You are on page 1of 10

www.1000projects.com www.fullinterview.com www.chetanasprojects.

com

BIOMETRICS

Abstract: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Introduction of this technology brings new security vulnerabilities to computer systems. Identification and verification are the two ways of using biometrics. Biometric system consists of a scanning device, software and a database. Biometrics is categorized into physical and behavioral biometrics. Basing on the application, selecting the right biometric is the crucial part. Multibiometrics is an integrated prototype system embedding different types of biometrics. Applications of biometrics are widely spread throughout the world.

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

Introduction As the fraud and terrorist attacks are increasing day by day, a need of high power security is increasing. Biometrics stands first in providing the required security. Biometrics literally means "life measurement." Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics. The features measured are: face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. The security field uses three different types of authentication:

a password, PIN, or piece of personal information (such as person names); a card key, smart card, or token (like a Secure ID card); and/or a biometric.

Of these, a biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. Use of Biometrics Biometrics is used in two major ways: Identification and Verification. Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method requires a large amount of processing power and some time if the database is very large. It is often used in determining the identity of a suspect from crime scene information. Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information. How It Works: Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. Biometric Authentication System A basic biometric system is made up of:

a sensor to record the biometric trait a computer unit to process and eventually save the biometric trait an application, for which the user's authentication is necessary

Types of Biometrics There are two types of biometrics: physical and behavioral. Behavioral biometrics is generally used for verification while physical biometrics can be used for either identification or verification. Physical biometrics includes: 1. Fingerprint Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Fingerprint matching techniques can be placed into two categories: minutiaebased and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. Also this method does not take into account the global pattern of ridges and furrows. The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation.

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

Fingerprint matching based on minutiae has problems in matching different sized (unregistered) minutiae patterns. Local ridge structures can not be completely characterized by minutiae. We are trying an alternate representation of fingerprints which will capture more local information and yield a fixed length code for the fingerprint. The matching will then hopefully become a relatively simple task of calculating the Euclidean distance will between the two codes.

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com 2. Facial Recognition: The face retrieval problem, known as face detection, can be defined as follows: given an arbitrary black and white, still image, find the location and size of every human face it contains. 3. Hand Geometry: This approach uses the geometric shape of the hand for authenticating a user's identity. Authentication of identity using hand geometry is an interesting problem. Individual hand features are not descriptive enough for identification. However, it is possible to devise a method by combining various individual features to attain robust verification. Hand Geometry Vs Fingerprints: Unlike fingerprints, the human hand isn't unique. One can use finger length, thickness, and curvature for the purposes of verification but not for identification. For some kinds of access control like immigration and border control, invasive biometrics (e.g., fingerprints) may not be desirable as they infringe on privacy. In such situations it is desirable to have a biometric system that is sufficient for verification. As hand geometry is not distinctive, it is the ideal choice. Furthermore, hand geometry data is easier to collect. With fingerprint collection good frictional skin is required by imaging systems, and with retina-based recognition systems, special lighting is necessary. Additionally, hand geometry can be easily combined with other biometrics, namely fingerprint. One can envision a system where fingerprints are used for (infrequent) identification and hand geometry is used for (frequent) verification. 4. Iris Scan An iris-based biometric, on the other hand, involves analyzing features found in the colored ring of tissue that surrounds the pupil. Iris scanning, undoubtedly the less intrusive of the eye-related biometrics, uses a fairly conventional camera element and requires no close contact between the user and the reader. In addition, it has the potential for higher than average template matching performance. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode. 5. Retinal Scan

