Você está na página 1de 10

TECHNICAL PAPER PRESENTATION

ON
BIOMERICS

PRESENTED BY:
P.SUDHEER,
Y07IT105,II B.Tech,
Email :prattipati8@yahoo.co.in,
CELL NO.9989153955

Dept. of I.T.
V.R.SIDDHARTHA ENGINEERING COLLEGE
VIJAYWADA-07

TO

I-FEST’09
GITAM UNIVERSITY,VISAKHAPATNAM.
ABSTRACT: and speed required. Every medium
The term "biometrics" is derived from the
of authentication has its own
Greek words bio (life) and metric (to
advantages and shortcomings. With
measure). Biometrics refers to the automatic
the increased use of computers as
identification of a person based on his/her
vehicles of information technology,
physiological or behavioral characteristics.
it is necessary to restrict
This method of identification is preferred
unauthorized access to or fraudulent
over traditional methods involving
use of sensitive/personal data.
passwords and PIN numbers for its accuracy
Biometric techniques being
and case sensitiveness. A biometric system
potentially able to augment this
is essentially a pattern recognition system
restriction are enjoying a renewed
which makes a personal identification by
interest. This paper describes the
determining the authenticity of a specific
how security provided by biometrics
physiological or behavioral characteristic
and it’s advantages.
possessed by the user. An important issue in
designing a practical system is to determine CONTENTS:
how an individual is identified. Depending
• Introduction
on the context, a biometric system can be
either a verification (authentication) system • Biometrics and it’s working.
or an identification system. Verification • Why it prefer? And step need
involves confirming or denying a person's for biometrics?
claimed identity while in identification, one
• Types of biometrics.
has to establish a person's identity.
• How can they provide
Biometric systems are divided on the basis
security?
of the authentication medium used. They are
• Advantages of biometrics.
broadly divided as identifications of Hand
Geometry, Vein Pattern, Voice Pattern, • Current & future of
DNA, Signature Dynamics, Finger Prints, Biometrics.

Iris Pattern and Face Detection. These • Conclusion


methods are used on the basis of the scope
• References
of the testing medium, the accuracy required
INTRODUCTION:
Biometrics is a sparkling word in the world sciences.
of science and technology. Since, after 9/11 The term "biometrics" is derived
biometrics is getting a titanic attention all from the Greek words bio (life) and
over the world by scientist, researchers and metric (to measure). For our use,
engineers. Now days everywhere in the biometrics refers to technologies for
world, especially in the western part of the measuring and analyzing a person's
world, security is given the top priority to physiological or behavioral
counter the possible treats from terrorists characteristics, such as fingerprints,
and hence biometrics and security are the irises, voice patterns, facial patterns,
synonyms. Biometric systems are spreading and hand measurements, for
rapidly at all security prone areas such as identification and verification
airports, banks, offices also with purposes.
documentation like passport, identity card, Working: Biometric devices consist
driving license, etc. of a reader or scanning device,
software that converts the gathered
In India our security system rely on old
information into digital form, and a
fashioned system adopted by police and
database that stores the biometric
other couple of security agencies like CBI
data for comparison with previous
and RAW. With changed world scenario due
records. When converting the
to continual treats from terrorist
biometric input, the software
organizations, India is also facing many
identifies specific points of data as
challenges inluding cross border terrorism,
match points. The match points are
drug trafficking, ill-legal immigrants from
processed using an algorithm into a
neighboring countries. Now slowly but
value that can be compared with
steadily Indian security systems are also
biometric data in the database.
adapting the biometric system.

WHY IS BIOMETRICS
Biometrics:
SECURE?
Biometrics is the development of statistical
Unique: The various biometrics
and mathematical methods applicable to
systems have been developed around
data analysis problems in the biological
unique characteristics of
individuals. The probability of 2 people Types of biometrics are realted to the
sharing the same biometric data is virtually iris recognition,face
recognition,siganature
nil.
checkeing,palm print, finger print
Cannot be shared: Because a biometric and speech recognition(voice)
property is an intrinsic property of an
HOW CAN THEY PROVIDE
individual, it is extremely difficult to
SECURITY?
duplicate or share (you cannot give a copy Mainly the biometrics provide the
of your face or your hand to someone!). security on the basis of
Identification and Verification. Here
Cannot be copied: Biometric characteristics Now we have to see the various
biometric how devices protected.
are nearly impossible to forge or spoof,
especially with new technologies ensuring FIRST INTRODUCTION:
that the biometric being identified is from a
Bertillonage, the first type of
live person.
biometrics came into form in 1890,

