Sie sind auf Seite 1von 8

BIOMETRICS

ABSTRACT: biological sciences. Recently, these


terms have also been used to refer to
Biometrics is seen by many as a the emerging field of information
solution to a lot of the user technology devoted to automated
identification and security problems identification of individuals using
in today‘s networks. Password abuse biological traits, such as those based
and misuse, intentional and on retinal or iris scanning, voice
inadvertent is a gaping hole in patterns, dynamic signatures,
network security. This results mainly fingerprints, face recognition, or
from human error, carelessness and hand measurements, especially for
in some cases maliciousness. authentication purposes. The purpose
Biometrics removes human error of such schemes is to ensure that the
from the security equation. rendered services are accessed only
Our paper will examine all the by a legitimate user and no one else.
technological and feasibility aspects Examples of such applications
as well as the practical applications. include secure access to buildings,
We will look at many different computer systems, laptops, cellular
biometric methods of identifying the phones, and ATMs. In the absence of
user. The paper has been divided into robust personal recognition schemes,
the following areas: these systems are vulnerable to the
wiles of an impostor. Biometric
 Introduction recognition, or, simply, biometrics,
 What is biometrics refers to the automatic recognition of
individuals based on their
~classification physiological and/or behavioral
 How the idea took up?
characteristics Thus biometrics can
 Working of biometric
be defined as the science and
systems
technology of measuring and
 Role of Biometrics in DNA
statistically analyzing biological
 Biometrics in INDIA
data.. For a layman, it could be said
that biometrics are the science of
 Biometric ATMs for rural
measuring physical or behavioral
India
characteristics that are unique to each
 Biometric passports
individual and they verify that an
individual is who he or she claims to
 Future of biometrics
be.
 Conclusion
 References
Often seen in science-fiction action
adventure movies, face pattern
matchers and body scanners seem
about to emerge as replacements for
computer passwords. Thus biometric
The techniques are of interest in any area
terms "Biometrics" and "Biometry" where it is important to verify the
have been used since early in the true identity of an individual.
20th century to refer to the field of Initially, these techniques were
development of statistical and employed primarily in specialist high
mathematical methods applicable to security applications; however we are
data analysis problems in the now seeing their use and proposed

1
use in a much broader range of divided in two main classes, as
public facing situations. represented in figure on the right
 Physiological: are related to
Fingerprint, facial, or other the shape of the body. The
biometric data can also be placed on oldest traits that have been
a smart card and users can present used for more than 100 years
both the smart card and their are fingerprints. Other
fingerprints or faces to merchants, examples are face
banks, or telephones for an extra recognition, hand geometry
degree of authentication and iris recognition

What is biometrics?
 Behavioral: are related to the
Biometrics (ancient Greek: bios behavior of a person. The first
="life", metron ="measure") refers to characteristic to be used, still
two very different fields of study and widely used today, is the
application. The first and the older signature. More modern
are used in biological studies, approaches are the study of
including forestry, synthesis, keystroke dynamics and of
analysis and management of voice
quantitative data on biological
communities such as forests.
Biometrics in reference to biological Strictly speaking, voice is
sciences has been studied and also a physiological trait because
applied for several generations and is every person has a different pitch,
somewhat simply viewed as but voice recognition is mainly based
"biological statistics More recently on the study of the way a person
and incongruently, the term's speaks, commonly classified as
meaning has been broadened to behavioral
include the study of methods for Other biometric strategies are
uniquely recognizing humans based being developed such as those based
upon one or more intrinsic physical on gait (way of walking), retina, hand
or behavioral traits veins, ear recognition, facial thermo
gram, DNA, odor and palm prints.
HOWTHE IDEA TOOK UP

An idea is nothing but a spark of


intelligence. It is nevertheless the
start of a revolution, and great minds
have plenty of such weird and
wonderful ideas.
It is tempting to think of biometrics
as being sci-fi futuristic technology
that we shall all be using some time
in the near future. But actually the
basic principles of biometric
verification were understood and
Biometric characteristics can be
practiced somewhat earlier.
Thousands of years earlier, the

