bio dimple verma_

Upload: nilesh-singh

Post on 08-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 bio Dimple verma_

    1/7

    BIOMETRICS - AN INTRODUCTION AND COMPARISON

    OF VARIOUS BIOMETRIC TECHNIQUES

    DIMPLE VERMA

    [email protected]

    ELECTRONICS & TELECOMMUNICATION

    RUNGTA COLLEGE OF ENGG. & TECH

    ABSTRACT:The word Biometric is derivedfrom two ancient Greek wordsBios & metron which meanslife and measure

    respectively.Hence,Biometric isthe science and technology ofmeasuring and analyzingbiological data. In informationtechnology, biometrics refer to thetechnology that measure andanalyze human bodycharacteristics, such asfingerprints,eye retinas,irises,voice pattern etc. forauthentication purposes.

    In this paper I have delt withvarious biometrics techniques andtheir comparison regarding theiruse,cost,acceptability etc.

    Classification of biometrics:Biometrics characteristics aremainly classified under twoclasses:-Physiological characteristics

    -Behavorial characteristics

    Terms used in study ofapplicability of biometrics:

    Universality describes howcommonly a biometric is found

    individually. Uniqueness is how well the

    biometric separates individuallyfrom another.

    Permanence measures how wella biometric resists aging.

    Collectability ease of acquisitionfor measurement.

    Acceptability degree of approvalof a technology.

    Circumvention ease of use of a

    substitute.

    Working of a Biometric system:

    1

    http://en.wikipedia.org/wiki/Image:Biometrics_traits_classification.png
  • 8/7/2019 bio Dimple verma_

    2/7

    The diagram shows a simpleblock diagram of a biometricsystem. The main operations asystem can perform are

    enrollment and test. During theenrollment biometric informationof an individual are stored, duringthe test biometric information aredetected and compared with thestored ones. The first block(sensor) is the interface betweenthe real world and our system; ithas to acquire all the necessarydata. Most of the times it is animage acquisition system, but itcan change according to thecharacteristics desired. Thesecond block performs all thenecessary pre-processing: it has

    to remove artifacts from thesensor, to enhance the input (e.g.removing background noise), to

    use some kind of normalisation,etc. In the third block featuresneeded are extracted. This step isan important step as the correctfeatures need to be extracted andthe optimal way. A vector ofnumbers or an image withparticular properties is used tocreate a template. A template is asynthesis of all the characteristicsextracted from the source, in the

    optimal size to allow for adequateidentifiability.If enrollment is beingperformed the template is simplystored somewhere (on a card or

    within a database or both). If amatching phase interference, andoptics. The goal of the technologyis is being performed, theobtained template is passed to amatcher that compares it withother existing templates,estimating the distance betweenthem using any algorithm. Thematching programme will analysethe template with the input. Thiswill then be output for anyspecified use or purpose (e.g.entrance in a restricted area).

    Various Biometrics methods:

    Facial recognition

    Voice recognition

    Signature recognition

    DNA

    Retinal scanning

    Iris recognition

    Fingerprint

    Hand Geometry

    Comparison of variousBiometrics methods:Variouus methods are compared

    in table-1

    2

  • 8/7/2019 bio Dimple verma_

    3/7

    Iris recognition technology:Iris recognition today combinestechnologies from several fields

    including, computer vision (CV),near-instant, highly accuraterecognition of a person's identitypattern recognition, statisticalbased on a digitally represented

    image of the scanned eye. Thetechnology is based upon the factthat no two iris patterns are alike(the probability is higher than that

    of fingerprints). The iris is aidentification possibilities life long.The iris can therefore serve as alife long password which theprotected organ which makes the

    VH-Very High H-High A-Average L-Low

    TABLE-1

    person must never remember.Confidence in recognition and

    identification facilitates exhustivesearches through nation-sizeddatabases.

