Professional Documents
Culture Documents
In the present day world, online Depending on the context on which a biometric
shopping using WAP enabled mobile phone has system works, it can be either classified as an
widely come into use. Credit cards serve as the Identification system or a verification
negative side also hackers and spoofers steal verification involves confirming or denying a
misuse credit card numbers, even though the person’s claiming identity.
• Facial thermogram: uses an infrared between the two images. The software does this
camera to map the face temperatures by tracking changes in the position of tiny
wrinkles in the skin, each just a fraction of a
• Smile: recognition of the wrinkle
millimetre wide.
changes when smiling
The data is used to produce an image of the face
Facial geometry:
overlaid with tiny arrows that indicate how
Many different methods based on geometrical
different areas of skin move during a smile. This
characteristics of the face have been developed
movement is controlled by the pattern of
such as "local feature analysis", "Eigen face or
muscles under the skin, and is not affected by
Principal Component Analysis", ...
the presence of make-up or the size of the
Skin pattern recognition: subject's smile. The system is sensitive enough
Visual Skin Print relies on standard hardware - to produce such a map from muscle twitches
most web-cams and higher resolution mass- even when people are trying to keep their
market video cameras, connected to a PC, will expression unchanged
work. Visual Skin Print™ is based on a simple
yet powerful idea: using the details of the skin Dynamic facial features:
for authentication.
In A Dynamic Approach to Face Recognition
Facial thermogram:
paper, a new method for face recognition is
proposed, which is based on dynamic instead of
static facial features. They track the motion of program and templates can be operated and
certain features on the face during a facial stored in the protected device itself. Optionally,
expression and obtain a vector field that the voice templates used for validation can be
characterizes the deformation of the face. loaded at verification time from a smart-card or
stored in external RAM due to their small size.
In the training process, two high-resolution
images of an individual, one with a neutral The greatest benefit of our method is that user
expression and the other with a facial security can be self-contained within a device.
expression, like a subtle smile, are taken to Cell Phones, ATM cards, Automobiles and Door
obtain the deformation field. Access are just some of the applications that are
protected by our Voice Protection Technology.
VOICE RECOGNITION:
The speaker-specific characteristics of speech Other speaker verification technologies may rely
are due to difference in physiological and on costly database management of many users’
behavioral aspects of the speech production templates, and in some cases risk sending the
system in humans. The main physiological biometric data or even the voice stream itself
aspect of the human speech production system is over phone lines, air waves, or Internet lines.
the vocal tract shape. The vocal tract modifies Our Voice Protection Technology, ensures that
the spectral content of an acoustic wave as it the biometric data stays safe as the spoken
passes through it, thereby producing speech. phrase cannot be reconstructed from the "key"
Therefore, it is common in speaker verification created by the user. For Internet applications, the
systems to make use of features derived only user's "voice prints" can be contained in a single,
from the vocal tract. encrypted IP packet as it is less than 1K in size.
The microphone in the mobile phone
captures the speech. Then, using cepstral This is your best assurance, that we can deliver
analysis, an utterance may be represented as a biometric security technology to the market at a
sequence of feature vectors. Utterances, spoken lower cost than anyone else in the industry, with
by the same person but at difference times, result no re-occurring maintenance costs such as
in similar yet a different sequence of features database management or complicated user
vectors. So, the irrespective of the mood of the training. Once our Voice Protection technology
consumer, his transaction is accepted or rejected. is built into a product it will continue to function
The following algorithm may be used in voice independently for the life of the product.
verification.
Voice Recognition Biometrics, continues to How Voice Recognition Works:
pioneer methods of speach verification that can
effectively operate without the benefit of an
The first step in voice recognition is for an
external server or hard drive. The entire software
individual to produce an actual voice sample.
Voice production is a facet of life in which we as mispronounced verbal phrases, different
take for granted every day, and the actual media used for enrollment and verification
process is complicated. The production of sound (using a land line telephone for the enrollment
originates at the vocal cords. In between the process, but then using a cell phone for the
vocal cords is a gap. When we attempt to verification process), as well as the emotional
communicate, the muscles which control the and physical conditions of the individual.
vocal cords contract. As a result, the gap Finally, the voice samples are converted from an
narrows, and as we exhale, this breathe passes analog format to a digital format for processing.
through the gap, which creates sound. The
unique patterns of an individual's voice is then The next steps are unique feature extraction and
produced by the vocal tract. The vocal tract creation of the template. The extraction
consists of the laryngeal pharynx, oral pharynx, algorithms look for unique patterns in the
oral cavity, nasal pharynx, and the nasal cavity individual's voice samples. To create the
(1). It is these unique patterns created by the template, a model of the voice is created. In
vocal tract which is used by voice recognition voice recognition systems, stochastic models,
systems. Even though people may sound alike to particularly Hidden Markov models, have been
the human ear, everybody, to some degree, has a utilized. With this type of modeling, statistical
different or unique annunciation in their speech. profiles are created by comparing various voice
samples to determine any repeating patterns.
To ensure a good quality voice sample, the
individual usually recites some sort of text, The final step is verification of the individual. At
which can either be a verbal phrase or a series of this stage, the live voice sample submitted for
numbers. The individual usually has to repeat verification is compared to the statistical profiles
this a number of times. The most common created, and a probability score is then computed
devices used to capture an individual's voice which describes the likelihood that the individual
samples are computer microphones, cell (mobile) is who he or she claims to be.
phones, and the land line based telephones. As a
result, a key advantage of voice recognition is
FINGERPRINT ACQUISITION:
that it can leverage existing telephony
Finger based scanning is one
technology, with minimal disruption to an
of the oldest methods used for verification.
entity's business processes. In terms of noise
Fingerprints, unique and immunable for all are
disruption, computer microphones and cell
made of series of ridges and furrows on the
phones create the most, and land line based
surface of the finger. These ridges and furrows
telephones create the least. There are also other
determine the uniqueness of the fingerprints.
factors which can affect the quality of voice
Apart from these, minute points (i.e. local ridge
samples other than the noise disruptions created
characteristics that occur at either a ridge
by telephony devices. For example, factors such
bifurcation or a ridge ending also play role in of capacitors of the size of 0.03µ m. capacitors
fool-proofing this biometric technique. with such a small size can be manufactured with
To reduce the search time and MEMS technology. When the consumer places
the computational complexity, fingerprint his thumb on the scanner, the points at which his
classification is undertaken and thus fingerprints fingerprint touches the screen get discharged
are classified as whorl, right loop, left loop, arch, whereas others remain charged. Thus the
and arch. Recently researchers and scientists fingerprint is scanned and is then sent for further
achieved a great feat by improving the process
fingerprint classification to 94%.
In today’s world, fingerprint Fingerprint Matching:
matching techniques can be placed into two
categories: minutiae-based and correlation based. Among all the biometric techniques, fingerprint-
In minutiae based technique, the minutiae points based identification is the oldest method which
are found and their relative placement are has been successfully used in numerous
mapped on the finger whereas in correlation applications. Everyone is known to have unique,
based technique, the fingerprint acquired from immutable fingerprints. A fingerprint is made of
the person is checked for certain points a series of ridges and furrows on the surface of
previously stored in the database. If both the finger. The uniqueness of a fingerprint can be
matches, the person is given authentication, else determined by the pattern of ridges and furrows
he is denied permission. as well as the minutiae points. Minutiae points
are local ridge characteristics that occur at either
a ridge bifurcation or a ridge ending.
class classification when 30.8% of the images • Smart cards took 15 years of