2
people in the Nile valley routinely required continue to fall making
employed biometric verification systems more feasible for low and
formally identify individuals via mid-level budgets. As the industry
unique physiological parameters grows however, the public concern
such as scars and a combination of over privacy issues.
features such as complexion, eye
color, height and so on but the first As technology gets more and more
known example of biometrics in advanced, Laws and regulations
practice was a form of finger continue to be drafted and standards
printing being used in China in the are beginning to be developed. The
14th century, as reported by explorer ways to distinguish the different
Joao de Barros. He wrote that the biometrical signalments become
Chinese merchants were stamping more and more precise.  This has led
children's palm prints and footprints to field of biometric technologies that
on paper with ink to distinguish the we live in today.
young children from one another. How a biometric system works
This is one of the earliest known (1)Capture the chosen
cases of biometrics in use and is still biometric.
being used today (2) Process the biometric and
In 1800s, identification largely relied extract and enroll the
upon "photographic memory." In the biometric template.
1890s, an anthropologist and police (3) Store the template in a
desk clerk in Paris named Alphonse local repository, a central
Bertillon sought to fix the problem repository, or a portable token
of identifying convicted criminals such as a smartcard.
and turned biometrics into a distinct (4) live-scan the
field of study. He developed a chosen biometric.
method of multiple body (5) Process the
measurements which got named after biometric and
him (Bertillonage). His system was extract the
used by police authorities throughout biometric
the world, until it quickly faded template.
when it was discovered that some (6) Match the
people shared the same scanned biometric
measurements and based on the against stored
measurements alone, two people templates.
could get treated as one. After the (7) Provide a
failure of Bertillonage, the police matching score to business
started using finger printing, which applications.
was developed by Richard Edward (8) Record a secure audit.
Henry of ScotlIn the past three
decades biometrics has moved from
a single method (fingerprinting) to
more than ten discreet methods.
Companies involved with new
methods number in the hundreds and
continue to improve their methods as
the technology available to them
advances. Prices for the hardware

3
mistake of one person’s DNA for
somebody else’s.  DNA identity
Is DNA a biometric?
testing is a highly accurate where
DNA differs from standard exclusions are perfect and matches
biometrics in several ways:
in two unrelated people area
 DNA requires a tangible probability of 1 in 6 billion.
physical sample as opposed
to an impression, image, or However, since DNA identification
recording. is not yet an automated process it is
 DNA matching is not done in
real-time, and currently not still not considered as a biometric
all stages of comparison are recognition technology. 
automated.
 DNA matching does not
employ templates or feature The process of making a DNA
extraction, but rather fingerprint is by extracting a drop of
represents the comparison of
actual samples. blood by a laser beam and
embedding it on a microchip, which
Regardless of these basic
differences, DNA is a type of scans and authenticates the identity
biometric inasmuch as it is the use of of the person. The blood scanning is
a physiological characteristic to
verify or determine identity. done through a laser beam and that
Biometrics using DNA is why the blood extraction is so
for identity small that it is hardly painful to be
management: noticed. 
The most pronounced name, DNA
or deoxyribonucleic acid is a
The DNA Security System is a
double helix structure present in
state-of-the-art biotechnology
every cell of human body. The
system comprised of the Applied
DNA contained in the cells is the
DNA Chip and the Applied DNA
blueprint for all life and that genetic
Chip Reader. The plant DNA is
code is unique to each individual
embedded into non-silicon based
i.e., no two human beings have the
microchip using a revolutionary
same DNA structure unless it is a
proprietary technique. A profound
case of an identical cloned twin.
benefit of this technique is that it
DNA is used as a form of
can be used in numerous forms to
identification by using to produce
confirm the characteristics of a
either a DNA fingerprint or a DNA
multitude of products. 
profile. The technology makes no

