Escolar Documentos
Profissional Documentos
Cultura Documentos
CONTENTS
What is Biometrics? Biometrics applications Finger prints Face recognition Hand geometry Iris recognition Cognitive biometrics Behavioral biometrics Uses Drawbacks
WHAT IS BIOMETRICS?
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. To prevent identity theft, biometric data is usually encrypted when it's gathered. To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.
APPLICATIONS OF BIOMETRICS
Biometric Logon for PC and Networks is now well developed. Best of these in our view is the Identix technology which is integrated into Windows 2000 Active Directory and provides rapid verification at logon For the most effective security for web pages, the Bio Web Server system is the leading market player. Integrated with a number of hardware options including Digital Persona, which we at EyeNetWatch reckon is the most reliable the system is easy to install and to integrate with web applications There are many employee recognition systems available but Biometrics provides a cheaper alternative to most, very few people lose their fingers or eyes when compared with those who lose smartcards or forget passwords. Time and attendance has always been a problem in some industries. Biometrics can effectively eliminate problems with buddy clocking by ensuring that the employee in question is present. The management of voters to ensure no one votes twice has been a notoriously difficult application, however recent developments in the technology have allowed governments to adopt a high degree of security to prevent such a problem.
Biometrics consists of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric system, while different in application, contains at least one similarity: The biometric must be based upon a distinguishable human attribute such as a person's fingerprint, iris, voice pattern or even facial pattern. Today fingerprint devices are by far the most popular form of biometric security used, with a variety of systems on the market intended for general and mass market usage Nowadays a fingerprint scanning device can be small enough to be incorporated into a laptop for security. A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending). Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.
PATTERNS OF FINGERPRINTS
The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger.
The actual fingerprint identification process will change slightly between products and systems. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a persons name or account. In instances of security the match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access.
In large government organizations and corporations, biometrics plays a huge role in employee identification and security. Some data centers and have implemented biometric scanners to enhance remote access and management by adding another layer of network security for system administrators. The cost of implementing fingerprint and other biometric security scanning in data centers is quite expensive, and many centers rely on ID badges. Today companies have realized that fingerprint scanning is an effective means of security. These home and small office products are designed to protect the hard drive, notebook or even to remove the need for users to remember multiple passwords
Face Recognition
Application Areas
Importantly, face recognition is also rich in application areas. The most familiar application is in the security industry. Popular movies and television series have already shown many examples of high security systems which base admittance on identification by face matching. Although the accuracy required for high security applications may not be available in the short term, lower security applications or identification verification systems may be practical in the near future. Other application areas include the field of communications, specifically adaptive image compression for teleconferencing, and the field of advanced human interface, which seeks to use information about the facial expression or identity of the user to adapt interaction paradigms.
HANDGEOMETRY
The devices use a simple concept of measuring and recording length, width ,thickness, and surface area of an individuals hand while guided on a plate(figure1).Hand geometry systems sue a camera to Capture a silhouette image of the hand. The hand of the subject is placed on the plate, palm down, and guided by five pegs that sense when the hand is in place . The images capture both the top surface of of the hand and a side image that is captured using an angled mirror(figure2). 31,000 points are analyzed and 90 Measurements are taken ,the measurements range from the length of the fingers, to the distance between knuckles, to the height or thickness of the hand and fingers(figure3). This information is stored in nine bytes of data, an extremely low Number compared to the storage needs of other biometric systems.
HAND GEOMETRY
Hand geometry recognition is the longest implemented biometric type, debuting in the market in the late 1980s. The system are widely implemented for their ease of use, public acceptance, and integration capabilities. One of the shortcomings of the hand Geometry characteristic is that it is not highly unique, limiting the applications of the hand geometry system to verification tasks only.
HISTORY hand geometry systems have the longest implemented of all Many companies implement hand geometry systems in parallel with time clocks for time and attendance purposes. Walt Disney World has used a similar finger geometry technology system for several years to expedite and facilitate entrance to the park and to identify Guests as season ticket holders to prevent season ticket fraud.
