Sie sind auf Seite 1von 7

ACKNOLEDGEMENT

I would like to express my deep-felt gratitude to my advisor Asst. Prof. Mr. Vikas Kumar for
giving me an opportunity to work with the Biometrics System and for his advice,
encouragement, constants support. I wish to thank him for extending me freedom in deciding the
direction and scope of my research.
The purpose of this pre-thesis report is to provide an overview of the Biometric System.
Throughout this report, the emphasis has been to provide an understanding that Biometrics is
described as the science of recognizing an individual based on his or her physical or behavioural
traits.
I wish to thank all the people who provide indispensible encouragement, motivation and strength
during the preparation of this report. First of all, I feel greatly encouraged by the keen interest of
HOD Sir, Asst. Prof. Mr. RajatVarshney. I am greatly thankful to Asst. Prof. Mr. Avtar Singh,
Thesis and Seminar Incharge, who assigned the job of compiling this report. I am equally
thankful to Asst. Prof. Mr. MukeshSone, Asst. Prof. Mr. Santosh Kumar, Class Incharge and
my Thesis SupervisorAsst. Prof. Mr. Vikas Kumar, who were the main source of simulation
regarding the topic. I am immensely grateful to other faculty members of our department too.
I am thankful to my other colleagues and friends who helped in all possible ways, wherever
required.

Shiv Kumar
M.Tech(ECE)
Roll No. 1320311009

ABSTRACT

A wide variety of systems require reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such schemes is
to ensure that the rendered services are accessed only by a legitimate user, and not anyone else.
Examples of such applications include secure access to buildings, computer systems, laptops,
cellular phones and ATMs.
In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles
of an impostor. Biometric recognition, or simply biometrics, refers to the automatic recognition
of individuals based on their physiological and/or behavioral characteristics. By using biometrics
it is possible to confirm or establish an individuals identity based on who she is, rather than by
what she possesses (e.g., an ID card) or what she remembers (e.g., a password). In this
paper, we give a brief overview of the field of biometrics and summarize some of its advantages,
disadvantages, strengths, limitations, and related privacy concerns.
Biometric person identity authentication is gaining more and more attention. The authentication
task performed by an expert is a binary classification problem: reject or accept identity claim.
Combining experts, each based on a different modality (speech, face, fingerprint, etc.), increases
the performance and robustness of identity authentication systems.
In this context,a key issue is the fusion of the different experts for taking a final decision (i.e.,
accept or reject identity claim). We propose to evaluate different binary classification schemes
(support vector machine, multilayer perceptron, C4.5 decision tree, Fishers linear discriminant,
Bayesian classifier) to carry on the fusion. The experimental results show that support vector
machines and Bayesian classifier achieve almost the same performances, and both outperform
the other evaluated classifiers.

CONTENTS

PAGE
CERTIFICATE
ABSTRACT
ACKNOWLEDGEMENT
LIST OF FIGURE
LIST OF TABLE
LIST OF ABBREVIATIONS

i
ii
vii
viii
ix

CHAPTER 1
1.1 Introduction of biometrics
1.1.1 Universality
1.1.2 Distinctiveness
1.1.3 Permanence
1.1.4 Collectability
1.1.5 Performance
1.1.6 Acceptability
1.1.7 Circumvention
1.1.8 What to Measure
1.2 Needs of Biometrics
1.3 Origin of Biometrics
1.4 Working of Biometrics Technologies
1.5 Error Rate Their Usage

1-7
1
2
2
2
2
3
3
3
3
4
4
5
6

CHAPTER 2
2.1 Introduction

8-11
8

CHAPTER 3
3.1 Fingerprint Recognition
3.2 Iris Recognition
3.3 Retina Recognition
3.4 Hand Geometry Recognition
3.5 Signature Recognition
3.6 Face Recognition
3.7 Speaker Verification
3.8 Other Biometrics Techniques
3.8.1 Palm recognition
3.8.2 Hand Vein Recognition
3.8.3 DNA
3.8.4 Thermal Imaging
3.8.5 Ear Shape
3.8.6 Body odor
3.8.7 Keystroke Dynamic