Cannot be lost: A biometric property of an created by an anthropologist named

individual can be lost only in case of serious Alphonse Bertillon. He based his

accident. system on the claim that


measurement of adult bones does not
Uses Of Biometrics: change after the age of 20. The
Biometrics are used in two major ways:
Identification and Verification. method consisted of identifying
people by taking various body
The biometric recognition process
consists of the following steps: measurements like a person’s height,
arm length, length and breadth of the
Capturing of biological characteristics with
sensor (camera, microphone etc.) head, the length of different fingers,
the length of forearms, etc. using
Reprocessing of the gathered data to
improve and clean it calipers. However, the methodology
was unreliable as no measurements
Extraction of significant features
allowed multiple people to have
Comparison with reference data same results, decreasing the accuracy
and hence is no longer used.in-
TYPES OF BIOMETRICS: unique.
IRIS RECOGNITION: boundary and its center are
marked in green.
Why veriEye?
Correct segmentation when iris
Neurotechnology began research and boundaries are definitely not circles
development in the field of eye irirs and even not ellipses (see Figure 2)
biometrics in 1994.in 2008 and especially in gazing-away iris
NeuroTechnology released a PC-baser iris images.
recognition algorithom,VeriEye 2.0,that is FIG.NO.1 FIG.NO.2
designed for biometrical System integrators.
Algorithom Features:
Reliability,Speed,Uniqueness,Robustness
Simple multi-biometric system integration.
Flexible licensing and pricing.

ALGORITHOM:

The VeriEye 2.0 iris recognition algorithm


implements advanced iris segmentation,
enrollment and matching using robust digital
Even when iris boundaries seem to
image processing algorithms:
be perfect circles, recognition quality
can still be improved if boundaries
• Iris boundaries are not modeled by are found more precisely (see Figure
perfect circles. VeriEye uses active 3). Note these slight imperfections
when compared to perfect circular
shape models that more precisely white contours.
model the contours of the eye,
• Automatic interlacing
resulting in correct iris detection and correction
segmentation when perfect results in maximum quality
of iris features templates
circles fail. from moving iris images.
• Correct segmentation is achieved • Elimination of lighting
even when the centers of the iris reflections, eyelids and
inner and outer boundaries are eyelashes obstructions.
different (see Figure 1). The iris • Detection and correction of
inner boundary and its center are gazing-away iris images
(see Figure 4). A gazing-
marked in red, the iris outer away eye is correctly
segmented and transformed
as if it were looking directly into the
camera. performance. Template generation is
• Configurable matching speed varies
the result of the feature extraction
from 50,000 to 150,000 comparisons
process. A As a biometric, facial is a
per second. The highest speed still
form of computer vision that uses
preserves nearly the same
faces to attempt to identify a person
recognition quality (see Figure
or verify a person’s claimed identity.
5).
Regardless of specific method used,
facial recognition is accomplished in
a five step process.
1. First, an image of the face is
FIG.NO.3 FIGURE NO.4 acquired. This acquisition can be
accomplished by digitally scanning
an existing photograph or by using
an electro-optical camera to acquire
FIG.NO.5
a live picture of a subject. As video
Face recognition:
is a rapid sequence of individual still

