Sei sulla pagina 1di 24

A seminar report on Biometrics

Submitted by: Upanshu Agrawal DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE
It is certified that the seminar work entitled BIOMETRICS is a bonafide work presented by Upanshu Agrawal in a partial fulfillment for the award of degree of Bachelor of Engineering in Computer Science and Engineering of the GLNAIT, Mathura during the year 2011-12. The seminar report has been approved as it satisfies the academic requirements with respect to seminar work presented for the Bachelor of Engineering Degree.

Mr. Abu Salim P.C. (CSE Deptt.)

Miss Tumpa Roy Seminar Guide CSE Deptt.

Name:- Upanshu Agrawal CSE-III GLNAIT

ACKNOWLEDGEMENT
I thank my seminar guide Miss Tumpa Roy for giving me an opportunity to learn and present the seminar. I am indebted to Mr. P.C. Abu Salim, and Mr. Shabir Ali, lecturer CSE Deptt. & other faculty members for their proper guidance and valuable suggestions. If not for the above mentioned people my seminar would never have been completed successfully. I once again extend my sincere thanks to all of them.

Upanshu Agrawal

ABSTRACT
Over the last few years a new area of engineering science has been established whose products are likely to create a large market in the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his/her ''biological'' characteristics: voice, dynamics of movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to distinctly identify each person Biometric system is essentially a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Several important issues must be considered in designing a practical biometric system. First, a user must be enrolled in the system so that his biometric template can be captured. This template is securely stored in a central database or a smart card issued to the user. The template is retrieved when an individual needs to be identified. Depending on the context, a biometric system can operate either in verification (authentication) or an identification mode.

Index
CHAPTERS PAGE. No. 1. INTRODUCTION.06 2. WHAT IS BIOMETRICS?.....................................................................06 3. HISTORY OF BIOMETRICS.....07 3.1 Chinese Precursor..07 3.2 European Origins......07 3.3Modern Times...07 4.WORKING PRINCIPLE OF BIOMETRICS .08 4.1 Enrollment Mode.08 4.2Verification Mode.. 09 5. TYPES OF BIOMETRICS 09 5.1 Physical biometrics 09 5.2 Behavioral biometrics.. 09 6. CHARACTERISTICS OF BIOMETRICS.. 09 7. BASIC MECHANISM10 7.1 BIOMETRICS COLLECTION.. 11 7.2 BIOMETRIC TEMPLATES.. 11 8. BIOMETRICS IDENTIFICATION SCHEMES..11 8.1 Fingerprint. 12 8.2 Face..13 8.3 Hand Geometry14 8.4 Speaker/voice...14 8.5 Iris.15 8.6 SIGNATURE VERIFICATION.16 9. IRIS Recognition Technology16 9.1 History of iris recognition technology16 9.2 Physiological Properties of Iris..18 9.3 Working Principle Of Iris Recognition Technology..18 10. BIOMETRIC SECURITY..20 10.1 Sociological concerns.20 10.2 Danger to owners of secured items...20 10.3 Cancelable Biometrics21 11. BIOMETRIC APPLICATIONS.. 21 12.BIOMETRICS DEVICES21 13.ADVANTAGES/DISVANTAGES..23 14.REFERENCES.. 24

1. INTRODUCTION
Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.

2. What is Biometrics? Definition:


"Biometrics is the automated identification, or verification of human identity through the measurement of repeatable physiological ,or behavioral characteristics

Identification:
A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold.

Verification:
It refers to the 'one to one' comparison between a sample and another to ask the question, 'are you who you say you are . The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics, such as fingerprints, irises, voice patterns, facial patterns ,and hand measurements, for identification and verification purposes.

fig-explain defination

Identification and verification have long been accomplished by showing something you have, such as a license or a passport. Sometimes it also required something you know, such as a password or a PIN. As we move into a time when we need more secure and accurate measures, we begin to look at using something you are: biometrics. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

3. History of BIOMETRICS 3.1 Chinese Precursor:


Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children's palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today.

