Sie sind auf Seite 1von 9

Paper presentation On

BIO-METRICS

III B. Tech

Department of Electronics and Communication Engineering

SREE VIDYANIKETHAN ENGINEERING COLLEGE


Sree Sainath Nagar, Chandragiri Mandal, Tirupati.
Chitoor Dist. A.P.

ABSTRACT: network security. This results mainly


from human error, carelessness and
Biometrics is seen by many as a in some cases maliciousness.
solution to a lot of the user Biometrics removes human error
identification and security problems from the security equation.
in today‘s networks. Password abuse Our paper will examine all the
and misuse, intentional and technological and feasibility aspects
inadvertent is a gaping hole in as well as the practical applications.

1
We will look at many different phones, and ATMs. In the absence of
biometric methods of identifying the robust personal recognition schemes,
user. The paper has been divided into these systems are vulnerable to the
the following areas: wiles of an impostor. Biometric
recognition, or, simply, biometrics,
• Introduction refers to the automatic recognition of
• What is biometrics individuals based on their
~classification physiological and/or behavioral
• How the idea took up? characteristics Thus biometrics can
• Working of biometric be defined as the science and
systems technology of measuring and
• Role of Biometrics in DNA statistically analyzing biological
• Biometrics in INDIA data.. For a layman, it could be said
that biometrics are the science of
measuring physical or behavioral
 Biometric ATMs for rural
characteristics that are unique to each
India
individual and they verify that an
 Biometric passports
individual is who he or she claims to
be.
• Future of biometrics
• Conclusion
Often seen in science-fiction action
• References
adventure movies, face pattern
matchers and body scanners seem
about to emerge as replacements for
computer passwords. Thus biometric
techniques are of interest in any area
The where it is important to verify the
terms "Biometrics" and "Biometry" true identity of an individual.
have been used since early in the Initially, these techniques were
20th century to refer to the field of employed primarily in specialist high
development of statistical and security applications; however we
mathematical methods applicable to are now seeing their use and
data analysis problems in the proposed use in a much broader
biological sciences. Recently, these range of public facing situations.
terms have also been used to refer to
the emerging field of information Fingerprint, facial, or other
technology devoted to automated biometric data can also be placed on
identification of individuals using a smart card and users can present
biological traits, such as those based both the smart card and their
on retinal or iris scanning, voice fingerprints or faces to merchants,
patterns, dynamic signatures, banks, or telephones for an extra
fingerprints, face recognition, or degree of authentication
hand measurements, especially for
authentication purposes. The purpose What is biometrics?
of such schemes is to ensure that the
rendered services are accessed only Biometrics (ancient Greek: bios
by a legitimate user and no one else. ="life", metron ="measure") refers to
Examples of such applications two very different fields of study and
include secure access to buildings, application. The first and the older
computer systems, laptops, cellular are used in biological studies,

2
including forestry, synthesis, analysis
and management of quantitative data Strictly speaking, voice is
on biological communities such as also a physiological trait because
forests. Biometrics in reference to every person has a different pitch,
biological sciences has been studied but voice recognition is mainly based
and applied for several generations on the study of the way a person
and is somewhat simply viewed as speaks, commonly classified as
"biological statistics More recently behavioral
and incongruently, the term's
meaning has been broadened to Other biometric strategies are
include the study of methods for being developed such as those based
uniquely recognizing humans based on gait (way of walking), retina,
upon one or more intrinsic physical hand veins, ear recognition, facial
or behavioral traits thermo gram, DNA, odor and palm
prints.
HOWTHE IDEA TOOK UP

