Professional Documents
Culture Documents
Articles 4
Articles 4
COMPARISON OF VARIOUS
BIOMETRIC METHODS
Sylvia Belleh
Biomet ric Aut hent icat ion: Comparat ive St udy of Different Biomet rics Feat ures and Recent d…
Mohammad Mahfuzul Haque
Fingerprint s, Iris and DNA Feat ures based Mult imodal Syst ems: A Review
Kamt a Nat h Mishra
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
introduction is usually offered regarding
commonly used biometrics, including, Face, Biometric data acquisition.
Iris, Fingerprint, Finger Vein, Lips, Voice. The Data evaluation and feature extraction.
comparison criteria list introduced is restricted Corresponding scores creation (analyzed
to accuracy, size of template, cost, security data is then compared with what is
level, and long term stability. actually saved in the database).
Enrollment (first scan of a feature by a
Keywords biometric reader, produce its digital
Biometric systems, technique, face, Iris, finger, representation and create a template,
lips, voice. even a few in most of the systems).
techniques.
It does not require any co-operation of
the test subject to do any work.
Systems set up in airports, multiplexes,
and other open public areas can easily
identify an individual among the
massive crowd.
This performs massive identification
which usually other biometric system
can’t perform [2].
The systems don’t require any direct
contact of a person in order to verify Fig.1 Image sample for Facial recognition
his/her identity. This could be
advantageous in clean environments, for 2.2 IRIS
monitoring or tracking, and in
Iris recognition offers one of the most secure
automation systems [2].
strategies of authentication and recognition.
User-friendly design: Contactless
Once the impression of an iris has been taken
authentication.
using a standard digicam, the authentication
Incident monitoring for security with
process involves, evaluating the present subject's
photo which in turn taken by a camera,
iris with stored version. It is one of the most
but there is no such evidence with the
accurate technique with very low false
fingerprint technology to track these
acceptance as well as rejection rates. This is how
incidents.
the technology becomes very useful.
Disadvantages
Advantages
Face recognition isn’t perfect and faces
Iris possesses unique structure shaped
challenges to perform under certain
by 10 months of age, and is always
conditions.
stable throughout life.
One obstacle associated with the
The iris incorporates fine texture. Even
viewing position of face.
genetically similar people have entirely
Face recognition doesn’t work
independent iris textures [2].
effectively in bad/weak lighting,
An iris scan can be carried out through
sunglasses/sunshades, lengthy hair, or
10 cm to a few meters apart.
other objects partly covering the
Non-intrusive data collection (no actual
subject’s face.
contact with a scanner is required)[2] .
Not much effective for low resolution
Data capturing can be carried out even
images [2].
though a user is putting contact lenses or
A serious drawback is that many
glasses [2].
systems are usually less efficient if
High accuracy and High recognition
facial expressions vary. Even a big
process speed [2].
grin/laugh can render the system’s
performance less effectively. (so Easy recognition of fake irises (e.g.
significantly North america now permits when somebody wear color contacts).
only neutral facial expressions on Scalability along with the speed is
significantly advantageous [4].
passport photos )
Additionally, when used for security Minimal false acceptance rate.
purposes, it is more costly and complex Two seconds processing time.
www.sciencepublication.org
25
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
Iris recognition security systems are valleys are the lower portions". The particular
viewed as one of the most appropriate individuality of a fingerprint could be
security system nowadays. It is truly a determined by the several patterns of ridges and
distinctive and easy way to identify a furrows plus the minutiae points. Fingerprint
user. authentication in actual an automated method of
verifying a match among different human
Disadvantages fingerprints.
Iris scanners might be very easily fooled Advantages
through a superior quality image of an
iris or face instead of the real thing. These systems usually are simple to use
The scanning devices are often hard to and install.
adjust and may annoy multiple people of It requires inexpensive equipment which
various heights. usually have low power intake.
The accuracy of scanning devices may A fingerprint pattern has individually
impacted by unusual lighting effects and distinctive composition and
illumination from reflective types of characteristic remains the same with
surfaces. time [2].
Iris scanners tend to be more expensive Finger prints are largely universal. Only,
in comparison with additional of the 2% of human population cannot
biometrics [1]. use finger prints due to skin damage or
Because iris is a tiny organ to scan from hereditary factors [10].
a long distance, Iris recognition Fingerprints are the most preferred
becomes challenging to perform well at biometric.
a distance larger than a few meters. One should not have to remember
Iris recognition is vulnerable to passwords, you simply swipe your
inadequate image quality. finger on scanner and done it.
People suffer from diabetes or some Biometric fingerprint scanner presents a
other serious disease cause alterations in method to record an identity point which
is very hard to be fake, making the
technology incredibly secure.
It is easy to use along with the high
verification process speed and accuracy
[1].
Disadvantages
Because fingerprint scanner only scans
one section of a person's finger, it may
ir susceptible to error.
is. Many scanning system could be cheat
employing artificial fingers or perhaps
showing another person’s finger [2].
