Você está na página 1de 12

Visit: www.geocities.com/chinna_chetan05/forfriends.

html

Presentation on

BIOMETRICS

1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

or more methodologies is used to


achieve required performance, which is
ABSTRACT
called multibiometrics. In this paper we
The automated use of
explained an example of multibiometric
physiological or behavioral
system, which combines fingerprint
characteristics to determine or verify
identification, speech recognition and
identity. To elaborate on this definition,
facial recognition. A neatly sketched
physiological biometrics are based on
figure is used to describe the process in
measurements and data derived from
brief.
direct measurement of a part of the
Biometrics has wide area
human body. Fingerprint, iris-scan,
applications; Most of them are covered
retina-scan, hand geometry, and facial
in this paper.
recognition are leading physiological
Also some of the future applications like
biometrics. Biometric system is the
ATM machine, workstation and network
integrated biometric hardware and
access, travel and tourism and telephone
software used to conduct biometric
transactions are given.
identification or verification. A
generalized biometric system is Heathrow is the first UK

expressed nearly with figure. airport to carry out a large-scale trial of


the iris recognition technology, which
Various biometric
examines a passenger's eye, rather than
technologies are fingerprint
their passport as they go through
identification, speaker recognition, facial
immigration control. This real-time
recognition, hand geometry, signature-
application is explained. There are many
scan, keystroke-scan, palm-scan, etc.
benefits with biometrics. And so the
Among these popular recognition
merits and demerits of it are listed. At
techniques like fingerprint recognition ,
last we predicted how biometrics
facial recognition and speech recognition
changes lifestyle in future.
are clearly explained. An automatic
personal identification system based The structure of this

solely on one methodology often cannot document together with all pictures is

meet the system performance original. The text expresses our own

requirements. So a combination of two understanding on the concepts and is

2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

based on the documents referred from microprocessors to automate identity


selected books. verification had occupied the minds of
Keywords: Biometrics, biometric individuals and organizations both in the
system, enrollment, template storage, military and commercial sectors. After
network, fingerprint identification, the September 11th terrorist attack,
fingerprint matching, fingerprint Biometrics has gained prominence as
classification, Speaker recognition, being more reliable than current
waterfall, stochastic model, template technologies, for people identification.
model,, Hidden Markov Model, Facial Definition:
recognition, Eigenfaces, Local feature Biometrics involves identifying
analysis, neural networks, a person based on a unique physical
multibiometrics. characteristic that is different from any
INTRODUCTION other person. Biometrics can be either

Thousands of years earlier ‘innate’ such as fingerprints, face or iris;

physiological parameters such as scars, or ‘behavioral’ such as handwriting, gait

complexion, eye color, height, moles, etc or typing

are used to identify the individuals. Style. Biometric characteristics are

Later, in the nineteenth century physical measured using sensors that produce

features and characteristics are used to data values that can then be processed by

identify criminals. This resulted in a a computer using specialized algorithms

variety of measuring devices being for analysis and comparison. Biometric

produced. The idea of measuring system is the integrated biometric

individual physical characteristics hardware and software used to conduct

seemed to stick and the parallel biometric identification or verification.

development of fingerprinting became


the international methodology among How Biometric Systems Works?
police forces for identity verification. Biometric devices and
With this background, it is systems have their own operating
hardly surprising that for many years a methodology, there are some
fascination with the possibility of using generalisations for biometric systems
electronics and the power of implementation as shown in the fig.
3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

or on a portable token such as a chip


[A] Enrollment: The process whereby a card. The last one is an attractive option
user’s initial biometric sample or for two reasons. Firstly, it requires no
samples are collected, assessed, local or central storage of templates and
processed, and stored for ongoing use in secondly, the user carries their template
a biometric system. These samples are with them and can use it at any
referred as templates. A poor quality authorized reader position. [C] The
template will often cause considerable network. Networks may rely on the
problems for the user, often resulting in vendor’s systems design and message
a re-enrolment. functionality, together with their own

[B] Template storage is an area of software. Or the user can himself design

interest particularly with large scale networking, message passing and

applications which may accommodate monitoring system ,taking advantage of

many thousands of individuals. The the recent generic biometric API’s and

possible options are as follows; Store the accessing the reader functions directly.

template within the biometric reader This provides absolute flexibility and

device or remotely in a central repository control over systems design.

