You are on page 1of 14

SASURIE ACADEMY OF

ENGINEERIG
COIMBATORE

TOPIC NAME :- BIOMETRIC AVENUES FOR HUMAN


IDENTIFICATION (IEEE)

AUTHORS : - KRISHNA KUMAR.S

NAVEEN KUMAR .S

DEPARTMENT : - Electronics and Communication

Engineering

YEAR : - III YEAR (V semester)

MOBILE NO : - 96291 63836

E-mail id : - naveen.nng.009@gmail.com

COLLEGE PH NO:-04254-327474, 327676


BIOMETRIC AVENUES FOR HUMAN
IDENTIFICATION

ABSTRACT: - reported so far using face


or a finger image under
In this paper we are certain conditions is good
going to present an practice, however, there is
advance technology of the still a great need for better
biometry is the multi- performance in biometrics
biometric and its for use in video
applications. At one end, surveillance. One possible
there is a continuous and way to achieve improved
tremendous improvement performance is to combine
in the lifestyle of humans information from multiple
while at the other end; the sources. Besides, such
technological crimes are systems alleviate some of
increasing rapidly. As the problems that are faced
there is a problem there by single biometrics-based
must be a solution. The systems like restricted
solution for the problem of degrees of freedom, spoof
illegal authentication is attacks, and unacceptable
Biometrics. Biometrics is a error rates. We present a
means of using the prototype bimodal
physiological or biometric identification
behavioral characteristics system by merging face
of a person. Human and finger images.
identification performance
INTRODUCTION: -
Biometrics refers to the fraudulent use of the
automatic identification of following:
a person based on his or
her physiological or  ATMs

behavioral characteristics.  Cellular phones

This identification method  Smart cards


is preferred over  Desktop PCs
traditional method  Workstations
involving passwords and  Computer
PINs (personal networks
identification numbers) for
several reasons, including PINs and passwords

the person to be identified may be forgotten, and

is required to be physically token-based identification

present at the point of methods such as passports

identification and/or and driver’s licenses may

identification based on be forged, stolen, or lost.

biometric techniques Thus, biometric systems of

obviates the need to identification are enjoying

remember a password or a new interest. Various

carry a token. With the types of biometric systems

increased use of computers are being used for real-

as vehicles of information time identification. The

technology, restricting most popular are based on

access to face recognition and

sensitive/personal data is fingerprint matching;

necessary. however, other biometric


systems use iris and retinal
By replacing PINs, scans, speech, facial
biometric techniques can feature comparisons and
potentially prevent facial thermo grams, and
unauthorized access to or
hand geometry. A knowing the way in which
biometric system is a biometrical machine
essentially a pattern- captures the analyzed
recognition system that individual's physical
makes a personal elements. The mechanism
identification by of a biometric
determining the identification system
authenticity of a specific works with two main
physiological or steps: registration and
behavioral characteristic identification. Registration
possessed by the user. An consists in storing the
important issue in biological trait of an
designing a practical individual in a digital
system is to determine format, which will be used
how an individual is later to identify him/her.
identified. Depending on Once the individual is
the context, a biometric registered, when a new
system can be either a input is done, the
verification identification process
(authentication) or an captures and converts the
identification system. biological trait to the
binary format and
BIOMETRICS compares it to the stored
FUNCTIONALITIE one. The binary
S: - representation of a
biological trait is called
The operation of a template. The generated
biometric identification template of the same
system implicates in the individual can be not
domain of their methods of totally equal at different
actuation, in other words, capture moments. This is
due to noisy factors during (i) Verification/aut
the capture process (e.g. hentication,
light, position, rotation, which is the
distortion. different confirmation or
sensors, etc). So, a denial of a
biometric identification person's
system has to work with claimed
statistics to Confirm a identity (“Am I
person’s identity. who I claim I
am?”). Usually,
in this kind of
functionality,
Biometrics is
combined with
a traditional
method, e.g., a
person uses
his/her personal
magnetic card
and then his/her
finger to
confirm that
he/she is the
real owner of
Functional Blocks of Basic the card;
Biometric System (ii) Recognition/ide
ntification,
There Are Two Main which is the
Functionalities Within establishment
Identification Process: of the identity

