Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

A

Seminar Report On
BIOMETRICS
Presented by
1. Aditi Rajesh Kashetwar

2. Rajlakshmi Rajesh Kancharlawar

3.Sanjana Santoshrao Dhade

SE

Information Technology 2021-2022

Guided By

S.P.Bandewar Sir

(Department Of Information Technology)

Submitted to

MGM’s College of Engineering ,Nanded


under

Dr. Babasaheb Ambedkar Technological University,Lonere

1
Certificate
This is to certify that the report entitled

“BIOMETRICS”
Submitted By
1. Aditi Rajesh Kashetwar
2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade

in satisfactory manner as a partial fulfillment of Third year in Information


Technology
To

MGM’s College of Engineering, Nanded


Under
DR.Babasaheb Ambedkar Technological University,Lonere
has been carried out under my guidance,
Mr. S. P. Bandewar
Asst. Professor

Mr. S. A. Hashmi Dr.Mrs.G.S. Lathkar


Head Director

Department of I T MGM’s COE Nanded

2
We are greatly indebted to our seminar guide Mr. S. P. Bandewar for their
able guidance throughout the course of this work. It has been an altogether
different experience to work with their and we would like to thank you for their
help, suggestions and numerous discussions.

We gladly take this opportunity to thank Mr. S. A. Hashmi (Head of


Information Technology Engineering, MGM’s College of Engineering,
Nanded.)

We are heartly thankful to Dr. Mrs. G. S. Lathkar (Director, MGM’s


College of Engineering, Nanded.) for providing facility during progress of
seminar; also for their kindly help, guidance and inspiration.

Last but not least we are also thankful to all those who help directly or
indirectly to develop this seminar and complete it successfully.

With Deep Reverence,

1. Aditi Rajesh Kashetwar


2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade
SY-IT

3
ABSTRACT

The biometric is said to have many limitations. Due to its drawbacks the multimodal
biometric has emerged to provide a secure solution. The multimodal biometric system
is a much more secure system ensuring more than one check. This is mostly used in
cases of bank security. This system involves the finger scanning along with voice scan
and hand geometry scam and even image scan. The image scans by image processing
is a highly modified system. Secure ATM by image processing is adopted by most of
the bank ATMs both in the private and government sectors.
The image processing is a complex system involving a number of interwoven
processes. Theprocess of image processing from receiving the visual information to
presentation of the screen involves two major processes. The major 3 process involved
in Secure ATM image processing are, 1Discretization and representation,
2.Processing, 3.Analysis. Discretization and representation is changing the visual
available into a discrete form which is compatible with the computer.
Processing is done to improve on the quality of the image by filtering it. Data
is also compresses to save space. Analysis of the image is also done by taking out
the image features, qualifying the shapes and also registering them along with
recognizing them. The various process makes the Bank ATMs secure thus is widely
being adopted leaving behind the old biometricsystem.

4
CONTENTS

Chapter Title PageNo.


No.

