Escolar Documentos
Profissional Documentos
Cultura Documentos
?
c
used in a large range of civilian application areas. Biometrics can be used transactions
conducted via telephone and Internet (electronic commerce and electronic banking) .
In automobiles, biometrics can replace keys with key -less entry devices.
mm
c
?
c
mm
c
?
c
mm
c
?
c
Characteristics
Face
mm
c
?
c
mm
c
?
c
The black and white digital image is analysed by software running on a built in HD
64180 microprocessor.(This a Z-80 base chip) to extract identifying
characteristics f r o m t h e ha n d p i c t u r e . The s o f t w a r e compares t h os e f ea t ur es
to capture w h e n t h e user w a s enrolled in the system, and signals the result-match or no
match. Analysis is based on the measurement and comparison of geometric.
The magnification factor of the c a mer a is known and is calibrated for pixels
per inch of real distance. Then the dimensions of parts of the hand, such as finger length,
width and area are measured, adjusted according to calibration marks on the platen
and used to determine the identifying geometric of the hand.
mm
c
?
c
mm
c
?
c
A strong corr elation exists bet ween t he dimensions of the hand. For
example if the little finger is long, the index finger will most likely also be along.
Some 400 hands were measured to determine these
interrelationships, and the results are integrated into the system as a set of matrices
are applied to measured geometric to produce the 9 byte identity feature vector
that is stored in the system during enrolment, with this amount of data
compression, the current 4.5 kg unit with single printed circuit board can store
2000 identities.
Enrolment involves taking three hands reading and averaging the
resulting vectors. Users ca n enr ol t hems el ves wit h mi ni mal help. When used
for identification the 9-byte vector is compared to the stored vector and
scor e bas ed on the scalar difference is st or ed. Low scores indicate a small
difference; high scores mean a poor match. The recognition systems product
fine-tunes the reference vector a small increment at a time, in case the original
template was made under less than perfect conditions.
There are so many ot her s ystems for hand r ecognition. One was
an effort by SRI international, to take pictures of unconstrained hands help in
f r e e s p a c e . This system was introduced in 1985. Biometrics Inc.,
Tokyo¶s Toshiba Corp. Identification corp. etc is some companies which
developed biometrics systems.
m m
c
?
c
m
m
!!" #c $" %&&'&
?
c
?
c
·
Biometrics developers have also not lost sight of fact that humans use the face
as their primary method of telling who¶s who. More than a dozen effort to develop
automated facial verification or recognition systems use approaches ranging from pattern
recognition based on neural networks to infrared scans of µhot spots¶ on the face.
Using the whole face for automatic identification is a complex task because its
appearance is constantly changing. Variations in facial expressions, hair s t yl es and
facial ha i r , head p os i t i o n , camera s ca l e and lighting create image that are usually different
from the image captured on a film or videotape earlier. The application of advanced image
processing techniques and the us e of neural net wor ks f or classifying the images, however,
have made the job possible.
?
c
There is only one system available on the market today. The system is developed
by Neuro Metric Vision s y s t e m Inc. This can recognize faces with a few constraint s
as pos sible, accommodating a range of camera scales and lighting environments, along
with changes in expression and facial hair and in head positions. The work sprang
from the realisation that such techniques as facial image comparisons, measurement of
key facial structure and the analysis of facial geometry could be used in face
recognition syst em. Any of these approaches might employ rule-based logic or a neural
network for the image classification process.
The system¶s r eject ion level can be tuned by specifying the different signal
to noise ratios f or t he ma t c h ± a high r a t i o to s p ec i f y a pr ec i s e match, and
alower one to allow more facial variation. In a tightly controlled environment, for
m m
c
?
c
example, the system could set up to recognise a person only when looking at the
camera with same expression he or she had when initially enrolled in the system.
m m
c
?
c
A device that examines the human iris is being developed by Iriscan Inc.
The technique¶s big advantage over retinal scans is that it does not require the user to
move close to the device and focus on a target because the iris pattern is on the
eye¶s surface. In fact the video image of an eye can be taken at distance of a metre or
so, and the user need not interact with device at all.
