bio dimple verma_
TRANSCRIPT
-
8/7/2019 bio Dimple verma_
1/7
BIOMETRICS - AN INTRODUCTION AND COMPARISON
OF VARIOUS BIOMETRIC TECHNIQUES
DIMPLE VERMA
ELECTRONICS & TELECOMMUNICATION
RUNGTA COLLEGE OF ENGG. & TECH
ABSTRACT:The word Biometric is derivedfrom two ancient Greek wordsBios & metron which meanslife and measure
respectively.Hence,Biometric isthe science and technology ofmeasuring and analyzingbiological data. In informationtechnology, biometrics refer to thetechnology that measure andanalyze human bodycharacteristics, such asfingerprints,eye retinas,irises,voice pattern etc. forauthentication purposes.
In this paper I have delt withvarious biometrics techniques andtheir comparison regarding theiruse,cost,acceptability etc.
Classification of biometrics:Biometrics characteristics aremainly classified under twoclasses:-Physiological characteristics
-Behavorial characteristics
Terms used in study ofapplicability of biometrics:
Universality describes howcommonly a biometric is found
individually. Uniqueness is how well the
biometric separates individuallyfrom another.
Permanence measures how wella biometric resists aging.
Collectability ease of acquisitionfor measurement.
Acceptability degree of approvalof a technology.
Circumvention ease of use of a
substitute.
Working of a Biometric system:
1
http://en.wikipedia.org/wiki/Image:Biometrics_traits_classification.png -
8/7/2019 bio Dimple verma_
2/7
The diagram shows a simpleblock diagram of a biometricsystem. The main operations asystem can perform are
enrollment and test. During theenrollment biometric informationof an individual are stored, duringthe test biometric information aredetected and compared with thestored ones. The first block(sensor) is the interface betweenthe real world and our system; ithas to acquire all the necessarydata. Most of the times it is animage acquisition system, but itcan change according to thecharacteristics desired. Thesecond block performs all thenecessary pre-processing: it has
to remove artifacts from thesensor, to enhance the input (e.g.removing background noise), to
use some kind of normalisation,etc. In the third block featuresneeded are extracted. This step isan important step as the correctfeatures need to be extracted andthe optimal way. A vector ofnumbers or an image withparticular properties is used tocreate a template. A template is asynthesis of all the characteristicsextracted from the source, in the
optimal size to allow for adequateidentifiability.If enrollment is beingperformed the template is simplystored somewhere (on a card or
within a database or both). If amatching phase interference, andoptics. The goal of the technologyis is being performed, theobtained template is passed to amatcher that compares it withother existing templates,estimating the distance betweenthem using any algorithm. Thematching programme will analysethe template with the input. Thiswill then be output for anyspecified use or purpose (e.g.entrance in a restricted area).
Various Biometrics methods:
Facial recognition
Voice recognition
Signature recognition
DNA
Retinal scanning
Iris recognition
Fingerprint
Hand Geometry
Comparison of variousBiometrics methods:Variouus methods are compared
in table-1
2
-
8/7/2019 bio Dimple verma_
3/7
Iris recognition technology:Iris recognition today combinestechnologies from several fields
including, computer vision (CV),near-instant, highly accuraterecognition of a person's identitypattern recognition, statisticalbased on a digitally represented
image of the scanned eye. Thetechnology is based upon the factthat no two iris patterns are alike(the probability is higher than that
of fingerprints). The iris is aidentification possibilities life long.The iris can therefore serve as alife long password which theprotected organ which makes the
VH-Very High H-High A-Average L-Low
TABLE-1
person must never remember.Confidence in recognition and
identification facilitates exhustivesearches through nation-sizeddatabases.
