Professional Documents
Culture Documents
Biometrics: P.V.K.K. Institute of Technology Rudrampeta Anantapur
Biometrics: P.V.K.K. Institute of Technology Rudrampeta Anantapur
AUTHORS:
C.SRAVANI
K.SWETHA
H.T.NO: 083N1A0548
H.T.NO:083N1A0555
III B.TECH C.S.E. III
B.TECH C.S.E.
Email:shanu.chintha@gmail.com
Email:skadapala@yahoo.com
PH:7569009094
PH:9701737197
This paper presents a brief introduction to biometrics and and application. Biometrics is used to identify the
the various biometric systems adopted by it. In this paper it identity of an input sample when compared to a
is described how a person himself can be given as a template, used in cases to identify specific people by
password. Biometrics is automated methods of identifying certain characteristics. Standard validation systems
a person or verifying the identity of a person based on a often use multiple inputs of samples for sufficient
physiological characteristics include hand or finger images, sample. This intends to enhance security as multiple
facial characteristics, and iris recognition. Behavioral different samples are required such as security tags
characteristics are traits that are learned or acquired. and codes and sample dimensions. Examples of
Dynamic signature verification, speaker verification, and physiological characteristics include hand or finger
keystroke dynamics are examples of behavioral images, facial characteristics, and iris recognition.
characteristics. Biometric authentication requires Behavioral characteristics are traits that are learned or
comparing a registered or enrolled biometric sample acquired. Dynamic signature verification, speaker
against a newly captured biometric sample. The most verification, and keystroke dynamics are examples of
popular biometric technologies are fingerprints, face, behavioral characteristics. Biometric authentication
palm/hand geometry, handwriting, iris, retinal, and voice. requires comparing a registered or enrolled biometric
Biometric technologies are rapidly becoming the sample against a newly captured biometric sample.
foundation of an extensive array of highly secure During Enrollment, a sample of the biometric trait is
identification and personal verification solutions. In the captured, processed by a computer, and stored for later
information age of today, the need for a convenient and comparison. Biometric recognition can be used in
highly secure identification and authentication is crucial Identification mode, where the biometric system
for our personal data protection. One of the most popular identifies a person from the entire enrolled population
and well known biometrics is the fingerprint. Fingerprints by searching a database for a match based solely on
have been used to identify criminals for decades and have the biometric. For example, an entire database can be
more recently been used as a way to provide searched to verify a person has not applied for
authentication. Every person has a unique fingerprint; even entitlement benefits under two different names. This is
identical twins have different sets of fingerprints. Another sometimes called “one-to-many” matching. A system
biometric is the face. For example, a computer login device can also be used in Verification mode, where the
can scan a person's face and determine if they are an biometric system authenticates a person’s claimed
finger or a glance at a camera is enough to authenticate because every person has a different pitch, but voice
• FACIAL
RECOGNITION: In
our everyday lives, our face
is an important part of who we are and how
people identify us. It would be very difficult
for us to interact with and identify others if
everyone looked the same. The face is
arguably a person's most unique physical
characteristic. Other than identical twins,
each person's face has some unique
characteristics that can be distinguished, but
it is a lot more complex for the computer to
quantify these features for recognition. Facial
recognition generally consists of two parts;
• Physiological are related to the shape of the face detection and face identification. Face
body. The oldest traits that have been used detection is the computer's ability to be able
for more than 100 years are fingerprints. to detect a portion of the video image as an
Other examples are face recognition, hand individual's face from a complex background.
geometry and iris recognition. This extraction alone is a challenge for the
• Behavioral are related to the behavior of a software algorithm. Once the location and
person. The first characteristic to be used, area of the face within an image is identified,
still widely used today, is the signature. More the algorithm will need to extract enough
critical features within the face and compare
these features from a database to accurately and curvature for the purposes of verification but not
identify the individual. The commonly used for identification. This technology is more suitable in
technique for this analysis process is called situations where there are more users and is perhaps
Local Feature Analysis. There are other less disciplined in their approach to the system. With
techniques for facial identification such as the fingerprint acquisition, good frictional skin is required
eigen face technique, but the LFA and its by imaging systems, and with retina-based recognition
variants are more popularly used by most systems, special lighting is necessary. Hand geometry
practical implementations today. can be easily combined with other biometrics, namely
Advantages the fingerprint, to enhance the identification
• Easy to use and requires no special training or authenticity. One can also devise a system where
REFERENCES: