Professional Documents
Culture Documents
Veena.t.s
Shruthi.e
Pallavi.k.s
Rekha.r
Some biometric
systems
How it
workz
Whatz
biometric
s
Topics
A glance at Biometrics
History of biometrics
How biometric systems work?
Facial recognition
Finger print indentification
Hand geometry
Retinal pattern recognition
Iris based recognition
Voice recognition
Choice of techniques
Applications and privacy issues
Biometrics,
The word biometrics comes from the Greek bios (life)
and metrikos (measure), is automatic methods for
identifying a person on the basis of some biological or
behavioral characteristic of the person. Many biological
characteristics, such as fingerprints,face, fingerprints,
hand geometry, handwriting, iris, retinal, vein, and
behavioral characteristics, such as voice patterns, are
distinctive to each person.
Biometric technologies are becoming the foundation of
an extensive array of highly secure identification and
personal verification solutions
A receptionist scanning customer for loading customer information into the
system
History
In 1882 Alphonse Bertillon, chief of the criminal
identification division of the police department in Paris,
France, developed a detailed method of identification
based on certain bodily measurements, physical
descriptions, and photographs. The Bertillon System of
Anthropometric Identification gained wide acceptance
before fingerprint identification superseded it.
scientists know from a number of archaeological
artifacts that ancient civilizations, such as those of
Babylonia and China, recognized the individuality of
fingerprint impressions
.
Biometrics vs. Forensics
Biometrics and forensics have a lot in common,
but they're not exactly the same. Biometrics uses
your physical or behavioral characteristics to
determine your identity or to confirm that you are
who you claim to be. Forensics uses the same
kind of information to establish facts in civil or
criminal investigations.
Biometrics uses unique features,like the iris of eye, to
identify person.
How biometrics work
Biometric systems can seem complicated, but they all use the same
three steps:
•Enrollment: The first time you use a biometric system, it records basic
information about you, like your name or an identification number. It
then captures an image or recording of your specific trait.
•Storage: Contrary to what you may see in movies, most systems don't
store the complete image or recording. They instead analyze your trait
and translate it into a code or graph. Some systems also record this data
onto a smart card that you carry with you.
•Comparison: The next time you use the system, it compares the trait
you present to the information on file. Then, it either accepts or rejects
that you are who you claim to be.
Vein scanning is one form of biometric identification
Handwriting
At first glance, using handwriting to identify people might not
seem like a good idea. After all, many people can learn to
copy other people's handwriting with a little time and practice.
It seems like it would be easy to get a copy of someone's
signature or the required password and learn to forge it.
But biometric systems don't just look at how you shape each
letter; they analyze the act of writing. They examine the
pressure you use and the speed and rhythm with which you
write. They also record the sequence in which you form letters,
like whether you add dots and crosses as you go or after you
finish the word.
A handwriting recognition system's sensors can include a
touch-sensitive writing surface or a pen that contains sensors
that detect angle, pressure and direction. The software
translates the handwriting into a graph
This Tablet PC has a signature verification system.
Hand and Finger Geometry
People's hands and fingers are unique -- but not as unique as
other traits, like fingerprints or irises. That's why businesses and
schools, rather than high-security facilities, typically use hand
and finger geometry readers to authenticate users, not to identify
them
Systems that measure hand and finger geometry use a digital
camera and light. To use person simply place his hand on a flat
surface, aligning his fingers against several pegs to ensure an
accurate reading. Then, a camera takes one or more pictures of
his hand and the shadow it casts. It uses this information to
determine the length, width, thickness and curvature of his hand
or fingers. It translates that information into a numerical
template.
Authenticate vs. Identify
A biometric system can either authenticate that you are
who you say you are, or it can identify you by
comparing your information to all of the information on
file. Authentication is a one-to-one comparison; it
compares your characteristic with your stored
information. Identification, on the other hand, is a one-to-
many comparison.
A hand geometry scanner
Voiceprints
Every person voice is unique because of the shape of
vocal cavities and the way they move their mouth when they
speak. To enroll in a voiceprint system, they either say the
exact words or phrases that it requires, or give an extended
sample of their speech so that the computer can identify
person no matter which words they say.
. But the data used in a voiceprint is a sound spectrogram,
not a wave form. A spectrogram is basically a graph that
shows a sound's frequency on the vertical axis and time on
the horizontal axis. Different speech sounds create different
shapes within the graph
Speaker recognition systems use spectrograms to
represent human voices
Spectrogram Reading
Eye anatomy
Iris scanning can seem very futuristic, but at the heart of the
system is a simple CCD digital camera. It uses both visible
and near-infrared light to take a clear, high-contrast picture of
a person's iris.
When person look into an iris scanner Usually, eye is 3 to 10
inches from the camera. When the camera takes a picture,
the computer locates:
The center of the pupil
The edge of the pupil
The edge of the iris
It then analyzes the patterns in the iris and translates them into
a code.
Iris scanners are becoming more common in high-security
applications because people's eyes are so unique (the
chance of mistaking one iris code for another is 1 in 10 to the
78th power
An iris scanner
Vein Geometry
As with irises and fingerprints, a person's veins are
completely unique. Twins don't have identical veins, and a
person's veins differ between their left and right sides. Many
veins are not visible through the skin, making them
extremely difficult to counterfeit or tamper with. Their shape
also changes very little as a person ages
To use a vein recognition system, you simply place your
finger, wrist, palm or the back of your hand on or near the
scanner. A camera takes a digital picture using near-infrared
light. The hemoglobin in your blood absorbs the light, so
veins appear black in the picture. As with all the other
biometric types, the software creates a reference template
based on the shape and location of the vein structure.
Vein scanners use near-infrared light to reveal the patterns in a
person’s veins
Facial Recognition Technology
Human beings use facial recognition all the time to identify
other people. As a result, in the field of biometrics, facial
recognition is one of the most active areas of research.
This includes identify people from still-photograph images of
their faces to the design of systems that recognize active and
changing facial images against a cluttered background. More
advanced systems can recognize a particular individual in a
videotape or a movie.
Researchers base the patterns used for facial recognition on
both specific and general features. The specific features such
as the eyes, eyebrows, nose, lips, and chin. they employ an
overall analysis of the facial image and a breakdown of the
image into a number of component images. is sufficient for
the accurate recognition of one person in a large group of
overall analysis of the facial image and a breakdown
of the image into a number of component images
3D Facial Recognition
The Vision 3D + 2D ICAO
camera is used to perform
enrollment, verification and
identification of 3D and 2D
face images
www.google.com
www.Howstuffworks.com