Professional Documents
Culture Documents
Guided By Submitted By
ABSTRACT:-
Bio- metrics is modern security system. It uses a person‟s biological features to give
access rights. The biological features like finger print, voice print, iris pattern, face print,
signature(dynamic), retina, hand geometry, ear form , DNA, odor, keyboard stroke,
finger geometry, vein structure of back of hand etc. are used. So, in this any
unauthorized person cannot trap the information or assets. Today, to preve nt illegal
operations this technique is widely used. It is a user- friendly technique, which is
accepted by almost all fields.
The problem of the personal identification has become a great matter in today‟s world.
Biometrics, which means biological features based identity recognition, has provided a
convenient and reliable solution to this problem. This recognition technology is relatively
new with many significant advantages, such as speed, accuracy, hardware, simplicity and
applicability
Biometrics is a means of identifying a person by measuring a particular physical or
to many people. Biometric systems have two advantages over traditional ID methods.
First, the person to be identified does not have to present anything but himself. Second,
the critical variable for identification cannot be lost or forged. Retinal identification is
the most accurate of the biometric methods used at this time. It will replace traditional
ID methods such as P.I.N. numbers for accessing A.T.M.s and virtually every other
and prerequisite.
After the arrival of IT(Information Technology) this technique is used along with
computer and this embedding gives the perfect result.
Contents:- page-no:-
2) Introduction to Bio-metrics 2
3) A Few Defination 3
4) History of Bio-metrics 4
7) Phases of Bio-metrics 8
7.1 Input
7.2 Process
7.3 Output
8) Bio-metrics Identification 10
8.1 Voice Print
8.2 Finger Print
8.3 Iris Pattern
8.4 Face Print
8.5 Hand Geometry
8.6 Retinal Scan
8.7 Keystroke Dynamics
8.8 Facial Recognition
8.9 Signature Recognition
12)About Bio-metrics 26
13.1 Will Bio-metrics solve all security concerns ?
13.2 Which is the best identification technique ?
13.3 Is Bio-metrics more ‘secure’ then password ?
13.4 Applications
13.5 New Opportunities
13.6 Future Technology
13.7 Benefits
15) Conclusion 30
16) Reference 31
From the beginning of the human culture, people are always trying to secure their
properties. Because some people are always eager to snatch others properties.
Security refers to prohibit some unauthorized persons from some important data
or from some precious assets.
To restrict this kind of theft human beings are making special systems that can
prevent the thieves such systems are known as security systems.
We can consider the starting of these kinds of systems through lock and key.
A Frenchman Alexander Fish has made a strong, fire proof safe in 1844. And
Linas Yel –an American, has invented a Pin lock kind of lock. Both these
equipments are used to provide security to money, important documents and
jewellary. So this is the first step in the world of security system.
At that point of time this arrangement for security was considered the best. But as
time passes it was found that any unauthorized person could access these through
duplicate keys or using any technique. So as the world progresses, the thieves
become more intelligent to break the security.
Thus, we always need a new and strong security system to protect our assets.
Today in the world of e-commerce and Internet this thing is becoming more and
more important because today the world is like village, from anywhere, any time,
any body can harm you.
e.g. :-If you are purchasing something from web and because of
lack of security someone come to know your bank account
number. Then that person will have all the information of your bank
account, which can perhaps put you in a big trouble!
Now a days, there are many security systems are available. But we shall
concentrate on ‘BIO-METRICS’.
2. INTRODUCTION
BIO=Pertaining to biology; MATRICS=Science and art of measurement.
3. A FEW DEFINATION
Biometrics Authentication
Person authentication or simply authentication is a task of confirming or denying
a person‟s claimed identity. Biometrics is a measurement using a person‟s behavioural or
physiological characteristics. Examples of these characteristics are fingerprints, face,
voice and signature. Biometric authentication is a task of confirming or denying a
person‟s claimed identity using his behavioural or physiological characteristics.
Note the distinction between the terms biometrics and biometry. Biometry refers to a
much broader field involving application from statistics to biology and medicine.
Biometrics is a noun and biometric is an adjective.
Identification Authentication
It determines the identity of the person. It determines whether the person is indeed
who he claims to be.
There is no identity claim from the user. The user makes an identity claim. By using
The system has to search through its record the claim as a key, the system searches the
to find the identity. This search is called a user‟s record to compare. It is a one to one
many-to-one mapping. The cost of mapping. The system uses the identity as a
computation in the identification task key to call for the identity‟s record. The
increases in proportion to the number of cost of computation is not dependant on
record of users. the number of record of users.
It is often assumed that a captured The captured biometric signature comes
biometric signature comes from a set of from a large set of unknown users. This is
known biometric feature stored in the referred to as open-set verification.
system. This is referred to as closed-set
identification.
4. HISTORY OF BIO-METRICS
He has observed that No two persons have same finger print. Each and
every person has got a unique finger print pattern.
