Beruflich Dokumente
Kultur Dokumente
SEMINAR REPORT ON
BIO-METRICS TECHNOLOGY
(Worldwide interoperability for Bio-metrics)
1
available at www.mindstien.net
Contents:- page-no:-
2. Introduction to Bio-metrics 2
3. A Few Definition 3
4. History of Bio-metrics 4
7. Phases of Bio-metrics 8
7.1 Input
7.2 Process
7.3 Output
8. Bio-metrics Identification 10
8.1 Voice Print
8.2 Finger Print
8.3 Iris Pattern
8.4 Face Print
8.5 Hand Geometry
8.6 Retinal Scan
8.7 Keystroke Dynamics
8.8 Facial Recognition
8.9 Signature Recognition
2
available at www.mindstien.net
10. Comparison of Bio-metrics technique 20
14. Conclusion 30
15. Reference 31
3
available at www.mindstien.net
* WHAT SECURITY?* &
WHY SECURITY?*
From the beginning of the human culture, people are always trying to
secure their properties. Because some people are always eager to snatch
others properties.
To restrict this kind of theft human beings are making special systems that
can prevent the thieves such systems are known as security systems.
We can consider the starting of these kinds of systems through lock and
key.
A Frenchman Alexander Fish has made a strong, fire proof safe in 1844.
And Linas Yel –an American, has invented a Pin lock kind of lock. Both
these equipments are used to provide security to money, important
documents and jewellary. So this is the first step in the world of security
system.
At that point of time this arrangement for security was considered the best.
But as time passes it was found that any unauthorized person could access
these through duplicate keys or using any technique. So as the world
progresses, the thieves become more intelligent to break the security.
Thus, we always need a new and strong security system to protect our
assets.
e.g. :-If you are purchasing something from web and because of
lack of security someone come to know your bank account
number. Then that person will have all the information of your
bank account, which can perhaps put you in a big trouble!
Now a days, there are many security systems are available. But we shall
concentrate on ‘BIO-METRICS’.
4
available at www.mindstien.net
*INTRODUCTION*
BIO=Pertaining to biology; MATRICS=Science and art of measurement.
5
available at www.mindstien.net
*A FEW DEFINATIONS*
¾ Biometrics Authentication
Note the distinction between the terms biometrics and biometry. Biometry
refers to a much broader field involving application from statistics to
biology and medicine. Biometrics is a noun and biometric is an adjective.
Identification Authentication
It determines the identity of the person. It determines whether the person is indeed
who he claims to be.
There is no identity claim from the user. The user makes an identity claim. By using
The system has to search through its record the claim as a key, the system searches the
to find the identity. This search is called a user’s record to compare. It is a one to one
many-to-one mapping. The cost of mapping. The system uses the identity as a
computation in the identification task key to call for the identity’s record. The
increases in proportion to the number of cost of computation is not dependant on
record of users. the number of record of users.
It is often assumed that a captured The captured biometric signature comes
6
available at www.mindstien.net
biometric signature comes from a set of from a large set of unknown users. This is
known biometric feature stored in the referred to as open-set verification.
system. This is referred to as closed-set
identification.
HISTORY OF BIO-METRICS*
¾ Francis Gal ton is one of the founders of Bio-metrics. In 1892, Gal ton
¾ Invented the first system of fingerprinting.
¾ He has observed that No two persons have same finger print. Each and
¾ every person has got a unique finger print pattern.
¾ But after 1990, when IT (Information Technology) comes into the picture,
through its advancement and simplicity Bio-metrics technique becomes very
popular.
5.1. Purpose
7
available at www.mindstien.net
5.2. Journal
5.3. Meeting
8
available at www.mindstien.net
*GENERIC MODEL OF BIO-METRICS*
9
available at www.mindstien.net
6.2 Transmission: -
Not all the biometric systems process and store data on the measuring
device. Often measurement is made using relatively simple device to a
computer or server for processing and/or storage. Depending on the system, the
data may be relatively large and thus would need to be compressed for quick
transfer. The compression algorithm needs to be selected carefully; otherwise it
may introduce some artefacts that could impact the decision process.
In any image scanning Biometric system, JPEG compression is
preferred due to the block ness it produces at high compression ratios. The data
can also be transmitted to the database for storage as raw data.
10
available at www.mindstien.net
* PHASE OF BIO-METRICS*
7.1 Input
Using appropriate input device it will collect the data of the person’s
biological features. These features are known as the master key for
the computer.
