Você está na página 1de 37

BIOMETRICS

CONTENTS
What is Biometrics? Biometrics applications Finger prints Face recognition Hand geometry Iris recognition Cognitive biometrics Behavioral biometrics Uses Drawbacks

WHAT IS BIOMETRICS?
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. To prevent identity theft, biometric data is usually encrypted when it's gathered. To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.

APPLICATIONS OF BIOMETRICS
Biometric Logon for PC and Networks is now well developed. Best of these in our view is the Identix technology which is integrated into Windows 2000 Active Directory and provides rapid verification at logon For the most effective security for web pages, the Bio Web Server system is the leading market player. Integrated with a number of hardware options including Digital Persona, which we at EyeNetWatch reckon is the most reliable the system is easy to install and to integrate with web applications There are many employee recognition systems available but Biometrics provides a cheaper alternative to most, very few people lose their fingers or eyes when compared with those who lose smartcards or forget passwords. Time and attendance has always been a problem in some industries. Biometrics can effectively eliminate problems with buddy clocking by ensuring that the employee in question is present. The management of voters to ensure no one votes twice has been a notoriously difficult application, however recent developments in the technology have allowed governments to adopt a high degree of security to prevent such a problem.

Biometrics consists of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric system, while different in application, contains at least one similarity: The biometric must be based upon a distinguishable human attribute such as a person's fingerprint, iris, voice pattern or even facial pattern. Today fingerprint devices are by far the most popular form of biometric security used, with a variety of systems on the market intended for general and mass market usage Nowadays a fingerprint scanning device can be small enough to be incorporated into a laptop for security. A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending). Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.

WHAT ARE FINGERPRINT SCANNERS?

PATTERNS OF FINGERPRINTS

The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger.

THE PROCESS OF FINGERPRINT SCANNING.

The actual fingerprint identification process will change slightly between products and systems. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a persons name or account. In instances of security the match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access.

USES OF FINGERPRINT SCANNERS

In large government organizations and corporations, biometrics plays a huge role in employee identification and security. Some data centers and have implemented biometric scanners to enhance remote access and management by adding another layer of network security for system administrators. The cost of implementing fingerprint and other biometric security scanning in data centers is quite expensive, and many centers rely on ID badges. Today companies have realized that fingerprint scanning is an effective means of security. These home and small office products are designed to protect the hard drive, notebook or even to remove the need for users to remember multiple passwords

Face Recognition

WHAT IS FACE RECOGNITION?


Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. This biometric has been widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has been unproven in high-level usage. It is currently used in verification only systems with a good deal of success.

PROCESS OF FACE RECOGNITION


User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and reattempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds. To prevent a fake face or mold from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying.

How Facial Recognition SystemWorks?


Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. FaceIt defines these landmarks as nodal points. Each human face has approximately 80 nodal points. Some of these measured by the software are: Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw line

Application Areas
Importantly, face recognition is also rich in application areas. The most familiar application is in the security industry. Popular movies and television series have already shown many examples of high security systems which base admittance on identification by face matching. Although the accuracy required for high security applications may not be available in the short term, lower security applications or identification verification systems may be practical in the near future. Other application areas include the field of communications, specifically adaptive image compression for teleconferencing, and the field of advanced human interface, which seeks to use information about the facial expression or identity of the user to adapt interaction paradigms.

HANDGEOMETRY
The devices use a simple concept of measuring and recording length, width ,thickness, and surface area of an individuals hand while guided on a plate(figure1).Hand geometry systems sue a camera to Capture a silhouette image of the hand. The hand of the subject is placed on the plate, palm down, and guided by five pegs that sense when the hand is in place . The images capture both the top surface of of the hand and a side image that is captured using an angled mirror(figure2). 31,000 points are analyzed and 90 Measurements are taken ,the measurements range from the length of the fingers, to the distance between knuckles, to the height or thickness of the hand and fingers(figure3). This information is stored in nine bytes of data, an extremely low Number compared to the storage needs of other biometric systems.