3.2 European Origins:


Until the late 1800s, identification largely relied upon "photographic memory." In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed a method of multiple body measurements which got named after him (Bertillon age). His system was used by police authorities through out the world, until it quickly faded when it was discovered that some people shared the same measurements and based on the measurements alone, two people could get treated as one. After the failure of Bertillon age, the police started using finger printing, which was developed by Richard Edward Henry of Scotland Yard, essentially reverting to the same methods used by the Chinese for years.

3.3 Modern Times:


In the past three decades biometrics has moved from a single method (fingerprinting) to more than ten discreet methods. Companies involved with new

methods number in the hundreds and continue to improve their methods as the technology available to them advances. Prices for the hardware required continue to fall making systems more feasible for low and mid-level budgets. As the industry grows however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the breadth of use of fingerprinting, some are beginning to be used in both legal and busine

4. WORKING PRINCIPLE OF BIOMETRICS


Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. All Biometric authentications require comparing a registered or enrolled biometric sample (biometric template or identifier) against a newly captured biometric sample (for example, a fingerprint captured during a login).

Figure 2 Enrollment and Verification Technique

4.1 Enrollment Mode:


A sample of the biometric trait is captured, processed by a computer, and stored for later comparison. Biometric recognition can be used in Identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match based solely on the biometric. For example, an entire database can be searched to verify a

person has not applied for entitlement benefits under two different names. This is sometimes called one-to-many matching.

4.2Verification Mode:
In this mode biometric system authenticates a persons claimed identity from their previously enrolled pattern. This is also called one-to-one matching. In most computer access or network access environments, verification mode would be used. A user enters an account, user name, or inserts a token such as a smart card, but instead of entering a password, a simple glance at a camera is enough to authenticate the user.

5. TYPES OF BIOMETRICS
There are two types of biometrics: behavioral and physical. Behavioral biometrics - Used for verification. Physical biometrics - Used for either identification or verification.

5.1 Physical biometrics:


Fingerprint - Analyzing fingertip patterns. Facial Recognition- Measuring facial characteristics. Hand Geometry- Measuring the shape of the hand. Iris recognition- Analyzing features of colored ring of the eye.

5.2 Behavioral biometrics:


Speaker Recognition - Analyzing vocal behavior. Signature - Analyzing signature dynamics. Keystroke- Measuring the time spacing of typed words.

6.CHARACTERISTICS OF BIOMETRICS
Biometric characteristics can be divided in two main classes, as represented in figure on the right:

Physiological are related to the shape of the body. The oldest traits that have been used for more than 100 years are fingerprints. Other Examples are face recognition, hand geometry and iris recognition. Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.

7. BASIC MECHANISM
The diagram shows a simple block diagram of a biometric system. When such a system is networked together with telecommunications technology, biometric systems become tale-biometric systems. The main operations a system can perform are enrollment andtest. During The Enrollment, Biometric Information From An Indivi dual Is Stored. During The Test, Biometric Information Is Detected And Compared With The Stored information. Note That It Is Crucial That Storage And Retrieval Of Such systems Themselves Be Secure If The Biometric System Is Be Robust. The First Block (Sensor) Is The Interface Between The Real World And Our System; It has to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalization, etc. In the third block features needed are extracted. This step is an important step as the correct features need to be extracted and the optimal way. A vector of numbers or an image with particular

10

properties is used to create a template. A template is a synthesis of all the characteristics extracted from the source, in the optimal size to allow for adequate identifiability.