1 Introduction 9

1.1 History & Development 10

1.2 What is biometric 10

1.3 Classification 11

2 Biometric System 12
Components (BCS)

2.1 Components 12

2.2 Authentication 12

2.3 Biometric Accuracy 13

3 Biometric Technology 14

3.1 Fingerprint Authentication 14 to 15

3.2 Retina Scan 15

3.3 Iris Recognition 16

5
3.4 Hand Geometry 16 to 17

3.5 Voice recognition 17

3.6 Signature Pattern 17 to 18

3.7 Key Stroke 18

3.8 Facial Recognition 18 to 19

3.9 DNA Matching 19

4 Multimodal Biometric 20
System (MBS)

4.1 Fusion Of Face, Voice And 20


Fingerprint

4.2 Fusion Of Face And Lip 21

4.3 Vulnerable Points Of 22


Biometric System

5 Biometric Devices 23 to 24

6 applications 25 to 26

6.1 Future Scopes 27

7 Conclusion 28

8 References 29
6
LIST OF ABBREVIATIONS

1. MBS- Multimodal Biometric System

2. BCS- Biometric System Components

3. STRs – Short Tandem Repeat sequences

7
LIST OF FIGURES
Figure No. Title Page No.
3.1 Fingerprint Authentication 15

3.2 Retina Scan 15

3.3 Iris recognition 16

3.4 Hand Geometry 17

3.5 Voice Recognition 17

3.6 Signature Pattern 18

3.7 Key stroke 18

3.8 Facial Recognition 19

3.9 DNA Matching 19

4.1 Fusion Of Face, Voice And 20


Fingerprint

4.2 Fusion Of Face, And Lip 21

4.3 Vulnerable Points Of 22


Biometric System

5.1 Face Camera 23

5.2 Iris Scanner 24

8
Chapter 1
Introduction

Reliable user authentication is becoming an increasingly important task in the Web-enabled


world. The consequences of an insecure authentication system in a corporate or enterprise
environment can be catastrophic, and may include loss of confidential information, denial of
service, and compromised data integrity. The value of reliable user authentication is not
limited to just computer enhanced security. The prevailing techniques of user authentication,
which involve the use of either passwords and user IDs (identifiers), or identification cards
and PINs (personal identification numbers), suffer from several limitations. Passwords and
PINs can be illicitly acquired by direct covert observation. Once an intruder acquires the user
ID or network access. Many other applications in everyday life also require user
authentication, such as banking, e- commerce, and physical access control to computer
resources, and could benefit from and the password, the intruder has total access to the user’s
resources. In addition, there is no way to positively link the usage of the system or service to
the actual user, that is, there is no protection against repudiation by the user ID owner. For
example, when a user ID and password is shared with acolleague there is no way for the system
to know who the actual user is. A similar situation arises when a transaction involving a credit
card number is conducted on the Web. Even though the data are sent over the Web using
secure encryption methods, current systems are not capable of assuring that the rightful owner
of the credit card initiated the transaction. In the modern distributed systems environment, the
traditional authentication policy based on a simple combination of user ID and password has
become inadequate. Fortunately, automated biometrics in general, and fingerprint technology
in particular, can provide a much more accurate and reliable user authentication method.
Biometrics is a rapidly advancing field that is concerned with identifying a person based on
his or her physiological or behavioural characteristics.

9
1.1 History and Development
The idea of using patterns for personal identification was originally proposed in 1936 by
ophthalmologist Frank Burch. By the 1980 the idea had appeared in James Bond films, but it
still remained science fiction and conjecture. In 1987, two other ophthalmologists AramSafirand
Leonard Flom patented this idea and in 1987 they asked John Daugman to try to create actual
algorithms for this iris recognition. These algorithms which daugman patented in 1994 are the
basis for all current iris recognition systems and products. daugman algorithms are owned by
technologies and the process is licensed to several other Companies who serve as System
integrators and developers of special platform for iris recognition in recent years several
products have been developed for acquiring its images over a range of distances and in a variety
of applications. One active imaging system developed in 1996 by licensee Sensor deployed
special cameras in bank ATM to capture IRISi mages at a distance of up to 1 meter. This active
imaging system was installed in cash machines both by NCR Corps and by Diebold Corp in
successful public trials in several countries during 1997 to 1999. a new and smaller imaging
device is the low cost “Panasonic Authentication digital camera for handheld, desktop, e-
commerce and other information security applications. Ticketless air travel, check-in and
security procedures based on iris recognition in airports have been developed by eye ticket.

1.2 What is biometrics


For a quick biometrics definition: Biometrics are biological measurements — or physical
characteristics — that can be used to identify individuals. For example, fingerprint mapping,
facial recognition, and retina scans are all forms of biometric technology, but these are just
the most recognized options. Researchers claim the shape of an ear, the way someone sits and
walks, unique body odours the veins in one’s hands, and even facial contortions are other
unique identifiers. These traitsfurther define biometrics.

