You are on page 1of 29

BIOMETRIC AUTHANTICATION

A SEMINAR REPORT SUBMITTED


IN PARTIAL FULFILLMENT OF THE REQUIREMENT
FOR THE DEGREE OF

BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
BY
AMIT KUMAR
ROLL NO 1373713007
UNDER THE SUPERVISION OF

MS. MONICA MAURYA


MANYAWAR KANSI RAM ENGINEERING COLLEGE OF
INFORMATION TECHNOLOGY
(AMBEDKAR NAGAR)

TO THE
FACULTY OF INFORMATION TECHNOLOGY

UTTAR PRADESH TECHNICAL UNIVERSITY LUCKNOW


APRIL 2014 - 2015
(i)

CERTIFICATE
This is to certify that the colloquium report entitled Biometric Authantication submitted
by Amit kumar is partial fulfilment of the requirements for the award of Bachelor of
Technology degree in Information Technology from Manyawar Kansi Ram
Engineering College of Information Technology, affiliated to Uttar Pradesh Technical
University, Lucknow under my supervision during the academic session 2014-15.

SUPERVISIOR
Ms. Monica Maurya
Department of information technology

APPROVED FOR SUBMISSION


(SHOBHIT KUMAR)
Head of department
Date:

(ii)

ABSTRACT
Humans recognize each other according to their various characteristics for age.We recognize
others by their face when we meet them and by their voice as we speak to them.Identity verif
i-cation (authentication) in computer systems has been traditionally based on something that
one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards,
however, tend to get stolen or lost and passwords are often forgotten or disclosed. To
achieve more reliable verification or identification we should use something that really
characterizes the given person. Biometrics offer automated methods of identity verification
or identification on the principle of measurable physiological or behavioralcharacteristi
cs such as a fingerprint or a voice sample.The characteristics are measurable andunique. Thes
echaracteristics should not be duplicable, but it is unfortunately often possible to create a
copy that is accepted by the biometric system as a true sample.In biometric-based
authentication, a legitimate user does not need to remember or carry anything and it is known
to be more reliable than traditional authentication schemes.However, the security of biometri
csystems can be undermined in a number of ways.For instance, a biometric template can be
replaced by an impostor's template in a system database or it might be stolenand replayed.
Consequently, the impostor could gainun authorized access to a place or a system.
Moreover, it has been shown that it is possible to create a physical spoof starting from
standard biometric templates. Hence, securing thebiometric templates is vital to maintain s
ecurity and integrity of biometric systems.
This report actually gives an overview of what is biometric system and a detail overview
of a particular system i.e iris recognition system.

(iii)

ACKNOWLEDGEMENT

Suggestions towards our project, which helped us in making this project more efficient and
user. We acknowledge our sincere thanks to those who have contributed significantly to this
project.It is a pleasure to extend the deep gratitude to my guide MS. MONICA MAURYA
for her valuable guidance and support to continuously promote us for the progress of the
project.I thank him for valuable friendly. I feel obliged in taking the opportunity to thank.
Mr. Shobhit Kumar (H.O.D. Information Technology). I thank each and every ones
efforts who helped us in some or the other way for small and significant things.

(iv)

List of figure

page no

1. BASIC STRUCTURE OF A BIOMETRIC SYSTEM

02

2. ENROLLEMENT (A SAMPLE OF BIOMETRIC TRAIT)


3. CLASSIFICATION OF BIOMETRICS
4. FRINGURE PRINT

04
06

5. FACIAL RECOGINATION

07

6. SPEAKER RECOGINATION

08

7. IRIS RECOGINATION

09

8. HAND AND FINGURE GEOMECTORY

10

9. SIGN RECOGINATION
10. AADHAR CARD

(v)

03

11
14

Table of contents
Cover page
Certificate
Abstract
Acknowledgement
List of figure

page no.
(i)
(ii)
(iii)

(iv)
(v)

1.INTRODUCTION
1-4
1.1 HISTORY AND DEVELOPMENT OF BIOMETRICS
1.2 BASIC STRUCTURE OF A BIOMETRIC SYSTEM
1.3MULTIMODAL BIOMETRICS
4
2. CLASSIFICATION OF BIOMETRICS
2.1 TYPES OF BIOMETRICS
2.2 FRINGURE PRINT
2.3 FACIAL RECOGINATION
2.4 SPEAKER RECOGINATION
2.5 IRIS RECOGINATION
2.6 HAND AND FINGURE GEOMECTORY
2.7 SIGN RECOGINATION

