Professional Documents
Culture Documents
systems reasonably.
1
CHAPTER ONE
1.0 INTRODUCTION
2
(passwords can be announced in hacker websites); and they
authentication system.
3
reliable user authentication techniques has increased in the wake
4
making biometric technology an effective tool for providing
information security.
or a voice sample.
maintain security.
access.
6
CHAPTER TWO
issues. This need for security also extends to the need for
identification are being developed, each with its own strengths and
7
weaknesses and a potential niche market. This chapter reviews
The term Biometrics is derived from the Greek words bio (life)
biometric systems have only become available over the last few
8
identifying individuals based on detailed records of their body
9
Woodrow W. Bledsoe, which used the location of eyes, ears, nose
a system was that all these features were manually identified and
10
this first biometric automated system motivated several funding
agencies like FBI Fund, NIST for the development of scanners and
out that no two irises are alike and their findings were awarded a
11
(IAFIS) 36 competition. The competition identified and investigated
Iriscan. The year 2000 envisaged the first face recognition vendor
the same year paved way for the first research paper on the use of
12
2005, Iris on the move was announced by Biometric Consortium
described them as loops and spirals but did not note their value as
patterns. This was the first step towards the modern study of
13
when Sir William Herschel, the Chief Magistrate of the Hooghly
Later, the right index and middle fingers were printed next to the
signature on all contracts made with the locals. The purpose was
relation to the research study, the review study also reveals the
fact that even though several success stories are published with
14
CHAPTER THREE
algorithm.
15
be in a form that permits subsequent processing and
16
RESEARCH METHODOLGY
3.2.1 Fingerprints
than for any other biometric. As the prices of these devices and
where you can give users adequate explanation and training, and
17
cost, small size, and ease of integration of fingerprint
authentication devices.
where there are more users or where users access the system
biometric projects.
18
3.2.3 Retina
scanning can be quite accurate but does require the user to look
close contact with the reading device. For these reasons, retinal
3.2.4 Iris
19
matching performance. Iris biometrics work with glasses in place
and is one of the few devices that can work well in identification
been strong points with iris scanning devices, but you can expect
3.2.5 Face
20
3.2.6 Signature
an accepted identifier.
3.2.7 Voice
transforms voice into text. Voice biometrics has the most potential
21
has often been more complicated than with other biometrics,
22
TABLE I
23
security system employs depends in part on what the system is
24
Eye Ticket, which Charlotte/Douglas International Airport in North
verification functions.
25
access as the application that will provide the critical mass to move
time, user demands for virtual access will raise public awareness of
26
technology with the potential to make our society safer, reduce
authentication applications.
27
Given an input biometric sample, identification determines if the
supervision as possible.
28
cannot be accomplished without biometrics (e.g., by using token-
employs iris scan cards to speed up the passport and visa control
the gate and look into a camera; the camera acquires the eye
the Iris Code; the computed Iris Code is compared with the data
29
across the spectrum, from IT vendors to end users, and from
application-specific parameters.
Some biometric devices are not user friendly. For example, users
30
with the data collection (for instance, background noise when
3.4.3 Accuracy
vendors arrive at quoted values of FAR and FRR. Because FAR and
behavioral biometrics.
31
3.4.4 Cost
costs;
prints;
and
system maintenance.
32
religious and civil-liberties groupshave rejected biometric
33
dynamics under way in this emerging biometric market, and we
hope it will help you consider all the possible alternatives when
34
3.5.1 Inconsistent Presentation:
surface.
35
acquisitions may correspond to different non frontal projections of
36
of these phenomena contribute to dramatic variations in the
with the image acquisition surface and the valleys do not make any
37
contact with the image acquisition surface. However, the dryness
disease, sweat, dirt, and humidity in the air all confound the
38
biometric signal/representations, determining whether two
39
CHAPTER FOUR
40
expressive representation called a feature set which can be stored
matching.
components:
Portal
granted.
authentication.
41
Input device
may be verified.
that case a link between the user and her biometric template must
42
similarity between the template and the current biometric sample
43
4.4 RESEARCH CHALLENGES INBIOMETRIC RECOGNITION
44
is also very challenging given the variety of scenarios that are
possible.
the most fundamental questions one would like to ask about any
45
and every acquisition of the biometric from an individual should
46
Empirical Performance Measurement: Performance assessment
47
Fig.4. Biometric system characterization. The accuracy axis
represents the
48
CHAPTER FIVE
CONCLUSION
current password systems and does not encumber the end user
49
underlying biometric technology has created the expectation that
biometric is the panacea for all of our security and identity theft
50
biometrics system with sufficient privacy safeguards may be a
51
efforts will facilitate the cycle of build-test-share for transforming
advance the state of the art and make biometric systems more
52
value of the technology, user acceptance, and the credibility of the
information security.
53
REFERENCES
Processing
Technology,
ps197/ps-197.pdf
Identication
Systems.Technical
report.http://www.ecommonitor.com/papers/biometricsTR2000.pdf
54