Professional Documents
Culture Documents
6-3-22 Report Bio
6-3-22 Report Bio
Seminar Report On
BIOMETRICS
Presented by
1. Aditi Rajesh Kashetwar
SE
Guided By
S.P.Bandewar Sir
Submitted to
1
Certificate
This is to certify that the report entitled
“BIOMETRICS”
Submitted By
1. Aditi Rajesh Kashetwar
2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade
2
We are greatly indebted to our seminar guide Mr. S. P. Bandewar for their
able guidance throughout the course of this work. It has been an altogether
different experience to work with their and we would like to thank you for their
help, suggestions and numerous discussions.
Last but not least we are also thankful to all those who help directly or
indirectly to develop this seminar and complete it successfully.
3
ABSTRACT
The biometric is said to have many limitations. Due to its drawbacks the multimodal
biometric has emerged to provide a secure solution. The multimodal biometric system
is a much more secure system ensuring more than one check. This is mostly used in
cases of bank security. This system involves the finger scanning along with voice scan
and hand geometry scam and even image scan. The image scans by image processing
is a highly modified system. Secure ATM by image processing is adopted by most of
the bank ATMs both in the private and government sectors.
The image processing is a complex system involving a number of interwoven
processes. Theprocess of image processing from receiving the visual information to
presentation of the screen involves two major processes. The major 3 process involved
in Secure ATM image processing are, 1Discretization and representation,
2.Processing, 3.Analysis. Discretization and representation is changing the visual
available into a discrete form which is compatible with the computer.
Processing is done to improve on the quality of the image by filtering it. Data
is also compresses to save space. Analysis of the image is also done by taking out
the image features, qualifying the shapes and also registering them along with
recognizing them. The various process makes the Bank ATMs secure thus is widely
being adopted leaving behind the old biometricsystem.
4
CONTENTS
1 Introduction 9
1.3 Classification 11
2 Biometric System 12
Components (BCS)
2.1 Components 12
2.2 Authentication 12
3 Biometric Technology 14
5
3.4 Hand Geometry 16 to 17
4 Multimodal Biometric 20
System (MBS)
5 Biometric Devices 23 to 24
6 applications 25 to 26
7 Conclusion 28
8 References 29
6
LIST OF ABBREVIATIONS
7
LIST OF FIGURES
Figure No. Title Page No.
3.1 Fingerprint Authentication 15
8
Chapter 1
Introduction
9
1.1 History and Development
The idea of using patterns for personal identification was originally proposed in 1936 by
ophthalmologist Frank Burch. By the 1980 the idea had appeared in James Bond films, but it
still remained science fiction and conjecture. In 1987, two other ophthalmologists AramSafirand
Leonard Flom patented this idea and in 1987 they asked John Daugman to try to create actual
algorithms for this iris recognition. These algorithms which daugman patented in 1994 are the
basis for all current iris recognition systems and products. daugman algorithms are owned by
technologies and the process is licensed to several other Companies who serve as System
integrators and developers of special platform for iris recognition in recent years several
products have been developed for acquiring its images over a range of distances and in a variety
of applications. One active imaging system developed in 1996 by licensee Sensor deployed
special cameras in bank ATM to capture IRISi mages at a distance of up to 1 meter. This active
imaging system was installed in cash machines both by NCR Corps and by Diebold Corp in
successful public trials in several countries during 1997 to 1999. a new and smaller imaging
device is the low cost “Panasonic Authentication digital camera for handheld, desktop, e-
commerce and other information security applications. Ticketless air travel, check-in and
security procedures based on iris recognition in airports have been developed by eye ticket.
11
Chapter 2
2.1 Components
A biometric system is essentially a pattern recognition system that recognizes a person based
on a feature vector derived from a specific characteristic that the person possesses.
1) Sensor module which acquires the biometric data; Web cam, Digitizing Table, Scanner.
2) Feature extraction module where the acquired data is processed to extract feature vectors;
Projection [offline], on Coordinates [online, offline]
3) Matching module where feature vectors are compared against those in the template ;(
Neural Networks, Algorithm)
Biometrics As noted earlier refers to technologies that measure and analyse human body
characteristics, such as DNA, fingerprints and eye retina and irises and hand measurements,
for authentication purposes.
2.2 Authentication
Biometric authentication refers to security processes that verify a user’s identity through
unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints.
Biometric authentication systems store this biometric data in order to verify a user’s identity
when that user accesses their account. Because this data is unique to individual users,
biometric authentication is generally more secure than traditional forms of multi-factor
authentication. Thanks to the dark web and account takeover fraud, authenticating the identity
of userspresents an ever-evolving challenge.
