Bio Metrics Assignment

Embed Size (px)

Citation preview

  • 8/8/2019 Bio Metrics Assignment

    1/29

    BIOMETRICS

    Submitted in partial fulfillment of therequirements of the degree of MBA

    Submitted to

    Mr.Gaurav ChandiokDepartment of IT, ABS

    Submitted by310B14 Sahil Behl

    310B39 Anuja Sharma

    310B41- Abhishek Gupta

    1

  • 8/8/2019 Bio Metrics Assignment

    2/29

    TABLE OF CONTENTS

    PARTICULARS Pg. No.Table of picture

    Certificate

    Introduction

    Definition of biometrics

    Types of biometrics

    Application of biometrics

    Appendix

    References

    1) ..3

    2) Certificate....4

    3) Introduction.5

    4) Definition of biometrics.....7

    5) Finger recognition..10

    6) Face recognition.14

    7) Hand geometry...168) Iris recognition...18

    9) Voice recognition...21

    10) Signature recognition.....23

    11) Application of biometrics...26

    12) Appendix....27

    2

  • 8/8/2019 Bio Metrics Assignment

    3/29

    Table of Pictures

    1) General biometric model.9

    2) Finger print scanning..103) Finger print verification (fig a)...11

    4) Finger print biometric system (fig b)..11

    5) Iris recognition biometric system18

    6) Structure of iris....18

    7) Multi biometric system...24

    3

  • 8/8/2019 Bio Metrics Assignment

    4/29

    CERTIFICATE

    This is to certify that Sahil Behl, Anuja Sharma &

    Abhishek Gupta students of Amity University, MBA-

    M&S, 2010-12, have successfully completed a project on

    the topic Biometrics.

    This report has not been submitted to any other

    organization & does not form part of any course undergone

    by then, for the award of MBA degree.

    INTRODUCTION

    4

  • 8/8/2019 Bio Metrics Assignment

    5/29

    What is Biometrics?

    "Biometrics" means "life measurement" but the term is usually associated with

    the use of unique physiological characteristics to identify an individual. Theapplication which most people associate with biometrics is security. However,

    biometrics identification has eventually a much broader relevance as computer

    interface becomes more natural. Knowing the person with whom you are

    conversing is an important part of human interaction and one expects

    computers of the future to have the same capabilities.

    A number of biometric traits have been developed and are used to authenticate

    the person's identity. The idea is to use the special characteristics of a person to

    identify him. By using special characteristics we mean the using the features

    such as face, iris, fingerprint, signature etc.

    The method of identification based on biometric characteristics is preferred

    over traditional passwords and PIN based methods for various reasons such as:

    The person to be identified is required to be physically present at the time-of-

    identification. Identification based on biometric techniques obviates the need to

    remember a password or carry a token. A biometric system is essentially a

    pattern recognition system which makes a personal identification by

    determining the authenticity of a specific physiological or behavioral

    characteristic possessed by the user. Biometric technologies are thus defined as

    the "automated methods of identifying or authenticating the identity of a living

    person based on a physiological or behavioral characteristic".

    A biometric system can be either an 'identification' system or a 'verification'

    (authentication) system, which are defined below.

    Identification - One to Many: Biometrics can be used to determine a person's

    identity even without his knowledge or consent. For example, scanning a crowd

    with a camera and using face recognition technology, one can determine

    matches against a known database.

    Verification - One to One: Biometrics can also be used to verify a person's

    identity. For example, one can grant physical access to a secure area in a

    building by using finger scans or can grant access to a bank account at an ATM

    by using retinal scan.

    Biometric authentication requires to compare a registered or enrolled biometric

    sample (biometric template or identifier) against a newly captured biometric5

  • 8/8/2019 Bio Metrics Assignment

    6/29

    sample (for example, the one captured during a login). This is a three-step

    process (Capture, Process, Enroll) followed by a Verification or Identification

    process.