12-32
12
15
16
17
19
20
22
23
23
23
24
24
24
24
25

3.8.8 Fingernail Bed


3.9 Practical Detail
a. Universality
b. Uniqueness
c. Performance
d. Collectability
e. Performance
f. Acceptability
g. Circumvention
3.10 The layer Model
a. First Measurement
b. Creation of master Characteristic
c. Storage of Master Characteristic
d. Acquisition
e. creation of New characteristic
f. Comparison
g. Decision
3.11 Biometric And Cryptography
a. Biometric are not Secret
b. The live ness Problem
c. Authentication Software
d. Improving Security With Biometrics
CHAPTER 4
4.1 Introduction of Hand Geometry
4.2 Module of Hand Geometry Biometric System
4.2.1 Image Acquisition
4.2.2 Image Preprocessing
4.2.3 Gray scale Image
4.2.4 Noise Removable Image
4.2.5 Features Extraction
4.2.6 Matching
4.2.7 Decision
4.3 Complete Block Diagram of Hand Geometry System
4.3.1 Enrollment Phase
4.3.2 Verification Phase
4.4 Applications of Hand geometric System
(i) Cash Vault Application
(ii) Dual Custody Application
(iii) Anti-pass Back
(iv) Time and Attendance
(v) Point of Scale Application
(vi) Interactive Kiosks
(vii) Parking Lot Application
4.5 Problem Formulation and Proposed Solution
4.5.1 Problem Formulation

25
25
25
25
25
26
26
26
26
26
26
27
27
28
29
29
29
30
30
31
31
32
33-46
33
36
37
38
38
38
39
40
40
41
41
41
42
42
43
43
43
43
43
43
44
44

4.5.2 Proposed Solution

44

CHAPTER 5
5.1 Matlab Software
5.2 Image Preprocessing Toolbox
5.4 Methodology
5.4.1 Algorithm for Image Preprocessing Module
5.4.2 Algorithm for Feature Extraction
5.4.3 Algorithm for Determining Landmark Points
5.4.4 Algorithm for Determining the Length of the Fingers
5.4.5 Algorithm For Determining the Width of the Fingers
5.4.6 Algorithm For Determining the palm Width and other Four Distances
5.4.7 Matching

47-59
47
47
49
49
54
55
56
57
57
58

CHAPTER 6
6.1 Result and Discussion
6.2 Future Scope
6.3 Conclusion

60-63
60
60
64

LIST OF FIGURES
Figure No.Description

Page No.

3.1Fingerprint
3.2Fingerprint13
3.3Optical Reader
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13

12
Fingerprint Processing
Iris Recognition
Iridian Iris Recognition Technology
Retina of Human Eye
Retina Scanner Device
2D Structure of Hand Geometry
Hand Geometry Recognition System
Captured Image of Signature
E-pad and Smart pen
Captured Image Of Face

4.1
4.2
4.3
4.4
4.5

Hand Geometry Recognition Illustration


Hand Geometry System
Module of Hand geometry Biometrics System
Image Acquisition
Feature Extracted From the Input Image

4.6

Components of Biometrics System 42

4.7

Define all land mark point and all features

5.1
5.2
5.3
5.4
5.5
5.6
6.1

Example image from the hand database


Input colored image
Gray Scale image
Image After Noise removal
Image After edge Detection
Hand geometry features
FAR-FRR Curve

14
14
15
15
16
17
17
18
19
20
21
34
35
36
37
39

45
48
50
51
52
53
54
62

LIST OF TABLES

Table No.

Description

Page No.

1.1
1.2

Real Round Rates( From Real Test)


Ratethree devices set to the highestSecurity level

7
7

6.1

The value of FAR and FRR at different Threshold value

61

Das könnte Ihnen auch gefallen