Professional Documents
Culture Documents
1
• Permanence: don't change over time
• Measurability : measurable with
• simple technical instruments
• User-friendliness : easy and
• comfortable to measure
HISTORY OF BIOMETRICS:
2
fingerprints!). To reduce the search time and other. Typical sources of images for use in facial
computational complexity, it is desirable to recognition include video camera signals and
classify these fingerprints in an accurate and pre-existing photos such as those in driver's
consistent manner so that the input fingerprint is license databases.
required to be matched only with a subset of the
fingerprints in the database HOW DOES FACIAL RECOGNITION
The algorithms are developed to WORKS?
classify fingerprints into five classes, namely,
whorl, right loop, left loop, arch, and tented arch.
The algorithm separates the number of ridges
present in four directions (0 degree, 45 degree,
90 degree, and 135 degree) by filtering the
central part of a fingerprint.
The classifier is tested on 4,000 images
in the database. . For the four-class problem
(arch and tented arch combined into one class),
we are able to achieve a classification accuracy Faces are highly complex patterns that
of 94.8%. often differ in only subtle ways, and that it can
be impossible for man or machine to match
ACCURACY AND INTEGRITY: images when there are differences in lighting,
Someone may attempt to use latent print camera, or camera angle, let alone changes in the
residue on the sensor just after a legitimate user appearance of the face itself.
accesses the system. At the other end of the Not surprisingly, government studies of
scale, there is the gruesome possibility of facerecognition
presenting a finger to the system that is no longer software have found high rates of
connected to its owner. Therefore, sensors both "false positives" (wrongly matching
attempt to determine whether a finger is live, and innocent people with photos in the database) and
not made of latex (or worse). Detectors for "false negatives" (not catching people even when
temperature, blood-oxygen level, pulse, blood their photo is in the database). One problem is
flow, humidity, or skin conductivity would be that unlike our fingerprints or irises, our faces do
integrated. not stay the same over time. These systems are
easily tripped up by changes in hairstyle, facial
FACE RECOGNITION: hair, or body weight, by simple disguises, and by
the effects of aging. In addition, questions have
been raised about how well the software works on
darkskinned people, whose features may not appear
clearly on lenses optimized for
lightskinnedpeople.
It would work especially poorly in the
frenetic environment of an airport, where
fastmoving crowds and busy background images
would further reduce its already limited
effectiveness.
HAND GEOMETRY:
3
HOW IT WORKS ? dark pupil of the eye.
The iris-scan process begins with a
Every hand is unique. Hand geometry photograph. A specialized camera, typically very
scanners such as those made by Recognition close to the subject, no more than three feet, uses
Systems Inc. take over 90 measure- ments of the an infrared imager to illuminate the eye and
length, width, thickness, and surface area of the capture a very high-resolution photograph. This
hand and four fingers--all in just 1 second. process takes only one to two seconds and
provides the details of the iris that are mapped,
The technology uses a 32,000-pixel CCD digital recorded and stored for future
camera to record the hand's three-dimensional matching/verification.
shape from silhouetted images projected within Eyeglasses and contact lenses present
the scanner. The scanner disregards surface no problems to the quality of the image and the
details, such as fingerprints, lines, scars, and dirt, iris-scan systems test for a live eye by checking
as well as fingernails, which may grow or be cut for the normal continuous fluctuation in pupil
from day to day. size.
When a person uses the scanner, it The inner edge of the iris is located by
compares the shape of the user's hand to a an iris-scan algorithm which maps the iris’
template recorded during an enrollment session. distinct patterns and characteristics. Algorithms
If the template and the hand match, the scanner have a number of steps and are used by the
produces an output--it may unlock a door, biometric system to determine if a biometric
transmit data to a computer, verify identification, sample and record is a match.
or log the person's arrival or departure time. Iris’ are composed before birth and,
To register in a hand-scan system a except in the event of an injury to the eyeball,
hand is placed on a reader’s covered flat surface. remain unchanged throughout an individual’s
This placement is positioned by five guides or lifetime. Iris patterns are extremely complex,
pins that correctly situate the hand for the carry an astonishing amount of information and
cameras. A succession of cameras captures 3-D have over 200 unique spots. The fact that an
pictures of the sides and back of the hand. The individual’s right and left eyes are different and
attainment of the hand-scan is a fast and simple that patterns are easy to capture, establishes
process. The hand-scan device can process the 3D irisscan
images in 5 seconds or less and the hand technology as one of the biometrics that is
verification usually takes less than 1 second. The very resistant to false matching and fraud.