    During Capture process, raw biometric is captured by a sensing device such as

    a fingerprint scanner or video camera. The second phase of processing is to

    extract the distinguishing characteristics from the raw biometric sample and

    convert into a processed biometric identifier record (sometimes called

    biometric sample or biometric template). Next phase does the process of

    enrollment. Here the processed sample (a mathematical representation of the

    biometric - not the original biometric sample) is stored / registered in a storage

    medium for future comparison during an authentication. In many commercial

    applications, there is a need to store the processed biometric sample only. The

    original biometric sample cannot be reconstructed from this identifier.

    Background Concepts

    A number of biometric characteristics may be captured in the first phase of

    processing. However, automated capturing and automated comparison with

    previously stored data requires that the biometric characteristics satisfy the

    following characteristics:

    1. Universal: Every person must possess the characteristic/attribute. The

    attribute must be one that is universal and seldom lost to accident or

    disease.2. Invariance of properties: They should be constant over a long period of

    time. The attribute should not be subject to significant differences based

    on age either episodic or chronic disease.

    3. Measurability: The properties should be suitable for capture without

    waiting time and must be easy to gather the attribute data passively.

    4. Singularity: Each expression of the attribute must be unique to the

    individual. The characteristics should have sufficient unique properties

    to distinguish one person from any other. Height, weight, hair and eye

    color are all attributes that are unique assuming a particularly precise

    measure, but do not offer enough points of differentiation to be usefulfor more than categorizing.

    5. Acceptance: The capturing should be possible in a way acceptable to a

    large percentage of the population. Excluded are particularly invasive

    technologies, i.e. technologies which require a part of the human body to

    be taken or which (apparently) impair the human body.

    6

  • 8/8/2019 Bio Metrics Assignment

    7/29

    6. Reducibility: The captured data should be capable of being reduced to a

    file which is easy to handle.

    7. Reliability and tamper-resistance: The attribute should be impractical to

    mask or manipulate. The process should ensure high reliability and

    reproducibility.

    8. Privacy: The process should not violate the privacy of the person.

    9. Comparable: Should be able to reduce the attribute to a state that makes

    it digitally comparable to others. The less probabilistic the matching

    involved, the more authoritative the identification.

    10.Inimitable: The attribute must be irreproducible by other means. The

    less reproducible the attribute, the more likely it will be authoritative.

    Among the various biometric technologies being considered, the attributes

    which satisfy the above requirements are fingerprint, facial features, hand

    geometry, voice, iris, retina, vein patterns, palm print, DNA, keystroke

    dynamics, ear shape, odor, signature etc.

    The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).

    Biometrics refers to the automatic identification of a person based on his/her

    physiological or behavioral characteristics. This method of identification is preferred over

    traditional methods involving passwords and PIN numbers for its accuracy and case

    sensitiveness. A biometric system is essentially a pattern recognition system which makes

    a personal identification by determining the authenticity of a specific physiological or

    behavioral characteristic possessed by the user. An important issue in designing a

    practical system is to determine how an individual is identified. Depending on the

    context, a biometric system can be either a verification (authentication) system or an

    identification system. Verification involves confirming or denying a person's claimed

    identity while in identification, one has to establish a person's identity. Biometric systems

    are divided on the basis of the authentication medium used. They are broadly divided as

    identifications of Hand Geometry, Vein Pattern, Voice Pattern, DNA, Signature

    Dynamics, Finger Prints, Iris Pattern and Face Detection. These methods are used on the

    7

  • 8/8/2019 Bio Metrics Assignment

    8/29

  • 8/8/2019 Bio Metrics Assignment

    9/29

    Up until the late 1800s, identification largely relied upon "photographic memory". In the

    1890s, an anthropologist and police desk clerk in Paris, Alphonse Bertillon, decided to fix

    the problem of identifying convicted criminals and turned biometrics into a distinct fieldof study.