11

10
12

4.APPLICATION
4.1AADHAR CARD
4.2FRADUS IN INDUSTRY

REFRENCE

5 - 11

7
8

3.ADVANTAGES AND DISADVANTAGES

CONCLUSION

1-2
2-3

13 - 15
14
15

16
17

CHAPTER 1 INTRODUCTION
Biometrics are automated methods of identifying a person or verifying the identity of a perso
n
based on a physiological or behavioral characteristic. Biometric-based authentication is
theautomatic identity verification, based on individual physiological or behavioral characterist
ics,such as fingerprints, voice, face and iris. Since biometrics is extremely difficult to forge a
nd

cannot be forgotten or stolen, Biometric authentication offers a convenient, accurate,


irreplaceable and high secure alternative for an individual,which makes it has advantages ove
r
traditional cryptography-based authentication schemes. It has become a hot interdisciplinary
topic involving biometric and Cryptography. Biometric data is personal privacy information,
which uniquely and permanently associated with a person and cannot be replaced like
passwords or keys.Once an adversary compromises the biometric data of a user,the data is los
t
forever, which may lead to a huge financial loss. Hence, one major concern is how a persons
biometric data, once collected, can be protected.

1.1 HISTORY AND DEVELOPMENT OF BIOMETRICS


The idea of using patterns for personal identification was originally proposed in 1936 by
ophthalmologist Frank Burch. By the 1980s the idea had appeared in James Bond films, but i
t
still remained science fiction and conjecture. In 1987, two other ophthalmologists Aram Safir
and Leonard Flom patented this idea and in 1987 they asked John Daugman to try to create
actual algorithms for this iris recognition. These algorithms which Daugman patented in 1994
are the basis for all current iris recognition systems and products.
Daugman algorithms are owned by Iridian technologies and the process is licensed to
several other Companies who serve as System integrators and developers of special platforms
exploiting iris recognition in recent years several products have been developed for acquiring
itsimages over a range of distances and in a variety of applications.One active imaging syste
m
developed in 1996 by licensee Sensar deployed special cameras in bank ATM to capture IRI
S

01

images at a distance of up to 1 meter.This active imaging system was installed in cash machin
eboth by NCR Corps and by Diebold Corp in successful public trials in several countries durin
g
1997 to 1999. A new and smaller imaging device is the low cost Panasonic Authenticam
digital camera for handheld, desktop, e-commerce and other information security applications.
Ticket less air travel, check-in and security procedures based on iris recognition kiosks in
airports havebeen developed by eye ticket. Companies in several, countries are now
using Daughmans algorithms in a variety of products.

1.2 BASIC STRUCTURE OF A BIOMETRIC SYSTEM

Biometric authentication requires comparing a registered or enrolled biometric sample (bio


metric template or identifier) against a newly captured biometric sample (for example, a
finger printcaptured during a login).During Enrollment, a sample of the biometric trait is
captured,processed by a computer, and stored for later comparison.Biometric recognition
can be used in Identification mode, where the biometric system identifies a person from
the entire enrolled population by searching a database for a match based solely on the
biometric.For example, an entire database can be searched to verify a person has not
applie for entitlement benefits under two different names. This is sometimes called

02
one to manymatching.
A system can also be used in Verification mode, where the biometric system authenticates a
persons claimed identity from their previously enrolled pattern. This is also called one-toonematching. In most computer access or network access environments, verification mode
would be used. A user enters an account,user name,or inserts a token such as a smart card,
but instead ofentering a password, a simple touch with a finger or a glance at a camera is e
nough to authenticate the user.

03

1.3 MULTIMODAL BIOMETRIC SYSTEM


Multimodal biometric systems use multiple sensors or biometrics to overcome the
limitations of unimodal biometric systems. For instance iris recognition systems can be
compromised by aging irides and finger scanning systems by worn-out or cut fingerprints.
While unimodal biometric systems are limited by the integrity of their identifier, it is
unlikely that several unimodal systems will suffer from identical limitations. Multimodal
biometric systems can obtain sets of information from the same marker (i.e., multiple
images of an iris, or scans of the same finger) or information from different biometrics
(requiring fingerprint scans and, using voice recognition, a spoken pass-code). Multimodal
biometric systems can integrate these unimodal systems sequentially, simultaneously, a
combination thereof, or in series, which refer to sequential, parallel, hierarchical and serial
integration modes, respectively.
Broadly, the information fusion is divided into three parts, pre-mapping fusion, midstmapping fusion, and post-mapping fusion/late fusion.In pre-mapping fusion information
can be combined at sensor level or feature level. Sensor-level fusion can be mainly
organized in three classes:
(1) single sensor-multiple instances,
(2) intra-class multiple sensors, and
(3) inter-class multiple sensors.
Feature-level fusion can be mainly organized in two categories:
(1) intra-class

(2) inter-class.

