Professional Documents
Culture Documents
The word biometrics comes from the Greek words bios and metric,
meaning'' life measurement''. By measuring something unique
about an individual and using that to identify them, we can achieve
a dramatic improvement in security of the key store. Biometrics
refers to methods for uniquely recognizing humans based upon one
or more intrinsic physical or behavioral traits. In information
technology, in particular, biometrics is used as a form of identity
access management and access control. It is also used to identify
individuals in groups that are under surveillance.
6
HISTORY OF BIOMETRICS
Joao de Barros, an explorer and writer, wrote that Chinese
merchants used a form of biometrics by stamping children’s palm
prints and footprints on paper with ink .In doing this, the Chinese
solved a way to distinguish young children from one another. This
is one of the earliest known cases of biometrics .Later an
anthropologist named Alphonse Bertillion sought to fix the
problem of identifying convicted criminals. He found that even if
names changed, even if a person comes in disguise, certain
elements of the body remained fixed. This led him to form a
method of measuring the distinguishable parts of a person’s body,
which never changed throughout their life. Whenever a new
criminal was caught, instead of taking down their name, the
authorities would measure them and look for a matching card. This
system was adopted by prisons and police stations across the
country and world. As technology got more and more advanced,
the ways to distinguish the different biometrical signalments has
become more and more precise which has led to the field of
biometric technologies that we live in today.
7
CATEGORIES OF BIOMETRICS
1. Physiological- (also known as static biometrics): Biometrics
based on data derived from the measurement of a part of a
person’s anatomy. They are related to the shape of the body
for example, fingerprints and iris patterns, as well as facial
features, hand geometry and retinal blood vessels.
8
BIOMETRIC SYSTEM
COMPONENTS
What do I need to make it
-algoritham
-repository
9
BIOMETRIC SYSTEM
ARCHITECTURE
Raw Extracted
Data data features Template
collection Signal Matching Storage
processing
Match
score
10
• Matching subsystem-Key role in the biometric
system.Receives processed biometric data from signal
processing subsystem and biometric template from storage
subsystem.Measures the similarity of the claimant’s sample
with the reference template.Typical methods distance
metrics, probabilistic measures, neural networks, etc
11
PHYSIOLOGICAL BIOMETRICS
FINGERPRINT - analyzing fingertip
patterns
Among all the physiological biometric techniques, fingerprint-
based identification is the oldest method, which has been
successfully used in numerous applications. Everyone is known to
have unique, immutable fingerprints. A fingerprint is made of a
series of ridges and furrows on the surface of the finger. The
uniqueness of a fingerprint can be determined by the pattern of
ridges and furrows as well as the minutiae points.
Capture Techniques:
Sensor Types
1. Optical
2. Silicon
3. Ultrasonic
Features:
12
FACIAL RECOGNITION
Capture Techniques:
1. Still Camera
2. Video
3. Thermal Imaging
Algorithm Categories:
Features:
13
RETINAL SCAN - analyzing blood vessels in
the eye
The patterns of blood vessels on the back of the human eye are
unique to each individual. Oldest biometrics as 1930's research
suggested scanning involves using a low-intensity light source and
an optical coupler to read the patterns at a great level of accuracy.
A retinal scan involves the use of a low-intensity coherent light
source, which is projected onto the retina to illuminate the blood
vessels which are then photographed and analysed. A coupler is
used to read the blood vessel patterns. Retina scans require that the
person removes his/her glasses, place their eye close to the
scanner, stare at a specific point, and remain still, and focus on a
specified location for approximately 10 to 15 seconds while the
scan is
14
[Retinal recognition system [Icam 2001 by
Eyedentify]
15
IRIS RECOGNITION
Iris recognition uses the iris as the physical characteristic to be
measured. This technique is very reliable as no two irises can ever
be same as the iris contains many randomly distributed immutable
structures. Moreover, the iris does not change over time. By the
use of a standard video technology, its features can be quickly
recorded from about nine inches away, thus eliminating the need
for evasive physical contact.It measures upto 266 unique features.It
is popular for facility access and transportation/border security.
Features:
1. Highly Accurate
2. Very stable over lifetime
3. Not affected by common eye surgeries
4. No physical contact required
5. Works through glasses and contacts
Disadvantage:
16
1. You can cheat the iris scanner by putting on lens or glasses.
Behavioral biometrics
1.Voice:
• Speaker Recognition - analyzing vocal behavior-
Voice authentication, also known as “speaker
verification”, is defined as the automated verification of
a person’s claimed identity, based on unique
characteristics of their voice. A simple microphone is
enough to record the voice, and then most of the
algorithm are analyzing the voice spectrum. Voice and
speech can be combined to get a better system.
2. Signature:
• Analyzing Signature Biometrics-
17
recognizes the small changes in a person's handwriting
from day to day and over time.
FUTURE RESEARCH
• Body Odor – Future technology can be body odour. A
British company, Mastiff Electronic System Ltd. is working
on such a system
• Keystroke Dynamics – Keystroke dynamics, also referred to
as typing rhythms, is an innovative biometric technology
• Ear shape-The shape of the ear is unique for every
individual. Scientists are working on the principles guiding
this aspect of the body .
• Body Salinity-The hormones of each one of us have a
definite composition which can never be duplicated.This
feature is used to make a foolproof security system.
• Vascular patterns- Vascular patterns are best described as a
picture of the veins in a person's hand or face. The thickness
and location of these veins are believed to be unique enough
to an individual to be used to verify a person's identity. The
18
most common form of vascular pattern readers are hand-
based, requiring the user to place their hand on a curved
reader that takes an infrared scan. This scan creates a picture
that can then be compared to a database to verify the user's
stated identity. Research is going on in this field to remove
all the loopholes.
CONCLUSION
19
20