Iris recognition technology looksat the unique characteristics ofthe iris, the colored areasurrounding the pupil. While mostbiometrics have 13 to 60 distinctcharacteristics, the iris is said tohave 266 unique spots. Each eyeis believed to be unique andremain stable over time andacross environments (e.g.,weather, climate, occupational
differences). Iris recognition
systems use small, high-qualitycameras to capture a black and
white high-resolution photographof the iris. Once the image iscaptured, the iris' elasticconnective tissue-called thetrabecular meshwork-is analyzed,processed into an optical"fingerprint," and translated into adigital form. Figure 12 depicts theprocess of generating an irisbiometric. Given the stablephysical traits of the iris, thistechnology is considered to beone of the safest, fastest, and
most accurate,
noninvasive biometric
technologies. This type of
Eye-iris
Retina finger Hand geometry Writing voice
Reliability VH VH H H H H
Easiness A L H H H H
Acceptance A A A H VH HIdentification andauthentication
BOTH BOTH BOTH AUTHENTICATION BOTH AUTHENTICATION
Attacksprecaution
VH VH H H A A
3
-
8/7/2019 bio Dimple verma_
4/7
biometric scanning works withglasses and contact lenses inplace. Therefore, iris scanbiometrics may be more useful for
higher risk interactions, such asbuilding access. Improvements inease of use and systemintegration are expected as newproducts are brought to market.The iris is differentiated by severalcharacteristics includingligaments, furrows, ridges, crypts,rings, corona, freckles, and asigzag collarette. Iris recognitiontechnologies are now seen in awide array of identificationsystems. They are used inpassports, aviation security,access security (both physicaland electronic), hospitals, andnational watch lists. Irisrecognition alogithms can be seenin more and more identificationsystems relating to customs andimmigration. Future applications
will include, e-commerce,information security (infosec),authorisation, building entry,automobile ignition, forensicapplications, computer networkaccess, PINs, and personalpasswords.
CURRENT USES OFBIOMETRICSThere are many uses that
biometrics is being used todayand the future holds moreadvances.
At Coca-Cola Co., handscanning machines recentlyreplaced the venerable time cardfor many workers.
In Cook County, Illinois, asophisticated camera thatanalyzes the iris patterns of anindividual's eyeball is helping
ensure that the right people arereleased from jail.
At Purdue University in Indiana,the campus credit union isinstalling automated tellermachines with a finger scannerthat will eliminate the need forplastic bankcards and personalidentification numbers
Walt Disney World in Orlandohas started taking hand scans ofpeople who purchase yearlypasses. These visitors now mustpass through a scanner when
entering the park preventingthem from lending their passesto other people.
The technology also receivedwidespread attention at lastsummers Olympic GamesAtlanta, where 65,000 athletes,coaches and officials used ahand-scanning system to enterthe Olympic Village.
Emerging BiometricTechnologies:Newer biometric technologiesusing diverse physiological andbehavioral characteristics are invarious stages of development.
Vein scan biometric technologycan automatically identify aperson from the patterns of theblood vessels in the back of the
hand. The technology uses near-infrared light to detect vein vesselpatterns. Vein patterns aredistinctive between twins andeven between a person's left andright hand. Developed beforebirth, they are highly stable androbust, changing throughout one'slife only in overall size. Thetechnology is not intrusive, and
4
-
8/7/2019 bio Dimple verma_
5/7
works even if the hand is notclean. It is commercially available.
Facial thermography detects heat
patterns created by the branchingof blood vessels and emitted fromthe skin. These patterns, calledthermograms, are highlydistinctive. Even identical twinshave differentthermograms.Thermographyworks much like facial recognition,except that an infrared camera isused to capture the
images.nfrared systems workaccurately even in dim light ortotal darkness.
DNA matching is a type ofbiometric in the sense that it usesa physiological characteristic forpersonal identification. It isconsidered to be the "ultimate"biometric technology in that it canproduce proofpositive
identification of a person, exceptin the case of identical twins.
Body odor. This technology woulduse an odor-sensing instrument(an electronic "nose") to capturethe volatile chemicals that skinpores all over the body emit tomake up a person's smell.Although distinguishing oneperson from another by odor may
eventually be feasible, the factthat personal habits such as theuse of deodorants and perfumes,diet, and medication influencehuman body odor renders thedevelopment of this technologyquite complex.