In 1968, Bio- metrics technique was implemented successfully when well-known bank
of New York has arranged the finger print scanning to access the currency walt , first
time in the world.
But after 1990, when IT (Information Technology) comes into the picture, through its
advancement and simplicity Bio- metrics technique becomes very popular.
This new technology is very easy to understand compare to its heavy label.
Because of user- friendly environment this technique is very well welcomed by
various fields.
5.1 Purpose
5.2 Journal
Biometrics is published quarterly. Its general objectives are to promote and extend
the use of mathematical and statistical methods in the various subject- matter
disciplines, by describing and exemplifying developments in these methods and
their application in a form readily assimilable by experimenters and those
concerned primarily with analysis of data. The journal is a ready medium for
publication of papers by both the experimentalist and the statistician. The papers
in the journal include statistical, authoritative expository or review articles, and
analytical or methodological papers contributing to the planning or analysis of
experiments and surveys, or the interpretation of data. Many of the papers in
Biometricscontain actual worked examples of the statistical analyses proposed.
5.3 Meetings
Encouragment is given the subject- matter experimenter by holding symposia
dealing with applied statistics as a part of annual meetings of the biological,
chemical, engineering, and physical science societies. Such symposia afford an
opportunity for subject-matter specialists and statisticians to discuss problems of
mutual interest. At Regional meetings of the Society, a member is afforded an
opportunity to present technical papers. This permits the exchange of ideas and
information through formal presentation and informal contacts with fellow
statisticians and experimentalists.
6.2 Transmission: -
Not all the biometric systems process and store data on the measuring device.
Often measurement is made using relatively simple device to a computer or server for
processing and/or storage. Depending on the system, the data may be relatively large
and thus would need to be compressed for quick transfer. The compression algorithm
needs to be selected carefully; otherwise it may introduce some artefacts that could
impact the decision process.
In any image scanning Biometric system, JPEG compression is preferred due to
the blockness it produces at high compression ratios. The data can also be transmitted
to the database for storage as raw data.
7. PHASE OF BIO-METRICS
7.1 Input
Using appropriate input device it will collect the data of the person‟s
biological features. These features are known as the master key for
the computer.
For recording and converting biometric traits to usable computer data, one needs an
appropriate sensor (see table). Of course, costs can greatly vary for different sensors.
However, we can't forget that many technical devices already have sensors built in, and
therefore, offer possibilities to measure biometric features nearly free of cost.
7.2 Process
Processes the input data. Here, computer takes the measurement of inputed
Biological features.
No two persons have same finger print. So, computer joins the points of that finger
print features and make the pattern of it and it will store that pattern into its memory.
Then computer compares this pattern against the master keys.
7.3 Output
Testing of processed data and give the access rights to the person. Here,
When any person scanned his/her finger print , computer will
store a Bio- logical featured pattern and compares it against the stored master-
key in its memory. And if it is matched, then permission granted else not.
8.BIO-METRICS IDENTIFICATION
CONVENTIONAL METHODS OF BIOMETRIC IDENTIFICATION ARE……….
1 VOICE PRINT
2 FINGER PRINT
3 IRIS PATTERN
4 FACE PRINT
5 HAND GEOMETRY
6 RETINAL SCAN
7 KEYSTROKE DYNAMICS
8 FACIAL RECOGNITION
9 SIGNATURE RECOGNITION
But as each & every person has got different voice pattern that‟s why
no two voice prints are matched.
Your voice is further modified by the way you speak - the way your
mouth, lips, tongue, jaw and teeth move (these are called articulators).
Therefore, the chances of two people have the same vocal
characteristics are minute.
The computer converts the voice pattern into 0 & 1.After taking the
input that input is also converted into 0 & 1.If the both code matches
the person is authorized.
To scan the finger print, a special kind of scanner that can work with
optical rays is used.
Here, those special features are core, split, island, end & delta.
The new sophisticated software of bio metrics scans the finger as well
as palm.
The computer converts the finger pattern into 0 & 1.After taking the
input that input is also converted into 0 & 1.If the both code matches
the person is authorized.
entire planet could be enrolled into an iris database and there would
still be a minute chance of false identification or rejection. In finger
print technique there are only 90 special features, but in iris pattern
there are 266 special features.
The iris pattern of a person‟s left and right eyes are different.
Computer only considers the data of iris and removes other data and
analyzes the total 266 features and assigns a particular value to each
feature.
The pattern of iris is converted into the total 4,096 bits of 0 & 1.
Then computer compares the new data of 0 & 1 to the iris print stored
as master key and if it is matches then gives the access rights.
Iris has stable and distinctive features for personal identification. That
is because every iris has fine and unique patterns and does not change
over time since two or three years after the birth, so it might be called
as a kind of optical finger print
The Iris Code is so specialized that the chances of two irises having
the same code are 1 in 1052 !
To make this pattern it will use approx 50 features of face like the distance
between two eyes, breath of nose, cheeks, area of forehead, jaws etc.