    Bertillon developed a technique of multiple body measurements which later got namedafter him - Bertillon age. His method was then used by police authorities throughout the

    world, until it quickly faded when it was discovered that some people shared the same

    measurements and based on the measurements alone, two people could get treated as one.

    After the failure of Bertillon age, the police started using finger printing, which was

    developed by Richard Edward Henry of Scotland Yard, essentially reverting to the samemethods used by the Chinese for years. (Which still is going strong?)

    Biometric history in the recent past (three decades) has seen drastic advancements and

    the technology have moved from a single method (fingerprinting) to more than tenprudent methods. Companies involved with new methods have grown into the hundreds

    and continue to improve their methods as the technology available to them also advances.Prices for the hardware required continue to fall making systems more feasible for low

    and mid-level budgets and thus making this more adaptable in small businesses and even

    households.

    As the industry grows however, so does the public concern over privacy issues. Laws and

    regulations continue to be drafted and standards are beginning to be developed. While no

    other biometric has yet reached the breadth of use of fingerprinting, some are beginningto be used in both legal and business areas.

    Types of Biometrics:

    There are basically two types of biometrics:

    1. Behavioral biometrics

    2. Physical biometrics

    Behavioral biometric definition: Behavioral biometrics basically measures the

    characteristics which are acquired naturally over a time. It is generally used for

    verification.Examples of behavioral biometrics include:

    * Speaker Recognition - analyzing vocal behavior

    9

  • 8/8/2019 Bio Metrics Assignment

    10/29

    * Signature - analyzing signature dynamics

    * Keystroke - measuring the time spacing of typed words

    Physical biometric definition: Physical biometrics measures the inherent physical

    characteristics on an individual. It can be used for either identification or verification.

    Examples of physical biometrics include:

    * Bertillonage - measuring body lengths (no longer used)* Fingerprint - analyzing fingertip patterns

    * Facial Recognition - measuring facial characteristics

    * Hand Geometry - measuring the shape of the hand* Iris Scan - analyzing features of colored ring of the eye

    * Retinal Scan - analyzing blood vessels in the eye

    * Vascular Patterns - analyzing vein patterns* DNA - analyzing genetic makeup

    THE GENERAL BIOMETRIC MODEL

    10

    Data Collection

    Biometric Capture

    Signal

    Processin

    g Enrollment

    Template

    Extraction

    Decision

    Making

    M

    Making

    95%

    Verification

    Matching Score

    Storage

  • 8/8/2019 Bio Metrics Assignment

    11/29

    Biometrics security can be mainly classified as follows:

    1) Finger recognition.

    2) Hand geometry.

    3) Face recognition.

    4) Voice recognition.

    5) Iris recognition

    FINGER RECOGNITION: Among all the biometric techniques, fingerprint-based

    identification is the oldest method which has been successfully used in numerous

    applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is

    made of a series of ridges and furrows on the surface of the finger. The uniqueness of a

    fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae

    points. Minutiae points are local ridge characteristics that occur at either a ridge

    bifurcation or a ridge ending.

    What is Fingerprint Scanning?

    Fingerprint scanning is the acquisition and recognition of a persons fingerprint

    characteristics for identification purposes. This allows the recognition of a person through

    quantifiable physiological characteristics that verify the identity of an individual. There

    are basically two different types of finger-scanning technology that make this possible.

    11

  • 8/8/2019 Bio Metrics Assignment

    12/29

    1. One is an optical method, which starts with a visual image of a finger.

    2. The other uses a semiconductor-generated electric field to image a finger. There is a

    range of ways to identify fingerprints. They include traditional police methods of

    matching minutiae, straight pattern matching, moir fringe patterns and ultrasonic.