HAND GEOMETRY
Hand geometry recognition is the longest implemented biometric type, debuting in the market in the late 1980s. The system are widely implemented for their ease of use, public acceptance, and integration capabilities. One of the shortcomings of the hand Geometry characteristic is that it is not highly unique, limiting the applications of the hand geometry system to verification tasks only.

HISTORY hand geometry systems have the longest implemented of all Many companies implement hand geometry systems in parallel with time clocks for time and attendance purposes. Walt Disney World has used a similar finger geometry technology system for several years to expedite and facilitate entrance to the park and to identify Guests as season ticket holders to prevent season ticket fraud.

WHAT IS IRIS RECOGNITION?

Iris scan biometrics employs the unique characteristics and features of the human iris in order to verify the identity of an individual. The iris is the area of the eye where the pigmented or coloured circle, usually brown or blue, rings the dark pupil of the eye. The iris-scan process begins with a photograph. A specialized camera, typically very close to the subject, no more than three feet, uses an infrared imager to illuminate the eye and capture a very high-resolution photograph. This process takes only one to two seconds and provides the details of the iris that are mapped, recorded and stored for future matching/verification. Eyeglasses and contact lenses present no problems to the quality of the image and the iris-scan systems test for a live eye by checking for the normal continuous fluctuation in pupil size.

PROCESS OF IRIS RECOGNITION


An iris-recognition algorithm first has to identify the approximately concentric circular outer boundaries of the iris and the pupil in a photo of an eye. The set of pixels covering only the iris is then transformed into a bit pattern that preserves the information that is essential for a statistically meaningful comparison between two iris images. Discarding the amplitude information ensures that the template remains largely unaffected by changes in illumination and virtually negligibly by iris color, which contributes significantly to the long-term stability of the biometric template. To authenticate via identification (one-to many template matching) or verification (one-to one template matching) a template created by imaging the iris, is compared to a stored value template in a database.

USES OF IRIS RECOGNITION

It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea). This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labor. The iris is mostly flat and its geometric configuration is only controlled by two complementary muscles (the sphincter pupillae and dilator pupillae), which control the diameter of the pupil. This makes the iris shape far more predictable than, for instance, that of the face. The iris has a fine texture that like fingerprints is determined randomly during embryonic gestation. An iris scan is similar to taking a photograph and can be performed from about 10 cm to a few meters away. There is no need for the person to be identified to touch any equipment that has recently been touched by a stranger, thereby eliminating an objection that has been raised in some cultures against finger-print scanners, where a finger has to touch a surface, or retinal scanning, where the eye can be brought very close to a lens (like looking into a microscope lens). Some argue that a focused digital photograph with an iris diameter of about 200 pixels contains much more long-term stable information than a fingerprint.

COGNITIVE BIOMETRICS

WHAT IS COGNITIVE BIOMETRICS?


A new trend has been developed that merges human perception to computer database in a brain-machine interface. This approach has been referred to as cognitive biometrics. Cognitive biometrics is based on specific responses of the brain to stimuli which could be used to trigger a computer database search. Currently, cognitive biometrics systems are being developed to use brain response to odor stimuli , facial perception and mental performance for search at ports and high security areas. These systems are based on use of functional transcranial Doppler (FTCD) and functional transcranial Doppler spectroscopy (FTCDS) to obtain brain responses, which are used to match a target odor, a target face or target performance profile stored in a computer database. Thus, the precision of human perception provides the data to match that stored in the computer with improve sensitivity of the system.

TYPES OF COGNITIVE BIOMETRICS

ODOR AND SCENT COGNITIVE BIOMETRIC SYSTEMS


In forensics, odor evaluation can make important contributions in both prosecution and defense of criminal cases. The use of blood hounds and other scent following dogs to identify individual people or their scent trails in the environment on the basis of a previous offered reference scent article such as handkerchief, hat, and other items of clothing has been described Canine scent identification evidence is usually accepted in court to suggest the unique identification of an accused individual in the same way that finger prints are used. The latter is premised on the alleged factuality of the "individual odor theory," which hold that each person has a unique scent that can be identified by the dog and related back to a specific individual.