Blood pulse biometrics measurethe blood pulse on a finger withinfrared sensors. This technology
is still experimental and has ahigh false match rate, making itimpractical for personalidentification.
Nailbed identification technologyis based on the distinctlongitudinal, tongue-in-groovespatial arrangement of theepidermal structure directlybeneath the fingernail. Thisstructure is mimicked in the ridgeson the outer surface of the nail.When an interferometer is used to
detect phase changes in back-scattered light shone on thefingernail, the distinct dimensionsof the nailbed can bereconstructed and a one-dimensional map can begenerated.
Gait recognition, recognizingindividuals by their distinctivewalk, captures a sequence of
images to derive and analyzemotion characteristics. A person'sgait can be hard to disguisebecause a person's musculatureessentially limits the variation ofmotion, and measuring it requiresno contact with the person.However, gait can be obscured ordisguised if the individual, forexample, is wearing loose fittingclothes. Preliminary results have
confirmed its potential, but furtherdevelopment is necessary beforeits performance, limitations, andadvantages can be fullyassessed.
Ear shape recognition is still aresearch topic. It is based on thedistinctive shape of each person'sears and the structure of thelargely cartilaginous, projecting
5
-
8/7/2019 bio Dimple verma_
6/7
portion of the outer ear. Althoughear biometrics appears to bepromising, no commercialsystems are available
CONCLUSION:By the study of various biometrictechniques I have concluded that
Facial recognition, voicerecognition and signaturerecognition techniques arecheap and non intrusive too
But at the same timethey are changeable,i.e,all three
of them may change with timeand are also affected bysurrounding conditions.Voicesometimes changes due tocough and cold.
On the other hand techniquessuch as DNA,iris recognitionand retinal scanning are veryintrusive and are highlyaccurate.Iris and retinal process take
even less than 5 seconds foroperation.But they are very expensive.
Fingerprint is one of the mostdeveloped biometrics.It is easyto use and highly accurate too.Also it requires very lessmemory space to store data.
But it may sometime makemistakes due to dirtiness inhands and also the prints of a
person working in chemicalindustries may change.
Hand Geometry is alsosomewhat similar to fingerprintprocess.It is highly acceptable insociety and the hardware usedcan be integrated with otherdevices alsoBut for the persons sufferingfrom problems like arthritis or
rumetis ,it becomes hard for
them to keep their hand onscanner for their hand to bescanned.
REFERENCES USED:
Jain, A. K.; A. Ross & S.Pankanti (June 2006),"Biometrics: A Tool forInformation Security", IEEETransactions On InformationForensics And Security 1st (2)
P. J. Philips, P. Grother, R. J.Micheals, D. M. Blackburn, E.Tabassi, and J. M. Bone, FaceRecognition Vendor Test 2002:Overview and Summary(Online)
R. Cappelli, D. Maio, D. Maltoni,J. L. Wayman, and A. K. Jain,Performance evaluation offingerprint verification systems,IEEE Trans. Pattern Anal. Mach.
Intell., vol. 28, no. 1, pp. 318,Jan. 2006
NIST Iris Challenge Evaluation,(Online)
S. Hocquet, J. Ramel, H.Cardot, Fusion of Methods forKeystroke DynamicAuthentication, AutomaticIdentification AdvancedTechnologies, 2005. FourthIEEE Workshop on 17-18 Oct.2005 Page(s):224 - 229
D. A. Reynolds, W. Campbell, T.Gleason, C. Quillen, D. Sturim,P. Torres-Carrasquillo, and A.Adami, The 2004 MIT Lincolnlaboratory speaker recognitionsystem, in Proc. IEEE Int. Conf.Acoustics, Speech, SignalProcessing, Philadelphia, PA,Mar. 2005
6
http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653 -
8/7/2019 bio Dimple verma_
7/7
7