Intra-class is again classified into four subcategories:


(a) Same sensor-same features,
(b) Same sensor-different features,
(c) Different sensors-same features,
(d) Different sensors-different features.
Spoof attacks consist in submitting fake biometric traits to biometric systems, and are a
major threat that can curtail their security. Multi-modal biometric systems are commonly
believed to be intrinsically more robust to spoof attacks, but recent studies have shown that
they can be evaded by spoofing even a single biometric trait.

04

CHAPTER 2 CLASSIFICATION OF BIOMETRICS


Biometrics encompasses both physiological and behavioral characteristics.A physiological
characteristic is a relatively stable physical feature such as finger print, iris pattern,
retina pattern or a Facial feature. A behavioral trait in identification is a persons signature,
keyboard typing pattern or a speech pattern. The degree of interpersonal variation is smaller
in a physical characteristic than in a behavioral one.

05
2.1 TYPES OF BIOMETRICS
There are two types of biometrics
1.Behavioural biometrics
2.Physical biometrics

2.1.1 BEHAVIOURAL BIOMETRICS


The biometrics which basically measure the characteristics which is acquired naturally over
a time.
Signature, speaker recogination etc. are the examples of behavioural biometrics.

2.1.2 PHYSICAL BIOMETRICS


The biometrics which measure the inherent physical characteristics of an indivisual.
Iris scan, hand geometry ,figure print etc are the examples of physical biometrics.

2.2 FINGERPRINT
Fingerprints: The patterns of friction ridges and valleys on an individual's fingertips are uniq
ueto
that individual.For decades, law enforcement has been classifying and determining identity
By matching key points of ridge endings and bifurcations. Fingerprints are unique for each
finger of a person including identical twins.One of the most commercially available biometric
technologies, fingerprint recognition devices for desktop and laptop access are now widely
available from many different vendors at a low cost. With these devices, users no longer need
to type passwords instead, only a touch provides instant access.

06

2.3 FACE RECOGINITION


Face Recognition: The identification of a person by their facial image can be done in a numbe
r of different ways such as by capturing an image of the face in the visible spectrum using an
inexpensive camera or by using the infrared patterns of facial heat emission. Facial
recognitioin visible light typically model key features from the central portion of a facial
image. Using a wide assortment of cameras, the visible light systems extract features
from the capturedimage(s) that do not change over time while avoiding superficial
features such as facial expressions or hair.

07

2.4 SPEAKER RECOGINATION


Speaker Recognition:. Speaker recognition uses the acoustic features of speech that have bee
n
found to differ between individuals. These acoustic patterns reflect both anatomy and learned
behavioral patterns .This incorporation of learned patterns into the voice templates has earne
dspeaker recognition its classification as a "behavioral biometric." Speaker recognition syste
ms
employ three styles of spoken input: text-dependent, text-prompted and text independent.
Most speaker verification applications use text-dependent input, which involves selection an
d
enrollment of one or more voice passwords. Text-prompted input is used whenever there is
concern of imposters. The various technologies used to process and store voiceprints include
hidden Markov models, pattern matching algorithms, neural networks, matrix representation
and decision trees.

08
2.5 IRIS RECOGINITION
Iris Recognition: This recognition method uses the iris of the eye which is the colored area tha
t
surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a
video-based image acquisition system. Iris scanning devices have been used in personal
authentication applications for several years. Systems based on iris recognition have
substantially decreased in price and this trend is expected to continue. The technology works
well in both verification and identification modes.

09
2.6 HAND AND FIGURE GEOMETRIC
Hand and Finger Geometry: To achieve personal authentication, a system may measure eithe
r
physical characteristics of the fingers or the hands. These include length, width, thickness and
surface area of the hand. One interesting characteristic is that some systems require a smallbi
ometric sample. It can frequently be found in physical access control in commercial and
residential application, in time and attendance systems and in general personal authentication
applications.