An idea is nothing but a spark of


intelligence. It is nevertheless the
start of a revolution, and great minds
have plenty of such weird and
wonderful ideas.
It is tempting to think of biometrics
as being sci-fi futuristic technology
that we shall all be using some time
in the near future. But actually the
basic principles of biometric
verification were understood and
Biometric characteristics can be practiced somewhat earlier.
divided in two main classes, as Thousands of years earlier, the
represented in figure on the right people in the Nile valley routinely
• Physiological: are related to employed biometric verification
the shape of the body. The formally identify individuals via
oldest traits that have been unique physiological parameters
used for more than 100 years such as scars and a combination of
are fingerprints. Other features such as complexion, eye
examples are face color, height and so on but the first
recognition, hand geometry known example of biometrics in
and iris recognition practice was a form of finger printing
being used in China in the 14th
century, as reported by explorer Joao
• Behavioral: are related to the de Barros. He wrote that the Chinese
behavior of a person. The merchants were stamping children's
first characteristic to be used, palm prints and footprints on paper
still widely used today, is the with ink to distinguish the young
signature. More modern children from one another. This is
approaches are the study of one of the earliest known cases of
keystroke dynamics and of biometrics in use and is still being
voice used today

3
In 1800s, identification largely relied • (3) Store the template in a
upon "photographic memory." In the local repository, a central
1890s, an anthropologist and police repository, or a portable
desk clerk in Paris named Alphonse token such as a smartcard.
Bertillon sought to fix the problem of • (4) live-scan the
identifying convicted criminals and chosen biometric.
turned biometrics into a distinct field • (5) Process the
of study. He developed a method of biometric and
multiple body measurements which extract the
got named after him (Bertillonage). biometric
His system was used by police template.
authorities throughout the world, • (6) Match the
until it quickly faded when it was scanned biometric
discovered that some people shared against stored
the same measurements and based on templates.
the measurements alone, two people • (7) Provide a matching score
could get treated as one. After the to business applications.
failure of Bertillonage, the police
• (8) Record a secure audit.
started using finger printing, which
was developed by Richard Edward
Henry of ScotlIn the past three
decades biometrics has moved from
a single method (fingerprinting) to
more than ten discreet methods.
Companies involved with new
methods number in the hundreds and
continue to improve their methods as
the technology available to them
advances. Prices for the hardware
required continue to fall making
systems more feasible for low and Is DNA a biometric?
mid-level budgets. As the industry
grows however, the public concern DNA differs from standard
over privacy issues. biometrics in several ways:
As technology gets more and more
advanced, Laws and regulations • DNA requires a tangible
continue to be drafted and standards physical sample as opposed
are beginning to be developed. The to an impression, image, or
ways to distinguish the different recording.
biometrical signalments become • DNA matching is not done in
more and more precise. This has led real-time, and currently not
to field of biometric technologies all stages of comparison are
that we live in today. automated.
• DNA matching does not
How a biometric system works employ templates or feature
• (1)Capture the chosen extraction, but rather
biometric. represents the comparison of
• (2) Process the biometric and actual samples.
extract and enroll the
biometric template.

4
Regardless of these basic differences, embedding it on a microchip, which
DNA is a type of biometric inasmuch
scans and authenticates the identity
as it is the use of a physiological
characteristic to verify or determine of the person. The blood scanning is
identity.
Biometrics using DNA done through a laser beam and that
for identity management: is why the blood extraction is so
small that it is hardly painful to be
The most pronounced name, DNA
noticed.
or deoxyribonucleic acid is a double
helix structure present in every cell The DNA Security System is a
of human body. The DNA state-of-the-art biotechnology
contained in the cells is the system comprised of the Applied
blueprint for all life and that genetic DNA Chip and the Applied DNA
code is unique to each individual Chip Reader. The plant DNA is
i.e., no two human beings have the embedded into non-silicon based
same DNA structure unless it is a microchip using a revolutionary
case of an identical cloned twin. proprietary technique. A profound
DNA is used as a form of benefit of this technique is that it
identification by using to produce can be used in numerous forms to
either a DNA fingerprint or a DNA confirm the characteristics of a
profile. The technology makes no multitude of products.
mistake of one person’s DNA for
somebody else’s. DNA identity Although there are discussions of

testing is a highly accurate where using DNA fingerprints as a form of

exclusions are perfect and matches genetic bar code to identify

in two unrelated people area individuals, it’s not likely to happen

probability of 1 in 6 billion. in the very near future. This is

However, since DNA identification because the technology, which

is not yet an automated process it is requires isolating, keeping on file

still not considered as a biometric and then analyzing the patterns, are

recognition technology. both expensive and impractical.


