Você está na página 1de 3

Review Article

A Review Article on Different


Biometric Techniques
Kirandeep Kaur1, Jasvir Singh2

Abstract
With enhancement in technology, the personal identification has become a major challenge to
conquer. The biometric approach is one of the most accurate, secure and reliable method for
personal verification. Biometric device generally works on the principle of pattern recognition that
recognizes a person by his different biological features i.e. Fingerprint, retina-scan, iris scan, hand
geometry, and face recognition are leading physiological biometrics and behavioural characteristic
are Voice recognition, keystroke-scan, and signature-scan

Keywords: Biometric techniques, Pattern recognition, Scan


Introduction
A biometric system works by recognizing a person using various biomedical features and behaviour. A biometric
system is composed of two different modules which are integrated together to work as a single biometric unit. These
modules are:

Database Preparation Module


This module of the biometric system is responsible to enrol a person and to build up a database and afterwards train
the system using that data set. This module is further composed of two sub-modules named as: Enroll module and
Training module.

Training Module
Verification Module: using the collected dataset, this module verifies the person by matching the input pattern with
the pattern in the collected dataset and determines whether or not a person is authenticated.3

Biometric Technology
• Fingerprint recognition
• Voice recognition
• Face recognition
• Palm scan
• Iris-scan
• Retina-scan

1,2
M.Tech Student, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India.
Correspondence: Ms. Jasvir Kaur, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India.
E-mail Id: jasvirkaurbasra@gmail.com
Orcid Id: http://orcid.org/0000-0002-0178-7613
How to cite this article: Kaur K, Singh J. A Review Article on Different Biometric Techniques. J Adv Res Image Proc Appl 2017;
4(1&2): 1-3.

© ADR Journals 2017. All Rights Reserved.


Kaur K et al. J. Adv. Res. Image Proc. Appl. 2017; 4(1&2)

Fingerprint Recognition recognizing the geometric structure of the human face


where as the photometric method calculate the various
In this technique, a system works on the fingerprint intensity values in order to identify a person.2
patterns which are unique physical characteristic of a
human body. The system scans the pattern and store in Palm Scan
the database and further uses this database to match
the input pattern and to verify the identity of a person. This technique is having a high security level as compare
Human fingerprints consist different type of patterns to the fingerprint reorganization method. There is a
which are classified as loop, arch and whorl and these all palm scanner which uses a infrared rays in order to scan
collectively build up a single pattern. This technique is the palm and after that it identifies the flow of blood in
commonly used for the purpose of attendance in veins as the structure of veins is unique in every human
organizations and for security purpose but fingerprint and hence it is more reliable technique and is having a
spoofing is one of the most serious threats to this good security level value.4
technology which degrade the level of trust in the
technology.4 IRIS Scan
This technology requires some special hardware
Voice Recognition
component unlike face and voice recognition. The iris of
Voice recognition is based on the behavioural and human eye shows unique pattern which is scanned
physical characteristic of human. Various kinds of voice using infrared rays which shows the different iris pattern
recognition interface systems are used currently and are which is not possible to see in daylight or in ordinary
having a significant role for physically disable person light. After scanning various points of comparisons are
and helps them to easily operate the mobile and other created and are converted into a iris code of 512 digits
machine. This system generally works on the sound and are stored into the database and is latter used to
patterns and the rhythm of voice of any person and identify the person by scanning an matching the human
hence provides a higher level of security and broader iris.6
level of applications.3
Retina-Scan
Face Recognition
Retinal vasculature can be obtained from the fundus
This technology also has a significant attention in the image which can be used to study the pattern of blood
security measure. This technique is broadly accepted for vessels of a human eye which is unique in every human
attendance and security purpose and in various law- being and hence this concept is used to implement the
enforcement fields. This technique is implemented using retinal scan technology. This method is an older method
various algorithms based on geometric method and as compared to the iris scan but is comparatively
photometric method. Geometric method is based on expensive because of high cost of data acquisition
hardware.8

Table 1.Comparison of Different Biometric Techniques

2
J. Adv. Res. Image Proc. Appl. 2017; 4(1&2) Kaur K et al.

Conclusion 4. Aishwarya D, Gowri M, Saranya RK. Palm print


recognition using liveness detection technique.
Biometrics is an emerging technology using different International Conference on Science Technology
platforms and becoming very popular in various Engineering and Management, Chennai, India.
industrial and security application as integrated through 2016. pp. 109-114.
pocket devices like smart phones, smart cards computer 5. Alqahtani A. Evaluation of the Reliability of Iris
networks. Public also encourage the use of this Recognition Biometric Authentication Systems.
technology as it eliminates the concept of remembering International Conference on Computational Science
PIN code or password. This has changed the lifestyle of and Computational Intelligence, Las Vegas, NV, USA.
the people and helps in improving the security policies 2016. pp.781-785.
and health factor. As far as biometric has numerous 6. Matin A, Mahmud F, Zuhori ST, et al. Human iris as
advantages, it needs lots of improvement in term of cost a biometric for identity verification. International
and performance in order to provide reliable and secure Conference on Electrical, Computer and
services to the society. Telecommunication Engineering, Rajshahi,
Bangladesh. 2016. pp. 1-4.
References 7. Díaz Alonso AD, Travieso CM, Alonso JB, et al.
Biometric personal identification system using
1. Lyamin AV, Cherepovskaya EN. An Approach to biomedical sensors. International Conference on
biometric identification by using low-frequency eye Communication Control and Intelligent Systems,
tracker. Transactions on Information Forensics and Mathura, India. 2016. pp. 104-109.
Security 2017; 12(4): 881-91. 8. Jiu F, Noronha K, Jayaswal D. Biometric
2. Gupta D. Multimodel biometric system: Fusion identification through detection of retinal
techniques and their comparison. International vasculature. International Conference on Power
Conference on Recent Advances in Engineering and Electronics, Intelligent Control and Energy Systems,
Computational Sciences, Chandigarh, India. 2015. Delhi, India. 2016. pp. 1-5.
pp. 1-4. 9. Xu Q, Chen Y, Wang B, et al. Radio biometrics:
3. Bhatia R. Biometrics and face recognition human recognition through a wall. Transactions on
techniques. International Journal of Advanced Information Forensics and Security 2017; 12(5):
Research in Computer Science and Software 1141-55.
Engineering 2013; 3: 93-9.

Você também pode gostar