4
Although there are discussions of to offer banking
services to the
using DNA fingerprints as a form
rural masses.
of genetic bar code to identify
To reach the
individuals, it’s not likely to happen
rural masses,
in the very near future. This is banks are going
all out in
because the technology, which
providing a
requires isolating, keeping on file user-friendly banking experience. To
boost micro financing initiatives,
and then analyzing the patterns, are
banks are deploying biometric
both expensive and impractical.  solutions with ATMs. Establishing
the identity of a rural depositor
Benefits of DNA biometric systems
through biometrics makes it possible
for illiterate or barely literate folks to
 Accurate: the chance of 2 become part of the banking user
individuals sharing the same community. In recent years the
DNA profile is less than one importance of biometrics has grown
in a hundred billion with 26 tremendously with an increasing
different bands studied. demand of security in accordance of
unique identification of individuals.
Weaknesses of DNA Its use for identification in
biometric systems applications other than policing is on
the rise. In view of the rapidly
 DNA matching is not done in increasing applications, the scope of
real-time biometrics is also increasing, be it
 Intrusive: a physical sample identification via face, voice, retina
must be taken, while other or iris. Fingerprinting, however, has
biometric systems only use the advantage of being a familiar
an image or a recording concept worldwide. I n the retail
 Civil liberty issues and public payments arena, developments in
perception biometric Technologies have made
their presence felt in the
Applications of DNA Pervasiveness of self service devices
biometrics including Automated Teller
Machines (ATMs) and Point of
DNA evidence has been used in Service (POS) machines. Some of
courts of law since 1985 to prove the new generation POS terminals
guilt or innocence. It is also used for are biometric enabled with smart
paternity testing, identification of card readers, allowing thumb-print
missing or dead people. based authentication. Some Indian
banks have started implementing
Biometric ATMs for rural biometric applications in retail
India: branch applications for officer
authentication. Elsewhere in the
ATMs with biometric devices are the world, efforts are on enabling
latest solution in the ongoing effort payments through kiosks based on
fingerprints (non-card based). ATM

5
enhancements with biometric protocols to be used in passports.
support envisaged by vendors Only the digital image (usually in
eliminate the need for PIN entry, and JPEG or JPEG2000 format) of each
authenticate customer transactions biometric feature is actually stored in
by thumb-impressions. A simplified the chip. The comparison of
menu on ATMs coupled with biometric features is performed
possible audio guidance in local outside the passport chip by
language enable easy use for rural electronic border control systems (e-
masses. So far bank ATMs are borders). To store biometric data on
dependent on PIN verification. The the contact less chip, it includes a
fingerprint authentication method is minimum of 32 kilobytes of
non-PIN based, and this requires EEPROM storage memory, and runs
enhancements to the standard Switch on an interface in accordance with
environment. the ISO/IEC 14443 international
standard, amongst others. These
standards ensure interoperability
between different countries and
 BIOMETRIC PASSPORT: different manufacturers of passport
books.
A biometric passport is a combined
paper and electronic identity  India is issuing biometric
document that uses biometrics to passports next year :
authenticate the citizenship of
travelers. The passport's critical Government has decided to
information introduce biometric passports, using
is stored on sophisticated technology of finger
a tiny RFID prints, in the country by the end of
computer next year.
chip, much It is aimed at restricting misuse of
like passports. These will initially be
information introduced in the category of
stored on diplomatic and official passports,
smartcards. Like some smartcards, officials said.
the passport book design calls for an
embedded contact less chip that is
able to hold digital signature data to
ensure the integrity of the passport
and the biometric data.

