Professional Documents
Culture Documents
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
BY
AMIT KUMAR
ROLL NO 1373713007
UNDER THE SUPERVISION OF
TO THE
FACULTY OF INFORMATION TECHNOLOGY
CERTIFICATE
This is to certify that the colloquium report entitled Biometric Authantication submitted
by Amit kumar is partial fulfilment of the requirements for the award of Bachelor of
Technology degree in Information Technology from Manyawar Kansi Ram
Engineering College of Information Technology, affiliated to Uttar Pradesh Technical
University, Lucknow under my supervision during the academic session 2014-15.
SUPERVISIOR
Ms. Monica Maurya
Department of information technology
(ii)
ABSTRACT
Humans recognize each other according to their various characteristics for age.We recognize
others by their face when we meet them and by their voice as we speak to them.Identity verif
i-cation (authentication) in computer systems has been traditionally based on something that
one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards,
however, tend to get stolen or lost and passwords are often forgotten or disclosed. To
achieve more reliable verification or identification we should use something that really
characterizes the given person. Biometrics offer automated methods of identity verification
or identification on the principle of measurable physiological or behavioralcharacteristi
cs such as a fingerprint or a voice sample.The characteristics are measurable andunique. Thes
echaracteristics should not be duplicable, but it is unfortunately often possible to create a
copy that is accepted by the biometric system as a true sample.In biometric-based
authentication, a legitimate user does not need to remember or carry anything and it is known
to be more reliable than traditional authentication schemes.However, the security of biometri
csystems can be undermined in a number of ways.For instance, a biometric template can be
replaced by an impostor's template in a system database or it might be stolenand replayed.
Consequently, the impostor could gainun authorized access to a place or a system.
Moreover, it has been shown that it is possible to create a physical spoof starting from
standard biometric templates. Hence, securing thebiometric templates is vital to maintain s
ecurity and integrity of biometric systems.
This report actually gives an overview of what is biometric system and a detail overview
of a particular system i.e iris recognition system.
(iii)
ACKNOWLEDGEMENT
Suggestions towards our project, which helped us in making this project more efficient and
user. We acknowledge our sincere thanks to those who have contributed significantly to this
project.It is a pleasure to extend the deep gratitude to my guide MS. MONICA MAURYA
for her valuable guidance and support to continuously promote us for the progress of the
project.I thank him for valuable friendly. I feel obliged in taking the opportunity to thank.
Mr. Shobhit Kumar (H.O.D. Information Technology). I thank each and every ones
efforts who helped us in some or the other way for small and significant things.
(iv)
List of figure
page no
02
04
06
5. FACIAL RECOGINATION
07
6. SPEAKER RECOGINATION
08
7. IRIS RECOGINATION
09
10
9. SIGN RECOGINATION
10. AADHAR CARD
(v)
03
11
14
Table of contents
Cover page
Certificate
Abstract
Acknowledgement
List of figure
page no.
(i)
(ii)
(iii)
(iv)
(v)
1.INTRODUCTION
1-4
1.1 HISTORY AND DEVELOPMENT OF BIOMETRICS
1.2 BASIC STRUCTURE OF A BIOMETRIC SYSTEM
1.3MULTIMODAL BIOMETRICS
4
2. CLASSIFICATION OF BIOMETRICS
2.1 TYPES OF BIOMETRICS
2.2 FRINGURE PRINT
2.3 FACIAL RECOGINATION
2.4 SPEAKER RECOGINATION
2.5 IRIS RECOGINATION
2.6 HAND AND FINGURE GEOMECTORY
2.7 SIGN RECOGINATION
11
10
12
4.APPLICATION
4.1AADHAR CARD
4.2FRADUS IN INDUSTRY
REFRENCE
5 - 11
7
8
CONCLUSION
1-2
2-3
13 - 15
14
15
16
17
CHAPTER 1 INTRODUCTION
Biometrics are automated methods of identifying a person or verifying the identity of a perso
n
based on a physiological or behavioral characteristic. Biometric-based authentication is
theautomatic identity verification, based on individual physiological or behavioral characterist
ics,such as fingerprints, voice, face and iris. Since biometrics is extremely difficult to forge a
nd
01
images at a distance of up to 1 meter.This active imaging system was installed in cash machin
eboth by NCR Corps and by Diebold Corp in successful public trials in several countries durin
g
1997 to 1999. A new and smaller imaging device is the low cost Panasonic Authenticam
digital camera for handheld, desktop, e-commerce and other information security applications.
Ticket less air travel, check-in and security procedures based on iris recognition kiosks in
airports havebeen developed by eye ticket. Companies in several, countries are now
using Daughmans algorithms in a variety of products.
02
one to manymatching.
A system can also be used in Verification mode, where the biometric system authenticates a
persons claimed identity from their previously enrolled pattern. This is also called one-toonematching. In most computer access or network access environments, verification mode
would be used. A user enters an account,user name,or inserts a token such as a smart card,
but instead ofentering a password, a simple touch with a finger or a glance at a camera is e
nough to authenticate the user.
03
(2) inter-class.
