Bio Metrics Basic

Embed Size (px)

Citation preview

  • 7/29/2019 Bio Metrics Basic

    1/12

    BIOMETRICS AS A BOON TO TWENTY

    FIRST CENTURY:

    Biometrics (ancient Greek: bios life,

    metric measure) refers to two

    very different fields of study and

    application. Biometrics is the

    science and technology of

    measuring and analyzing

    biological data. In information

    technology, biometrics refers to

    technologies that measure and

    analyze human body

    characteristics, such as

    fingerprints, eye retinas and

    irises, voice patterns, facial

    patterns and hand measurements,

    for authentication purposes.

    Biometrics History :

    During the 14th century in the China a

    reporter named,Barros wrote that

    the Chinese merchants were

    stamping children's palm prints

    and footprints on paper with ink

    so as to differentiate the young

    children from one another. This is

    one of the most primitive known

    cases of biometrics in use and is

    still being used today.

    ETHICS OF BIOMETRICS:

    Let me first of all explain the difference

    between identification and

    authentication. The identification

    process entails matching a physiological

    or behavioral characteristic of a person

    to an established and pre-confirmed

    record of that characteristic. For

    example, matching the image of my face

    to a photograph in a large number of

    photos in a database. Searching, in

    other words, to identify a person such

    as the rogues gallery used by the police

    department.

    Authentication is done is through the

    presentation of a "token" such as a

    PIN, a card, or a biometric whose

    validity is confirmed, and thereby

    verifying one's eligibility to access a

    particular service. There is no

    searching and matching to a database,

    only the validity of the token is

    established, through a single one-to-one

    match.

    http://en.wikipedia.org/wiki/Greek_languagehttp://en.wikipedia.org/wiki/Greek_language
  • 7/29/2019 Bio Metrics Basic

    2/12

    The problem is that a biometric such as

    a fingerprint can be used as a unique

    surrogate of one's identity which, as a

    unique identifier, can be used to trace

    people's transactions and link massive

    amounts of personal data about them.

    If my fingerprints are stored in a

    database, then my transactions,

    whereabouts and personal information

    can easily be tracked.

    The issues with biometric systems:

    There are two basic types of recognition

    errors: the false accept rate (FAR)

    and the false reject rate (FRR). A

    False Accept is when a non

    matching pair of biometric data is

    wrongly accepted as a match by

    the system. A False Reject is when

    a matching pair of biometric data

    is wrongly rejected by the system.

    When you try to lower one of the

    errors by varying the threshold,

    the other error rate automatically

    increases.

    In a biometric authentication system,

    the relative false accept and false

    reject rates can be set by choosing

    a particular operating point (i.e.,

    a detection threshold). To provide

    high security, biometric systems

    operate at a low FAR instead of

    the commonly recommended

    equal error rate (EER) operating

    point where FAR = FRR.

    Biometric characteristics can be divided

    in two main classes, as represented

    as:

    Physiological are related to the shape of

    the body. Examples include, but

    are not limited to fingerprint,face

    recognition, hand and palm

    geometry and iris recognition.

    Behavioral are related to the behavior

    of a person. Characteristic

    implemented by using biometrics

    http://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Iris_recognitionhttp://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Iris_recognition
  • 7/29/2019 Bio Metrics Basic

    3/12

    aresignature verification,

    keystroke dynamics, and voice.

    Physiological Biometrics:

    Fingerprints: The patterns of friction

    ridges and valleys on an

    individual's fingertips are unique

    to that individual

    One of the most commercially available

    biometric technologies users no

    longer need to type passwords

    instead, only a touch provides

    instant access. Fingerprint

    systems can also be used in

    identification mode.

    Face Recognition: The identification of

    a person by their facial image can

    be done in a number of different

    ways such as by capturing an

    image of the face in the visible

    spectrum using anopticalcamera

    or by using the infrared patterns

    of facial heat emission.

    Hand and Finger Geometry: These

    methods of personal

    authentication are well

    established.

    . To achieve personal authentication, a

    system may measure either

    physical characteristics of the

    fingers or the hands. These

    include length, width, thickness

    and surface area of the hand.

    http://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Keystroke_dynamicshttp://en.wikipedia.org/wiki/Speaker_recognitionhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Keystroke_dynamicshttp://en.wikipedia.org/wiki/Speaker_recognitionhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Authentication
  • 7/29/2019 Bio Metrics Basic

    4/12

    Iris Recognition: This recognition

    method uses the iris of the eye

    which is the colored area that

    surrounds the pupil. The iris

    patterns are obtained through a

    video-based image acquisition

    system. The technology works

    well in both verification and

    identification modes (in systems

    performing one-to-many searchesin a database).

    Face Recognition : the analysis of facial

    characteristics.

    Fingerprint: the analysis of an

    individuals unique fingerprints .

    Hand geometry: the analysis of the

    shape of the hand and the length

    of the fingers .

    Retina: the analysis of the capillary

    vessels located at the back of the

    eye.

    Iris: the analysis of the colored ring that

    surrounds the eyes pupil.