- from a set of
known persons from the
(“Who am I?”). traditional
In this case, method (e.g.,
after the input card number)
of the biometric then the
data, the biometric data
physical or in this same
behavioral trait register are
of a person is compared with
compared to a inputted one.
number of Depending on
database the number of
registers, until registers in the
there is a database and
matching the admissible
register or the time for
registers are matching, one
over. The first of the two
functionality functionalities
demands a is applied. Each
combined approach has
traditional its own
method, but complexities
requires less and could
time to get a probably be
matching. Once solved best by a
the register specific
exists, it is biometric
indexed and system,
can be retrieved including the
by the data following:
PHYSICAL technologies, and its

BIOMETRICS: application in criminal


identification, using
¦ Fingerprint—Analyzing eyesight, has been in use
fingertip patterns for more than 100 years.
Today, computer software
¦ Facial recognition/face
and hardware can perform
location—measuring facial
the identification
characteristics
significantly more
accurately and rapidly.
¦ Hand geometry—
Fingerprint technology is
measuring the shape of the
among the most developed
hand
biometric technologies,
¦ Iris scan—Analyzing and its price is cost-
features of colored ring of effective enough to make
the eye its way into public use.

¦ Retinal scan—Analyzing Most fingerprint matching


blood vessels in the eye systems are based on
matching minutiae points
¦ vascular patterns— between the query and the
Analyzing vein patterns. template fingerprint
images. The matching of
two minutiae sets is
usually posed as a point
pattern matching problem
FINGERPRINT and the similarity between
RECOGNITION:-. them is proportional to the
number of matching
Fingerprint minutiae pairs. The first
recognition is one of the stage of the minutiae-
oldest biometric
based technique is the Aligning the two
minutiae extraction fingerprints is a mandatory
step of the fingerprint
matching in order to
maximized the number of
matching minutiae.
Formulation Correctly aligning two
fingerprints requires
geometrical
Minutiae-based matching
transformations, such as:
problem can be formulated
rotation, displacement,
in the following way.
scale, and other distortion-
Let T and I be the tolerant transformations.
template and the input After the alignment, a final
fingerprint minutiae sets, matching score is
respectively. In general, computed by using the
each minutiae is described maximum number of
by its x, y location mated pairs.
coordinates and its angle è.
A minutiae mj in I and a
minutiae mi in T are
considered “matching” if Challenges In
the spatial displacement Fingerprint
between them is smaller Identification:
than a given tolerance r0 -
and the direction
difference between them is Despite the
smaller than an angle efficacy of human
tolerance è0. identification based on
fingerprint matching
techniques, the fingerprint
identification still presents iris of either eye. This
some challenges, such as: protected internal organ,
approximately 3% of whose pattern can be
fingerprints are not of encoded from distances of
good quality; no proven up to almost a meter,
contact less fingerprint reveals about 266
sensor technology is independent degrees-of-
currently available; the freedom of textural
new compact solid-state variation across
sensors capture only small individuals.
portion of the fingerprint;
The iris is a
fingerprint impression is
structure of the human eye,
often left on the sensor;
composed of elastic
fingerprints are not
connective tissue, the
universal; fingerprint
trabecular meshwork,
sensors can be different
whose prenatal
during registration and
morphogenesis is
identification
completed during the 8th
(interoperability).
month of gestation. It
IRIS consists of pectinate