FACIAL COGNITIVE BIOMETRIC SYSTEMS


Conventional biometric methods introduced to improve security are static, mainly based on cross matching the face of the traveler with that in the international passport and fingerprints. Although a welcome improvement to the prior situation of total absence of biometric information, its importance in terror crime prevention may be limited. However, it may serve to provide a database of biometric information including faces and fingerprints. At present, the data is static and would not, for example, identify suspects with cosmetic or plastic surgery modification of their faces to escape identification However to be effective, subjective judgment must be replaced with objective physiologic correlates of good matches. This will require objective online detection of physiologic variables, suggestive of facial memory involvement and cross matching the online variables to expected variables, for the particular face involved. Online brain imaging adapted for use for such applications include electrophysiological techniques and transcranial Doppler ultrasound.

COGNITIVE PERFORMANCE BIOMETRIC SYSTEMS


Task performance using general intelligence must elicit responses in neural anatomic structures for processing of the information. In task requiring general intelligence there is the necessity of keeping several conceptual formulations in mind such as during Raven's Progressive Matrices (RPM), and is itself a working memory function involving prefrontal cortex. Evidence obtained in normal subjects using positron emission tomography studies have shown that high tasks do not show diffuse recruitment of multiple brain regions, instead they are associated with selective recruitment of lateral prefrontal cortex in one or both hemispheres. It has been shown that working memory is typically associated with activations in the prefrontal cortex (PFC), anterior cingulated, parietal and occipital regions. These brain areas received blood supply from the middle cerebral arteries. Two fundamental working-memory processes have been identified: the passive maintenance of information in short-term memory and the active manipulation of this information .

Behavioral Biometrics

Types
Keystroke
Behavioral Biometrics

Signature Speaker recognition

KEYSTROKE
The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The keystroke rhythms of a user are measured to develop a unique biometric template of the users typing pattern for future authentication. Raw measurements available from most every keyboard can be recorded to determine Dwell time (the time a key pressed) and Flight time (the time between key down and the next key down and the time between key up and the next key up). The recorded keystroke timing data is then processed through a unique neural algorithm, which determines a primary pattern for future comparison. Data needed to analyze keystroke dynamics is obtained by keystroke logging. Normally, all that is retained when logging a typing session is the sequence of characters corresponding to the order in which keys were pressed and timing information is discarded.

SIGNATURE
Signature is a handwritten depiction of someone's name, nickname or even a simple "X" that a person writes on documents as a proof of identity and intent. The writer of a signature is a signatory. Like a handwritten signature, a signature work describes the work as readily identifying its creator. The traditional function of a signature is to give evidence of the provenance of the document (identity) and the intention (will) of an individual with regard to that document For example, the role of a signature in many consumer contracts is not solely to provide evidence of the identity of the contracting party, but rather to additionally provide evidence of deliberation and informed consent. This is why the signature often appears at the bottom or end of a document. In many countries, signatures may be witnessed and recorded in the presence of a Notary Public to carry additional legal force. On legal documents, an illiterate signatory can make a "mark" (often an "X" but occasionally a personalized symbol), so long as the document is countersigned by a literate witness.

SPEAKER RECOGNITION
Speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. There is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification. Speaker recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style). Because speaker verification has earned speaker recognition its classification as a "behavioral biometric."

ADVANTAGES
The fact that you will have to personally be present in order to authenticate yourself is the advantage of this system
Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly

Current methods like password verification have many problems (people write them down, they forget them, they make up easy-tohack passwords)

ADVANTAGES (contd)
Automated biometric identification can be done very rapidly and uniformly, with a minimum of training Your identity can be verified without resort to document that may be stolen, lost or altered

DISADVANTAGES
The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time

DISAVANTAGES (contd)
For people affected with diabetes, the eyes get affected resulting in differences Relatively expensive; requires large amount of computer storage; may not be generally accepted by public. In case of Face recognition, people who look alike can fool scanner; people can alter their appearance and facial hair can fool device.

BIBLIOGRAPHY
The information has been taken from: www.webopedia.com www.wikipedia.com www.biometrics.org

THIS PROJECT IS DONE BY


LAXMI PAI AAKANKSHA THARIANI KHUSHBOO JAIN SUNNY CHABRIYA AASHIK AMBAWAT GAURAV PUNJABI

Você também pode gostar