The computer converts the face pattern into 0 & 1.After taking the input
that input is also converted into 0 & 1.If the both code matches the person
is authorized.
It works as follows:
The user first enters a PIN number on a keypad, and then
positions their hand on a plate using a set of guidance pins which
ensures that the hand will be in generally the same position for every
measurement. Then a digital camera mounted above the plate, with
the aid of a mirror, takes a picture of the top and side views of the
hand. The dimensions of the hand, such as finger length, width and
area, are extrapolated from the image and the magnification of the
camera. This system, however, is subject to an attack using a fake
hand modeled after that of an authorized user.
Retinal Scan technology is based on the blood vessel pattern in the retina of the
eye. A retinal scan can produce almost the same volume of data as a fingerprint image
analysis.
It works as follows:
The user positions their head against a support, and a low power infrared light is
directed against the back of the retina. The image of the pattern of veins is reflected back
to a camera.
1. Facial metrics
2. Eigenfaces.
(a) (b)
Figure 1(c) shows an ear. An ear has more structure thus creates different shading.
Segmenting ear can be very challenging. However, if ear can be segmented reliably and
represented in a canonical image space, it is possible to extract ear shape information.
The same goes to fist as shown in Figure 1(d). We tried to capture thumb too in the hope
that fingerprints might be observed. However, at such resolution, fingerprints are partially
captured and is not clear.
From Table 2, Retinal scan, after [Daugman, 1995], appears to have the highest
crossover accuracy. Even though Iris scan has high cross over accuracy, its user
acceptability is low. Fingerprints and hand geometries are equally “unique”.
Signature dynamics and voice dynamics have the lowest accuracy rates according
to [Ruggles, 1998]. In addition, these two techniques rely on behavioural measurements
as opposed to physical measurements. In general, behavioural biometrics is less reliable
than physical biometrics.
Retinal scan has high accuracy but also has a high data collection error rate and
low user acceptability. For this reason, retinal scan exists only in science fiction movies
but not in real life applications!
The fingerprint biometric has a low data collection error rate and high user
acceptability. Further, fingerprint technology has had the most research and development
money applied to both identification and authentication problem. Finally, fingerprint
biometrics has the highest acceptance in the identification community and virtually every
large biometrics system in operation today uses fingerprint biometrics. Notwithstanding
it's association with "criminal" applications, fingerprint biometrics is generally accepted
by clients.
The chosen biometrics in this project, i.e., face and voice, are based on user
acceptability and another important factor, the availability of resources in the laboratory.
Once the system is established, moving into other biometrics would be easier.
False Accept Rates claimed for today's biometric access systems range
from 0.0001% to 0.1%.
The False Reject Rates quoted for current biometric systems range
from 0.00066% to 1.0%.
A low False Reject Rate is very important for most applications, since
users will become extremely frustrated if they're denied access by a
device that has previously recognized them.
It's important to remember that error rates are statistical: they are
derived from a series of transactions by a population of users.
In general, the larger the population and the greater the number of
transactions, the greater the confidence level in the accuracy of the
results.
If the reported error rate is 1:10, then a sample of 100 transactions may
provide a sufficient confidence level. Conversely, a 100-transaction
sample would be too small if the error rate was reported as 1:100,000.
Biometric devices are extremely secure, thanks to the combination of low False Accept
Rates at moderate sensitivity settings, combined with a short user keypad code.
At the same time, biometrics are extremely convenient and error-free, thanks to low False
Reject Rates.
13.ABOUT BIO-METRICS
It is a matter of fact that the security of password protected values in particular depends
on the user. If the user has to memorize too many passwords, he will to use the same
For Security
For Accountability
For Efficiency
Law enforcement
Health & Social services
The unfortunate events of September 11,2001 have placed the recent focus on
creating new systems and installations employing biometrics.
Examples include facial recognition at airports and fingerprint and iris scanning
solutions at new government facilities.
o Lastly, since the biometric templates are stored on individual cards, the
number of users for any particular biometric reader is unlimited. This
scenario differs from biometric readers that store the template, thereby
limiting the template capacity to the reader's sto rage capacity.
This Bio-chip concept is recently used in an African Safaris to trap the activities
and diseases of animals. For this every animal has a Bio-chip in its body.
So, in future it may not require to ask “What is your name?” just make a shake
hand and allow the Bio-chips to interact and will know the person‟s
Identification.
We don‟t know, But Bio- metrics identification may include brain Chemistry
because every one has got different brain chemistries.
14. CONCLUSION :-
We conclde that for biometrics is better technique for any security. This technique is
improve then unauthorized person can not access any thing our assets. It depends on
physical behavior. This technique is possible only on the man identification not its
document needed for it.
15.REFERENCES:-
2. www.findbiometrics.com
3. www.howstuffworks.com
CONCLUSION :-
We conclde that for biometrics is better technique for any security. This technique is
improve then unauthorized person can not access any thing our assets. It depends on
physical behavior. This technique is possible only on the man identification not its
document needed for it.