    Fig-a

    12

    BIOMETRIC

    CAPTURE

    IMAGE

    PROCESS

    101

    0

    011

    0

    110

    1

    BIOMETRIC

    MATCHING

    TEMPLATE

    EXTRACT

    101

    0

    011

    0

    110

    1

    98

    %

    IMAGE LIVE UPDATE

    MATCHING SCORESTORED

    TEMPLATE

    STORAGE DEVICE

  • 8/8/2019 Bio Metrics Assignment

    13/29

    Fig-b

    Fingerprint matching techniques can be placed into two categories: minutiae-based and

    correlation based. Minutiae-based techniques first find minutiae points and then map their

    relative placement on the finger. However, there are some difficulties when using this

    approach. It is difficult to extract the minutiae points accurately when the fingerprint is of

    low quality. Also this method does not take into account the global pattern of ridges and

    furrows. The correlation-based method is able to overcome some of the difficulties of the

    minutiae-based approach. However, it has some of its own shortcomings. Correlation-

    based techniques require the precise location of a registration point and are affected by

    image translation and rotation. Fingerprint matching based on minutiae has problems in

    matching different sized (unregistered) minutiae patterns. Local ridge structures cannot

    be completely characterized by minutiae. A commercial fingerprint-based authentication

    system requires a very low False Reject Rate (FAR) for a given False Accept Rate(FAR). This is very difficult to achieve with any one technique.

    Fingerprint Classification:

    Large volumes of fingerprints are collected and stored everyday in a wide range of

    applications including forensics, access control, and driver license registration. An

    automatic recognition of people based on fingerprints requires that the input fingerprint

    be matched with a large number of fingerprints in a database (FBI database contains

    approximately 70 million fingerprints!). To reduce the search time and computational

    complexity, it is desirable to classify these fingerprints in an accurate and consistent

    manner so that the input fingerprint is required to be matched only with a subset of the

    13

  • 8/8/2019 Bio Metrics Assignment

    14/29

    fingerprints in the database. The algorithms are developed to classify fingerprints into

    five classes, namely, whorl, right loop, left loop, arch, and tented arch. The algorithm

    separates the number of ridges present in four directions (0degree, 45 degree, 90 degree,

    and 135 degree) by filtering the central part of a fingerprint. The classifier is tested on

    4,000 images in the database. . For the four-class problem (arch and tented arch

    combined into one class), we are able to achieve a classification accuracy of 94.8%.

    Accuracy and Integrity:

    Someone may attempt to use latent print residue on the sensor just after a legitimate user

    accesses the system. At the other end of the scale, there is the gruesome possibility of

    presenting a finger to the system that is no longer connected to its owner. Therefore,

    sensors attempt to determine whether a finger is live, and not made of latex (or worse).

    Detectors for temperature, blood-oxygen level, pulse, blood flow, humidity, or skin

    conductivity would be integrated.

    Advantages:

    a. Very high accuracy.

    b. Is the most economical biometric PC user authentication technique.

    c. it is one of the most developed biometrics

    d. Easy to use.

    e. Small storage space required for the biometric template, reducing the size of the

    database memory required

    f. It is standardized.

    Disadvantages:

    a. For some people it is very intrusive, because is still related to criminal identification.14

  • 8/8/2019 Bio Metrics Assignment

    15/29

    b. It can make mistakes with the dryness or dirty of the fingers skin, as well as with the

    age (is not appropriate with children, because the size of their fingerprint changes

    quickly).

    c. Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi

    fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytesapproximately Compression required (a factor of 10 approximately).

    FACE RECOGNITION:

    Facial recognition systems are built on computer programs that analyze images of human

    faces for the purpose of identifying them.

    The programs take a facial image, measure characteristics such as the

    distance between the eyes, the length of the nose, and the angle of the jaw, and create

    a unique file called a "template." Using templates, the software then compares that

    image with another image and produces a score that measures how similar the images

    are to each other. Typical sources of images for use in facial recognition include

    video camera signals and pre-existing photos such as those in driver's license

    databases.

    How well does facial recognition work?