1.3 CLASSIFICATION OF BIOMETRICS


10
BIOMETRICS is the science of analysing the characteristics specific to each individual in
order to be able to authenticate their identity. In the literal and most simple sense, biometrics
means the “measurement of the human body”.
If you have a relatively new smartphone, you may well be familiar with using your
fingerprint to unlock your phone, access online banking services or even authenticate a
mobile payment. A fingerprint is an example of physiological biometric data – something
that’s related to the specific measurements, dimensions and characteristics of your body.
.

11
Chapter 2

2.1 Components

A biometric system is essentially a pattern recognition system that recognizes a person based
on a feature vector derived from a specific characteristic that the person possesses.

3.1 Components of A simple biometric system:

1) Sensor module which acquires the biometric data; Web cam, Digitizing Table, Scanner.

2) Feature extraction module where the acquired data is processed to extract feature vectors;
Projection [offline], on Coordinates [online, offline]

3) Matching module where feature vectors are compared against those in the template ;(
Neural Networks, Algorithm)

4) Decision-making module in which the user's identity is established or a claimed identity is


accepted or rejected.

Biometrics As noted earlier refers to technologies that measure and analyse human body
characteristics, such as DNA, fingerprints and eye retina and irises and hand measurements,
for authentication purposes.

2.2 Authentication
Biometric authentication refers to security processes that verify a user’s identity through
unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints.
Biometric authentication systems store this biometric data in order to verify a user’s identity
when that user accesses their account. Because this data is unique to individual users,
biometric authentication is generally more secure than traditional forms of multi-factor
authentication. Thanks to the dark web and account takeover fraud, authenticating the identity
of userspresents an ever-evolving challenge.
On one side of the authentication challenge are users who demand speed and convenience
and don’t want to have to remember numerous passwords or make their way through a
complex login or verification process every time they access an app or site. But, on the other
hand, security requirements are quickly evolving to demand a rigorous approach to
authentication.
12
2.3 Biometric Accuracy

Biometrics is a means of identifying and verifying people identity based on physiological


characteristics. The core value of a biometric system depends on its ability to correctly accept
or reject an individual identity. In other words, accuracy is the criteria to assess the reliabilityof a
biometric modality. The accuracy of a biometric modality is usually measured in terms of matching
errors which consist of false acceptance rate (FAR) and false rejection rate.

13
Chapter 3
Biometric Technology
3.1 Fingerprint Authentication

Fingerprint recognition, which measures a finger’s unique ridges, is one of the oldest forms of
biometric identification. After capturing the print, sophisticated algorithms use the image to
produce a unique digital biometric template. The template is then compared to new or existing
scans to either confirm or deny a match. Capturing fingerprint biometric images may be
achieved using. Optical sensors using CCD or CMOS image sensors.
Solid-state transducer sensors capturing features like the electric field, thermal, piezoelectric
or capacitive energy signals.
Ultrasound sensors capturing the transmitted acoustic signals in a receiver used for fingerprint
capture in echography. When using fingerprinting matching, one can use any of the following
3 ways of types of biometrics to match the fingerprint with the stored fingerprint. Ridge pattern
comparison and fingerprint matching use the ridges as a comparison feature and scores over
the fingerprint capturing of minutiae-based images, which suffer when usingprints captured in
low quality.
Correlation fingerprint matching is done by overlaying the 2 images of fingerprints and
calculating the equivalent pixel association between them to match their association. Minute
based matching of fingerprints is done in biometrics examples by comparing theinput
minutiae and the stored set of points on a plane stored in the system.

14
3.1 Fig. – Fingerprint Authentication

3.2 Retina Scan

Retinal scans capture capillaries deep within the eye by using unique near-infrared cameras.
The raw image is first pre-processed to enhance the image then processed again as a biometric
template to use during both enrolment and verification.

