Professional Documents
Culture Documents
Abstract - Positive and reliable automatic identification of Identification is determining who a person is. It
humans is a very important topic in a number of law involves taking the measured characteristic and trying to
enforcement (e.g., criminal investigation), government find a match in a database containing records of people and
(e.g., border control), and commercial (e.g., logical and that characteristic. This method requires a large amount of
physical access control) applications. Surrogate processing power and some time if the database is very
representations of identity such as passwords and physical large. It is often used in determining the identity of a
tokens fail to provide satisfactory level of security in the suspect from crime scene information.
current electronic era. Biometrics-based authentication Verification is determining if a person is who they
techniques utilize physical and behavioral characteristics say they are. It involves taking the measured characteristic
(e.g., fingerprint, iris, voice, gait, and face) to either verify and comparing it to the previously recorded data for that
a claimed identity (biometric verification) or establish the person. This method requires less processing power and
identity of an individual (biometric identification). time, and is often used for accessing places or information.
With increased emphasis on security, there is a growing The use of biometrics is not limited to a particular
and urgent need to automatically identify humans both field, but it is widely used in various platforms. Some of
locally and remotely on a routine basis. them are enlisted below:
Index Terms: Biometrics, Ear Patterns, Gait Technology • ATM, and ticketing machines that recognize an
, Face, Fingerprint, Iris, Signature, Voice Recognition. authorized valid user (with or without card or PIN)
• Integrated personal identifiers for credit card
I .INTRODUCTION verification at point-of-sale or identification of a
Definition: customer without a credit card
Biometrics refers to the automatic identification of a • Stationary and mobile platforms for licensing,
person based on his/her physiological or behavioral registration, and border security programs
characteristics. This method of identification is preferred • Travel security systems with passport, ticket, and
over current methods involving passwords and PIN baggage verification
numbers for various reasons: the person to be identified is • Business, residence, and vehicle security with
required to be physically present at the point-of- access and operator authentication
identification; identification based on biometric techniques • Processing and circulation control in the
obviates the need to remember a password or carry a token. corrections (prison) environment, and
With the increased use of computers as vehicles of • Portable systems for on-scene recognition of
information technology, it is necessary to restrict access to individuals for police and military use.
sensitive/personal data. By replacing PINs, biometric
techniques can potentially prevent unauthorized access to How It Works:
or fraudulent use of ATMs, cellular phones, smart cards,
desktop PCs, workstations, and computer networks. PINs Biometric devices consist of a reader or scanning device,
and passwords may be forgotten, and token based methods software that converts the gathered information into digital
of identification like passports and driver's licenses may be form, and a database that stores the biometric data for
forged, stolen, or lost. Thus biometric systems of comparison with previous records. When converting the
identification are enjoying a renewed interest. biometric input, the software identifies specific points of
data as match points. The match points are processed using
Why we need biometrics? an algorithm into a value that can be compared with
biometric data in the database.
In order to avoid the problems of forgetting passwords and
ID codes, Biometrics based authentication helps us in III. . TYPES OF BIOMETRICS SYSTEM
verifying your finger prints, iris pattern and voice for your
identity at A.T.M’s, Airports etc.., you can unlock your
houses, withdrawing money from a bank with just a blink
of an eye, a tap of your finger or by just showing your face.
II.USE OF BIOMETRICS
Advantages:
Fingerprint Classification: Fingerprint classification is a
• High accuracy rate.
technique to assign a fingerprint into one of the several pre-
specified types already established in the literature which • Can perform 1-to-many comparisons.
can provide an indexing mechanism. Fingerprint • Inexpensive equipment.
classification can be viewed as a coarse level matching of • Easy to use (samples are easy to
the fingerprints. An input fingerprint is first matched at a capture and maintain).
coarse level to one of the pre-specified types and then, at a • Most established and oldest of the
finer level, it is compared to the subset of the database biometric technology.
containing that type of fingerprints only.
Disadvantages:
• Actual finger scan images cannot be
recreated from a template image
• Users relate fingerprint recognition to
criminal activity.
XI. REFERENCES
[1] www.bioenabletech.com/
[2]www.eyenetwatch.com/biometric_technology/technolo
gies.html
[3]www.ravirajtech.com/biometrics_fingerprint_technolo
gy.html
[4]www.biometrics.gov/Documents/biointro.pdf
[5] www.blackhat.com/presentations/bh.../bh-us-02-smith-
biometric.ppt
[6]cracs.fc.up.pt/~mcoimbra/lectures/PSI.../PSI_2007_
PCorreia.pdf
[7] http://www.cbel.com/biometrics_security/