Iris scan biometrics employs the unique characteristics and features of the human iris in order to verify the identity of an individual. The iris is the area of the eye where the pigmented or coloured circle, usually brown or blue, rings the dark pupil of the eye. The iris-scan process begins with a photograph. A specialized camera, typically very close to the subject, no more than three feet, uses an infrared imager to illuminate the eye and capture a very high-resolution photograph. This process takes only one to two seconds and provides the details of the iris that are mapped, recorded and stored for future matching/verification. Eyeglasses and contact lenses present no problems to the quality of the image and the iris-scan systems test for a live eye by checking for the normal continuous fluctuation in pupil size.
It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea). This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labor. The iris is mostly flat and its geometric configuration is only controlled by two complementary muscles (the sphincter pupillae and dilator pupillae), which control the diameter of the pupil. This makes the iris shape far more predictable than, for instance, that of the face. The iris has a fine texture that like fingerprints is determined randomly during embryonic gestation. An iris scan is similar to taking a photograph and can be performed from about 10 cm to a few meters away. There is no need for the person to be identified to touch any equipment that has recently been touched by a stranger, thereby eliminating an objection that has been raised in some cultures against finger-print scanners, where a finger has to touch a surface, or retinal scanning, where the eye can be brought very close to a lens (like looking into a microscope lens). Some argue that a focused digital photograph with an iris diameter of about 200 pixels contains much more long-term stable information than a fingerprint.
COGNITIVE BIOMETRICS
Behavioral Biometrics
Types
Keystroke
Behavioral Biometrics
KEYSTROKE
The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The keystroke rhythms of a user are measured to develop a unique biometric template of the users typing pattern for future authentication. Raw measurements available from most every keyboard can be recorded to determine Dwell time (the time a key pressed) and Flight time (the time between key down and the next key down and the time between key up and the next key up). The recorded keystroke timing data is then processed through a unique neural algorithm, which determines a primary pattern for future comparison. Data needed to analyze keystroke dynamics is obtained by keystroke logging. Normally, all that is retained when logging a typing session is the sequence of characters corresponding to the order in which keys were pressed and timing information is discarded.
SIGNATURE
Signature is a handwritten depiction of someone's name, nickname or even a simple "X" that a person writes on documents as a proof of identity and intent. The writer of a signature is a signatory. Like a handwritten signature, a signature work describes the work as readily identifying its creator. The traditional function of a signature is to give evidence of the provenance of the document (identity) and the intention (will) of an individual with regard to that document For example, the role of a signature in many consumer contracts is not solely to provide evidence of the identity of the contracting party, but rather to additionally provide evidence of deliberation and informed consent. This is why the signature often appears at the bottom or end of a document. In many countries, signatures may be witnessed and recorded in the presence of a Notary Public to carry additional legal force. On legal documents, an illiterate signatory can make a "mark" (often an "X" but occasionally a personalized symbol), so long as the document is countersigned by a literate witness.
SPEAKER RECOGNITION
Speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. There is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification. Speaker recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style). Because speaker verification has earned speaker recognition its classification as a "behavioral biometric."
ADVANTAGES
The fact that you will have to personally be present in order to authenticate yourself is the advantage of this system
Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly
Current methods like password verification have many problems (people write them down, they forget them, they make up easy-tohack passwords)
ADVANTAGES (contd)
Automated biometric identification can be done very rapidly and uniformly, with a minimum of training Your identity can be verified without resort to document that may be stolen, lost or altered
DISADVANTAGES
The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time
DISAVANTAGES (contd)
For people affected with diabetes, the eyes get affected resulting in differences Relatively expensive; requires large amount of computer storage; may not be generally accepted by public. In case of Face recognition, people who look alike can fool scanner; people can alter their appearance and facial hair can fool device.
BIBLIOGRAPHY
The information has been taken from: www.webopedia.com www.wikipedia.com www.biometrics.org