The technology being implemented by Iris can Inc.,is based on principles
developed and planted by ophthalmologists Leonard Flom and Aran Safir and on
mathematicalalgorithms developed by John Daugman. In their practice, Flom and Safir
obs er ved t ha t every ir i s ha d highly detailed and unique texture that remains stable
over decades of life. This p a r t of the eye is one of the most striking features of
t h e face. It is easily visible from yards away a s a coloured disk, behind the
clear protective window of the cornea, surrounded by the white tissue of the eye.
?
c
Another biometrics approach that is attractive because of its
acceptability to users is voice verification. All the systems used in analyzing t he
voice are rooted in more broadly bas ed s p eec h pr oc es s i ng technology. Currently,
voice verification is being used in access control for m e d i u m security areas or for
situations involving many people a s i n offices and lab. There are two approaches to
voice verification. One is using dedicated hardware and software at the point of access
.The second approach is using personal computer host configurations that drive a
network over regular phone lines.?
One of the latest implementation of the technology is the recently
demonstrated AT&T Smart Card used in an automatic teller system. The AT&T
prototype stores an i n d i v i d u a l ¶ s v o i c e p a t t e r n o n a memory card, the size of
a credit card. In brief, someone opening an account at a bank has to speak a selected
two or three-syllable word eight items. The word can be chosen by the user and belong
to any language or dialect.
Another approach being as an alternative to the algorithms
discussed is based on Hidden Markov Models, which consider the probability
of state changes and allow the system to predict what the speaker is trying to
say. This capability would be crucial for speaker independent recognition. Storing
voice templates on a card and receiving and processing voice information at a local
device, such as ATM, eliminated variations due to telephone connection and types of
telephones used.
:-The speaker- specific characteristics of speech are
due to differences in physiological and behavioural a s p e c t s o f t h e s p e e c h
p r o d u c t i o n s y s t e m in humans. The main physiological aspect of the human speech
production system is the vocal tract shape. The vocal tract is generally considered as the
speech production organ above the vocal folds, which consists of the following: (a)
laryngeal pharynx ( beneath the epiglottis), (b) oral pharynx ( behind the tongue,
between the epiglottis and velum ), ( c) oral cavity ( forward of the velum and bounded
by the lips, tongue, and palate ), (d) nasal pharynx ( above the velum, rear end of nasal
cavity ), and (e) nasal cavity (above the palate and extending from the pharynx to the
nostrils ). The shaded area in figure 4 depicts the vocal tract.
m m
c
?
c (() *+)
å
m m
,-
. /
-012-2-345--056 7c486 ,-9:0:;:.
?
c
The acoustic wave is produced when the airflow from the lungs is
carried by the trachea t h r o u g h the vocal f o l d s . The s o u r c e of
e x c i t a t i o n can be charact er ized as phonation, whispering, friction, compression,
m m
c
?
c
?
c
inefficient in database retrieval. A prototype biometric s y s t e m i s d e v e l o p e d
w h i c h i n t e g r a t e s f a c e s a n d fingerprints. The system overcomes the limitations
of face recognition systems as well as fingerprint verification systems. The integrated
prototype system operates in the identification mode with an admissible response
time. The identity established b y t he s ys t em i s mor e r el i a bl e t ha n t he identity
established by a face recognition system. In addition, t h e pr op os e d decision
f us i o n schema enables perfor mance improvement by integrating multiple cues with
different confidence measures. Experimental results demonstrate that our system
performs very well. It meets the response time as well as the accuracy requirements.
'& %"&
% (!! # ) "# *
A Biometric system which relies only on a single biometric identifier in
making a personal identification often not able to meet the desired performance
requirements. Identification based on multiple biometrics represents on emerging
trend. A multimodal biometric system is introduced (figure given below ), which
integrates face recognition, fingerprint verification, and speaker verification in
making a personal identification.
This s ys t em t a kes a dva nt a ge of the capabilities of each individual biometric.
It can be u s e d t o o v e r c o m e s o m e o f t h e l i m i t a t i o n s o f a single
biometrics. Preliminary experimental results demonstrate that the identity established by
such an integrated system is more r eliable than the identity established by a face
recognition system, a fingerprint verification system and a speaker verification system.???
m m
c
?
c <<= >?=
?
å
m m
@A
B C
ADEFAFAGHIAADIJ KcHLJ @AMNDNONB
?
c
m m
c
?
c
m m
c
?
c
m m
c
?
c
1. HTTP:/BIOMETRICS.CSE.MSU.
m m
c
?
c
m m
c