For recording and converting biometric traits to usable computer data, one needs
an appropriate sensor (see table). Of course, costs can greatly vary for different
sensors. However, we can't forget that many technical devices already have
sensors built in, and therefore, offer possibilities to measure biometric features
nearly free of cost.
7.2 Process
Processes the input data. Here, computer takes the measurement of
inputted Biological features.
11
available at www.mindstien.net
No two persons have same finger print. So, computer joins the points of that
finger print features and make the pattern of it and it will store that pattern into
its memory. Then computer compares this pattern against the master keys.
7.3 Output
Testing of processed data and give the access rights to the person. Here,
When any person scanned his/her finger print , computer will
Store a Bio-logical featured pattern and compares it against the stored master-
Key in its memory. And if it is matched, then permission granted else not.
BIO-METRICS IDENTIFICATION
12
available at www.mindstien.net
incoming audio signal whereas voice recognition tries to detect
the speaker given a voice sample.
But as each & every person has got different voice pattern
that’s why no two voice prints are matched.
Your voice is further modified by the way you speak - the way
your mouth, lips, tongue, jaw and teeth move (these are called
articulators). Therefore, the chances of two people have the
same vocal characteristics are minute.
13
available at www.mindstien.net
Finger print, Francis Galton proves this after a long observation in
1982
To scan the finger print, a special kind of scanner that can work
with optical rays is used.
Here, those special features are core, split, island, end & delta.
14
available at www.mindstien.net
8.3 PATTERN OF IRIS: -
an iris has a mesh-like texture to it, with numerous overlays
and patterns. The iris is located behind the cornea of the eye,
but in front of the lens. Its only physiological purpose is to
control the amount of light that enters the eye through the
pupil, but its construction from elastic connective tissue gives
it a complex, fibrillous pattern.
15
available at www.mindstien.net
In this technique CCD camera, which looks like small
camcorders, scans the eye’s iris pattern.
The iris pattern of a person’s left and right eyes are different.
The pattern of iris is converted into the total 4,096 bits of 0 &
1.
Then computer compares the new data of 0 & 1 to the iris print
stored as master key and if it is matches then gives the access
rights.
Iris has stable and distinctive features for personal
identification. That is because every iris has fine and unique
patterns and does not change over time since two or three years
after the birth, so it might be called as a kind of optical finger
print
The Iris Code is so specialized that the chances of two irises
having the same code are 1 in 1052 !
16
available at www.mindstien.net
Computer login: the iris an living password.
Internet security.
To make this pattern it will use approx 50 features of face like the
distance between two eyes, breath of nose, cheeks, area of
forehead, jaws etc.
The computer converts the face pattern into 0 & 1.After taking the
input that input is also converted into 0 & 1.If the both code
matches the person is authorized.
17
available at www.mindstien.net
software as culprit. For that person Bio-metrics technology
has been proved 100% true. While according to plan other
person is eating a Jellybeans candy and he acts as if he is
blowing. By doing this face was looking quite similar to the
first one. So, camera recognizes him as a culprit by ringing
an alarm.
18
available at www.mindstien.net
8.5 Hand Geometry: -
Hand geometry is by far the most widely used
biometric system. The ID3D Hand key system from
Recognition Systems, Inc. is the most popular.
Various methods are used to measure the hand; these
methods generally fall into one of two categories:
1. Mechanical
2. Image-edge detection
Either method produces estimates of certain person.
Key measurements of the hand (length of fingers and thumb,
widths, etc.); this data are used to "categorize" a person.
It works as follows:
The user first enters a PIN number on a keypad, and then
positions their hand on a plate using a set of guidance pins which
ensures that the hand will be in generally the same position for every
measurement. Then a digital camera mounted above the plate, with
the aid of a mirror, takes a picture of the top and side views of the
hand. The dimensions of the hand, such as finger length, width and
area, are extrapolated from the image and the magnification of the
camera. This system, however, is subject to an attack using a fake
hand modeled after that of an authorized user.
Retinal Scan technology is based on the blood vessel pattern in the retina
of the eye. A retinal scan can produce almost the same volume of data as a
fingerprint image analysis.
It works as follows:
The user positions their head against a support, and a low power infrared
light is directed against the back of the retina. The image of the pattern of veins is
reflected back to a camera.