The currently standardized


biometrics used for this type of
identification system are facial
recognition, fingerprint recognition,
and iris recognition. These were
adopted after assessment of several
different kinds of biometrics
including retinal scan. The
International Civil Aviation
Organization defines the biometric
file formats and communication

6
Such passports, aimed at eliminating of cases wherein wrong information
the scope of impersonation and other has been furnished.
forms of manipulations are
subsequently expected to be given to The Future of Biometrics --
other categories of people. These Trends and Emerging Uses
passports
for Biometric Technology
will have a
chip,
The future of biometrics holds great
which will
promise in private industry uses. By
carry the
measuring facial geometry,
finger
surveillance systems can identify
print and
suspects against characteristics stored
all other
in the security system's database.
details of
"There is a popular tendency to
its holder.
regard biometric products as sci-fi
The
mythology, but the reality is that
fingerprint will also be fed in the
biometrics is the future of the
computer system of immigration
security industry and is quickly
officials at airports and ports.
becoming recognized as the most
accurate identification technology in
"Whenever anybody with this
the market," claims Don Mihae who
passport approaches an immigration
was recently hired by JAD
officer, he will be required to put his
Communication & Safety Systems
(JADCS) to lead its security division.

Biometrics' future will include e-


commerce applications for extra
security on the checkout page, and
biometrics will guard against
finger print unauthorized access to cars and cell
on the computer window. If the phones. In the future, biometric
finger print match, the person is technology will further develop 3-D
cleared," an official said. infrared facial recognition access
control, real-time facial recognition
Introduction of this system will passive surveillance, and visitor
involve massive computerization and management authentication systems.
the task has been entrusted to the Already A4Vision, a provider of 3-D
government-owned facial scanning and identification
National Informatics Centre (NIC). software uses specialized algorithms
The Ministry of External Affairs to interpret the traditional 2-D
(MEA) has also decided to introduce camera image and transfer it into a 3-
a system wherein a sticker, carrying D representation of a registered face.
all relevant information of its holder, This makes it almost impossible to
would be pasted on passports. deceive the biometric system with
still photos or other images.
These will be beneficial in the
context of people going abroad for Strengthening existing biometric
studies or job. It is being introduced innovations for future growth
in view of detection of large number

7
All of these security innovations will deploy hi-tech security systems to
make biometric technology more solve crimes or protect employees,
accurate and make its usage more biometric technology will improve,
widespread. as investor confidence increases.
Once the consumer confidence is
• Access control facial recognition -- evident, biometric research will
Biometric technologies will permit provide further innovations, which
authorized users entry to a property will in turn strengthen future
or to specific location in a building. performance, and this cycle will
Today, A4Vision uses a 3-D infrared continue to build in a positive
facial recognition system to project direction. But for the biometric
subdued light onto a subject's face technology field to grow, industry
for optimal identification. But in the standards must exist so that there is
future, this biometric technology will the greatest compatibility between
be strengthened so that the subject applications and hardware With such
will not have to be a just few feet a young technology, biometric and
away from the video surveillance identification technology has
cameras. everything to gain with improved
standards and accuracy. In probably a
• Facial recognition passive short time, biometric developers will
surveillance -- Hidden surveillance surpass the quality of their current
cameras will be set up to monitor an product so that the future of the
entranceway of any type of building biometric field will be assured in the
to accurately identify a potential hi-tech marketplace.
suspect or terrorist against a database
of millions of images in less than one References:
second. Alerts will then transmitted
to security personnel in real time.  www.biometrics.co.in

• Alert management -- This is a fully  M. A. Dabbah, W. L. Woo,


customizable command center to and S. S. Dlay, "Secure
guard against potential security Authentication for Face
breeches. The center uses real-time Recognition," presented at
technologies to deliver security alerts Computational Intelligence in
to multiple locations through PDA Image and Signal Processing,
(personal digital assistant) devices, 2007. CIISP 2007. IEEE
and other mobile technologies Symposium on, 2007

CONCLUSION:  http://www.cilab.upf.edu/bios
ecure1/public_docs_deli/BioSecu
As the need increases for re_Deliverable_D10-2-3_b3.pdf
government bodies and large firms to

BY:
R.kartheek
B.TECH-III(I.T)
V.R.S COLLEGE (CHIRALA)

Das könnte Ihnen auch gefallen