4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

[D] Verification: The verification of the finger. The uniqueness of a


process requires the user to claim an fingerprint can be determined by
identity by either entering a PIN or the pattern of ridges and furrows
presenting a token, and then verify this as well as the minutiae points.
claim by providing a live biometric to be Minutiae points are the locations
compared against the claimed reference on your fingerprint where the
template. There will be a resulting match ridges will stop or split into two,
or no match accordingly. A record of or intersect. Fingerprint matching
this transaction will then be generated techniques can be placed into
and stored, either locally within the two categories: minutiae-based
device or remotely via a network and and correlation based. In
host (or indeed both). minutiae-based matching a
[E] Transaction storage: Some devices fingerprint is initially enrolled
will store a limited number of into an archive. Instead of storing
transactions internally, scrolling over as the entire image of the
new transactions are received. fingerprint, only the minutiae
[F] The network (again): Here the points are kept. An algorithm is
network handles transactions, which is used to translate the minutiae
of critical importance in some points into a code, which is
applications. called the template. Later, when
the person has their fingerprint
Popular Biometric Methodologies:
scanned, the minutiae points are
1.Finger Print Identification:
recognized, placed through the
• Finger Print Matching: Among
algorithm and the code is
all the biometric techniques,
compared to the template. But it
fingerprint-based identification is
is difficult to extract the minutiae
the oldest method, which has
points accurately when the
been successfully used in
fingerprint is of low quality.
numerous applications. A
Local ridge structures cannot be
fingerprint is made of a series of
completely characterized by
ridges and furrows on the surface
minutiae. The correlation-based

5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

techniques require the precise the number of ridges present in four


location of a registration point directions (0 degree, 45 degree, 90
and are affected by image degree, and 135 degree).
translation and rotation. So an 2.Speaker Recognition:
alternate representation of It involves recognizing people
fingerprints is tried, which will based on their voices. Systems plot
capture more local information frequencies that the voice produces
and yield a fixed length code for every 1/100th of a second to form a
the fingerprint. "waterfall." The "waterfall" is a three-
• Fingerprint Classification: An dimensional image that is a map of the
automatic recognition of people voice for one second. A line graph of
based on fingerprints requires curved and straight arrows note the
that the input fingerprint be transitions between phonemes, the
matched with a large number of smallest units of speech. A database
fingerprints in a database . The stores this information until it is needed.
input fingerprint is required to be Voiceprint determines resonance of the
matched only with a subset of the cavities in the throat with vocal-tract
fingerprints in the database to geometry from a voice sample. Different
reduce the search time and languages, different voice samples,
computational complexity. stuffy noses etc cannot fool this method.
There are two types of models that have
been used extensively in speaker
verification and speech recognition
systems: stochastic models and template
models. The stochastic model treats the
speech production process as a
parametric random process and assumes
that the parameters of the underlying
An algorithm classifies fingerprints into
stochastic process can be estimated in a
five classes namely, whorl, right loop,
precise, well-defined manner. The
left loop, arch, and tented arch, as
template model attempts to model the
shown in figure. The algorithm separates
6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

speech production process in a non- model generated a given set of feature


parametric manner by retaining a vectors.
number of sequences of feature vectors 3.Facial Recognition:
derived from multiple utterances of the • Eigenfaces: Developed by
same word by the same person. A very Viisage Technology. First, a
popular stochastic model for modeling camera captures the image of a
the speech production process is the person. The face is mapped into a
Hidden Markov Model (HMM). The variety of coefficients depending
model is a doubly embedded stochastic on the features, which becomes
process where the underlying stochastic 128 digits, otherwise called a
process is not directly observable (it is "vector." The vector is the code
hidden). The HMM can only be viewed for the person. When the person
through another set of stochastic presents him/herself later to be
processes that produce the sequence of identified, he/she must present a
observations. Thus, the HMM is a finite- PIN or bar code and then allow
state machine, where a probability the camera to take a picture. The
density function p(x | s_i) is associated difference between the face's
with each state s_i. The states are vector and the database's vector
connected by a transition network, where for the PIN or bar code are
the state transition probabilities are placed on a coordinate system
a_{ij} = p(s_i | s_j). A fully connected called "face space" and the
three-state HMM is depicted in figure differences between the two of
them are determined.If distance
between the images is small
enough, access is granted, else
denied

For the Hidden Markov models, the


matching score is the probability that the

7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

Local Feature Analysis: Local Neural Networks: Neural Networks


Feature Analysis (LFA) is another is a slight bit more complicated than the
algorithm. First, the camera takes a "eigenfaces" method. A series of
picture of the face and cuts out the neurons, or processing units, are
background and other faces. LFA is connected together. A programmer sets
based on idea that all faces are made of the rules of how the neurons recognize
building blocks. However, every face patterns. If the actual output is greatly
uses different building blocks and puts different than the computed output, then
them together in a unique manner. LFA the neurons will adjust itself to fit the
translates the building blocks into a code situation. More situations lead to more
called "face print." The "face print" is shifts in neurons, which lead to better
stored in a database for identification. results.
LFA is also used for verification.