10
2.7 SIGNATURE VERIFICATION
Signature Verification:This technology uses the dynamic analysis of signature to authenticate
a person. The technology is based on measuring speed, pressure and angle used by the person

when a signature is produced. One focus for this technology has been e-business applications
and other applications where signature is an accepted method of personal authentication.

Digital signature

11
CHAPTER 3. ADVANTAGES AND DISADVANTAGES
A critical feature of this coding approach is the achievement of commensurability among
iris codes, by mapping all irises into a representation having universal format and constant
length, regardless of the apparent amount of iris detail. In the absence of commensurability

among the codes one would be faced with the inevitable problem of comparing long codes wit
h
short codes, showing partial agreement and partial disagreement in their lists of features.

3.1 ADVANTAGES
01.It is an internal organ that is well protected against damage by a highly transparent and
sensitive membrane. This feature makes it advantageous from finger print.
02.Flat , geometrical configuration controlled by 2 complementary muscles control the
diameter of the pupil makes the iris shape more predictable .
03.An iris scan is similar to taking a photograph and can be performed from about 10 cm to
a few meters away.
04.Encoding and decision-making are tractable .
05.Genetic independence no two eyes are the same.

3.2 DISADVANTAGES
01.The accuracy of iris scanners can be affected by changes in lightning.
02.Obscured by eyelashes, lenses, reflections.
03.Deforms non-elastically as pupil changes size.
04.Iris scanners are significantly more expensive than some other form of biometrics.
05.As with other photographic biometric technologies,iris recognition is susceptible to poor
image quality, with associated failure to enroll rates

12
CHAPTER4. APLLICATIONS
Iris-based identification and verification technology has gained acceptance in a number
of

different areas.Application of iris recognition technology can he limited only by imagination.


The important applications are those following:-1.Used in ATMs for more secure transaction.
2.Used in airports for security purposes.
3.Computer login: The iris as a living password
4.Credit-card authentication
5.Secure financial transaction (e-commerce, banking).
6.Biometrickey Cryptography for encrypting/decrypting messages.
7.Driving licenses and other personal certificates.
8.Entitlements and benefits authentication.
9.Forensics, birth certificates, tracking missing or wanted person.

13
4.1INDIA'S NATIONAL ID PROGRAM

India's national ID program called Aadhaar is the largest biometric database of the world. It
is a biometrics-based digital identity assigned for lifetime, verifiable online instantly in
public domain, at anytime, from anywhere, in a paperless way. It is designed to enable
government agencies to deliver retail public service securely based on biometric data
(fingerprint, iris scan and face photo), along with demographic data (name, age, gender,
address, parent/spouse name, mobile phone number) of a person. The data is transmitted in
encrypted form over internet for authentication, aiming to free it from limitations of
physical presence of a person at a given place.
It has enrolled about 550 million residents and assigned 480 million Aadhaar numbers as of
7 November 2013. It aims to cover entire population of 1.25 billion in a few years.

14
4.2 Frauds in industry happens in the following situations:

Safety deposit boxes and vaults

Bank transaction like ATM withdrawals

Access to computers and emails

Credit Card purchase

Purchase of house, car, clothes or jewellery

Getting official documents like birth certificates or passports

Obtaining court papers

Drivers licence

Getting into confidential workplace

writing Checks

15

CONCLUSIONS
There are many mature biometric systems available now. Proper design and implementation o
f
the biometric system can indeed increase the overall security. There are numerous conditions
that must be taken in account when designing a secure biometric system. First, it is necessary
to realize that biometrics is not secrets. This implies that care should be taken and it is not
secure to generate any cryptographic keys from them. Second, it is necessary to trust the
input device and make the communication link secure. Third, the input device needs to be
verified .Iridian process is defined for rapid exhaustive search for very large databases:
distinctive capability required for authentication today. The extremely low probabilities
of getting a false match enable the iris recognition algorithms to search through extremely
large data bases, evenof a national or planetary scale. As iris technology superiority has
already allowed it to make significant inroads into identification and security venues which
had been dominated by otherbiometrics. Iris-based biometric technology has always been an e
xceptionally accurate one, and it may soon grow much more prominent.

16
REFERENCES
1. http://google.com.
2.http://www.quora.com
3. www://biometricupdate.com/globalreport
4. www.wikipedia.com
5. http://Security of Biometric Authentication Systems/statistical principles of iris recognitio
n
6.www.scribd.com/doc/50033821

17

You might also like