100% found this document useful (3 votes)
584 views12 pages

Biometrics

This document provides an introduction to biometrics. It discusses how biometrics uses physiological or behavioral characteristics to identify individuals. Some common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. It then describes several types of biometric systems in more detail, including how they work, typical template sizes, uses, and limitations. It concludes by discussing potential applications of biometrics and envisions a future with more widespread biometric identification replacing passwords.

Uploaded by

subinjose
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
584 views12 pages

Biometrics

This document provides an introduction to biometrics. It discusses how biometrics uses physiological or behavioral characteristics to identify individuals. Some common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. It then describes several types of biometric systems in more detail, including how they work, typical template sizes, uses, and limitations. It concludes by discussing potential applications of biometrics and envisions a future with more widespread biometric identification replacing passwords.

Uploaded by

subinjose
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 12

BIOMETRICS

SEMINAR ROUGH REPORT

Submitted on Submitted By
22-09-2008 Subin Jose
Class : cs7
Roll no : 24
College of Engineering Poonjar
BIOMETRICS

INTRODUCTION

Biometrics is a automated method for recognizing a person based on his


or her behavioral or physiological characteristic. It comes from the greek words
“bios – life” and “metron – to measure”. Among the features measured are; face,
fingerprints, hand geometry, iris, retinal and voice to establish his or her identity.
Biometric technologies are becoming the foundation of an extensive array of
highly secure identification and personal verification solutions.

As the level of security breaches and transaction fraud increases, the


need for highly secure identification and personal verification technologies is
becoming apparent. Biometric-based solutions are able to provide for confidential
financial transactions and personal data privacy. The need for biometrics can be
found in federal, state and local governments, in the military, and in commercial
applications. Enterprise-wide network security infrastructures, government IDs,
secure electronic banking, investing and other financial transactions, retail sales,
law enforcement, and health and social services are already benefiting from these
technologies.

NEED OF BIOMETRICS

1. Significant Population Increase

2. E-Commerce, PC Banking

3. Increased “Identity Theft”

4. Increased Fraud

5. Too Many PINS & Passwords

6. Need for Improved Physical / Logical Access Control

7. Highly Secure Identification and Personal Verification

8. To Enhance Social Security Number(SSN)


BIOMETRICS

TYPES OF BIOMETRICS

The important and most widely used Biometrics are

1. Finger print

2. Hand Geometry

3. Iris Scan

4. Retina Scan

5. Facial Scan

6. Voice Recognition

COMPONENTS OF BIOMETRIC SYSTEM

Biometric devices have three primary components

1. Automated mechanism that scans and captures a digital or analog image of a


living personal characteristic.

2. Compression, processing, storage and comparison of image with a stored


data.

3. Return output whether sample is match or unmatched and interfaces with


application systems.
BIOMETRICS

GENERAL BIOMETRIC SYSTEM

FINGER PRINTS

The important points regarding to finger print verification are

1. Different people have entirely different sets of finger prints, which enable
identification.

2. A fingerprint is made up of ridges and valleys, which are scanned.


BIOMETRICS

3. Optical scanner illuminate the finger and the CCD inside takes a picture of
the finger.

4. Algorithm compare specific features of the fingerprint called minutiae with


samples in database.

5. If a specific number of minutiae are matched then the print accepted.

The figure shows how a finger print recognition mechanism work.

HAND GEOMETRY

The important points regarding to Hand Geometry verification are

1. Measures the physical characteristics of the user’s hand and fingers.

2. Low level infrared light and a camera used to capture an image.


BIOMETRICS

3. Features that measure include characteristics such as finger curves, thickness


and length; the height and width of the back of the hand; the distances
between joints and all bone structure.

4. This technology uses a 32,000-pixel CCD digital camera to record the hand's
three-dimensional shape.

5. The internal processor and software convert the hand image to a 9-byte
mathematical template.

6. Suited to applications where there is a large user base or users access the
system infrequently.
7. Hand geometry most suitable for access control and attendance applications.
8. Infrared light is slightly injuries to hands.

IRIS SCAN

The important points regarding to Iris Scan verification are

1. The Iris is the coloured ring surrounding the pupil.

2. Iris’ are composed before birth and, except in the event of an injury to the
eyeball, remain unchanged throughout an individual’s lifetime.