    Computers can do increasingly amazing things, but they are not magic. If

    human beings often can't identify the subject of a photograph, why should computers

    15

  • 8/8/2019 Bio Metrics Assignment

    16/29

    be able to do it any more reliably? The fact is that faces are highly complex patterns

    that often differ in only subtle ways, and that it can be impossible for man or machine

    to match images when there are differences in lighting, camera, or camera angle, let

    alone changes in the appearance of the face itself. Not surprisingly, government

    studies of face-recognition software have found high rates of both "false positives"

    (wrongly matching innocent people with photos in the database) and "false negatives"

    (not catching people even when their photo is in the database). One problem is that

    unlike our fingerprints or irises, our faces do not stay the same over time. These

    systems are easily tripped up by changes in hairstyle, facial hair, or body weight, by

    simple disguises, and by the effects of aging.

    For example by study, it was found false-negative rates for face-recognition verification

    of 43 percent using photos of subjects taken just 18 months earlier, for example. The

    study also found that a change of 45 degrees in the camera angle rendered the software

    useless. The technology works best under tightly controlled conditions, when the subject

    is starting directly into the camera under bright lights.

    In addition, questions have been raised about how well the software works on dark-

    skinned people, whose features may not appear clearly on lenses optimized for light-

    skinned-people.

    Samir Nanavati of the International Biometric Group, a consulting firm, sums it up: "You

    could expect a surveillance system using biometrics to capture a very, very small

    percentage of known criminals in a given database."

    It would work especially poorly in the frenetic environment of an airport, where fast-

    moving crowds and busy background images would further reduce its already limitedeffectiveness.

    Advantages:

    a. Non intrusive

    16

  • 8/8/2019 Bio Metrics Assignment

    17/29

    b. Cheap technology.

    Disadvantages

    a. 2D recognition is affected by changes in lighting, the persons hair, the age, and if the

    person wear glasses.

    b. Requires camera equipment for user identification; thus, it is not likely to become

    popular until most PCs include cameras as standard equipment.

    HAND GEOMETRY: How it Works:

    Every hand is unique. Hand geometry scanners such as those made by Recognition

    Systems Inc. take over 90 measurements of the length, width, thickness, and surface area

    of the hand and four fingers--all in just 1 second. The technology uses a 32,000-pixel

    CCD digital camera to record the hand's three-dimensional shape from silhouetted images

    projected within the scanner. The scanner disregards surface details, such as fingerprints,

    lines, scars, and dirt, as well as fingernails, which may grow or be cut from day to day.

    When a person uses the scanner, it compares the shape of the user's hand to a template

    recorded during an enrollment session. If the template and the hand match, the scanner

    produces an output--it may unlock a door, transmit data to a computer, verify

    identification, or log the person's arrival or departure time. To register in a hand-scan

    17

  • 8/8/2019 Bio Metrics Assignment

    18/29

    system a hand is placed on a readers covered flat surface. This placement is positioned

    by five guides or pins that correctly situate the hand for the cameras. A succession of

    cameras captures 3-D pictures of the sides and back of the hand. The attainment of the

    hand-scan is a fast and simple process. The hand-scan device can process the 3-D images

    in 5 seconds or less and the hand verification usually takes less than 1 second. The image

    capturing and verification software and hardware can easily be integrated within

    standalone units. Hand-scan applications that include a large number of access points and

    users can be centrally administered, eliminating the need for individuals to register on

    each device. The user's template may reside in internal memory or on other media such as

    a hard disk or smart card chip.

    Advantages:

    a. Though it requires special hardware to use, it can be easily integrated into other

    devices or systems.

    b. It has no public attitude problems as it is associated most commonly with authorized

    access.

    c. The amount of data required to uniquely identify a user in a system is the smallest byfar, allowing it to be used with Smartcards easily.

    Disadvantages:

    a. Very expensive

    b. Considerable size.

    c. It is not valid for arthritic person, since they cannot put the hand on the scanner

    properly.

