You are on page 1of 32

Biometrics Identification

Systems

Mikhail Parmar 2009129


Parth Bhatt 2009135
Pooja Surana 2009136
Nikeeta Kataruka 2009146
Prerana Lochav 2009178
Introduction
ü Biometrics refers to methods for uniquely
recognizing humans based upon one or
more intrinsic physical or behavioral traits.

ü In information technology, in particular,


biometrics is used as a form of identity
access management and access control.

ü It is also used to identify individuals in


groups that are under surveillance.
Classification
1. Behavioral are related to the behavior of
a person.

• Examples include to typing rhythm, hand-


writing, voice etc.

• Some researchers have coined the term


behaviometrics for this class of
biometrics.
Voice

The analysis of the pitch, tone,


cadence and frequency of a
person's voice
Applications
• Automotive speech recognition (e.g., Ford Sync)
• Court reporting (Real time Voice Writing)
• Hands-free computing: voice command recognition
computer user interface
• Home automation
• Interactive voice response
• Mobile telephony, including mobile email
• Multimodal interaction
• Pronunciation evaluation in computer-aided language
learning applications
• Robotics
• Transcription (digital speech-to-text).
• Speech-to-text (transcription of speech into mobile
text messages)
• Air Traffic Control Speech Recognition
Hand-Writing

The way you sign your name


does change over time, and
can be consciously changed
to some extent, it provides a
basic means of identification
Classification
2. Physiological are related to the shape of
the body.

• Examples include fingerprint, face


recognition, DNA, hand and palm
geometry, iris recognition, which has
largely replaced retina, odor/scent etc.
Face Recognition

Facial characteristics (the


size and shape of facial
characteristics, and their
relationship to each other).
Typically, this method uses
relative distances between
common landmarks on the
face to generate a unique
"face print."
Applications
• Document control (digital chip in
passports, drivers‘ licenses)
• Transactional authentication (credit cards,
ATMs, point-of-sale)
• Computer security (user access
verification)
• Physical access control (smart doors)
• Voter registration (election accuracy)
• Time and attendance (entry and exit
verification)
DNA
A system that recognizes
human DNA. DNA evidence
has been used in courts of
law since 1985 to prove guilt
or innocence. It is also used
for paternity testing,
identification of missing or
dead people
Applications
• DNA Testing in Forensics

• DNA Testing in Healthcare

• DNA Testing in Legal

• DNA Testing in archeology and human


genome

• DNA Testing in Agriculture


Hand & Palm Geometry
Hand geometry is the
measurement and
comparison of the different
physical characteristics of
the hand. It is a popular
means of biometric
authentication
Applications
• Security systems: physical admission into
secured areas with door lock and
integrated building security systems
• Log-in control: network or PC access
• Healthcare: ID verification for medical
equipment, electronic record management
• Banking and financial services: access to
ATM, kiosks, vault
Iris Recognition

An iris scan provides an


analysis of the rings,
furrows and freckles in the
colored ring that surrounds
the pupil of the eye. More
than 200 points are used
for comparison.
Applications
• National border controls: the iris as a living
passport
• Computer login: the iris as a living password
• Cell phone and other wireless-device-based
authentication
• Secure access to bank accounts at cash machines
• Ticketless travel; authentication of rights to
services
• Driving licenses; other personal certificates
• Entitlements and benefits authorization
• Forensics; birth certificates; tracing missing or
wanted persons
• Credit-card authentication
• Automobile ignition and unlocking; anti-theft
Finger Print
Finger Print
Fingerprint recognition is based on two facts:

• Fingerprints never change Small ridges form


on a person's hands and feet before they
are born and do not change throughout the
person's life.

• No two fingerprints are the same. In the


over 140 years that fingerprints have been
routinely compared world wide, no two
areas of friction skin on any two persons
(including identical twins) have been found
to contain the same individual
Finger Print
• The ridges on the hands and feet of all
persons have three characteristics
(ridge endings, bifurcations and dots)
that appear in combinations that are
never repeated in any two persons.

• It has a strong combination of accuracy,


speed and ease of use.
Finger Print Elements
Procedure
• Enrolment: capturing a fingerprint image.
An image of the fingerprint in question is
created using a fingerprint sensor. The
requirements on image size and precision
depend on how much information is
needed for a proper identification.

• Extraction: removal of redundant


information. The characteristic traits are
extracted from the image and all
unnecessary information is removed. The
more unique this information becomes, the
Procedure
• Matching: comparison with stored
template.

• Verification: Comparison of the input


image with the image stored that
represents an individual.

• Identification: Comparison of the input


image with all templates in a database
Components
Advantages
• Acceptance—As most people are familiar
with the use of fingerprinting for
identification purposes, it is generally
accepted as a technology.

• Accuracy—Fingerprint technology is
accurate. There is very low chance of
accepting a false print or a chance of
rejecting a legitimate print.
Advantages
• Ease of use—Very little time is required
for enrolment with a fingerprint scanning
system.

• Uniqueness—Fingerprints are a unique


identifier specific to the individual.
Advantages
• Installation—Changes in technology have
made fingerprint scanners relatively easy
to install and inexpensive.

• Most fingerprint scanners are now very


small and portable. Plug-and-play
technologies have made installation very
easy.

• In many cases, the scanning device has


been incorporated into keyboards, mouse
Advantages
• Security—Fingerprints cannot be lost or
stolen, and are difficult to reproduce.

• Storing fingerprint templates as statistical


algorithms rather than complete copies
ensures that the ability to reproduce these
unique identifiers is significantly reduced.
Disadvantages
• Acceptance—User acceptance is not
guaranteed. Fingerprint scanning is
utilizing part of an individual’s body to
identify him/her. Some people view this as
an invasion of privacy or worse.

• Training—Due to the intuitive nature of


scanning fingerprints, such devices require
training to use and to support.
Disadvantages
• Injury—Injury, whether temporary or
permanent, can interfere with the
scanning process. In some cases re-
enrolment is required.

• For example, bandaging a finger for a


short period of time can impact an
individual if fingerprint scanning is used in
a wide variety of situations.
Disadvantages
• Security—As some authors have argued,
there is nothing to suggest that the same
technology that is used to store
fingerprints as statistical algorithms
cannot also be used or modified to
recreate accurate depiction of the print
itself.

• This raises serious concerns related to how


such data should be stored, maintained
and protected to prevent fraudulent use.
Applications
Example!!!

You might also like