Sei sulla pagina 1di 10

An Abstract Report on

BIOMETRICS

Submitted by:
Mr. Arshad D. Mujawar Mr. Sagar A. Patil

Department of Information Technology Govt. College of Engineering, Karad. 2011-12

Abstract: Keywords: 1. Introduction to Biometrics 2. Interest in Biometrics 3. Verification versus Identification 4. Types of Biometrics 4. A. Physiological 4. B. Behavioral 5. Issues & concerns 6. Performance 7. Applications of Biometrics

Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.

2. Why Interest in Biometrics?


Convenient Passwords are not userfriendly Perceived as more secure May actually be more secure May be useful as a deterrent Passive identification

3. Verification versus Identification


A biometric system can operate in the following two modes. In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. This process may use a smartcard, username or ID number (e.g. PIN) to indicate which template should be used for comparison. 'Positive recognition' is a common use of verification mode, "where the aim is to prevent multiple people from using same identity". In Identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a

1. Introduction to Biometrics
Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided in two main classes:

Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odor/scent.

previously set threshold. Identification mode can be used either for 'positive recognition' (so that the user does not have to provide any information about the template to be used) or for 'negative recognition' of the person "where the system establishes whether the person is who she (implicitly or explicitly) denies to be". The latter function can only be achieved through biometrics since other methods of personal recognition such as passwords, PINs or keys are ineffective.

Fig no.1 Arch pattern

Fig no.2 Loop pattern

4. TYPES OF BIOMETRICS: 4. A. Physiological: Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odor/scent.

Fig no.3 Whorl pattern

4 .A. 1. Fingerprint Recognition:


Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.
Patterns The three basic patterns of fingerprint ridges are the arch, loop, and whorl.

Finger-scan A live acquisition of a persons fingerprint. Image Acquisition Image Processing Template Creation Template Matching Acquisition Devices: Glass plate Electronic Ultrasound

Fingerprint SWAD Strengths: Fingerprints dont change over time Widely believed fingerprints are unique

Weaknesses: Scars Attacks: Surgery to alter or remove prints Finger Decapitation Gummy fingers Corruption of the database Defenses: Measure physical properties of a live finger (pulse)

Fig no.4. Locating Image of Face Step 3: ANALYSIS OF FACIAL IMAGE -software measures face according to is peaks and valleys (nodal points) -focuses on the inner region of the face known as the golden triangle -nodal points are used to make a face print Step 4: COMPARISON -the face print created by the software is compared to all face prints the system has stored in its database. Step 5: MATCH OR NO MATCH -software decides whether or not any comparisons from step 4 are close enough to declare a possible match

4 .A. 2. Facial Recognition:


Facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a persons claimed identity. Regardless of specific method used, the facial recognition is accomplished in a five step process. FIVE STEP PROCESS : Step 1: ACQUIRING THE IMAGE OF AN INDIVIDUALS FACE 2 WAYS TO AQUIRE IMAGE 1) Digitally scan an existing photograph 2) Acquire a live picture of a subject Step 2: LOCATE IMAGE OF FACE -software is used to locate the faces in the image that has been obtained

Facial Scan Based on video Images

Captured specially for through cameras as photo proof Templates can be based on previously-recorded images Technologies: Eigen face Approach Feature Analysis (Visionics) Neural Network Facial Scan: SWAD Strengths: Database can be built from drivers license records, visas, etc. Can be applied covertly (surveillance photos). (Super Bowl 2001) Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera Defenses: Scanning stations with mandated poses

to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
Breakthrough work to create the irisrecognition algorithms required for image acquisition and one-to-many matching was pioneered in the early 2000s by John G. Daugman, Ph.D., OBE (University of Cambridge Computer Laboratory).

Fig no.5 : Iris Iris scanners use pattern-recognition techniques based on images of the irides of an individual's eyes

Iris Scan Image Acquisition Image Processing Template Creation Template Matching Uses to date: Physical access control Computer authentication

4 .A. 3.Iris Recognition:


Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes. iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea,

Iris Scan: SWAD Strengths: Safety of internal organ

Fine texture like fingerprint Medical and surgical does not change the shape Weaknesses: High quality image may fooled Discomfort of height Fear of damage of eye cost Algorithms may not work on all individuals No large databases Attacks: Surgery (Minority Report ) Defenses:

synthesis, has facilitated the construction of polyamide conjugates bearing a diverse set covalently-linked chemical species. Polyamide-linked moieties have been employed to supplement the DNA recognition profile of polyamides (intercalator conjugates), to modify their biological activities (activator peptide conjugates), and to facilitate detection of targeted DNA sequences (fluorophore conjugates). The growing utility of fluorophore-polyamide conjugates is evidenced by their use in chromosome staining and cellular localization studies. The physical properties of these conjugates often show marked variations with respect to the covalent modification strategy employed as well as the chemical nature of the fluorophore. As a result, multiple iterations of conjugate