Five Steps to Facial Recognition images, it can also be used as a


1. Capture image source of facial images.
2. Find face in image 2. Second, software is employed to
3. Extract features
detect the location of any faces in the
4. Compare templates
5. Declare matches acquired image. This task is difficult,
and often generalized patterns of
what a face “looks like” (two eyes
and a mouth set in an oval shape) are
employed to pick out the faces.
3. Once the facial detection software
has targeted a face, it can be
analyzed. As noted in slide three,
facial recognition analyzes the patial
geometry of distinguishing features
of the face. Different vendors use
different methods to extract the
identifying features of a face. Thus, specific surveillance or watch post
details on the methods are proprietary. The scenario.facial recognition processes
most popular method is called Principle with relatively high fidelity and at
Components Analysis (PCA), which is long distances remains technically
ommonly referred to as the eigenface challenging for automated systems.
method. PCA has also been combined with At the most basic level, detecting
neural networks and local feature analysis in whether a face ispresent in a given
efforts to enhance its template is a reduced electronic photograph is a difficult
set of data that represents the unique technical problem.
features of an enrollee’s face. It is important
tonote that because thefeatures, they do not
use hairstyle, facial hair, or other similar Signature:
factors. There exist a number of
biometrics methods today e.g.
4. The fourth step is to compare the template
Signatures, Fingerprints, Iris etc.
generated in step three with thosein a
There is considerable interest in
database of known faces. In an identification
authentication based on handwritten
application, this process yields scores that
signature verification system as it is
indicate how losely the generated template
the cheapest way to authenticate the
matches each of those in the database. In a
person. Signatures are a special case
verification application, the generated
of handwriting in which special
template
characters and flourishes are viable.
is only compared with one template in the
database – that of the claimed identity. Signature Verification is a difficult
5. The final step is determining whether any pattern recognition problem as
scores produced in step four are high enough because no two genuine signatures of
to declare a match. The rules governing the a person are precisely the same. Its
declaration of a match are often configurable difficulty also stems from the fact
by the end user, so that he or she can that skilled forgeries follow the
determine how the facial recognition system genuine pattern unlike fingerprints or
should behave based on security and irises where fingerprints or irises
operational onsiderations. from two different persons vary
Technical Difficulties in face recogitoin: widely. This kind of electronic
Machines also experience difficulties when
they perform facial recognition in a
signature - also known as a "dynamic
signature" or a"biometric signature". Finger print:
VeriFinger Matching Server is a
ready-to-use software that performs
the identification and verification of
fingerprints on the server side. The
server is intended to be used in web-
based and other network-based
1 systems. VeriFinger Matching Server
runs on PCs with Microsoft
Windows or Linux and includes
these additional components: Server
Palm print: administration tool for monitoring
servers state, managing log and other
In the field of biometrics, palmprint is server administration tasks;
a novel but promising technology. Limited
work has been reported on palmprint Support modules for MySQL and
identification and verification, despite the Oracle databases.
importance of palmprint features. There are
2 Sample client applications:
many unique features in a palmprint image
that can be used for personal identification. C# tutorials (for
Principal lines, wrinkles, ridges, minutiae Microsoft Windows);
points, singular points, and texture are
regarded as useful features for palmprint
representation.The system functions by
projecting palmprint images onto a feature 3 C sample (for Linux);
space that spans the significant variations
among known images. The significant 4 Sample Java applet.
features are known as "eigenpalms" because
they are the eigenvectors (principal
Speech:
components) of the set of palmprints.
5 Speech recognition
technology is used more and
more for telephone
applications like travel
booking and information,
financial account
information, customer service
call routing, and directory
assistance. Using constrained
grammar recognition, such Current &Future of
applications can achieve remarkably Biometric:
high accuracy.
Today...
ADVANTAGES:
While the most common use of iris
* Increase security - Provide a recogni-tion to date is physical
convenient and low-cost additional
tier of security. access control in pri-vate enterprise
and government, the versatil-ity of
* Reduce fraud by employing hard-
to-forge technologies and materials. the technology will lead to its
For e.g.Minimise the opportunity for growing use in large sectors of the
ID fraud, buddy punching.
economy such as transportation,
* Eliminate problems caused by lost healthcare, and national iden-
IDs or forgotten passwords by using
physiological attributes. For e.g. tification programs. Although
Prevent unauthorised use of lost, security is clearly a prime concern,
stolen or "borrowed" ID cards.
iris recognition is also being adopted
* Reduce password administration for productivity-enhancing
costs.
applications like time and atten-
* Replace hard-to-remember dance.
passwords which may be shared or
observed.
Tomorrow...
* Integrate a wide range of
biometric solutions and technologies, Enterprise and government both
customer applications and databases acknowl-edge the convergence of
into a robust and scalable control
solution for facility and network physical and infor-mation security
access environments, but there are new

* Make it possible, automatically, to security challenges on the horizon -


know WHO did WHAT, WHERE just-in-time inventory control,
and WHEN!
sophisticated supply chain
* Offer significant cost savings or management, and even a phe-
increasing ROI in areas such as Loss
Prevention or Time & Attendance. nomenon called "coopetition"-in
which companies that compete in
Unequivocally link an individual to
a transaction or event. some areas, coo-perate in others.
WIRELESS:

Wireless biometrics will offer biometric


authentication services to wireless and
Internet service providers. The technology
will allow customers of wireless services
and products to authenticate their identities
when conducting electronic transactions.

With the advent of wireless biometrics,


Biometrics systems are coming of age with
the combination of technologies that create
new application options. The combination of
fingerprint recognition and wireless
communication allows new areas of
biometrics integration.

CONCLUSION:

Biometrics is a technology that is rapidly


becoming a useful security, cost-savings,
and convenience tool for the Federal
Government. Although the Federal
Government is using the tech-nology for
many applications now, fur-ther
development and assessment is required to
improve the technology’s utility.

REFERENCES:
http://www.biometricssecurity.com
http://www.LGirisrecognition.com
http://www.biometricswikepedia.com
http://www.advancesurcecode.com/
http://www.centerforbiometrics.com

Você também pode gostar