7.1 BIOMETRICS COLLECTION


Biometrics are typically collected using a device called a sensor. The suspensors are used to acquire the data needed for recognition and to convert the data to a digital form. The quality of the sensor used has a significant impact on the recognition results. Example sensors could be digital cameras (for face recognition)or a telephone (for voice recognition)

7.2 BIOMETRIC TEMPLATES


A biometric template is a digital representation of an individuals distinct characteristics, representing information extracted from a biometric sample. Biometric templates are what are actually compared in a biometric recognition system. Templates can vary between biometric modalities as well as vendors. Not all biometric devices are template based. For example, voice recognition is based on models. The difference between templates and models is beyond the scope of this paper

8. BIOMETRICS IDENTIFICATION SCHEMES:


There are several types of biometric identification schemes: Face : the analysis of facial characteristics Fingerprint : the analysis of an individuals unique fingerprints Hand geometry: the analysis of the shape of the hand and the length of the

11

fingers Retina: the analysis of the capillary vessels located at the back of the eye Iris: the analysis of the colored ring that surrounds the eyes pupil Signature: the analysis of the way a person signs his name. Vein: the analysis of pattern of veins in the back if the hand and the wrist Voice: the analysis of the tone, pitch, cadence and frequency of a persons voice.

8.1 Fingerprint
The patterns of friction ridges and valleys on an individual's fingertips are unique to that individual. For decades, law enforcement has been classifying and determining identity by matching key points of ridge endings and bifurcations. Fingerprints are unique for each finger of a person including identical twins. One of the most commercially available biometric technologies, fingerprint recognition devices for desktop and laptop access are now widely available from many different vendors at a low cost. With these devices, users no longer need to type passwords - instead, only a touch provides instant access. Fingerprint systems can also be used in identification mode. Several states check fingerprints for new applicants to social services benefits to ensure recipients do not fraudulently obtain benefits under fake names. New York State has over 900,000 people enrolled in such a system.

Advantages:
Subjects have multiple fingers. Easy to use, with some training Some systems require little space. Large amounts of existing data to allow background and/or watch list checks. Has proven effective in many large scale systems over years of use. Fingerprints are unique to each finger of each individual and the ridge arrangement remains permanent during one's lifetime.

Disadvantages:
Public Perceptions. Privacy concerns of criminal implications. Health or societal concerns with touching a sensor used by countless individuals.

12

8.2 Face
The identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visible spectrum using an inexpensive camera or by using the infrared patterns of facial heat emission. Facial recognition invisible light typically model key features from the central portion of a facial image. Using a wide assortment of cameras, the visible light systems extract features from the captured image(s) that do not change over time while avoiding superficial features such as facial expressions or hair. Several approaches to modeling facial images in the visible spectrum are Principal Component Analysis, Local Feature Analysis, neural networks, elastic graph theory, and multi-resolution analysis. Some of the challenges of facial recognition in the visual spectrum include reducing the impact of variable lighting and detecting a mask or photograph. Some facial recognition systems may require a stationary or posed user in order to capture the image, though many systems use a real-time process to detect a person's head and locate the face automatically. Major benefits of facial recognition are that it is non-intrusive, hands-free, continuous and accepted by most users.

Advantages:
No contact required. Commonly available sensors (cameras). Large amounts of existing data to allow background and/or watch list checks. Easy for humans to verify results.

Disadvantages:
Face can be obstructed by hair, glasses, hats, scarves etc. Sensitive to changes in lighting, expression, and poses faces changeover time. Propensity for users to provide poor-quality video images yet to expect accurate results.

13

8.3 Hand Geometry


These methods of personal authentication are well established. Hand recognition has been available for over twenty years. To achieve personal authentication, a system may measure either physical characteristics of the fingers or the hands. These include length, width, thickness and surface area of the hand. One interesting characteristic is that some systems require a small biometric sample (a few bytes). Hand geometry has gained acceptance in a range of applications. It can frequently be found in physical access control in commercial and residential applications, in time and attendance systems and in general personal authentication applications

Advantages
Easy to capture. Believed to be a highly stable pattern over the adult lifespan.

Disadvantages
Use requires some training. Not sufficiently distinctive for identification over large Databases. Usually used for verification of a claimed enrollment identity. System requires a large amount of physical space.

8.4 Speaker/voice
Speaker recognition has a history dating back some four decades, where the output of several analog filters were averaged over time for matching. Speaker recognition uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style). This incorporation of learned patterns into the voice templates (the latter called "voiceprints") has earned speaker recognition its classification as a "behavioral biometric. "Speaker recognition systems employ three styles of spoken input: textdependent, text-prompted and text independent. Most speaker verification applications use text-dependent input, which involves selection and

14

enrollment of one or more voice passwords. Text-prompted input is used whenever there is concern of imposters. The various technologies used to process and store voiceprints includes hidden Markov models, pattern matching algorithms, neural networks, matrix representation and decision trees. Some systems also use "anti-speaker" techniques, such as cohort models, and world models. Ambient noise levels can impede both collection of the initial and subsequent voice samples. Performance degradation can result from changes in behavioral attributes of the voice and from enrollment using one telephone and verification on another telephone. Voice changes due to aging also need to be addressed by recognition systems. Many companies market speaker recognition engines, often as part of large voice processing, control and switching systems. Capture of the biometric is seen as non-invasive. The technology needs little additional hardware by using existing micro phones and voice-transmission technology allowing recognition over long distances via ordinary telephones (wire line or wireless).

Advantages
Public Acceptance. No Contact Required. Commonly Available Sensors(telephones & microphones).

Disadvantages
Difficult to control sensor and channel variances that significantly impact capabilities. Not sufficiently distinctive for identification over large databases.

8.5 Iris
This recognition method uses the iris of the eye which is the colored area that surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a video-based image acquisition system. Iris scanning devices have been used in personal authentication applications for several years. Systems based on iris recognition have substantially decreased in price and this trend is expected to continue. The technology works well in both verification and identification modes (in systems performing one-to-many searches in a database). Current systems can be used even in the presence of eyeglasses and contact lenses. The technology is not intrusive. It does not require physical contact

15

with a scanner. Iris recognition has been demonstrated to work with individuals from different ethnic groups and nationalities

Advantages
No contact Required. Protected internal organ, less prone to injury. Believed to be highly stable over lifetime.

Disadvantages
Difficult to capture for some individuals. Easily obscured by eyelashes, eyelids, lens and reflections from the cornea. Public myths and fears related to scanning the eye with a light source. Acquisition of an iris image requires more training and attentiveness than most biometrics. Lack of existing data deters ability to use for background or watch list checks. Cannot be verified by a human.

8.6 SIGNATURE VERIFICATION


This technology uses the dynamic analysis of a signature to authenticate a person. The technology is based on measuring speed, pressure and angle used by the person when a signature is produced. One focus for this technology has been ebusiness applications and other applications where signature is anaccepted method of personal authentication.

9. IRIS Recognition Technology 9.1 History of iris recognition technology


The idea of using iris patterns for personal identification was originally documented in an ophthalmology textbook by James Doggarts in 1949, and may have been proposed as early as 1936 by ophthalmologist Frank Burch. By the 1980's the idea had appeared in James Bond films, but it still remained science fiction and conjecture 1987 two other ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and in 1989 they asked John Daugman (then

16

teaching at Harvard University) to try to create actual algorithms for iris recognition. These algorithms, which Daugman patented in 1994, are the basis for all current iris recognition systems and products. The Daugman algorithms are owned by Iridian Technologies, and the process is li censed to several other companies who serve as systems integrators and developers of special platforms exploiting iris recognition. Iris structure