    APPLICATIONS:

    18

    http://biometrics.pbworks.com/SmartCardshttp://biometrics.pbworks.com/SmartCards
  • 8/8/2019 Bio Metrics Assignment

    19/29

    Geometry scanners verify identity at the front entrances of over half the nuclear power

    plants in the U.S. The U.S. Immigration and Naturalization Service (INS) use Rhand

    geometry scanners to allow over 60,000 frequent travelers to bypass immigration lines

    (through the INSPASS program). Employers use hand-scan for entry/exit, recording staff

    movement and time/attendance procedures. The drastic reductions in cost of

    microprocessors in recent years have brought affordable hand geometry technology to the

    commercial market. Biometrics is no longer found only in nuclear power plants. Day care

    centers, athletic clubs, obstetrics wards, and police departments now use scanners.

    IRIS RECOGNITION:

    Fig. a

    19

  • 8/8/2019 Bio Metrics Assignment

    20/29

    Fig. b

    Iris scan biometrics employs the unique characteristics and features of the human iris in

    order to verify the identity of an individual. The iris is the area of the eye where the

    pigmented or colored circle, usually brown or blue, rings the dark pupil of the eye. The

    iris-scan process begins with a photograph. A specialized camera, typically very close to

    the subject, no more than three feet, uses an infrared imager to illuminate the eye and

    capture a very high-resolution photograph. This process takes only one to two seconds

    and provides the details of the iris that are mapped, recorded and stored for future

    matching/verification. Eyeglasses and contact lenses present no problems to the quality of

    the image and the iris-scan systems test for a live eye by checking for the normal

    continuous fluctuation in pupil size. The inner edge of the iris is located by an iris-scan

    algorithm which maps the iris distinct patterns and characteristics. An algorithm is a

    series of directives that tell a biometric system how to interpret a specific problem.

    Algorithms have a number of steps and are used by the biometric system to determine if a

    biometric sample and record is a match. Iris are composed before birth and, except in the

    event of an injury to the eyeball, remain unchanged throughout an individuals lifetime.

    Iris patterns are extremely complex, carry an astonishing amount of information and have

    over 200 unique spots. The fact that an individuals right and left eyes are different and

    that patterns are easy to capture, establishes iris-scan technology as one of the biometrics

    that is very resistant to false matching and fraud. The false acceptance rate for iris

    recognition systems is 1

    20

  • 8/8/2019 Bio Metrics Assignment

    21/29

    In 1.2 million, statistically better than the average fingerprint recognition system. The

    real benefit is in the false-rejection rate, a measure of authenticated users who are

    rejected. Fingerprint scanners have a 3 percent false-rejection rate, whereas iris scanning

    systems boast rates at the 0 percent level. Iris-scan technology has been piloted in ATM

    environments in England, the US, Japan and Germany since as early as 1997. Airports

    have begun to use iris-scanning for such diverse functions as employee

    identification/verification for movement through secure areas and allowing registered

    frequent airline passengers a system that enables fast and easy identity verification in

    order to expedite their path through passport control. Other applications include

    monitoring prison transfers and releases, as well as projects designed to authenticate on-

    line purchasing, on-line banking, on-line voting and on-line stock trading to name just a

    few. Iris-scan offers a high level of user security, privacy and general peace of mind for

    the consumer. A highly accurate technology such as iris-scan has vast appeal because the

    inherent argument for any biometric is, of course, increased security.

    Important points:

    The iris is a thin membrane on the interior of the eyeball.

    Iris patterns are extremely complex. Patterns are individual.

    Patterns are formed by six months after birth, stable after a year. They remain thesame for life.

    Imitation is almost impossible. Patterns are easy to capture and encode.

    Advantages:

    a. Very high accuracy.

    b. Verification time is generally less than 5 seconds.

    21

  • 8/8/2019 Bio Metrics Assignment

    22/29

    c. The eye from a dead person would deteriorate too fast to be useful, so no extra

    precautions have to been taken with retinal scans to be sure the user is a living human

    being.

