickly. Using passwords to determine the
identity of the user will not prevent someone else from taking the test.
The papillary ridge area is sometimes referred to as the pattern area. Each
papillary ridge pattern produces a different pattern area shape.
The center of the finger image, reflecting the pattern area; is referred to as the
core point. This allows for registering the image to compensate for aspect changes
caused by uncooperative users giving side images for example.
The two parallel inner ridges that diverge to surround the pattern area are
called type lines. They may not be continuous and due to the limitation of some
sensors, they also may appear fragmented.
The point of initial bifurcation, or other anatomic feature at the point of
divergence of two type lines, is called the delta. Usually it is placed directly in
front of the type line bifurcation.
Now by drawing a line from the delta to the core point, the number of ridge
intersections within the pattern area gives a ridge count.
Computer tomography can augment the above with the following either
relative to above mentioned points or independently in x-y space.
The distance between ridge lines and anatomic feature give a length to
the vector produced by orientating the anatomic characteristics. this is
dependent on the sensor reproducing repeatable results independent of
pressure spread or melting of the ridgelines.
The resultant orientation and vectors can be overlaid in x-y to give a
template.
ADVANTAGES: