Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

POSTER PRESENTATION ON BIOMETRICS

Presented by
K.Ganga Bhavani
B.Tech, ECE III year

DMSSVH COLLEGE OF ENGINEERING


MACHILIPATNAM

Abstract:
A wide variety of systems require reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such schemes
is to ensure that the rendered services are accessed only by a legitimate user, and not anyone
else. Examples of such applications include secure access to buildings, computer systems,
laptops, cellular phones and ATMs. In the absence of robust personal recognition schemes,
these systems are vulnerable to the wiles of an impostor. Biometric recognition, or simply
biometrics, refers to the automatic recognition of individuals based on their physiological
and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an
individuals identity based on who she is, rather than by what she possesses (e.g., an ID
card) or what she remembers (e.g., a password). In this paper, we give a brief overview of
the field of biometrics and summarize some of its advantages, disadvantages, strengths,
limitations, and related privacy concerns.
Key Words: Biometrics, Forensics, Identification, Verification, Components, Finger prints,
Iris, Voice etc.

Introduction:
Humans have used body characteristics
such as face, voice, gait, etc. for thousands
of years to recognize each other. Alphonse
Bertillon,
chief
of
the
criminal
identification division of the police
department in Paris, developed and then
practiced the idea of using a number of
body measurements to identify criminals
in the mid 19th century. Just as his idea
was gaining popularity, it was obscured by
a far more significant and practical
discovery of the distinctiveness of the
human fingerprints in the late 19th century.
Soon after this discovery, many major law
enforcement departments embraced the
idea of first booking the fingerprints of
criminals and storing it in a database
(actually, a card file). Later, the leftover
(typically,
fragmentary)
fingerprints
(commonly referred to as latents) at the
scene of crime could be lifted and
matched with fingerprints in the database
to determine the identity of the criminals.
Although biometrics emerged from its
extensive use in law enforcement to

identify criminals (e.g., illegal aliens,


security clearance for employees for
sensitive jobs, fatherhood determination,
forensics, positive identification of
convicts and prisoners), it is being
increasingly used today to establish person
recognition in a large number of civilian
applications.
What
biological
measurements qualify to be a biometric?
Any
human
physiological
and/or
behavioral characteristic can be used as a
biometric characteristic as long as it
satisfies the following requirements:

What is Biometrics?
The term "biometrics" is derived from the
Greek words bio (life) and metric (to
measure). For our use, biometrics refers
to technologies for measuring and
analyzing a person's physiological or
behavioral
characteristics.
These
characteristics are unique to individuals

hence can be used to verify or identify a


person.

How biometrics works?

Problems with current security


systems
Based on Passwords, or ID/Swipe cards

Can be Lost.
Can be forgotten.
Worse! Can be stolen and used by a
thief/intruder to access your data,
bank accounts, car etc.

Applications + Terminology
Identification: Match a persons
biometrics against a database to figure out
his identity by finding the closest match.
Commonly referred to as 1:N matching
Criminal Watch-list application scenarios

Verification: The person claims to be


John, system must match and compare
his/hers biometrics with Johns stored
Biometrics. If they match, then user is
verified or authenticated that he is indeed
John Access control application
scenarios. Typically referred as 1:1
matching.

Standards:

Help users deploy and maintain their


systems in an easier manner
Promote longevity
Enable interoperability
National and international efforts
developing for
o Technical interfaces
o Data interchange formats
o Testing and reporting
o Societal issues

Biometric components

Sensor - collects data and converts the


information to a digital format
Signal processing algorithms
perform quality control activities and
develop the biometric template
Data storage - keeps information that
new biometric templates will be
compared to
Matching algorithm - compares the new
biometric template to one or more
templates in data storage
Decision process - uses the results
from the matching component to make
a system-level decision (either
automated or human-assisted)

Biometric Modalities
Common Biometric Modalities:
Fingerprint
Face
Iris
Voice
Signature
Hand geometry
Other modalities:
Gait
Vascular
Retina
Facial Thermography

Fingerprint:

Manual fingerprint recognition studies


began in the late 1800s and early 1900s
Automated biometric identification
techniques introduced in the 1980s and
1990s
Fingerprints have uneven surface of
ridges and valleys that form a persons
unique pattern
Ridge patterns on the fingers top joint
command primary interest

Face :

No agreed-upon methods forautomated


face recognition as there arefor
fingerprints
Facial image types:
o Low resolution 2D images
o High resolution 2D and 3D
shows the
potential
to
greatly
improve
facerecognition accuracy

Iris Recognition :

Iris recognition concept dates to


1936
Major advancements began late
1980s
First algorithm patent issued 1994
for iris recognition automatically
Iris image process:
o Illuminate iris with near
infrared light
o Takes illuminated picture of
the iris without causing any
discomfort to the individual

Hand/ Finger Geometry:

Humans easily recognize familiar faces


Humans
struggle
at
recognizingunfamiliar individuals
Machine vision research began
in1960s
Use
automated
methods
for
recognizingindividuals via their facial
characteristics

One of the first successful commercial


biometric products
Verification Process:
User enters a PIN to claim an
identity
Places hand on the system, which
takes a picture of the hand
Using mirrors, picture shows
topand side hand views

Measures digits of the hand


andcompares to those collected
atenrollment

Advantages

Others

Speaker recognitionInfluenced by
physical structure of vocal tract and
behavioral characteristics
Dynamic SignatureMeasures the
speed and pressure when signing name
(not what the signature looks like)

Keystroke dynamicsMeasures the


typing patterns
Retina recognitionImages back of
the eye and compares blood vessels
with existing data
Gait/Body recognitionMeasures how
someone appears when walking

Facial ThermographyMeasures how


heat dissipates off the face

Most definitive, real-timetool available


today
Can be combined withother tools to
form moresecure, easier to use
verification solutions
Recognizes individualsdefinitively
Based
on
physiologicaland
behavioralcharacteristics

Conclusion:

As biometric technology matures,


there
will
be
an
increasing
interaction among the
market,
technology, and the applications.
This interaction will be influenced by
the added value of the technology,
user acceptance, and the credibility
of the service provider. It is too early
to predict where and how biometric
technology would evolve and get
embedded in which applications. But
it is certain that biometric-based
recognition will have a profound
influence on the way we conduct our
daily business.

References:
[1] S. Prabhakar, S. Pankanti, and A.
K. Jain, Biometric Recognition:
Security and Privacy Concerns, IEEE
Security and Privacy Magazine, Vol.
1, No. 2, pp. 33-42, 2003.
[2] A. K. Jain, R. Bolle, and S.
Pankanti
(editors),
Biometrics:
Personal Identification in Networked
Society, Kluwer Academic Publishers,
1999.
[3] S. Prabhakar and A. K. Jain,
Decision-level Fusion in Fingerprint

Verification, Pattern Recognition,


Vol. 35, No. 4, pp. 861-874, 2002.

You might also like