4 .A. 4. DNA recognition


Deoxyribonucleic acid (DNA) Biometrics could be the most exact form of identifying any given individual (Baird, S., 2002). Every human being has its own individual map for every cell made, and this map, or blueprint as it more often is called, can be found in every body cell. Because DNA is the structure that defines who we are physically and intellectually, unless an individual is an identical twin, it is not likely that any other person will have the same exact set of genes. The DNA recognition properties of minor groove-binding polyamides make them logical candidates for a number of biologically relevant applications and their scope of use is further expanded by the same structural features and synthetic accessibility that allowed their development from distamycin. The modular nature of polyamide structure and function, combined with amenability to solid phase design may be required, depending on the application envisioned. DNA Identification RFLP - Restriction Fragment Length Polymorphism Widely accepted for crime scenes Twin problem

4. A. 5. Voice Recognition Biometrics


Voice Recognition Biometrics, continues to pioneer methods of speech verification that can effectively operate without the benefit of an external server or hard drive. The entire software program and templates can be operated and stored in the protected device itself. Optionally, the voice templates used for validation can be

loaded at verification time from a smartcard or stored in external RAM due to their small size. The greatest benefit of our method is that user security can be self-contained within a device. Cell Phones, ATM cards, Automobiles and Door Access are just some of the applications that are protected by our Voice Protection Technology. Other speaker verification technologies may rely on costly database management of many users templates, and in some cases risk sending the biometric data or even the voice stream itself over phone lines, air waves, or Internet lines. Our Voice Protection Technology ensures that the biometric data stays safe as the spoken phrase cannot be reconstructed from the "key" created by the user. For Internet applications, the user's "voice prints" can be contained in a single, encrypted IP packet as it is less than 1K in size. Voice: SWAD Strengths: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise (airplanes) No large database of voice samples Attacks: Tape recordings Identical twins / soundalikes Defenses:

4. B. Behavior Biometrics:
4. B. 1. Handwriting (static & dynamic) Ongoing interest in biometric security and related topics has resulted in much work on systems that exploit the individuality of human behavior. Signature verification, for example, has had a long, rich history, with hundreds of papers written on the subject. The use of signatures has some well known advantages: they are a natural and familiar way of confirming identity, have already achieved acceptance for legal purposes, and their capture is less invasive than most other biometric schemes. Still, each individual has only one true signaturea severe limitation when it comes to certain security applications. As a result, researchers have recently begun to examine using arbitrary handwritten phrases, recasting the problem as one of computing cryptographic keys or biometric
hashes.

5. Issues and concerns

Template Size
Biometric Voice Face Signature Fingerprint Hand Geometry Iris Retina Approx. Template Size 70k 80k 84 bytes 2k 500 bytes 1000 bytes 256 bytes 1.2k 9 bytes 256 bytes 512 bytes 96 bytes

Privacy and discrimination

It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented.
Danger to owners of secured items

When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access.
Cancelable biometrics

One advantage of passwords over biometrics is that they can be re-issued. If a token or a password is lost or stolen, it can be cancelled and replaced by a newer version. This is not naturally available in biometrics. If someone's face is compromised from a database, they cannot cancel or reissue it.
Soft biometrics

Soft biometrics because of their inner nature are privacy preserving. They allow describing a subject starting from his/her physical attributes. Those attributes have a low discriminating power, thus not capable of identification performance; additionally they are fully available to everyone (e.g. height, weight, gender) which makes them privacy-safe.
International trading of biometric data

Many countries, including the United States, already trade biometric data.

6. Performance:
The following are used as performance metrics for biometric systems:

False accept rate or false match rate (FAR or FMR): the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false nonmatch rate (FRR or FNMR): the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. Receiver operating characteristic or relative operating characteristic (ROC): The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false non-matches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors). equal error rate or crossover error rate (EER or CER): the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuracy of

devices with different ROC curves. In general, the device with the lowest EER is most accurate. Failure to enroll rate (FTE or FER): the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs. Failure to capture rate (FTC): Within automatic systems, the probability that the system fails to detect a biometric input when presented correctly. Template capacity: the maximum number of sets of data which can be stored in the system.

7. Applications of Biometrics:
* Biometric Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping.

*Social Security Number (SSN) in America is based on Biometrics. *Indian Government has undertaken ambitious project of UID (AADHAR) card enrolling Biometric features of every citizen in India.

* Biometric safes and biometric locks, provides security to the homeowners. * Biometric access control systems, providing strong security at entrances. * Biometric systems are also developed for securing access to pc's and providing single logon facilities.

* Wireless biometrics for high end security and providing safer transactions from wireless devices like PDA's, etc. * Applications of biometrics technology in identifying DNA patterns for identifying criminals, etc. * Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards. .. And much more!

CONCLUSION
In this abstract paper, we have presented what is Biometrics? Its importance, Types of Biometrics and brief analysis of the same, some of its applications. Biometric Studies concerned about the Various Algorithms, Databases to be managed effectively, machine trainings, accuracy and much more. We have tried to cover most of the important things from the very broad subject of Biometrics.

Potrebbero piacerti anche