Sometimes it may take many swipe of
Fig.2 Image sample for Iris Recognition
ridges and valley on the surface of finger which chemical sectors often affected.
are unique to each and every human [1]. "Ridges Cuts, marks transform fingerprints
are the top skin layer portions of the finger and which often has negatively effect on
performance [2].
www.sciencepublication.org
26
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
Finger prints aren’t private. We all leave Because blood vessels/veins are
fingerprints almost everywhere. Once located inside the human body, it is
the finger prints are stolen, they are quite hard to read or steal. There is
stolen for life time! You possibly in no minor risk of forgery or thieves.
way get back to a secure situation [10]. As finger veins do not depart any
trace during the authentication process
and thus can’t be duplicated.
Finger vein patterns stay continuous
throughout the adult years and so re-
enrollment of the vein pattern does not
required once singed up.
Finger veins are less likely to be
affected by changes in the weather
conditions or health conditions of the
specific.
Rashes, cracks and rough epidermis
Fig.3 Image sample for Finger Print Recognition do not have an impact on the result of
authentication.
2.4 Finger Vein The level of accuracy from vein
Finger vein authentication is often a biometric recognition systems is quite outstanding.
technology which specifies an individual when Time which delivered to validate
using the vein pattern inside of the fingers. each individual is smaller as compared
Veins are usually the blood vessels which carry to other methods (average is 1/2
blood towards the heart. Every single person's second).
veins are having unique physical and behavioral Vein patterns need only low image
features. It provides a greater degree of security resolution.
that protects information and access control Finger vein authentication
much better. As deoxyhemoglobin in the blood technology is inexpensive and having
absorbs infrared lights, vein patterns appear as smaller size of templates.
several dark outlines. The infrared lights
Disadvantages
combine with special camera capturing an image
of the finger vein pattern. This image is then In case an accident causes a user to lose
transformed into pattern data along with saved his/her finger then it can be a problem
as a template of any person's biometric
during the verification process.
authentication data. While authentication, the
Expensive: The actual technologies
particular finger vein image is taken and is
seriously aren’t cheap enough for bulk
compared against the saved template of the
deployment.
person.
Larger Size: The existence of CC
Advantages camera makes the system larger than a
fingerprint scanner.
Finger vein patterns are generally This technology is still untested mainly
distinctive to every person; even among because only vendor companies affirm
identical twins, so the actual false the accuracy levels. Governments and
acceptance rate is quite low (near to standards companies have not proven its
zero). capability yet.
Placing a hand or finger is actually Not for bulk recognition.
less invasive in comparison to other
biometric technologies.
www.sciencepublication.org
27
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
management.
The majority of people can speak more
rapidly in comparison with they can
type with fewer errors.
Disadvantages
Voice recognition is a technology through which surrounding.
sounds, phrases and words voiced by human Voice Recognition systems works well
beings are transformed into electrical signals, only if the microphone is actually close
and then these signals are converted into code to the end user. Much more far-away
design [9]. Here we emphasize on the human microphones are likely to boost the
voice because we generally and most often use number of errors.
voices to communicate our thoughts, our ideas May hacked with prerecorded voice
with others in surrounding environment [9]. messages.
Possesses primary amount of time for
Advantages
adjustment with each user's voice.
Different persons might speak various
Speech can be recommended as a
languages.
natural input as it does not demand any
Several words sound very similarly.
training and it is considerably quicker as
Case: two, to, too.
compared to some other input.
Largely expensive.
Voice is usually a quite natural strategy
to communicate, and in fact it is not
necessary for you to sit at keyboard set
or even work with handheld remote
control.
This technique helps those people who
have difficulty of using their hands.
It does not require any training for users.
It offers a big advantage to those who
suffer from problems that may impact
their writing capability but they can use
their voice to produce words/text on Fig.5 Image sample for Voice Recognition
desktop computers or may be other
equipments.
One of the major advantages of voice 2.6 Lip identification
recognition technique is to cut back
misspelled texts of which many typists Essentially the most growing technique of
may perhaps suffers a problem during human recognition, which originates from
typing. felony and forensic process, is usually human
lips identification [8]. This biometric accumulate
www.sciencepublication.org
28
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
many difficulties of traditional identification. So
as to recognize human identity, lips form and The concept of developing hybrid
color characteristics are taken into consideration (multimodal) biometric system needs a
[8]. Lip biometric may be used to improve the lot of attention.
potency of biometrics such as facial and voice Main drawback of this method is that
recognition. the particular facial attributes chosen
may not acquire relevant details. E.g.
Advantages visibility of teeth may present additional
details that can’t be utilized by a lip
Study proves that lips attributes are
shape model alone.
usually distinctive and also A big smile might cause difficulty in
unchangeable for every single examined recognition of a person with respect to
person. same person with neutral appearance as
Lips prints used by forensics before.
professionals and criminal police
training [8].
Size of template is small.
Lips based human recognition
dependent on static mouth/face photos.
Lips biometric certainly are passive
biometrics – person’s interaction is just
not necessary [8].
Photos might be obtained from the
distance without having analyzed
person’s knowledge.
Fig.6 Image sample for Iris Recognition
Lips usually are visible – not
hidden/overcast by anything [8].
Lips biometric can be hybrid to use as
lips-voice or lips-face biometric systems
[8].
www.sciencepublication.org
29
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
5. Future work
References
[1] Anil K. Jain, Arun Ross and Salil Prabhakar (2004),
“An Introduction to Biometric Recognition.”
www.sciencepublication.org
30