You are on page 1of 36

Biometrics In Use

Ajit Kamble(02) Bhavesh Rathod(04)

Contents
I. Introduction II. Biometrics Functionality

III. Classes of Biometrics


IV. Applications V. Benefits and Limitations

Introduction
Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control.
It is also used to identify individuals in groups that are under surveillance.

Introduction
The first time an individual uses a biometric system is called enrollment.
During the enrollment, biometric information from an individual is captured and stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.

Biometrics Functionality

Biometrics Functionality
The sensor is the interface between the real world and the system; it has to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired. Pre-processing: it has to remove artifacts from the sensor, to enhance the input, to use some kind of normalization. Feature extractor: this step is an important step as the correct features need to be extracted in the optimal way. A vector of numbers or an image with particular properties is used to create a template. Matching phase: the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm. The matching program will analyze the template with the input. This will then be output for any specified use or purpose

Classes of Biometrics

Face Recognition
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. Traditional Technique: Some facial recognition algorithms identify faces by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features. A probe image is then compared with the face data. One of the earliest successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation. Recognition algorithms can be divided into two main approaches, geometric, which looks at distinguishing features, or photometric, which is a statistical approach that distill an image into values and comparing the values with templates to eliminate variances.

Face Recognition
Modern Technique: A newly emerging trend, claimed to achieve previously unseen accuracies, is three-dimensional face recognition. This technique uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin. One advantage of 3-D facial recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view. Skin texture analysis Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. This technique, called skin texture analysis, turns the unique lines, patterns, and spots apparent in a persons skin into a mathematical space. Tests have shown that with the addition of skin texture analysis, performance in recognizing faces can increase 20 to 25 percent.

Fingerprint Recognition
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.

Hand Recognition
Hand scanner works by creating and storing the templates of hand geometry in a biometric device, which are later used for identification and verification processes.

Features of Hand Scanner


A hand scanner takes into account more than 90 different hand measurements, including thickness of palm and its surface area.

Based upon hand recognition, these devices are capable of preparing different templates on the basis of distinct geometrical shapes.
Huge capacity to store templates captured from thousands of users.

Facilitates easy mounting on the wall or over the desktop.


Backups and restore features are also integrated with these devices.

Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the iris of an individual's eyes.
Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has one of the smallest outlier groups of any biometric technology. A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.

DNA Recognition
The basic steps of DNA profiling include: 1. 2. 3. 4. Isolate the DNA (sample can originate from blood, saliva, hair, semen, or tissue) Section the DNA sample into shorter segments containing known variable number tandem repeats (VNTRs)identical repeat sequences of DNA Organize the DNA segments by size Compare the DNA segments from various samples

Most often, DNA biometrics is used for identification purposes as opposed to verification because the technique has yet to automate through technological advances.
DNA sequencing, the process of generating a DNA profile, is compared to DNA samples previously acquired and catalogued in a database.

The most common DNA database in existence is the CODIS System used by the Federal Bureau of Investigation.
DNA biometrics technology is not advanced enough for universal use.

Keystroke Recognition
The way and the manner in which we type on our computer keyboard varies from individual to individual and is considered to be a unique behavioral biometric. Keystroke Dynamics or Recognition is probably one of the easiest biometrics forms to implement and manage. This is so because at the present time, Keystroke Recognition is completely a software based solution. There is no need to install any new hardware and even software. All that is needed is the existing computer and keyboard that is already in place and use.

Signature Recognition
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. A key generation algorithm that selects a private key uniformly at random from a set of possible private keys.

Signature Recognition
A signing algorithm that, given a message and a private key, produces a signature. A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity. Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key.

Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.

Voice Recognition
Speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. There is a difference between speaker recognition and speech recognition. These two terms are frequently confused, as is voice recognition.