Benefits of DNA biometric systems
The process of making a DNA
fingerprint is by extracting a drop • Accurate: the chance of 2
individuals sharing the same
of blood by a laser beam and DNA profile is less than one

5
in a hundred billion with 26 with an increasing demand of
different bands studied. security in accordance of unique
identification of individuals. Its use
Weaknesses of DNA for identification in applications
biometric systems other than policing is on the rise. In
view of the rapidly increasing
• DNA matching is not done in applications, the scope of biometrics
real-time is also increasing, be it identification
• Intrusive: a physical sample via face, voice, retina or iris.
must be taken, while other Fingerprinting, however, has the
biometric systems only use advantage of being a familiar
an image or a recording concept worldwide. I n the retail
• Civil liberty issues and public payments arena, developments in
perception biometric Technologies have made
their presence felt in the
Applications of DNA Pervasiveness of self service devices
biometrics including Automated Teller
Machines (ATMs) and Point of
DNA evidence has been used in Service (POS) machines. Some of
courts of law since 1985 to prove the new generation POS terminals
guilt or innocence. It is also used for are biometric enabled with smart
paternity testing, identification of card readers, allowing thumb-print
missing or dead people. based authentication. Some Indian
banks have started implementing
Biometric ATMs for rural biometric applications in retail
India: branch applications for officer
authentication. Elsewhere in the
ATMs with biometric devices are the world, efforts are on enabling
latest solution in the ongoing effort payments through kiosks based on
to offer banking fingerprints (non-card based). ATM
services to the enhancements with biometric support
rural masses. envisaged by vendors eliminate the
need for PIN entry, and authenticate
To reach the customer transactions by thumb-
rural masses, impressions. A simplified menu on
banks are going ATMs coupled with possible audio
all out in guidance in local language enable
providing a easy use for rural masses. So far
user-friendly bank ATMs are dependent on PIN
banking experience. To boost micro verification. The fingerprint
financing initiatives, banks are authentication method is non-PIN
deploying biometric solutions with based, and this requires
ATMs. Establishing the identity of a enhancements to the standard Switch
rural depositor through biometrics environment.
makes it possible for illiterate or
barely literate folks to become part of
the banking user community. In
recent years the importance of  BIOMETRIC PASSPORT:
biometrics has grown tremendously

6
A biometric passport is a combined  India is issuing biometric
paper and electronic identity passports next year :
document that uses biometrics to
authenticate the citizenship of Government has decided to
travelers. The passport's critical introduce biometric passports, using
information sophisticated technology of finger
is stored on a prints, in the country by the end of
tiny RFID next year.
computer It is aimed at restricting misuse of
chip, much passports. These will initially be
like introduced in the category of
information diplomatic and official passports,
stored on smartcards. Like some officials said.
smartcards, the passport book design Such passports, aimed at eliminating
calls for an embedded contact less the scope of impersonation and other
chip that is able to hold digital forms of manipulations are
signature data to ensure the integrity subsequently expected to be given to
of the passport and the biometric other categories of people. These
data. passports
will have a
The currently standardized chip,
biometrics used for this type of which will
identification system are facial carry the
recognition, fingerprint recognition, finger print
and iris recognition. These were and all
adopted after assessment of several other
different kinds of biometrics details of
including retinal scan. The its holder.
International Civil Aviation The
Organization defines the biometric fingerprint will also be fed in the
file formats and communication computer system of immigration
protocols to be used in passports. officials at airports and ports.
Only the digital image (usually in
JPEG or JPEG2000 format) of each "Whenever anybody with this
biometric feature is actually stored in passport approaches an immigration
the chip. The comparison of officer, he will be required to put his
biometric features is performed
outside the passport chip by
electronic border control systems (e-
borders). To store biometric data on
the contact less chip, it includes a
minimum of 32 kilobytes of
EEPROM storage memory, and runs finger print
on an interface in accordance with on the computer window. If the
the ISO/IEC 14443 international finger print match, the person is
standard, amongst others. These cleared," an official said.
standards ensure interoperability
between different countries and Introduction of this system will
different manufacturers of passport involve massive computerization and
books.