3.2 Fig. – scanning of retina

15
3.3 Iris Recognition

The iris, or the colour part of the eye, consists of thick, thread-like muscles. These muscles
help shape the pupil to control the amount of light that enters the eye. By measuring the
unique folds of these muscles, biometric authentication tools can confirm identity with
incredible accuracy. Liveness detection (like requiring a user to blink for the scan) adds an
additional layer of accuracy and security.

3.3 Fig. – scanning of iris

3.4 Hand geometry

Biometrics refer to the measurement of hand characteristics like the length and width of
fingers, their curvature, and their relative position to other features of the hand. Though once
a dominant method of biometric measurement, modern advances in fingerprint and facial
recognition software have replaced its relevance in most advanced applications.

16
3.4 Fig. – Hand Geometry

3.5 Voice Recognition


Voice recognition technology falls under both the physiological and biometric umbrellas.
Physically speaking, the shape of a person’s vocal tract, including the nose, mouth, and
larynx determines the sound produced. The way a person says something – movement
variations, tone, pace, accent, and so on – is also unique to each individual.

3.5 Fig. – Voice Recognition

3.6 Signature Pattern


It is a biometric that measures spatial coordinates, pen pressure, inclination, and pen stroke
in both “off-line” and “on-line” applications. A digital tablet records measurements then uses
the information to automatically creates a biometric profilefor future authentication.

17
3.6 Fig. – Signature Pattern

3.7 Key Stroke


Keystroke dynamics take standard passwords to the next level by tracking the rhythm used to
enter a password. Measurements might include the time it takes to press each key, delays
between keys, characters typed per minute, and so on. Keystroke patterns work in conjunction
with passwords and PINs to improve security efforts.

3.7 Fig. – Key Stroke

3.8 Facial Recognition


Facial recognition is, by far the oldest form of biometric authentication. Even infants use facial
recognition to identify the people closest to them. Biometric facial recognition softwareworks
much the same way, albeit with more precise measurements. Specifically, facial recognition
software measures the geometry of the face, including the distance between the eyes and the
distance from the chin to the forehead (just to name a few). After collecting the data, an
advanced algorithm transforms it into an encrypted facial signature.

18
3.8 Fig. – Recognition of face

3.9 DNA Matching


DNA has long been used for identification purposes. Additionally, is the only form of
biometrics that can trace familial ties. DNA matching is especially valuable when dealing
with missing persons, disaster victim identification, and potential human trafficking.
Furthermore, other than fingerprints, DNA is the only biometric that can be “left behind”
unintentionally. DNA gathered from hair, saliva, semen, and so on contains Short Tandem
Repeat sequences (STRs).

3.9 Fig. – DNA Matching

19
Chapter 4

Multimodal Biometric System

4.1 Fusion of Face, Voice & Fingerprint


A biometric system which relies only on a single biometric identifier in making a personal
identification is often not able to meet the desired performance requirements. Identification
based on multiple biometrics represents an emerging trend. We introduce a multimodal
biometric system, which integrates face recognition, fingerprint verification, and speaker
verification in making a personal identification. This system takes advantage of the
capabilities of each individual biometric. It can be used to overcome some of the limitations
of a single biometrics. Preliminary experimental results demonstrate that the identity
established by such an integrated system is more reliable than the identity established by a
face recognition system, a fingerprint verification system and a speaker verification system.

4.1 Fig. – Fusion of face, fingerprint & voice

20
4.2 Fusion of Face and Lip Movement

The system acquires (records), pre-processes, and classifies each biometric feature separately.
During the training(enrolment) of the system, biometric templates are generated for each
feature. For classification, the system compares these templates with the newly recorded
pattern. Then, using a strategy that depends on the level of security required by the application,
it combines the classification results into one result by which it recognizes persons.