On one side of the authentication challenge are users who demand speed and convenience
and don’t want to have to remember numerous passwords or make their way through a
complex login or verification process every time they access an app or site. But, on the other
hand, security requirements are quickly evolving to demand a rigorous approach to
authentication.
12
2.3 Biometric Accuracy
13
Chapter 3
Biometric Technology
3.1 Fingerprint Authentication
Fingerprint recognition, which measures a finger’s unique ridges, is one of the oldest forms of
biometric identification. After capturing the print, sophisticated algorithms use the image to
produce a unique digital biometric template. The template is then compared to new or existing
scans to either confirm or deny a match. Capturing fingerprint biometric images may be
achieved using. Optical sensors using CCD or CMOS image sensors.
Solid-state transducer sensors capturing features like the electric field, thermal, piezoelectric
or capacitive energy signals.
Ultrasound sensors capturing the transmitted acoustic signals in a receiver used for fingerprint
capture in echography. When using fingerprinting matching, one can use any of the following
3 ways of types of biometrics to match the fingerprint with the stored fingerprint. Ridge pattern
comparison and fingerprint matching use the ridges as a comparison feature and scores over
the fingerprint capturing of minutiae-based images, which suffer when usingprints captured in
low quality.
Correlation fingerprint matching is done by overlaying the 2 images of fingerprints and
calculating the equivalent pixel association between them to match their association. Minute
based matching of fingerprints is done in biometrics examples by comparing theinput
minutiae and the stored set of points on a plane stored in the system.
14
3.1 Fig. – Fingerprint Authentication
Retinal scans capture capillaries deep within the eye by using unique near-infrared cameras.
The raw image is first pre-processed to enhance the image then processed again as a biometric
template to use during both enrolment and verification.
15
3.3 Iris Recognition
The iris, or the colour part of the eye, consists of thick, thread-like muscles. These muscles
help shape the pupil to control the amount of light that enters the eye. By measuring the
unique folds of these muscles, biometric authentication tools can confirm identity with
incredible accuracy. Liveness detection (like requiring a user to blink for the scan) adds an
additional layer of accuracy and security.
Biometrics refer to the measurement of hand characteristics like the length and width of
fingers, their curvature, and their relative position to other features of the hand. Though once
a dominant method of biometric measurement, modern advances in fingerprint and facial
recognition software have replaced its relevance in most advanced applications.
16
3.4 Fig. – Hand Geometry
17
3.6 Fig. – Signature Pattern
18
3.8 Fig. – Recognition of face
19
Chapter 4
20
4.2 Fusion of Face and Lip Movement
The system acquires (records), pre-processes, and classifies each biometric feature separately.
During the training(enrolment) of the system, biometric templates are generated for each
feature. For classification, the system compares these templates with the newly recorded
pattern. Then, using a strategy that depends on the level of security required by the application,
it combines the classification results into one result by which it recognizes persons.
21
4.3 Vulnerable Points of Biometric System
A generic biometric system can be cast in the framework of a pattern recognition system.
The first stage involves biometric signal acquisition from the user (e.g., the inkless fingerprint
scan). The acquired signal typically varies significantly from presentation to presentation;
hence, pure pixel-based matching techniques do not work reliably. For this reason, the second
signal processing stage attempts to construct a more invariant representation of this basic input
signal (e.g., in terms of fingerprint minutiae). The invariant representation is often aspatial
domain characteristic or a transform (frequency) domain characteristic, depending on the
particular biometric. During the enrolment of a subject in a biometric authentication system, an
invariant template is stored in a database that represents the particular individual. To
authenticate the user against a given ID, the corresponding template is retrieved from the
database and matched against the template derived from a newly acquired input signal.
22
Chapter 5
BIOMETRIC DEVICES
FACE CAMERA
Face detection is used in biometrics, often as a part of (or together with) a facial recognition
system. It is also used in video surveillance, human computer interface and image database
management. A face camera is a webcam with 2 Mega pixel or above which can take a clear
crisp photograph of the face.
Some recent digital cameras use face detection for autofocus. Also, face detection is useful for
selecting regions of interest in photo slideshows that use a pan-and-scale Ken Burns effect.
That is, the content of a given part of an image is transformed into features, after which a
classifier trained on example faces decides whether that particular region of the image is a
face, or not. A face model can contain the appearance, shape, and motion of faces. There are
several shapes of faces. Some common ones are oval, rectangle, round, square, heart, and
triangle. Motions include, but not limited to, blinking, raised eyebrows, flared nostrils,
wrinkled forehead , and opened mouth.
23
Irsis Scanner
The iris scanner captures images of either one or both of human irises
with higher resolution to compare and match it with the existing iris pattern of an
individual saved in the database. The biometric iris scanner operates based on two
processes - one is the pattern identification process and the other is comparing those
patterns to the pre-existing pattern of a human retina.
The biometric iris recognition system is profoundly scalable, secure, rapid, assessable
and accurate. An iris scanner is a biometric device utilized for a real-time identification
process with higher performance and greater accuracy.
24
Chapter 6
APPLICATIONS
In the last years has considerably increased the area of application of biometrics and it's expected that
in the near future, we will use biometry many times in our daily activities such as getting in the car,
opening the door of our house, accessing to our bank account by internet, accessing to our PDA, mobile
phone, laptops, etc. Depending of where the biometrics is deployed, the applications can be categorized
in the following five main groups: forensic, government, commercial, health-care and traveling and
immigration. However, some applications are common to these groups such as physical access,
PC/network access, time and attendance, etc.
1. FORENSIC: The use of biometric in the law enforcement and forensic is more known and
from long date, it is used mainly for identification of criminals. In particular, the AFIS
(automatic fingerprint identification system) has been used for this purpose. The facial-scan
technology (mug shots) is being also used for
identification of suspects. Another possible application is the verification of persons of home arrest, a
voice-scan is an attractive solution for this problem. The typical applications are:
• Identification of criminals-
collecting the evidence in the scene of crime (like fingerprints) it is possible to compare with data of
suspects or make a search in the data base of criminals.
• Corrections -
This refers to the treatment of offenders (criminals) through a system of penal incarceration,
rehabilitation, probation, and parole, or the administrative system by which these are effectuated. Is
these cases a biometric system can avoid the possibility of accidentally releasing the wrong prisoner,
or to ensure that people leaving the facilities are really visitors and not inmates.
2. GOVERNMENT:-
Here are many application of the biometry in the government sector. An AFIS is the primary system
used for locating duplicates in benefits systems, electronic voting for local or national elections,
driver's license emission, etc. The typical application are:
National Identification Cards -
the idea is to include digital biometric information in the national identification card. This is the most
25
ambitious biometric program, since the identification must be performed in a large- scale database,
containing millions of samples, corresponding to the whole population of one country. This kind of
cards can be used for multiple purposes such as controlling the collection of benefits, avoiding
duplicates of voter registration and driver license emission.
• Employee authentication -
The government use of biometric for PC, network, and data access is also important for security of
building and protection of information. Below are more detailed this kind of applications also used in
commercial sector.
• Military programs -
the military has long been interested in biometrics and the technology has enjoyed extensive support
from the national security community
3. COMMERCIAL:
Banking and financial services represent enormous growth areas for biometric technology, with many
deployments currently functioning and pilot project announced frequently. Some applications in this
sector are:
• Account access -
The use of biometric for the access to the account in the bank allows to keep definitive and auditable
records of account access by employees and customers. Using this the customers can access accounts
and employees can log into their workstations.
• ATMs -
the use of biometric in the ATM transaction allows more security.
Expanded Service Kiosks -
A more receptive market for biometrics may be special purpose kiosks, using biometric verification to
allow a greater variety of financial transaction than are currently available through standard ATMs.
26
6.1 FUTURE SCOPES
27
CONCLUSION
Biometrics can only be limited by limiting one's imagination. Biometric technology is now being
used in almost every area. Not only that, but various types of biometric systems are being used
to achieve various functionalities. There are many mature biometric systems available now.
Proper design and implementation of the biometric system can indeed increase the overall
security.
There are numerous conditions that must be taken in account when designing a secure
biometric system. First, it is necessary to realize that biometrics is not secrets. This implies
that care should be taken and itis not secure to generate any cryptographic keys from them.
Second, it is necessary totrust the input device and make the communication link secure.
Third, the input device needs to be verified.
The challenge has been to turn these into electronic processes that are inexpensive and easy to
use. Banks and others who have tested biometric-basedsecurity on their clientele, however,
say consumers overwhelmingly have a pragmatic response to the technology. Anything that
saves the information- overloaded citizen from having to remember another password or
personal identification number comes as a welcome respite.
28
REFERENCES
1. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
PrivateBiometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric and
T. kevenaar, Eds., chpt5, pp.79-77, Springer-Verlag, 20012.
29