    Iris recognition technology looksat the unique characteristics ofthe iris, the colored areasurrounding the pupil. While mostbiometrics have 13 to 60 distinctcharacteristics, the iris is said tohave 266 unique spots. Each eyeis believed to be unique andremain stable over time andacross environments (e.g.,weather, climate, occupational

    differences). Iris recognition

    systems use small, high-qualitycameras to capture a black and

    white high-resolution photographof the iris. Once the image iscaptured, the iris' elasticconnective tissue-called thetrabecular meshwork-is analyzed,processed into an optical"fingerprint," and translated into adigital form. Figure 12 depicts theprocess of generating an irisbiometric. Given the stablephysical traits of the iris, thistechnology is considered to beone of the safest, fastest, and

    most accurate,

    noninvasive biometric

    technologies. This type of

    Eye-iris

    Retina finger Hand geometry Writing voice

    Reliability VH VH H H H H

    Easiness A L H H H H

    Acceptance A A A H VH HIdentification andauthentication

    BOTH BOTH BOTH AUTHENTICATION BOTH AUTHENTICATION

    Attacksprecaution

    VH VH H H A A

    3

  • 8/7/2019 bio Dimple verma_

    4/7

    biometric scanning works withglasses and contact lenses inplace. Therefore, iris scanbiometrics may be more useful for

    higher risk interactions, such asbuilding access. Improvements inease of use and systemintegration are expected as newproducts are brought to market.The iris is differentiated by severalcharacteristics includingligaments, furrows, ridges, crypts,rings, corona, freckles, and asigzag collarette. Iris recognitiontechnologies are now seen in awide array of identificationsystems. They are used inpassports, aviation security,access security (both physicaland electronic), hospitals, andnational watch lists. Irisrecognition alogithms can be seenin more and more identificationsystems relating to customs andimmigration. Future applications

    will include, e-commerce,information security (infosec),authorisation, building entry,automobile ignition, forensicapplications, computer networkaccess, PINs, and personalpasswords.

    CURRENT USES OFBIOMETRICSThere are many uses that

    biometrics is being used todayand the future holds moreadvances.

    At Coca-Cola Co., handscanning machines recentlyreplaced the venerable time cardfor many workers.

    In Cook County, Illinois, asophisticated camera thatanalyzes the iris patterns of anindividual's eyeball is helping

    ensure that the right people arereleased from jail.

    At Purdue University in Indiana,the campus credit union isinstalling automated tellermachines with a finger scannerthat will eliminate the need forplastic bankcards and personalidentification numbers

    Walt Disney World in Orlandohas started taking hand scans ofpeople who purchase yearlypasses. These visitors now mustpass through a scanner when

    entering the park preventingthem from lending their passesto other people.

    The technology also receivedwidespread attention at lastsummers Olympic GamesAtlanta, where 65,000 athletes,coaches and officials used ahand-scanning system to enterthe Olympic Village.

    Emerging BiometricTechnologies:Newer biometric technologiesusing diverse physiological andbehavioral characteristics are invarious stages of development.

    Vein scan biometric technologycan automatically identify aperson from the patterns of theblood vessels in the back of the

    hand. The technology uses near-infrared light to detect vein vesselpatterns. Vein patterns aredistinctive between twins andeven between a person's left andright hand. Developed beforebirth, they are highly stable androbust, changing throughout one'slife only in overall size. Thetechnology is not intrusive, and

    4

  • 8/7/2019 bio Dimple verma_

    5/7

    works even if the hand is notclean. It is commercially available.

    Facial thermography detects heat

    patterns created by the branchingof blood vessels and emitted fromthe skin. These patterns, calledthermograms, are highlydistinctive. Even identical twinshave differentthermograms.Thermographyworks much like facial recognition,except that an infrared camera isused to capture the

    images.nfrared systems workaccurately even in dim light ortotal darkness.

    DNA matching is a type ofbiometric in the sense that it usesa physiological characteristic forpersonal identification. It isconsidered to be the "ultimate"biometric technology in that it canproduce proofpositive

    identification of a person, exceptin the case of identical twins.

    Body odor. This technology woulduse an odor-sensing instrument(an electronic "nose") to capturethe volatile chemicals that skinpores all over the body emit tomake up a person's smell.Although distinguishing oneperson from another by odor may

    eventually be feasible, the factthat personal habits such as theuse of deodorants and perfumes,diet, and medication influencehuman body odor renders thedevelopment of this technologyquite complex.