MultiBiometrics:

8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

A biometric system, which relies only on speaker verification in making a


a single biometric identifier in making a personal identification as shown in
personal identification, is often not able figure.
to meet the desired performance Applications:
requirements.
• Time Attendance
We introduce a multimodal biometric • Access control
system, which integrates face • Identification card and
recognition, fingerprint verification, and Immigration checks
speaker verification in making a • Police records, Patient
personal identification. This system management in hospitals
takes advantage of the capabilities of • Customer identification, Loyalty
each individual biometric. A multimodal programs
biometric system integrates face
recognition, fingerprint verification, and
9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

• Security systems and Preventing incorporating a biometric,


identity theft would enable them to
• Membership management in participate in various
clubs, libraries etc. frequent flyer and border

Future Applications: control systems as well as


paying for their air ticket,
 ATM machine use:
hotel room, hire care etc.
Most of the leading banks
 Telephone transactions:
have been experimenting
Many telesales and call
with biometrics for ATM
center managers have
machine use and as a
pondered the use of
general means of
biometrics.
combating card fraud.
 Workstation and network
Real-time Application:
access: Many are U.K Airport Tests Passenger Eye ID’s:
viewing this as the Heathrow is the first UK airport to carry
application, which will out a large-scale trial of the iris
provide critical mass for recognition technology, which examines
the biometric industry a passenger's eye, rather than their
and create the transition passport as they go through immigration
between sci-fi device to control. The aim is to speed up the
regular systems movement of passengers through the
component, thus raising terminal and detect illegal immigrants.
public awareness and Each passenger will have an image of
lowering resistance to the one of his or her eye's iris stored on
use of biometrics in computer. Instead of showing their
general. passport on arrival they will go into a
kiosk where in seconds a camera will
 Travel and tourism:
check that the pattern of their iris
There are multi
matches computer records. It is hoped
application cards for
the technology could have future
travelers which,
security benefits, with UK airports still

10 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

on alert following 11 September. The meet the system performance


entire procedure only takes a few requirements.
seconds and there is no contact with the In case of face recognition, face will
body or with lasers or other potentially sometimes change with time or injury,
harmful light sources. Passengers taking and that poses a problem
part are being asked to carry their Face recognition is fast but not reliable.
passports during the trial period should Fingerprint verification is reliable but
immigration officials want to check their inefficient in database retrieval.
details. Some voice recognition systems has

Benefits: some problems since the voice changes


with a human’s mood and illness
 Increased security when
and background noise poses some
controlling access to confidential
problems.
data and IT systems
Biometrics in Future:
 Reduced risk of fraudulent use
In future with Biometrics,
of identity by employees
one can go to shopping without money
 Enhanced user convenience
purse or credit card. It just needs to place
 Increased costs savings due to
his/her finger on the reader device and
reduced password maintenance
can debit money from their bank
costs
accounts. In credit cards system if a
 User convenience due to no
mother and daughter have a joint
passwords to remember or reset
account, then they cannot know how
and faster login
much each one uses. But with biometrics
 Privacy – ability to transact
mother will know her daughter secretly
anonymously
buying beer bottles. The biometrics
market is expected to grow to $1.8
Demerits:
billion by 2004.
An automatic personal
Conclusion:
identification system based solely on
Biometrics makes automated use
fingerprints or faces is often not able to
of physiological or behavioral
characteristics to determine or verify
11 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

identity. Finger biometrics are most [2]. Implementing Biometric Security


popular and one of the most accurate and by John Chirillo, Scott Blaul "IN THE
cost effective solutions. Hand geometry, REALM OF computer security,
signature-scan, keystroke-scan, palm- biometrics.
scan are some more biometric [3]. www.blackwell-synergy.com
technologies in use. With Biometrics [4]. www.biometrics.org
[5]. www.cic.gc.ca
there is no problem of ID being stolen.
Many institutions and organizations are
trying to use this technology.

References:
[1]. A Machine Learning Approach by S.
Y. Kung, M. W. Mak, S. H. Lin.

12 Email: chinna_chetan05@yahoo.com

Você também pode gostar