Beruflich Dokumente
Kultur Dokumente
I would like to express my deep-felt gratitude to my advisor Asst. Prof. Mr. Vikas Kumar for
giving me an opportunity to work with the Biometrics System and for his advice,
encouragement, constants support. I wish to thank him for extending me freedom in deciding the
direction and scope of my research.
The purpose of this pre-thesis report is to provide an overview of the Biometric System.
Throughout this report, the emphasis has been to provide an understanding that Biometrics is
described as the science of recognizing an individual based on his or her physical or behavioural
traits.
I wish to thank all the people who provide indispensible encouragement, motivation and strength
during the preparation of this report. First of all, I feel greatly encouraged by the keen interest of
HOD Sir, Asst. Prof. Mr. RajatVarshney. I am greatly thankful to Asst. Prof. Mr. Avtar Singh,
Thesis and Seminar Incharge, who assigned the job of compiling this report. I am equally
thankful to Asst. Prof. Mr. MukeshSone, Asst. Prof. Mr. Santosh Kumar, Class Incharge and
my Thesis SupervisorAsst. Prof. Mr. Vikas Kumar, who were the main source of simulation
regarding the topic. I am immensely grateful to other faculty members of our department too.
I am thankful to my other colleagues and friends who helped in all possible ways, wherever
required.
Shiv Kumar
M.Tech(ECE)
Roll No. 1320311009
ABSTRACT
A wide variety of systems require reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such schemes is
to ensure that the rendered services are accessed only by a legitimate user, and not anyone else.
Examples of such applications include secure access to buildings, computer systems, laptops,
cellular phones and ATMs.
In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles
of an impostor. Biometric recognition, or simply biometrics, refers to the automatic recognition
of individuals based on their physiological and/or behavioral characteristics. By using biometrics
it is possible to confirm or establish an individuals identity based on who she is, rather than by
what she possesses (e.g., an ID card) or what she remembers (e.g., a password). In this
paper, we give a brief overview of the field of biometrics and summarize some of its advantages,
disadvantages, strengths, limitations, and related privacy concerns.
Biometric person identity authentication is gaining more and more attention. The authentication
task performed by an expert is a binary classification problem: reject or accept identity claim.
Combining experts, each based on a different modality (speech, face, fingerprint, etc.), increases
the performance and robustness of identity authentication systems.
In this context,a key issue is the fusion of the different experts for taking a final decision (i.e.,
accept or reject identity claim). We propose to evaluate different binary classification schemes
(support vector machine, multilayer perceptron, C4.5 decision tree, Fishers linear discriminant,
Bayesian classifier) to carry on the fusion. The experimental results show that support vector
machines and Bayesian classifier achieve almost the same performances, and both outperform
the other evaluated classifiers.
CONTENTS
PAGE
CERTIFICATE
ABSTRACT
ACKNOWLEDGEMENT
LIST OF FIGURE
LIST OF TABLE
LIST OF ABBREVIATIONS
i
ii
vii
viii
ix
CHAPTER 1
1.1 Introduction of biometrics
1.1.1 Universality
1.1.2 Distinctiveness
1.1.3 Permanence
1.1.4 Collectability
1.1.5 Performance
1.1.6 Acceptability
1.1.7 Circumvention
1.1.8 What to Measure
1.2 Needs of Biometrics
1.3 Origin of Biometrics
1.4 Working of Biometrics Technologies
1.5 Error Rate Their Usage
1-7
1
2
2
2
2
3
3
3
3
4
4
5
6
CHAPTER 2
2.1 Introduction
8-11
8
CHAPTER 3
3.1 Fingerprint Recognition
3.2 Iris Recognition
3.3 Retina Recognition
3.4 Hand Geometry Recognition
3.5 Signature Recognition
3.6 Face Recognition
3.7 Speaker Verification
3.8 Other Biometrics Techniques
3.8.1 Palm recognition
3.8.2 Hand Vein Recognition
3.8.3 DNA
3.8.4 Thermal Imaging
3.8.5 Ear Shape
3.8.6 Body odor
3.8.7 Keystroke Dynamic
12-32
12
15
16
17
19
20
22
23
23
23
24
24
24
24
25
25
25
25
25
25
26
26
26
26
26
26
27
27
28
29
29
29
30
30
31
31
32
33-46
33
36
37
38
38
38
39
40
40
41
41
41
42
42
43
43
43
43
43
43
44
44
44
CHAPTER 5
5.1 Matlab Software
5.2 Image Preprocessing Toolbox
5.4 Methodology
5.4.1 Algorithm for Image Preprocessing Module
5.4.2 Algorithm for Feature Extraction
5.4.3 Algorithm for Determining Landmark Points
5.4.4 Algorithm for Determining the Length of the Fingers
5.4.5 Algorithm For Determining the Width of the Fingers
5.4.6 Algorithm For Determining the palm Width and other Four Distances
5.4.7 Matching
47-59
47
47
49
49
54
55
56
57
57
58
CHAPTER 6
6.1 Result and Discussion
6.2 Future Scope
6.3 Conclusion
60-63
60
60
64
LIST OF FIGURES
Figure No.Description
Page No.
3.1Fingerprint
3.2Fingerprint13
3.3Optical Reader
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
12
Fingerprint Processing
Iris Recognition
Iridian Iris Recognition Technology
Retina of Human Eye
Retina Scanner Device
2D Structure of Hand Geometry
Hand Geometry Recognition System
Captured Image of Signature
E-pad and Smart pen
Captured Image Of Face
4.1
4.2
4.3
4.4
4.5
4.6
4.7
5.1
5.2
5.3
5.4
5.5
5.6
6.1
14
14
15
15
16
17
17
18
19
20
21
34
35
36
37
39
45
48
50
51
52
53
54
62
LIST OF TABLES
Table No.
Description
Page No.
1.1
1.2
7
7
6.1
61