Professional Documents
Culture Documents
Report
Report
Report
1. INTRODUCTION 1
2. ORIGIN OF BIOMETRICS 2
3. TYPOLOGY IN BIOMETRICS 3
4. GENERIC MODEL OF BIOMETRICS 4
4.1 Data Collection
4.2 Transmission
4.3 Signal Processing
4.4 Decision Making
4.5 Data Storage
5. PHASES IN BIOMETRICS 6
5.1 Input
5.2 Process
5.3 Output
6. VARIOUS BIOMETRIC SYSTEMS 8
6.1 Hand
6.2 Fingerprint
6.3 Face
6.4 Eye
6.4.1 Retina
6.4.2 Iris
6.5 Speech
6.6 Speaker Verification
7. COMPARISION OF BIOMETRIC TECHNIQUES
16
7.1 Uniqueness of Biometric Features
8. HOW WELL DOES BIOMETRICS WORK
18
8.1 False Acceptance Rate (FAR)
8.2 False Reject Rate (FRR)
8.3 Equal Error Rates
8.4 Validity of Test
9. ABOUT BIOMETRICS
20
9.1 Will Biometrics Solve All Security Concerns?
9.2 Which Is the Best Technique Among Above?
9.3 Is Biometrics More secure Than Passwords?
9.4 Where Biometrics Is Used
9.5 Near Future Technologies
9.6 Benefits of Adopting Biometrics
10. MULTI-BIOMETRICS
22
10.1 Integrating Faces and Fingerprints for Personal Identification
2
10.2 A Multimodal Biometric System Using Fingerprint, Face and
Speech
11. CONCLUSION
24
2
INTRODUCTION
2
ORIGIN OF BIOMETRICS
2
TYPOLOPY OF BIOMETRICS
A behavioural tract, on the other hand, has some physiological basis, but
also reflects person’s physiological makeup. The most common trait used
in identification is a person’s signature. Other behaviours used include a
person’s keyboard typing and speech patterns. Because of most
behavioural characteristics change over time, many biometrics machines
not rely on behaviour. It is required to update their enrolled reference
template may differ significantly from the original data, and the machine
become more proficient at identifying the person. Behavioural biometrics
work best with regular use.
2
2
GENERIC MODEL OF BIOMETRICS
2
4.2 Transmission: -
Not all the biometric systems process and store data on the measuring
device. Often measurement is made using relatively simple device to a
computer or server for processing and/or storage. Depending on the
system, the data may be relatively large and thus would need to be
compressed for quick transfer. The compression algorithm needs to be
selected carefully; otherwise it may introduce some artefacts that could
impact the decision process. In any image scanning Biometric system,
JPEG compression is preferred due to the block ness it produces at high
compression ratios. The data can also be transmitted to the database for
storage as raw data.
2
PHASES OF BIOMETICS
5.1 Input: -
Using appropriate input device it will collect the data of the person’s
biological features. These features are known as the master key for the
computer.
Let us put in a simple manner.
For recording and converting biometric traits to usable computer data,
one needs
an appropriate sensor (see table). Of course, costs can greatly vary for
different
sensors. However, we can't forget that many technical devices already
have
sensors built in, and therefore, offer possibilities to measure biometric
features
nearly free of cost.
5.2 Process: -
2
The input data is processed. Here, computer takes the measurement of
inputted Biological features. No two persons have same finger print. So,
computer joins the points of that finger print features and make the
pattern of it and it will store that pattern into its memory. Then computer
compares this pattern against the master keys.
5.3 Output: -
In this phase the processed data is tested and access rights are given to
the user accordingly. Here, when any person scanned his/her finger print,
the computer will store a Bio-logical featured pattern and compares it
against the stored master-Key in its memory. If it is matched, then
permission granted else not.
2
VARIOUS BIOMETRIC SYSTEMS
6.1 HAND: -
The three dimensional shape of a person’s hand has several advantages
as an Identification device. Scanning a hand and producing a result takes
1.2 seconds. It requires little space for data storage about 9 bytes which
can fit easily magnetic strip credit cards.