Voice recognition is combination of the two where it uses learned aspects of a speakers voice to determine what is being said; the system cannot recognize speech from random speakers very accurately, but it can reach high accuracy for individual voices for which it has been trained. There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication. On the other hand, identification is the task of determining an unknown speaker's identity..

Voice Recognition
From a security perspective, identification is different from verification. For example, presenting your passport at border control is a verification process - the agent compares your face to the picture in the document. Conversely, a police officer comparing a sketch of an assailant against a database of previously documented criminals to find the closest match is an identification process. Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user's knowledge and typically requires their cooperation. In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match.

Voice Recognition

Biometrics Technology

Use of Biometrics

Applications
Biometric Applications From one field to another and one industry type to another, biometric technology is extending the reach of its applications. Business houses as well as government and defense organizations are taking advantage of biometric application to arrange for avant-garde security solutions.

Applications
Physical Access: Here, you can learn about application of biometric identification to control employee access to sensitive areas of business organizations, banks, airports and other places. Physical access to homes and garages can also be controlled by this technology. PC and Network Access: You will be delighted to learn about biometric applications in controlling unauthorized access to computers and networks in an organization or at home. The section is of great importance, if you have an organization with computers and network resources as its vital components. Time and Attendance: The significance of biometric in maintaining employee time and attendance in an organization has increased manifolds in past few years. You can learn about the same by navigating to this page. Law Enforcement: Learn how police departments and other law enforcement bodies make use of biometric identification for catching criminals and investigating.

Applications
Logical Access: Biometric security plays an important role in controlling logical access to computers, facilitated by passwords and other identification tools. Learn how this technology can avoid information theft from your computers. Financial Security: E-commerce transactions, online insurance purchasing and other similar activities require advanced procedures like biometric identification. You can learn about the same by spending time in this section. Healthcare Industry: HIPAA compliant biometric devices are used widely to protect identities of users. Moreover, providing security at hospital premises is one of the biometric applications you can learn here. Immigration and Airports: Biometric applications are also prospering in field of immigration industry and at airports to ensure safety against terrorism and you can learn about it here.

Benefits and Limitations


Facial recognition: Benefits: Non intrusive Cheap technology. Limitations: 2D recognition is affected by changes in lighting, the persons hair, the age, and if the person wear glasses. Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include cameras as standard equipment.

Voice recognition: Benefits: Non intrusive. High social acceptability. Verification time is about five seconds. Cheap technology. Limitations: A persons voice can be easily recorded and used for unauthorised PC or network. Low accuracy. An illness such as a cold can change a persons voice, making absolute identification difficult or impossible.

Benefits and Limitations


DNA Recognition: Benefits: Accurate: the chance of 2 individuals sharing the same DNA profile is less than one in a hundred billion with 26 different bands studied. Limitations: DNA matching is not done in real-time Intrusive: a physical sample must be taken, while other biometric systems only use an image or a recording

Signature recognition: Benefits: Non intrusive. Little time of verification (about five seconds). Cheap technology.

Limitations: Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification. Error rate: 1 in 50.

Benefits and Limitations


Iris Recognition: Benefits: Very high accuracy. Verification time is generally less than 5 seconds. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being. Limitations: Intrusive. A lot of memory for the data to be stored. Very expensive

Fingerprint Recognition: Benefits: Very high accuracy. Is the most economical biometric PC user authentication technique. Easy to use. Small storage space required for the biometric template, reducing the size of the database memory required Limitation : For some people it is very intrusive, because is still related to criminal identification. It can make mistakes with the dryness or dirty of the fingers skin, as well as with the age.

Benefits and Limitations


Hand Recognition: Benefits: Though it requires special hardware to use, it can be easily integrated into other devices or systems. It has no public attitude problems as it is associated most commonly with authorized access. The amount of data required to uniquely identify a user in a system is the smallest by far, allowing it to be used with SmartCards easily. Limitations: Very expensive Considerable size. It is not valid for arthritic person, since they cannot put the hand on the scanner properly.

Thank You

You might also like