    Blood pulse biometrics measurethe blood pulse on a finger withinfrared sensors. This technology

    is still experimental and has ahigh false match rate, making itimpractical for personalidentification.

    Nailbed identification technologyis based on the distinctlongitudinal, tongue-in-groovespatial arrangement of theepidermal structure directlybeneath the fingernail. Thisstructure is mimicked in the ridgeson the outer surface of the nail.When an interferometer is used to

    detect phase changes in back-scattered light shone on thefingernail, the distinct dimensionsof the nailbed can bereconstructed and a one-dimensional map can begenerated.

    Gait recognition, recognizingindividuals by their distinctivewalk, captures a sequence of

    images to derive and analyzemotion characteristics. A person'sgait can be hard to disguisebecause a person's musculatureessentially limits the variation ofmotion, and measuring it requiresno contact with the person.However, gait can be obscured ordisguised if the individual, forexample, is wearing loose fittingclothes. Preliminary results have

    confirmed its potential, but furtherdevelopment is necessary beforeits performance, limitations, andadvantages can be fullyassessed.

    Ear shape recognition is still aresearch topic. It is based on thedistinctive shape of each person'sears and the structure of thelargely cartilaginous, projecting

    5

  • 8/7/2019 bio Dimple verma_

    6/7

    portion of the outer ear. Althoughear biometrics appears to bepromising, no commercialsystems are available

    CONCLUSION:By the study of various biometrictechniques I have concluded that

    Facial recognition, voicerecognition and signaturerecognition techniques arecheap and non intrusive too

    But at the same timethey are changeable,i.e,all three

    of them may change with timeand are also affected bysurrounding conditions.Voicesometimes changes due tocough and cold.

    On the other hand techniquessuch as DNA,iris recognitionand retinal scanning are veryintrusive and are highlyaccurate.Iris and retinal process take

    even less than 5 seconds foroperation.But they are very expensive.

    Fingerprint is one of the mostdeveloped biometrics.It is easyto use and highly accurate too.Also it requires very lessmemory space to store data.

    But it may sometime makemistakes due to dirtiness inhands and also the prints of a

    person working in chemicalindustries may change.

    Hand Geometry is alsosomewhat similar to fingerprintprocess.It is highly acceptable insociety and the hardware usedcan be integrated with otherdevices alsoBut for the persons sufferingfrom problems like arthritis or

    rumetis ,it becomes hard for

    them to keep their hand onscanner for their hand to bescanned.

    REFERENCES USED:

    Jain, A. K.; A. Ross & S.Pankanti (June 2006),"Biometrics: A Tool forInformation Security", IEEETransactions On InformationForensics And Security 1st (2)

    P. J. Philips, P. Grother, R. J.Micheals, D. M. Blackburn, E.Tabassi, and J. M. Bone, FaceRecognition Vendor Test 2002:Overview and Summary(Online)

    R. Cappelli, D. Maio, D. Maltoni,J. L. Wayman, and A. K. Jain,Performance evaluation offingerprint verification systems,IEEE Trans. Pattern Anal. Mach.

    Intell., vol. 28, no. 1, pp. 318,Jan. 2006

    NIST Iris Challenge Evaluation,(Online)

    S. Hocquet, J. Ramel, H.Cardot, Fusion of Methods forKeystroke DynamicAuthentication, AutomaticIdentification AdvancedTechnologies, 2005. FourthIEEE Workshop on 17-18 Oct.2005 Page(s):224 - 229

    D. A. Reynolds, W. Campbell, T.Gleason, C. Quillen, D. Sturim,P. Torres-Carrasquillo, and A.Adami, The 2004 MIT Lincolnlaboratory speaker recognitionsystem, in Proc. IEEE Int. Conf.Acoustics, Speech, SignalProcessing, Philadelphia, PA,Mar. 2005

    6

    http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653http://dx.doi.org/10.1109/TIFS.2006.873653
  • 8/7/2019 bio Dimple verma_

    7/7

    7