2
time, in case the original template was made under less than perfect
conditions.
There are so many other systems for hand recognition. One was an effort
by SRI international, to take pictures of unconstrained hands help in free
space. This system was introduced in 1985. Biometrics Inc., Tokyo’s
Toshiba Corp. Identification corp. etc are some companies which
developed biometrics systems.
2
between minutiae to form the reference template. Several companies
claim to be developing templates of under 100 bytes. Other machine
approach the finger as an image processing problem and applying
custom very large scale integrated chips, neural networks, fuzzy logic
and other technologies to the matching problem.
The Identix system uses a compact terminal that incorporates light and
CCD image sensors to take high-resolution picture of a fingerprint. It
based on 68000 CPU with additional custom chips, but can also be
configured as a peripheral for an IBM PC. It can operate as a standalone
system or as part of a network.
6.3 FACE: -
Biometrics developers have also not lost sight of fact that humans use
the face as their primary method of telling who’s who. More than a dozen
effort to develop automated facial verification or recognition systems use
approaches ranging from pattern recognition based on neural networks
to infrared scans of ‘hot spots’ on the face.
There is only one system available on the market today. The system is
developed by Neuro Metric Vision system Inc. this can recognize faces
with a few constraints as possible, accommodating a range of camera
scales and lighting environments, along with changes in expression and
facial hair and in head positions. The work sprang from the realisation
that such techniques as facial image comparisons, measurement of key
facial structure and the analysis of facial geometry could be used in face
recognition system. Any of these approaches might employ rule-based
logic or a neural network for the image classification process.
2
The Neuro-metric system operates on an IBM-compatible 386 or 486
personal computer with a maths co-processor, a digital signal processing
card and a frame grabber card to convert raster scan frames from an
attached camera in to pixel representations. The system can capture
images from black and white video cameras or video recorders in real
time.
Software running on the DSP card locates the face in the video frame,
scales and rotates if necessary, compensating for lighting differences
and performs mathematical transformations to reduce the face to a set
of floating point feature vectors. The feature vector set is input to the
neural network trained to respond by matching it to one of the trained
images in as little as 1 seconds.
To enrol someone in the Neuro Metric system, the face is captured, the
feature vectors extracted, and the neural network is trained on the
features. Greyscale facial images may be presented from live video or
photographs via videodisk. The neural network is repeatedly trained until
it learns all the faces and consistently identifies every image. The system
uses neural network clusters of 100-200 faces to build its face
recognition database. If multiple clusters are required they can be
accessed sequentially or hierarchically. When faces are added to or
detected from the database, only the affected clusters must be
retrained, which takes 3-5 minutes.
6.4 EYE
The other method of identification involves the eye. Two types of eye
identification are possible, scanning the blood vessel pattern on the
retina and examining the pattern of the structure of the iris. Now we can
look through a detailed description of each type below.
6.4.1 RETINA
Retina scans, in which a weak infrared light is directed through the
pupil to the back of the eye, have been commercially available
since1985. The retinal pattern is reflected back to a charge-coupled
device (CCD) Camera, which captures the unique pattern and
represents it in less than 35 bytes of information. Retina scans are
one of the best biometrics performers on the market, with low false
reject rates and nearly 0 present false accept rate. The technology
2
also offers small data templates provides quick identity
confirmations, and handles well the job of recognizing individuals in
a database of under 500 people. The toughest hurdle for retinal scan
technology is user resistance. People don’t want to put their eye as
close to the device as necessary. Only one company, Eyedentyfy
Inc., produces retinal scan products.
6.4.2 IRIS
Once it was the whites of their eyes that counted. Retinal pattern
recognition has been tried but found uncomfortable because the
individual must touch or remain very close to a retinal scanner. Now
the iris is the focus of a relatively new biometrics means of
identification. Standard monochrome video or photographic
technology in combination with robust software and standard video
imaging techniques can accept or reject an iris at distance of 30-45
cm.