The iris is a protected internal organ of the eye, located behind the cornea and the aqueous humor, but in front of the lens. The false acceptance rate for iris recognition systems is in 1 in 1.2 million, that is every 1 in 1.2million iris is found to be unique in its features. It is seen in cross-section in the anatomical drawing above. It is the only internal organ of the body that is normally visible externally. Images of the iris adequate for personal identification with very high confidence can be acquired from distances of up to about 3 feet (1 meter).Among the visible features of an iris are the trabecular mesh works of connective tissue (pectinate ligament), the collagenous tissue of the stroma, ciliarys processes, contraction furrows, crypts, rings, a corona and pupillary frill, colouration, and sometimes freckles. The striated anterior layer covering the trabecular meshwork creates the predominant texture seen with visible light The human iris begins to form during the third month of gestation. The structures creating its distinctive pattern are complete by the eighth month of gestation, but pigmentation continues into the first years after birth. The layers of the iris have both ectodermal and mesodermal embryological origin, consisting of (from back to front): a darkly pigmented epithelium; pupillary dilator and sphincter muscles; heavily vascularized stroma(connective tissue of interlacing ligaments containing melanocytes); and ananterior layer of chromataphores and melanocytes with a genetically determined density of melanin pigment granules.

17

The combined effect is a visible pattern displaying various distinctive features such as arching ligaments, crypts, furrows, ridges, and a zigzag collarette. Iris colour is determined mainly by the density of the stroma and its melanin content, with blue irises resulting from an absence of pigment:longer wavelengths differentially penetrate while shorter wavelengths are reflected and scattered, a phenomenon resembling that which makes the sky blue.

9.2 Physiological Properties of Iris


Further properties of the iris that enhance its suitability for use in high confidence identification systems include: Its inherent isolation and protection from the external environment. The impossibility of surgically modifying iris without unacceptable risk to vision. Its physiological response to light, which provides one of several natural tests against artifice. A property the iris shares with fingerprints is the random morphogenesis of its minutiae. Because there is no genetic penetrance in the expression of this organ beyond its anatomical form, physiology, color and general appearance, the iris texture itself is stochastic or possibly chaotic. Its detailed morphogenesis depends on initial conditions in thee mbryonic mesoderm from which it develops, the phenotypic expression even of two irises with the same genetic genotype (as in identical twins, or the pair possessed by one individual) have uncorrelated minutiae . The ease of registering iris image at some distance from a Subject without physical contact, unintrusively and perhaps inconspicuously Its intrinsic polar geometry, which imparts a natural coordinate system and an origin of coordinates. The high level of randomness in iris pattern, creating inter-Subject variability spanning about 250 degrees-of-freedom, and an entropy(information density) of about 3.2 bits per square-millimeter of iris tissue.

9.3 Working Principle Of Iris Recognition Technology

18

The iris -scan process begins with a photograph. A specialized camera, typically very close to the subject, no more than three feet, uses an infrared imager to illuminate the eye and capture a very high-resolution photograph

Figure 4 Iris Image After Image Acquisition Process This process takes only one to two seconds and provides the details of the iris that are mapped, recorded and stored for future matching/verification .The inner edge of the iris is located by an iris-scan algorithm, which maps the iris distinct patterns and characteristics. An algorithm is a series of directives that tell a biometric system how to interpret a specific problem. Algorithms have a number of steps and are used by the biometric system to determine if a biometric sample and record is a match A general iris recognition system for personal identification is composed of four steps i) Iris Image Acquisitionan image containing the users eye is captured by the high resolution Iris Camera. ii)Image Preprocessing the image is then preprocessed to normalize the scale and illumination of the iris and localize the iris from the acquired image. iii)Feature Extractionfeatures representing the iris patterns are extracted. iv)Pattern Matching- decision is made by means of matching. i) Iris Image Acquisition An important and difficult step of an iris recognition system is image acquisition. Since iris is small in size and dark in color, using some specialized camera iris image can be easily acquired for analysis ii)Image Preprocessing The acquired image always contains not only the useful parts (iris) but also some irrelevant parts (e.g. eyelid, pupil etc.). Under some conditions, the brightness is not uniformly distributed. In addition,

19

different eye-to camera distance may result in different image sizes of the same eye. For the p u r po s e o f a na l y s i s , th e o r i g i na l i ma g e ne ed s t o be pr ep r o ces s ed. T h e preprocessing is composed of three steps Iris Localization. Iris Normalization. Image Enhancement.