RECOGNITI ligaments adhering into a


tangled mesh revealing
ON: -
striations, ciliary’s

The most numerous and processes, crypts, rings,

dense degrees-of-freedom furrows, a corona,

(forms of variability across sometimes freckles,

individuals), which are vasculature, and other

both stable over time and features

easily imaged, are found in


the complex texture of the Formulation
Daugman’s Approach:- The extraction stage is
done by demodulation
The approach proposed by
with complex-valued 2D
Daugman, for iris
wavelets Then, a double-
recognition is composed of
dimensionless coordinate
three main stages: (i)
system is defined which
localization, (ii)
maps the tissue in a
extraction/encoding, and
manner that is invariant to
(iii) comparison. Figure 11
changes in pupillary
shows a diagram of
constriction and overall
Daugman’s approach.
iris image size, and hence
also invariant to camera
The localization stage uses
zoom factor and distance
an integro-differential
to the eye. The coordinate
operator to locate the
system compensates
borders of the iri(the inner
automatically for the
and outer boundaries of
stretching of the iris tissue
the iris), based on the
as the pupil dilates.
ascension of the gradient
to adjust the circular
The detailed iris pattern is
contours. This operator
encoded into a 256-byte
essentially is a circular
“Iris Code” by
edge detector and returns a
demodulating it with 2D
“spike” when a candidate
Gabor wavelets, which
circle shares the pupil
represent the texture by
(iris) center coordinates
phasors in the complex
and radius. If the eyelids
plane. Each phasor angle is
intrude, they are detected
quantized into just the
and excluded.
quadrant in which it lies
for each local element of
the iris pattern, and this
operation is repeated all (iv) Up to 7% iris scans

across the iris, at many can fail, due to anomalies,

different scales of analysis. such as watery eyes, long

The comparison of a eyelashes or hard contact

stored template with an lenses;

inputted one is done by the


(v) Iris can change over
calculation of the
time (e.g., as a result of
Hamming distance (HD)
eye disease), leading to
between two 256-byte iris
false rejects;
codes.

(vi) Contact lens or


photograph of a person's
iris pattern can be used to
LIMITATIONS OF
spoof some iris recognition
IRIS: -
systems (however, a
Fourier filter applied to a
Although the iris is
fake image can easily
one of the most reliable
reveal four points of
Biometrics traits, it has
spurious energy, when a
some limitations:
natural iris does not have
(i) Capturing an iris image these spurious
involves cooperation from coherences).
the user;

(ii) Cost of high


performance iris systems is
relatively high;
MULTIBIOMETRIC
(iii) Iris images may be of S:--
poor quality resulting in
A biometric system
failures to enroll;
that relies only on a single
biometric identifier often use of multiple biometric
presents limitations, such traits simultaneously
as:
The technique was
(i) Non-universality for tested on a subset of 10
that single trait;
users(provided data2
(ii) Noise in sensed mnths) These results
data, and
indicate that employing
(iii) Intra-class user-specific weights
variations.
further improves matching
So, by using multiple performance.
sources of biometric
simultaneously it is APPLICATIONS: -
possible to integrate
Biometrics is a
information to enhance
rapidly evolving
matching performance,
technology that is being
increase the population
widely used in forensics,
coverage by reducing
such as criminal
failure to enroll rate, and
identification and prison
difficult spoofing.
security, and that has the

The possible scenarios for potential to be used in a

multibiometrics include: large range of civilian

the use of multiple application areas.

algorithms for the same Biometrics can be used to

biometric trait recognition, prevent unauthorized

the use of multiple sensor access to ATMs, cellular

systems, the use of phones, smart cards,

multiple units of the same desktop PCs, workstations,

biometrics, the use of and computer networks. It

multiple impressions can be used during

systems; and, finally, the transactions conducted by


telephone and Internet .In enhancing user
automobiles, biometrics convenience. It must be
can replace keys with noted that deploying a
keyless entry devices. multibiometric system
introduces some overhead
CONCLUSION: - in terms computational
demands and costs.
Multibiometric systems
Researchers from the
alleviate a few of the
National Institute of
problems observed in unit
Science and Technology
modal biometric systems.
(NIST) used commercially
Besides improving
available biometric
matching performance,
products recently to
they also address the
acquire and test
problems of non-
multibiometric data
universality and spoofing.
pertaining to 1,000 users.
Multibiometric systems
This is an indication of the
can integrate information
increased attention that
at various levels, the most
multibiometric systems are
popular one being fusion
receiving from the
at the matching score level
government (for various
where the scores by the
national identification
individual matchers are
programs currently under
integrated. The simple sum
implementation such as the
rule results in improved
US-VISIT program) as
matching performance,
well as from researchers
which can be further
improved by employing REFERENCE:-
user-specific biometric
Websites:-
weights. User specific
\
weights aid in reducing the
false reject rate, thereby
 www.wikip
edia.com
 www.biowo
rld.com
 www.biose
c.org

You might also like