  • 7/29/2019 Bio Metrics Basic

    5/12

    Keystroke dynamics( Typing Dynamics):

    Is the detailed timing information

    that describes exactly when each

    key was depressed and when it

    was released as a person is typing

    at a computer keyboard.

    Signature: the analysis of the way a

    person signs his name.

    Vein : the analysis of pattern of veins in

    the back if the hand and the

    wrist .

    Voice : the analysis of the tone, pitch,

    cadence and frequency of a

    persons voice.

    At Walt Disney World biometric

    measurements are taken from the

    fingers of guests to ensure that the

    person's ticket is used by the same

    person from day to day.

    BIOMETRICS:

    Offering greater independence and

    privacy coupled with easy and fast

    entry to legitimate personnel, our

    cutting edge biometric systems

    recognize individuals not only

    from their fingerprints, but

    alternative systems are based oniris and voice recognition readers.

    http://en.wikipedia.org/wiki/Computer_keyboardhttp://en.wikipedia.org/wiki/Walt_Disney_Worldhttp://en.wikipedia.org/wiki/File:Biometrics.jpghttp://en.wikipedia.org/wiki/Computer_keyboardhttp://en.wikipedia.org/wiki/Walt_Disney_World
  • 7/29/2019 Bio Metrics Basic

    6/12

    DNA Identification technology:

    Deoxyribonucleic acid (DNA)

    Biometrics could be the most exact

    form of identifying any given individual

    .Every human being has its own

    individual map for every cell made, andthis map, or blueprint as it more often

    is called, can be found in every body

    cell.

    DNA can be collected from any number

    of sources: blood, hair, finger nails,

    mouth swabs, blood stains, saliva,

    straws, and any number of other

    sources that has been attached to the

    body at some time. DNA matching has

    become a popular use in criminal trials,

    especially in proving rape cases The

    main problems surrounding DNA

    biometrics is that it is not a quick

    process to identify someone by theirDNA.

    DNA Biometrics is not a fool proof

    method of identification. If forensic

    scientists to not conduct a DNA test

    properly, a persons identification code

    can be skewed. Another problem is

    matching prior DNA samples to new

    samples; this is a bigger problem

    Biometrics Fingerprint Technology :

    1. Why we need

    Fingerprints?

    With increasingly urgent need for

    reliable security, biometrics is being

    spotlighted as the authentication

    method for the next generation. Among

    numerous biometric technologies,

    fingerprint authentication has been in

    use for the longest time and bears more

    advantages than other biometric

    technologies do.

    2. History of the fingerprint:

  • 7/29/2019 Bio Metrics Basic

    7/12

    But fingerprint identification

    technology did not stop as a forensic

    method only. Fingerprints are now

    being used as a secure and effective

    authentication method in numerous

    fields, including financial, medical, e-

    commerce and entrance control

    applications. Modern applications of

    fingerprint technology rely in large part

    on the development of exceptionally

    compact fingerprint sensors

    3. Finger Identification

    Process:

    Fingerprint identification process

    consists of two essential procedures:

    enrollment and authentication.

    Taking the following stepscompletes each procedure.

    Step 1:Image Acquisition

    The beginning of fingerprints goes back to as early as the a

    times. According to historical findings, fingerprints were used on clay tab

    business transactions in ancient Babylon. In China, thumb prints were fou

    clay seals in the 19th century.

  • 7/29/2019 Bio Metrics Basic

    8/12

    Real-time image acquisition method

    is roughly classified into optical and

    non-optical. Optical method relies

    on the total reflection phenomenon

    on the surface of glass or reinforced

    plastic where the fingertip is in

    contact. The sensor normally

    consists of an optical lens and a

    CCD module or CMOS image

    sensor. In contrast, semiconductor

    sensors, as a typical example of non-

    optical sensors, exploit electrical

    characteristics of a fingertip such as

    capacitance.

    Step 2.Feature Extraction

    There are two main ways to compare

    an input fingerprint image andregistered fingerprint data. One is to

    compare an image with another image

    directly. The other is to compare the so-

    called 'features' extracted from each

    fingerprint image.

    The latter is called feature-

    based/minutia-based matching..

    Every finger has a unique pattern

    formed by a flow of embossed lines

    called ridges and hollow regions

    between them called valleys.

    As seen in the Picture 2 below, ridges

    are represented as dark lines, while

    valleys are bright.

    Step 3.Matching

    The matching step is classified into 1:1

    and 1:N matching according to its

    purpose and/or the number of reference

  • 7/29/2019 Bio Metrics Basic

    9/12

    templates. 1:1 matching is also called

    personal identification or verification.

    It is a procedure in which a user claims

    his/her identity by means of an ID and

    proves it with a fingerprint.

    The comparison occurs only once

    between the input fingerprint image

    and the selected one from the database

    following the claim by the user.

    :: Fingerprint Application

    Markets for fingerprint technology

    include entrance control and door-lock

    applications, fingerprint identificationmouses, fingerprint mobile phones, and

    many others.

    3S Technologies-Bangalore:

    3S Technologies- Bangalore - the

    biometrics product Division of

    Ability IT Services is a pioneering

    solution provider for electronic

    Security, Safety & Surveillance.