image capturing and verification software and The false acceptance rate for iris
hardware can easily be integrated within recognition systems is 1 in 1.2 million,
standalone units. Hand-scan applications that statistically better than the average fingerprint
include a large number of access points and users recognition system. The real benefit is in the
can be centrally administered, eliminating the false-rejection rate, a measure of authenticated
need for individuals to register on each device. users who are rejected. Fingerprint scanners have
a 3 percent false-rejection rate, whereas iris
scanning systems boast ratees at the 0 percent
level. A highly accurate technology such as
IRIS RECOGNITION: iris-scan has vast appeal because the inherent
argument for any biometric is, of course,
increased security. Iris scan biometrics employs the
unique characteristics and features of the human
iris in order to verify the identity of an individual
VOICE RECOGNITION:
4
print table are proportionate to the physical
locations of minutiae used in fingerprint SIGNATURE RECOGNITION:
identification. The minutiae are the endpoints
and bifurcations of the swirls of your fingerprint.
The advantage of using speech is that the number
of locations is almost endless. The capacity to
extend data collection over multiple words for
even better accuracy is a distinct advantage over
image-based techniques such as fingerprints and
retina scans where only a finite amount of
biometric data is available. Although it is
virtually impossible for an impostor to copy
someone's voice, it is also very difficult for
someone to repeat exactly the phrase originally
Signature verification is the process
enrolled. This is very similar to the fact it is
used to recognize an individual’s hand-written
difficult to reproduce the exact version of your
signature.
signature on your credit card.
There are two types of signature
Voice biometrics works by digitizing a
recognition techniques: simple and
profile of a person's speech to produce a stored
dynamic.There is an important distinction
model voice print, rather like a template, which
between simple signature comparisons and
is referred to each time that person attempts to
dynamic signature verification. Both can be
access secure data. The position and movement
computerized, but a simple comparison only
of the glottal tissues, lips, jaw and tongue
takes into account what the signature looks like.
correspond with speech movements in the vocal
Dynamic signature verification takes into
tract. Biometrics technology reduces each
account how the signature was made. With
spoken word into segments: sub-word like
dynamic signature verification it is not the
syllables, phonemes, trip hones or similar units
of sound, composed of several dominant
for biometric identification.
frequencies called formants, which remain
or look of the signature that is meaningful, it is
relatively constant over that segment. Each
the changes in speed, pressure and timing that
segment has three or four dominant tones that
occur during the act of signing.
dynamic signature verification it is not the
There will always be slight variations in a
shapeshape
person’s handwritten signature, but the
or look of the signature that is meaningful, it is
consistency created by natural motion and
the changes in speed, pressure and timing that
practice over time creates a recognizable pattern
occur during the act of signing.
that makes the handwritten signature a natural
There will always be slight variations in a
person’s handwritten signature, but the
PROPERTIES:
consistency created by natural motion and
practice over time creates a recognizable pattern
that makes the handwritten signature a natural
can be captured in digital form and plotted on a
table or spectrum. This table of tones yields the
speaker's unique voice print.
The voice print is stored as a table of
numbers, where the presence of each dominant
frequency in each segment is expressed as a
binary entry. Since all table entries are either 1 or
0, each column can be read bottom to top as a
long binary code. When a person speaks his or
her passphrase, the code word or words are
extracted and compared to the stored model for
that person. When authenticating, a user is asked to
answer up to three prompted questions, the
answers to which are easily remembered by the
user. In order to provide audible content of at
least one second in length, typical prompts are:
User's first, middle and last name .User's date
and month of birth Mother's first, middle and last
maiden name .Home telephone number
5
APPLICATIONS: • Telephone transaction
• Public identity cards
• Large volumes of fingerprints are
collected and stored everyday in a wide
range of applications DRAWBACKS OF BIOMETRICS:
including forensics, access control, and driver
license registration. Several countries, including Australia, Canada, the
• Geometry scanners verify identity at the United States and New Zealand, have witnessed
front entrances of over half the nuclear public disquiet over identification schemes. Some
power plants in of the fears that have been cited include, that
the U.S. people will be de-humanized by being reduced to
• Employers use hand-scan for entry/exit, codes.
recording staff movement and
time/attendance CONCLUSION:
procedures.
• Iris-scan technology has been piloted in So where security is highly required,
ATM environments in England, the US, implementation of biometrics security is a very
Japan and Germany since as early as 1997. good solution s there is to fear of stealing or
• Airports have begun to use iris-scanning forgetting the password. Tomorrow will find ever-
for such diverse functions as employee expanding applications for this thoroughly time-
identification/verification for movement through tested technology for financial transactions, ticket-
secure areas and allowing registered frequent less travel, and new business
airline passengers a system that enables fast and and residential applications where high security is a
easy identity verification in order to expedite their major concern.
path through passport control.
• Prison visitor systems, where visitors to
inmates are subject to verification
procedures in order that
identities may not be swapped during the visit - a
familiar occurrence among prisons worldwide.
6
7