4.2 Fig. – Fusion of face and lip movement

21
4.3 Vulnerable Points of Biometric System
A generic biometric system can be cast in the framework of a pattern recognition system.
The first stage involves biometric signal acquisition from the user (e.g., the inkless fingerprint
scan). The acquired signal typically varies significantly from presentation to presentation;
hence, pure pixel-based matching techniques do not work reliably. For this reason, the second
signal processing stage attempts to construct a more invariant representation of this basic input
signal (e.g., in terms of fingerprint minutiae). The invariant representation is often aspatial
domain characteristic or a transform (frequency) domain characteristic, depending on the
particular biometric. During the enrolment of a subject in a biometric authentication system, an
invariant template is stored in a database that represents the particular individual. To
authenticate the user against a given ID, the corresponding template is retrieved from the
database and matched against the template derived from a newly acquired input signal.

4.3 Fig. – Vulnerable points of biometric system

22
Chapter 5
BIOMETRIC DEVICES

FACE CAMERA
Face detection is used in biometrics, often as a part of (or together with) a facial recognition
system. It is also used in video surveillance, human computer interface and image database
management. A face camera is a webcam with 2 Mega pixel or above which can take a clear
crisp photograph of the face.
Some recent digital cameras use face detection for autofocus. Also, face detection is useful for
selecting regions of interest in photo slideshows that use a pan-and-scale Ken Burns effect.
That is, the content of a given part of an image is transformed into features, after which a
classifier trained on example faces decides whether that particular region of the image is a
face, or not. A face model can contain the appearance, shape, and motion of faces. There are
several shapes of faces. Some common ones are oval, rectangle, round, square, heart, and
triangle. Motions include, but not limited to, blinking, raised eyebrows, flared nostrils,
wrinkled forehead , and opened mouth.

5.1 Fig. – Face camera

23
Irsis Scanner
The iris scanner captures images of either one or both of human irises
with higher resolution to compare and match it with the existing iris pattern of an
individual saved in the database. The biometric iris scanner operates based on two
processes - one is the pattern identification process and the other is comparing those
patterns to the pre-existing pattern of a human retina.
The biometric iris recognition system is profoundly scalable, secure, rapid, assessable
and accurate. An iris scanner is a biometric device utilized for a real-time identification
process with higher performance and greater accuracy.

5.2 Fig Iris scanner

24
Chapter 6

APPLICATIONS

In the last years has considerably increased the area of application of biometrics and it's expected that
in the near future, we will use biometry many times in our daily activities such as getting in the car,
opening the door of our house, accessing to our bank account by internet, accessing to our PDA, mobile
phone, laptops, etc. Depending of where the biometrics is deployed, the applications can be categorized
in the following five main groups: forensic, government, commercial, health-care and traveling and
immigration. However, some applications are common to these groups such as physical access,
PC/network access, time and attendance, etc.
1. FORENSIC: The use of biometric in the law enforcement and forensic is more known and
from long date, it is used mainly for identification of criminals. In particular, the AFIS
(automatic fingerprint identification system) has been used for this purpose. The facial-scan
technology (mug shots) is being also used for
identification of suspects. Another possible application is the verification of persons of home arrest, a
voice-scan is an attractive solution for this problem. The typical applications are:
• Identification of criminals-
collecting the evidence in the scene of crime (like fingerprints) it is possible to compare with data of
suspects or make a search in the data base of criminals.
• Corrections -
This refers to the treatment of offenders (criminals) through a system of penal incarceration,
rehabilitation, probation, and parole, or the administrative system by which these are effectuated. Is
these cases a biometric system can avoid the possibility of accidentally releasing the wrong prisoner,
or to ensure that people leaving the facilities are really visitors and not inmates.