    3S Technologies Bangalore - India

    offer state-of-the-art security

    systems to provide foolproof

    security to facilities as well as the

    computer networks,using

    Biometrics and Smartcard

    Technologies.

    BARTRONICS:

    Incorporated in 1990, Bartronics is a

    Hyderabad based company that

    started with providing solutions in

    Bar Coding, one of the oldest

    AIDC technologies, RFID, POS,

    Smart Cards working as AIDC

    division, RFID division, Smart

    Card Division and Retail-IT

    division in separate.

  • 7/29/2019 Bio Metrics Basic

    10/12

    Our knowledge of products,

    technologies, implementation

    skills and understanding of the

    market place make us a dominant

    player in the domestic markets,

    and help us share .

    Biometrics Nutrition And Fitness:

    Anyone who tells you that you can lose

    weight in a healthy manner

    without improved eating and

    exercise regimens is out of touch

    with the reality of dieting. These

    two issues form the pillars of

    healthy living and true weight

    loss. Thats why a number of

    programs have been developed in

    order to help people gain

    discipline in these areas. The

    Biometrics program is designed tohelp people get their eating and

    exercise habits in line through the

    mediation of a personal or group

    trainer. Here well take a closer

    look at Biometrics to see what this

    program might provide for the

    average dieter.

    ADVANTAGES / DISADVANTAGES OF

    BIOMETRIC SYSTEMS:

    Here are some of the advantages and

    disadvantages of fully developed

    biometric systems that are fairly

    accurate:

    Retinal scans (electronic scan of the

    innermost layer of the eyeball's wall):

    Advantages: ;Retina generally remains

    stable through life, ensuring accuracy. -

    Disadvantages: Requires close physical

    contact MW scanning device; may not

    be generally accepted by public.

    Iris recognition (recording of iris using

    standard video technology):

    Advantages: Non-invasive procedure

    (close physical contact not required).

    Disadvantages: Relatively expensive;

    requires large amount of computerstorage; may not be generally accepted

    by public.

    Hand geometry (three-dimensional

    recording of length, width and height of

  • 7/29/2019 Bio Metrics Basic

    11/12

    hand and fingers, using optical

    scanner):

    Advantages: User-friendly; requires

    small amount of computer storage

    space.

    Disadvantages: Isn't as unique as other

    biometric methods; hand injury can

    cause recognition problems.

    Voice verification or recognition

    (acoustic signal of voice converted into

    digital code):

    Advantages: Works well over the

    telephone.

    Disadvantages: Requires large amount

    of computer storage; people's voices

    can change; background noises can

    interfere.

    Signature recognition (computer record

    of pen/stylus speed, pressure, direction

    and other characteristics of signature):

    Advantages: People are used to

    providing a signature.

    Disadvantages: Poor long-term

    reliability; accuracy difficult to ensure.

    CURRENT USES OF BIOMETRICS:

    MasterCard International Inc. and Visa

    USA Inc., the world's two largest credit

    card companies, have begun to study

    the feasibility of using finger-scanning

    devices at the point of sale to verify that

    the card user is really the card holder.

    The scanners would compare

    fingerprints with biometric information

    stored on a microchip embedded in the

    credit card.

    Walt Disney World in Orlando has

    started taking hand scans of people who

    purchase yearly passes. These visitors

    now must pass through a scanner when

    entering the park preventing them from

    lending their passes to other people.

    The Immigration and Naturalization

    Service is letting a select group of

    travelers bypass lengthy lines at New

    York's John F. Kennedy International

    Airport and Newark international

    Airport by sticking their bands and

    special cards the service has issued into

    an automated turnstile.

    Criminal Booking Systems:

  • 7/29/2019 Bio Metrics Basic

    12/12

    Managing criminal identity begins at the

    booking process.

    Processing a subject under a wrong

    name, or capturing low-quality

    biometric data can stand in the way of

    saving lives and preventing further

    crime. Our booking solutions ensure

    maximum accuracy of the arrest record

    to verify that a subject is who s/he

    claims to be, and that s/he can be

    properly identified as s/he moves

    through the criminal justice system.

    FUTURE OF BIOMETRICS:

    The future of this technology is just

    starting to bloom. Many issues are

    arising from this technology and

    "PRIVACY" is the main concern. Even

    if we are told that the government will

    not use the data or release the data to

    anyone, how can that be proven? It is

    YOUR right as an individual and

    person to protect your privacy about

    yourself and the direction of this

    technology seems to spell "D-I-S-A-S-T-

    E-R" for everyone "PRIVACY.

    Reference:www.biometrics.com

    http://images.google.co.in/imgres?imgurl=http://i.ehow.com/images/GlobalPhoto/Articles/4609194/84704_Full.jpg&imgrefurl=http://www.ehow.com/how-does_4609194_criminal-record-check-work.html&usg=__BibMXAxdHPH7IfK8KEtcq03DnrI=&h=399&w=600&sz=39&hl=en&start=16&tbnid=4FCT7dIcvM4cbM:&tbnh=90&tbnw=135&prev=/images%3Fq%3Dcriminals%2Bfinger%2Bprints%26gbv%3D2%26ndsp%3D20%26hl%3Den%26sa%3DN