    Disadvantages:

    a. Intrusive.

    b. A lot of memory for the data to be stored.

    c. Very expensive

    VOICE RECONITION:

    "Biometric technologies - those use voice - will be the most important IT innovations of

    the next several years. -Bill Gates at Gartner Group Itexpo '97. In comparing voice to

    other forms of biometrics, the frequency locations plotted on the voice print table are

    proportionate to the physical locations of minutiae used in fingerprint identification. The

    minutiae are the endpoints and bifurcations of the swirls of your fingerprint. The

    advantage of using speech is that the number of locations is almost endless. The capacity

    to extend data collection over multiple words for even better accuracy is a distinct

    advantage over image-based techniques such as fingerprints and retina scans where only

    22

  • 8/8/2019 Bio Metrics Assignment

    23/29

    a finite amount of biometric data is available. Although it is virtually impossible for an

    impostor to copy someone's voice, it is also very difficult for someone to repeat exactly

    the phrase originally enrolled. This is very similar to the fact it is difficult to reproduce

    the exact version of your signature on your credit card.

    Voice biometrics works by digitizing a profile of a person's speech to

    produce a stored model voice print, rather like a template, which is referred to each time

    that person attempts to access secure data. The position and movement of the glottal

    tissues, lips, jaw and tongue correspond with speech movements in the vocal tract.

    Biometrics technology reduces each spoken word into segments: sub-word like syllables,

    phonemes, trip hones or similar units of sound, composed of several dominant

    frequencies called formants, which remain relatively constant over that segment. Each

    segment has three or four dominant tones that can be captured in digital form and plotted

    on a table or spectrum. This table of tones yields the speaker's unique voice print.

    The voice print is stored as a table of numbers, where the presence of each

    dominant frequency in each segment is expressed as a binary entry. Since all table entries

    are either 1 or 0, each column can be read bottom to top as a long binary code. When a

    person speaks his or her pass phrase, the code word or words are extracted and compared

    to the stored model for that person.

    When authenticating, a user is asked to answer up to three prompted questions, the

    answers to which are easily remembered by the user. In order to provide audible content

    of at least one second in length, typical prompts are:

    User's first, middle and last name .User's date and month of birth Mother's first,

    middle and last maiden name .Home telephone number.

    Advantages:

    a. Non intrusive. High social acceptability.

    b. Verification time is about five seconds.

    23

  • 8/8/2019 Bio Metrics Assignment

    24/29

    c. Cheap technology.

    Disadvantages:

    a. A persons voice can be easily recorded and used for unauthorised PC or network.

    b. Low accuracy.

    c. An illness such as a cold can change a persons voice, making absolute identification

    difficult or impossible.

    SIGNATURE RECONITION:

    Signature verification is the process used to recognize an individuals hand-written

    signature. There are two types of signature recognition techniques: simple and dynamic.

    There is an important distinction between simple signature comparisons and dynamic

    signature verification. Both can be computerized, but a simple comparison only takes into

    account what the signature looks like. Dynamic signature verification takes into account

    how the signature was made. With dynamic signature verification it is not the shape or

    look of the signature that is meaningful; it is the changes in speed, pressure and timing

    that occur during the act of signing. There will always be slight variations in a persons

    handwritten signature, but the consistency created by natural motion and practice

    overtime creates a recognizable pattern that makes the handwritten signature a natural for

    biometric identification.

    Advantages:

    a. Non intrusive.

    b. Little time of verification (about five seconds).

    c. Cheap technology.

    24

  • 8/8/2019 Bio Metrics Assignment

    25/29

    Disadvantages:

    a. Signature verification is designed to verify subjects based on the traits of their unique

    signature. As a result, individuals who do not sign their names in a consistent manner

    may have difficulty enrolling and verifying in signature verification.

    b. Error rate: 1 in 50.