2. GOVERNMENT:-
Here are many application of the biometry in the government sector. An AFIS is the primary system
used for locating duplicates in benefits systems, electronic voting for local or national elections,
driver's license emission, etc. The typical application are:
National Identification Cards -
the idea is to include digital biometric information in the national identification card. This is the most

25
ambitious biometric program, since the identification must be performed in a large- scale database,
containing millions of samples, corresponding to the whole population of one country. This kind of
cards can be used for multiple purposes such as controlling the collection of benefits, avoiding
duplicates of voter registration and driver license emission.
• Employee authentication -
The government use of biometric for PC, network, and data access is also important for security of
building and protection of information. Below are more detailed this kind of applications also used in
commercial sector.
• Military programs -
the military has long been interested in biometrics and the technology has enjoyed extensive support
from the national security community
3. COMMERCIAL:
Banking and financial services represent enormous growth areas for biometric technology, with many
deployments currently functioning and pilot project announced frequently. Some applications in this
sector are:
• Account access -
The use of biometric for the access to the account in the bank allows to keep definitive and auditable
records of account access by employees and customers. Using this the customers can access accounts
and employees can log into their workstations.
• ATMs -
the use of biometric in the ATM transaction allows more security.
Expanded Service Kiosks -
A more receptive market for biometrics may be special purpose kiosks, using biometric verification to
allow a greater variety of financial transaction than are currently available through standard ATMs.

26
6.1 FUTURE SCOPES

1. Biometric identification technologies are improving so quickly that it is difficult to


predict what they will look like in a few years. One thing that can be assumed quite
confidently — passwords that were difficult to use, change, and remember will remain in
the past.
2. The development trends of biometric devices boil down to a significant decrease in this
type of device and improve ease of use. The mobile biometrics market segment's
development is associated with the active use of smartphones with pre-installed sensors.
3. Biometric data is not seen as the only comprehensive alternative to the user's usual logins
and passwords. They are used as a duplicate opportunity to authorize or confirm an
operation. Roughly speaking, if your biometrics didn't work for some reason, there is
always a fallback (enter a password or call the contact center). At the same time,
biometrics does not reduce the level of application security – rather, it increases it.

27
CONCLUSION

Biometrics can only be limited by limiting one's imagination. Biometric technology is now being
used in almost every area. Not only that, but various types of biometric systems are being used
to achieve various functionalities. There are many mature biometric systems available now.
Proper design and implementation of the biometric system can indeed increase the overall
security.

There are numerous conditions that must be taken in account when designing a secure
biometric system. First, it is necessary to realize that biometrics is not secrets. This implies
that care should be taken and itis not secure to generate any cryptographic keys from them.
Second, it is necessary totrust the input device and make the communication link secure.
Third, the input device needs to be verified.

The ultimate form of electronic verification of a person’s identity is biometrics; using a


physical attribute of the person to make a positive identification. Peoplehave always used the
brain’s innate ability to recognize a familiar face and it has long been known that a person’s
fingerprints can be used for identification.

The challenge has been to turn these into electronic processes that are inexpensive and easy to
use. Banks and others who have tested biometric-basedsecurity on their clientele, however,
say consumers overwhelmingly have a pragmatic response to the technology. Anything that
saves the information- overloaded citizen from having to remember another password or
personal identification number comes as a welcome respite.

28
REFERENCES

1. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
PrivateBiometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric and
T. kevenaar, Eds., chpt5, pp.79-77, Springer-Verlag, 20012.

2. Direct Indirect Human Computer Interaction Based Biometrics International Journal Of


Emerging Engineering Research and Technology Volume 3, Issue 3, March 2015.

3. A.A.E. Ahmed, I. Traore, “A new biometric technology based on mouse dynamics,


IEEE Transactions on depend able and Secure Computing” 4 (3) (2007) 165– 179
4. R. Germain, A. Califano, and S. Colville, “Fingerprint Matching Using Transformation
Parameter Clustering,” IEEE Computational Science and Engineering 4, No. 4, 42 –
49(2014).
5. L. O Gorman, “Practical Systems for Personal Fingerprint
Authentication,”IEEEComputer 33, No. 2, 58 – 60 (2013)
6. Biometric Digest -http://biometrics.cse.msu.edu
7. https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/
8. B. Miller, “Vital Signs of Identity,”IEEE Spectrum 31 , No.2, 22 – 30 (2013)

29

You might also like