19
available at www.mindstien.net
8.7 Keystroke Dynamics: -
This method analyzes the way in which a user types at a computer
keyboard. The input is monitored thousands of times a second, and the durations
of keystrokes and the latencies between them are recorded.
The goal for keyboard dynamics is continual authentication of the user
while at a computer; so that if an intruder user had access to the users session
while they were away, the machine would eventually be able to recognize the
discrepancy. Even though typing patterns are behavioral characteristics, they are
very hard to mimic.
1. Facial metrics
2. Eigenfaces.
20
available at www.mindstien.net
cannot consistently measure the dynamics of the signature. Also, a person does
not make a signature in a fixed manner; therefore, the data obtained from any one
signature from an individual has to allow for a range of possibilities.
Signature recognition has the same problem with match discrimination
(i.e., finding a match in a large database) as does hand geometry.
(a) (b)
(c) (d)
(e)
Figure 1(c) shows an ear. An ear has more structure thus creates different
shading. Segmenting ear can be very challenging. However, if ear can be
segmented reliably and represented in a canonical image space, it is possible to
extract ear shape information. The same goes to fist as shown in Figure 1(d). We
tried to capture thumb too in the hope that fingerprints might be observed.
However, at such resolution, fingerprints are partially captured and are not clear.
21
available at www.mindstien.net
By visual judgement, we have decided to use face biometrics, over eye
biometrics, ear and fist in decreasing order of priority.
Signature dynamics and voice dynamics have the lowest accuracy rates
according to [Ruggles, 1998]. In addition, these two techniques rely on
behavioural measurements as opposed to physical measurements. In general,
behavioural biometrics is less reliable than physical biometrics.
22
available at www.mindstien.net
Retinal scan has high accuracy but also has a high data collection error
rate and low user acceptability. For this reason, retinal scan exists only in science
fiction movies but not in real life applications!
The fingerprint biometric has a low data collection error rate and high user
acceptability. Further, fingerprint technology has had the most research and
development money applied to both identification and authentication problem.
Finally, fingerprint biometrics has the highest acceptance in the identification
community and virtually every large biometrics system in operation today uses
fingerprint biometrics. Notwithstanding its association with "criminal"
applications, fingerprint biometrics is generally accepted by clients.
The chosen biometrics in this project, i.e., face and voice, are based on
user acceptability and another important factor, the availability of resources in the
laboratory. Once the system is established, moving into other biometrics would be
easier.
23
available at www.mindstien.net
*HOW WELL DO BIOMETRICS WORK?*
24
available at www.mindstien.net
attempts by unauthorized person to determine the number of
possible occurrences.
In general, the larger the population and the greater the number
of transactions, the greater the confidence level in the accuracy
of the results.
25
available at www.mindstien.net
If the reported error rate is 1:10, then a sample of 100
transactions may provide a sufficient confidence level.
Conversely, a 100-transaction sample would be too small if the
error rate was reported as 1:100,000.
Biometric devices are extremely secure, thanks to the combination of low False
Accept Rates at moderate sensitivity settings, combined with a short user keypad
code.
*ABOUT BIO-METRICS*
26
available at www.mindstien.net
13.1 Will Biometric Solve All Security Concerns?
27
available at www.mindstien.net
anyone, the input must take place absolutely secret, it must not be extorted, and
the technical implementations must be perfect. This leads us to the practical
aspects: the implementation must be protected against replay attacks, keyboard
dummies (e.g., false ATMs), wiretapping etc. Even biometric features have to
cope with such problems. However, it can be assumed that the protection of
biometric feature acquisition is not easier than the acquisition of the password,
provided the implementation expense is comparable!
¾ For Security
¾ For Accountability
¾ For Efficiency
• The unfortunate events of September 11, 2001 have placed the recent
focus on creating new systems and installations employing biometrics.
28
available at www.mindstien.net
¾ Combination of Biometrics with smart cards
Lastly, since the biometric templates are stored on individual cards, the number of
users for any particular biometric reader is unlimited. This scenario differs from
biometric readers that store
o the template, thereby limiting the template capacity to the reader's
storage capacity.
• So, in future it may not require to ask “What is your name?” just make a
shake hand and allow the Bio-chips to interact and will know the person’s
Identification.
29
available at www.mindstien.net
• We don’t know, But Bio-metrics identification may include brain
Chemistry because every one has got different brain chemistries.
30
available at www.mindstien.net