04
05
2.1 TYPES OF BIOMETRICS
There are two types of biometrics
1.Behavioural biometrics
2.Physical biometrics
2.2 FINGERPRINT
Fingerprints: The patterns of friction ridges and valleys on an individual's fingertips are uniq
ueto
that individual.For decades, law enforcement has been classifying and determining identity
By matching key points of ridge endings and bifurcations. Fingerprints are unique for each
finger of a person including identical twins.One of the most commercially available biometric
technologies, fingerprint recognition devices for desktop and laptop access are now widely
available from many different vendors at a low cost. With these devices, users no longer need
to type passwords instead, only a touch provides instant access.
06
07
08
2.5 IRIS RECOGINITION
Iris Recognition: This recognition method uses the iris of the eye which is the colored area tha
t
surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a
video-based image acquisition system. Iris scanning devices have been used in personal
authentication applications for several years. Systems based on iris recognition have
substantially decreased in price and this trend is expected to continue. The technology works
well in both verification and identification modes.
09
2.6 HAND AND FIGURE GEOMETRIC
Hand and Finger Geometry: To achieve personal authentication, a system may measure eithe
r
physical characteristics of the fingers or the hands. These include length, width, thickness and
surface area of the hand. One interesting characteristic is that some systems require a smallbi
ometric sample. It can frequently be found in physical access control in commercial and
residential application, in time and attendance systems and in general personal authentication
applications.
10
2.7 SIGNATURE VERIFICATION
Signature Verification:This technology uses the dynamic analysis of signature to authenticate
a person. The technology is based on measuring speed, pressure and angle used by the person
when a signature is produced. One focus for this technology has been e-business applications
and other applications where signature is an accepted method of personal authentication.
Digital signature
11
CHAPTER 3. ADVANTAGES AND DISADVANTAGES
A critical feature of this coding approach is the achievement of commensurability among
iris codes, by mapping all irises into a representation having universal format and constant
length, regardless of the apparent amount of iris detail. In the absence of commensurability
among the codes one would be faced with the inevitable problem of comparing long codes wit
h
short codes, showing partial agreement and partial disagreement in their lists of features.
3.1 ADVANTAGES
01.It is an internal organ that is well protected against damage by a highly transparent and
sensitive membrane. This feature makes it advantageous from finger print.
02.Flat , geometrical configuration controlled by 2 complementary muscles control the
diameter of the pupil makes the iris shape more predictable .
03.An iris scan is similar to taking a photograph and can be performed from about 10 cm to
a few meters away.
04.Encoding and decision-making are tractable .
05.Genetic independence no two eyes are the same.
3.2 DISADVANTAGES
01.The accuracy of iris scanners can be affected by changes in lightning.
02.Obscured by eyelashes, lenses, reflections.
03.Deforms non-elastically as pupil changes size.
04.Iris scanners are significantly more expensive than some other form of biometrics.
05.As with other photographic biometric technologies,iris recognition is susceptible to poor
image quality, with associated failure to enroll rates
12
CHAPTER4. APLLICATIONS
Iris-based identification and verification technology has gained acceptance in a number
of
13
4.1INDIA'S NATIONAL ID PROGRAM
India's national ID program called Aadhaar is the largest biometric database of the world. It
is a biometrics-based digital identity assigned for lifetime, verifiable online instantly in
public domain, at anytime, from anywhere, in a paperless way. It is designed to enable
government agencies to deliver retail public service securely based on biometric data
(fingerprint, iris scan and face photo), along with demographic data (name, age, gender,
address, parent/spouse name, mobile phone number) of a person. The data is transmitted in
encrypted form over internet for authentication, aiming to free it from limitations of
physical presence of a person at a given place.
It has enrolled about 550 million residents and assigned 480 million Aadhaar numbers as of
7 November 2013. It aims to cover entire population of 1.25 billion in a few years.
14
4.2 Frauds in industry happens in the following situations:
Drivers licence
writing Checks
15
CONCLUSIONS
There are many mature biometric systems available now. Proper design and implementation o
f
the biometric system can indeed increase the overall security. There are numerous conditions
that must be taken in account when designing a secure biometric system. First, it is necessary
to realize that biometrics is not secrets. This implies that care should be taken and it is not
secure to generate any cryptographic keys from them. Second, it is necessary to trust the
input device and make the communication link secure. Third, the input device needs to be
verified .Iridian process is defined for rapid exhaustive search for very large databases:
distinctive capability required for authentication today. The extremely low probabilities
of getting a false match enable the iris recognition algorithms to search through extremely
large data bases, evenof a national or planetary scale. As iris technology superiority has
already allowed it to make significant inroads into identification and security venues which
had been dominated by otherbiometrics. Iris-based biometric technology has always been an e
xceptionally accurate one, and it may soon grow much more prominent.
16
REFERENCES
1. http://google.com.
2.http://www.quora.com
3. www://biometricupdate.com/globalreport
4. www.wikipedia.com
5. http://Security of Biometric Authentication Systems/statistical principles of iris recognitio
n
6.www.scribd.com/doc/50033821
17