6.5 SPEECH
Another biometrics approach that is attractive because of its
acceptability to users is voice verification. All the systems used in
analyzing the voice are rooted in more broadly based speech processing
technology. Currently, voice verification is being used in access control
2
for medium security areas or for situations involving many people as in
offices and lab. There are two approaches to voice verification. One is
using dedicated hardware and software at the point of access .The
second approach is using personal computer host configurations that
drive a network over regular phone lines.
The acoustic wave is produced when the airflow from the lungs is carried
by the trachea through the vocal folds. The source of excitation can be
characterized as phonation, whispering, friction, compression, vibration,
or a combination of these. Phonated excitation occurs when the airflow is
modulated by the vocal folds. Whispered excitation is produced by
airflow rushing through a small triangular opening between the
arytenoids cartilage at the rear of the nearly closed vocal folds. Friction
excitation is produced by constrictions in the vocal tract. Compression
excitation results from releasing a completely closed and pressurized
vocal tract. Vibration excitation is caused by air being forced through a
closure other than the vocal folds, especially at the tongue. Speech
produced by phonated excitation is called voiced, that produced by
phonated excitation plus friction is called mixed voiced, and that
produced by other types of excitation is called unvoiced.
2
part of the true model and has an identical magnitude spectra, which
contains the bulk of the speaker-dependent information.
Signature dynamics and voice dynamics have the lowest accuracy rates
according to [Ruggles, 1998]. In addition, these two techniques rely on
behavioural measurements as opposed to physical measurements. In
general, behavioural biometrics is less reliable than physical biometrics.
Retinal scan has high accuracy but also has a high data collection error
rate and low user acceptability. For this reason, retinal scan exists only in
science fiction movies but not in real life applications.
The fingerprint biometric has a low data collection error rate and high
user
acceptability. Further, fingerprint technology has had the most research
and
development money applied to both identification and authentication
problem.
Finally, fingerprint biometrics has the highest acceptance in the
identification community and virtually every large biometrics system in
operation today uses
fingerprint biometrics. Notwithstanding its association with "criminal"
applications, fingerprint biometrics is generally accepted by clients.
The chosen biometrics in this project, i.e., face and voice, are based on
user acceptability and another important factor, the availability of
resources in the laboratory. Once the system is established, moving into
other biometrics would be
easier.
2
Comparison of biometrics technologies based on perception of three biometrics experts according to
[Jain, 1999]
2
HOW WELL DOES BIOMETRICS WORK
Biometric devices can be adjusted to favour security or user convenience. How well do Biometrics
work? It depending on four points.
2
ABOUT BIOMETRICS
9.1 Will Biometric Solve All Security Concerns?
• No System can be 100% Safe
• Biometric Measures can be Very Successful in Fighting Today's Security
Concerns
• Major Drawback in Adopting Biometric Systems is that concerned
person
needs to be Physically
2
be perfect. This leads us to the practical aspects: the implementation
must be protected against replay attacks, keyboard dummies (e.g., false
ATMs), wiretapping etc. Even biometric features have to cope with such
problems. However, it can be assumed that the protection of biometric
feature acquisition is not easier than the acquisition of the password,
provided the implementation expense is comparable.
2
• Unauthorized Access to Personal Data can be prevented:
It is a one type of security system that no one can hack it because they
do not have our fingerprint, iris, voice, face etc. So, it prevents the data
from an unauthorized person.
MULTI –BIOMETRICS
10.1 Integrating Faces and Fingerprints for Personal
Identification
2
CONCLUSION
A range of biometric systems are in developments or on the market
because no one system meets all needs. The trade off in developing
these systems involve component cost, reliability, discomfort in using a
device, the amount of data needed and other factors. But the application
of advanced digital techniques has made the job possible. Further
experiments are going all over the world. In India also there is a great
progress in this field. So we can expect that in the near future itself, the
biometric systems will become the main part in identification purposes.