    A Multibiometric system

    (FINGER PRINT + FACIAL SCANNING + SPEECH)

    25

    Databa

    se

    Browse

    r

    Face

    Minutiae

    Central

    Template

    Database

    Finger space

    Projection

    Face

    Minutiae

    Central

    Fingerspac

    e

    Minutiae

    HMM

    Decision

    Accept/

    Reject

    SPEECH

    IMAGE

    ACQUISITION

    MODULE

    ENROLLMENT MODULE

  • 8/8/2019 Bio Metrics Assignment

    26/29

    User acceptance is also an important issue to consider when selecting a biometric system

    for employees to use on a regular basis. The following is a general user acceptance list in

    descending order, from the most accepted to the least accepted:

    1. Iris scan2. Keystroke/patterning

    3. Signature/handwriting

    4. Speaker/voice recognition

    5. Facial recognition/face location

    6. Fingerprint

    7. Hand geometry

    8. Retinal scan

    The following is a general CER list in descending order of accuracy, from the most

    effective to the least effective:1. Hand geometry

    2. Iris scan

    3. Retinal scan

    4. Fingerprint

    5. Speaker/voice recognition

    6. Facial recognition/face location

    7. Signature/handwriting

    8. Keystroke/patterning

    Biometric System Design and Evaluation

    Sensing and data acquisition

    Performance evaluation Scalable biometric identification architectures

    Real-time embedded biometric systems

    Integration and deployment with smart cards Template aging

    26

    VERIFICATION MODULE

  • 8/8/2019 Bio Metrics Assignment

    27/29

    Template protection, compromise detection, and revocation

    System inter-operability and integration issues

    liveness (spoof) detection Individuality assessment.

    Application of Biometrics-

    GovernmentPassports, national identification (ID) cards, voter cards, drivers licenses,

    social services, and so on

    TransportationAirport security, boarding passes, and commercial drivers licensesHealthcareMedical insurance cards, patient/employee identity cards

    FinancialBankcards, ATM cards, credit cards, and debit cards

    Retail and gamingRetail programs, such as check cashing, loyalty rewards and

    promotional cards, and gaming systems for access management and VIP programs

    SecurityAccess control and identity verifications, including time and attendance

    Public justice and safetyPrison IDs, county probation offices use for identification of

    parolees, county courthouses use for ID systems

    EducationStudent/teacher identity verification and access control. Biometrics is now

    being implemented in large-scale ID systems around the globe. Many new passports andnational ID card systems use some type of biometric encoded in a bar code or smart chip.

    Drivers licensesTechnologies being recommended by American Association ofMotor Vehicle Administrators (AAMVA), the organization that oversees DMVstandards, include biometrics and two-dimensional bar codes. Georgia, North Carolina,

    Kentucky, and others already utilize biometrics on their respective state drivers licenses.

    27

  • 8/8/2019 Bio Metrics Assignment

    28/29

    APPENDIX

    Research Papers:

    1- Emerging Methods of Biometrics Human Identification

    Micha Choras Image Processing Group, Institute of Telecommunications,

    University of Technology & Life Sciences, Kaliskiego 7, 85-796 Bydgoszcz,

    Poland

    2- Introduction to the Special Issue on Biometrics:

    Progress and Directions Salil Prabhakar, Senior Member, IEEE, Josef Kittler,

    Davide Maltoni, Lawrence OGorman, Fellow, IEEE, and Tieniu Tan, Fellow,IEEE

    3- BIOMETRIC SECURITY- KARTHIK PAIDI, SAI NITESH REDDY, SIVANI

    COLLEGE OF ENGG.

    4-A multimodal biometric identification system by A.Spoorthy and M.Sudha rani.

    5- Iris Recognition System by L.SANTHOSH KUMAR and P.SEETA

    RAMAIAH- The department of Computer science & Information Technology, SriSarathi Institute of Engg. and Tech. , Nuzvid.

    6- Iris Biometrics Recognition Application in Security Management,

    Chowhan.S.S* and G.N.Shinde, Indira Gandhi College, CIDCO, Nanded431602,

    28

  • 8/8/2019 Bio Metrics Assignment

    29/29

    29