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. An established technology, this technique involves using a lowintensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient if you wear glasses or are concerned about having close contact with the reading device. For these reasons, retinal scanning is not warmly accepted by all users, even though the technology itself can work well. Behavioral biometrics includes: 1. Voice authentication Voice authentication is not based on voice recognition but on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth, because it requires no new hardwaremost PCs already contain a microphone. However, poor quality and ambient noise can affect verification. In addition, the enrollment procedure has often been more complicated than with other biometrics, leading to the perception that voice verification is not user friendly. Therefore, voice authentication software needs improvement. 2. Signature Signature verification analyzes the way a user signs her name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. Signature verification enjoys a synergy with existing processes that other biometrics do not. People are used to signatures as a means of transaction-related identity verification, and most would see nothing unusual in extending this to encompass biometrics. Signature verification devices are reasonably accurate in operation and obviously lend themselves to applications where a signature is an accepted identifier. SELECTING A BIOMETRIC TECHNOLOGY Different technologies may be appropriate for different applications, depending on perceived user profiles, the need to interface with other systems or databases, environmental conditions, and a host of other application-specific parameters. MULTIBIOMETRICS: www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com Integrating Faces and Fingerprints for Personal Identification: An automatic personal identification system based solely on fingerprints or faces is often not able to meet the system performance requirements. Face recognition is fast but not reliable while fingerprint verification is reliable but inefficient in database retrieval. We have developed a prototype. A new biometric system integrates faces and fingerprints. The system overcomes the limitations of face recognition systems as well as fingerprint verification systems. The integrated prototype system operates in the identification mode with an admissible response time. The identity established by the system is more reliable than the identity established by a face recognition system. In addition, the proposed decision fusion schema enables performance improvement by integrating multiple cues with different confidence measures. Experimental results demonstrate that our system performs very well. It meets the response time as well as the accuracy requirements. A Multimodal Biometric System Using Fingerprint, Face, and Speech: A biometric system which relies only on a single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Identification based on multiple biometrics represents an emerging trend. We introduce a multimodal biometric system, which integrates face recognition, fingerprint verification, and speaker verification in making a personal identification. This system takes advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics. Preliminary experimental results demonstrate that the identity established by such an integrated system is more reliable than the identity established by a face recognition system, a fingerprint verification system, and a speaker verification system. Applications of Biometrics Following September 11th, attack on World Trade Center, the pace of Biometrics applications has accelerated considerably; at present most are still very high end applications, with government, defense and airport security being major customers. 1. Immigration www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com Terrorism, drug-running, illegal immigration and an increasing throughput of legitimate travelers is putting a strain on immigration authorities throughout the world. It is essential for the authorities to quickly and automatically process law-abiding travelers and identifies the law breakers. Biometrics is being employed in a number of diverse applications to make this possible. The U.S. Immigration and Naturalization Service (INS) are a major user and evaluator of biometric technologies. Systems are currently in place throughout to automate the flow of legitimate travelers and deter illegal immigrants. 2. Finger Biometric Door Lock Systems For any access control facilities that require door lock systems to provide optimum security, they are ideal locations for biometric fingerprint door locks. They provide exceptional protection against unauthorized users. Without the enrolled fingerprints of users, it is impossible for anyone else to make an entry. Therefore, the system allows a total control of the entryway in to the facility by authorized personnel only. Also, some models are capable of verifying previous users to enhance the investigation process for possible internal crime occurrences. 3. E-commerce applications E-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading party's identity. For example, many banks are interested in this combination to better authenticate customers and ensure non repudiation of online banking, trading, and purchasing transactions. Point-of-sales (POS) system vendors are working on the cardholder verification method, which would enlist smart cards and biometrics to replace signature verification. MasterCard estimates that adding smart-cardbased biometric authentication to a POS credit card payment will decrease fraud by 80 percent. Some are using biometrics to obtain secure services over the telephone through voice authentication. Future of Biometrics To guide and support the growth of biometrics, Biometrics Consortium has proposed 2 issues 1. Standardization www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com As a number of separate software and hardware vendors are included in the Biometric industry, each with their own interfaces, algorithms and data structures standards have emerged to provide a common software interface, to allow of biometric templates, and to permit effective comparison and different biometric technologies. The BioAPI standard, defines a common method for interfacing with a given biometrics application. Written in C, it consists of a set of function calls to perform basic actions common to all biometric technologies, such as

sharing evaluation of

enroll user, verify asserted identity (authentication), and discover identity.

2. Hybrid technology uses One of the more interesting uses of biometrics involves combining biometrics with smart cards and public-key infrastructure (PKI). A major problem with biometrics is how and where to store the user's template. Because the template represents the user's personal characters, its storage introduces privacy concerns. Furthermore, storing the template in a centralized database leaves that template subject to attack and compromise. On the other hand, storing the template on a smart card enhances individual privacy and increases protection from attack, because individual users control their own templates. PKI uses public- and private-key cryptography for user identification and authentication. It has some advantages over biometrics: It is mathematically more secure, and it can be used across the Internet. The main drawback of PKI is the management of the user's private key. To be secure, the private key must be protected from compromise; to be useful, the private key must be portable. The solution to these problems is to store the private key on a smart card and protect it with a biometric. CONCLUSION www.1000projects.com www.fullinterview.com www.chetanasprojects.com

www.1000projects.com www.fullinterview.com www.chetanasprojects.com Biometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability. In today's highly connected business environments, securing business-critical data is a vital concern. One of the most problematic areas of security is user authentication. Fortunately, the increasing popularity of biometric devices is making it easier to ensure that users logging into the network are really who they say they are.

www.1000projects.com www.fullinterview.com www.chetanasprojects.com

You might also like