10. BIOMETRIC SECURITY


A concern is how a person's biometric, once collected, can be protected. Australia has therefore introduced a Biometrics Institute Privacy Code Biometrics Institute in order to protect consumer personal data beyond the current protections offered by the Australian Privacy Act.

10.1 Sociological concerns


As technology advances, and time goes on, more private companies and public utilities may use biometrics for safe, accurate identification. These advances are likely to raise concerns such as:

Physical- Some believe this technology can cause physical harm to an


individual using the methods, or that instruments used are unsanitary. For example, there are concerns that retina scanners might not always be clean.

Personal Information- There are concerns whether our personal


information taken through biometric methods can be misused, tampered with, or sold, e.g. by criminals stealing, rearranging or copying the biometric data. Also, the data obtained using biometric scan be used in unauthorized ways without the individual's consent.

10.2 Danger to owners of secured items


When thieves cannot get access to secure properties, there is a chance thereof secured items the thieves will stalk and assault the property owner to gain access. If the item is secured with a biometric device, the damage to the owner could be irreversible, and potentially cost more than the secured property. In 2005,

20

Malaysian car thieves cut off the finger of a Mercedes-Benz S-Class owner when attempting to steal the car.

10.3 Cancelable Biometrics


Physical features, such as face, fingerprint, iris, retina, hand, or behavioral features, such as signature, voice, gait, must fulfill a certain criteria to qualify for use in recognition. They must be unique, universal, acceptable, collectable and convenient to the person, in addition, to reliability at recognition, performance and circumvention. However, most importantly, permanence is a key feature for biometrics. They must retain all the above features in particular the uniqueness unchanged, or acceptably changed, over the lifetime of the individual. On the other hand, this fundamental feature has brought biometrics to challenge a new risk. If biometric data is obtained, for example compromised from a database, by unauthorized users, the genuine owner will lose control over them forever and lose his/her identity.

11. BIOMETRIC APPLICATIONS


Biometric Time Clocks-Which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks- Provides security to the home owners. Biometric access control systems - Providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Wireless biometrics - for high end security and providing safer transactions from wireless devices like PDA's, etc. Identifying DNA Patterns - of biometrics technology in identifying DNA patterns for identifying criminals, etc. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.

12.BIOMETRICS DEVICES

21

Optical Fingerprint Scanner


Our biometric hamster is the next generation model of popular and versatile biometric fingerprint readers. Packaged in a comfortable, ergonomic design, this biometric scanner features the industry's most rugged and advanced optical sensor using patented SEIR fingerprint biometric technology

OptiMouse
OptiMouse is an innovative optical tracking mouse that can operate on almost any surface with exceptional response, it features the industry's most rugged and advanced optical sensor using patented SEIR fingerprint biometric technology.

iGuard - Integrated Access Control and Time Attendance System


iGuard is a complete solution combining a access control system and time attendance system. It utilizes patented embedded web server technology combined with biometrics and smart card authentication. This is the world's only available system that has achieved advanced operability using world-renowned TCP/IP networking protocol without having to compromise on security.

22

Personal Fingerprint Safes


Biometric personal safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as "accessdenial" secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items.

Biometric Fingerprint Door Locks


Your fingerprint is the key with our revolutionary fingerprint door lock. This amazing new product replaces keyed locking mechanisms with a fingerprint sensor that actually recognizes who is and who is not authorized to enter.

13.ADVANTAGES/DISADVANTAGE OF BIOMETRICS ADVANTAGES


No need to remember passwords or carry tokens Biometrics cannot be lost, stolen or forgotten More secure than a long password Solves repudiation problem Not susceptible to traditional dictionary attacks Only authorized users should have access to data and services. Biometrics provide an unobtrusive and convenient authentication mechanism.

DISADVANTAGES
The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger

23

print mode of authentication. It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time. For people affected with diabetes, the eyes get affected resulting in differences.

14. REFERENCES
http://www.biometrics.org/ Wikipedia.org www.scribd.com http://www.nist.gov/

24

Potrebbero piacerti anche