3. A specialized camera, typically very close to the eye, not more than three
feet uses here.

4. Camera uses an infrared imager to illuminate the eye and capture a very
high-resolution photograph.

5. Iris patterns are extremely complex, carry a large amount of information and
have over 200 unique spots.

6. Individual’s right and left eyes are different and that patterns are easy to
capture.

7. Iris data can be used as a tool for access to the bank account, thereby
eliminating the need for the customer to enter a PIN number or password.
BIOMETRICS

RETINA SCAN

The important points regarding to Retina Scan verification are

1. Distinctive features of retina are network of blood vessels.

2. The user looks through a small hole in the scanning device and focuses on a
particular point for a period of time.

3. At this time, a low intensity light and a CCD analyses the layer of blood
vessels at the back of the eye for matching patterns.

4. Then the computer system validates or repudiates the person’s identity.

5. Retina scan template is about 96 bytes.

6. Retina scan is used almost exclusively in high-end security applications.

7. There is absolutely no known method of replicating a person’s retina.

8. It is used for controlling access to areas or rooms in military installations,


power plants, and the like that are considered high risk security areas.

9. The continuity of the retinal pattern throughout life and the difficulty in
fooling such a device.

FACIAL SCAN
BIOMETRICS

The important points regarding to Facial Scan verification are

1. Every face has certain characteristics and distinguishable features, which


allow us to differentiate between two people.

2. The software divides the face into approximately into 80 nodes.

3. Some of the common ones being distance between eyes, width of nose, and
depth of eye sockets, cheekbones, jaw line, and chin.

4. The system generally needs to match between 35-45 nodes in order to obtain
a positive ID.

5. Approximate template size is 84 bytes to 2kbytes.

6. Face can be detected from a playing video.

7. It can be used in thousands of passengers at airport and match it with a


database of wanted criminals and find whether or not that face belongs to a
guilty party.

8. Only biometric that allows you to perform passive identification in a one to


many environment.

VOICE RECOGNITION

The important points regarding to Voice Recognition verification are

1. Voice recognition works by first storing voice patterns and then using them
as a database to authentication.

2. Voice recognition works by noting a person’s voice and converts it into an


audio file which is known as a voice print.

3. During the creation of a voice print, asked to choose a phrase and asked to
repeat it.

4. At verification time the same phrase is repeated and find whether matches or
not.
BIOMETRICS

5. Approximate template size is 80k byte.

MULTIMODE BIOMETRICS

Multi-biometric system is a biometric system that uses more than one


independent or weakly correlated biometric identifier taken from an individual.
This system takes advantage of the capabilities of each individual biometric. It
can be used to overcome some of the limitations of a single biometrics

A multimode biometric system which models face, thumb and voice for
identification is shown in figure

BIOMETRIC COMPARISON

The comparison between the above stated Biometric systems can be shown in the
following graph and table

Biometrics Approx Template Size

Voice 70k – 80k


BIOMETRICS

Face 84 bytes – 2k

Fingerprint 256 bytes – 1.2k

Hand Geometry 9 bytes

Iris 256 bytes – 512 bytes

Retina 96 bytes

BIOMETRIC APPLICATIONS AND FUTURE SCOPE


BIOMETRICS

1. National border controls: the biometrics as a living passport.

2. Secure access to bank cash machine accounts.

3. Ticket less air travel.

4. Tracing missing or wanted persons.

5. A good tool for Anti-terrorism.

6. Automobile ignition and unlocking.

7. Credit card authentication.

8. Internet security; control of access to privileged information.

9. Voter verification.

CONCLUSION

The proper implementation of biometric system will result a world without


identification and authentication threats. We can forgot our passwords and
PINs. With biometrics one can say “MY BODY IS MY PASSWORD”.

REFERENCES

 “Multimodal Biometrics”, A Jain , R .Bolle, S. Pankanti

 “Multimodal Biometric Systems”, D. Maltoni, D. Maio, A.K. Jain,


S.Prabhakar

 http:// www.biometrics.org

 http:// www.biometricfoundation.org

 http://www.biometricgroup.com
BIOMETRICS

 http://biometrics.cse.msu.edu

 http://www.biometricpartners.com

 http://www.neurotechnologija.com

 http://www.3dbiometrics.com/tech.html

You might also like