7
the task has been entrusted to the Already A4Vision, a provider of 3-D
government-owned facial scanning and identification
National Informatics Centre (NIC). software uses specialized algorithms
The Ministry of External Affairs to interpret the traditional 2-D
(MEA) has also decided to introduce camera image and transfer it into a 3-
a system wherein a sticker, carrying D representation of a registered face.
all relevant information of its holder, This makes it almost impossible to
would be pasted on passports. deceive the biometric system with
still photos or other images.
These will be beneficial in the
context of people going abroad for Strengthening existing biometric
studies or job. It is being introduced innovations for future growth
in view of detection of large number
of cases wherein wrong information All of these security innovations will
has been furnished. make biometric technology more
accurate and make its usage more
The Future of Biometrics -- widespread.
Trends and Emerging Uses
• Access control facial recognition --
for Biometric Technology
Biometric technologies will permit
authorized users entry to a property
The future of biometrics holds great
or to specific location in a building.
promise in private industry uses. By
Today, A4Vision uses a 3-D infrared
measuring facial geometry,
facial recognition system to project
surveillance systems can identify
subdued light onto a subject's face
suspects against characteristics
for optimal identification. But in the
stored in the security system's
future, this biometric technology will
database. "There is a popular
be strengthened so that the subject
tendency to regard biometric
will not have to be a just few feet
products as sci-fi mythology, but the
away from the video surveillance
reality is that biometrics is the future
cameras.
of the security industry and is
quickly becoming recognized as the
• Facial recognition passive
most accurate identification
surveillance -- Hidden surveillance
technology in the market," claims
cameras will be set up to monitor an
Don Mihae who was recently hired
entranceway of any type of building
by JAD Communication & Safety
to accurately identify a potential
Systems (JADCS) to lead its security
suspect or terrorist against a database
division.
of millions of images in less than one
second. Alerts will then transmitted
Biometrics' future will include e-
to security personnel in real time.
commerce applications for extra
security on the checkout page, and
• Alert management -- This is a fully
biometrics will guard against
customizable command center to
unauthorized access to cars and cell
guard against potential security
phones. In the future, biometric
breeches. The center uses real-time
technology will further develop 3-D
technologies to deliver security alerts
infrared facial recognition access
to multiple locations through PDA
control, real-time facial recognition
(personal digital assistant) devices,
passive surveillance, and visitor
and other mobile technologies
management authentication systems.

8
CONCLUSION: standards and accuracy. In probably
a short time, biometric developers
As the need increases for will surpass the quality of their
government bodies and large firms to current product so that the future of
deploy hi-tech security systems to the biometric field will be assured in
solve crimes or protect employees, the hi-tech marketplace.
biometric technology will improve,
as investor confidence increases. References:
Once the consumer confidence is
evident, biometric research will www.biometrics.co.in
provide further innovations, which  M. A. Dabbah, W. L. Woo,
will in turn strengthen future and S. S. Dlay, "Secure
performance, and this cycle will Authentication for Face
continue to build in a positive Recognition," presented at
direction. But for the biometric Computational Intelligence in
technology field to grow, industry Image and Signal Processing,
standards must exist so that there is 2007. CIISP 2007. IEEE
the greatest compatibility between Symposium on, 2007
applications and hardware With such  http://www.cilab.upf.edu/bios
a young technology, biometric and ecure1/public_docs_deli/BioSecu
identification technology has re_Deliverable_D10-2-3_b3.pdf
everything to gain with improved

Das könnte Ihnen auch gefallen