Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: BIOMETRIC SECURITY
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
BIOMETRIC SECURITY
[attachment=29703]
ABSTRACT
Now-a-days, Security is no longer a secure word, because of the recent evolutions in the IT field such as e-commerce, Internet etc., gone are the days where passwords, authentication were considered as measures for security. To help the security on the Net, there comes a new era of security namely BIOMETRICS.
Biometrics is a means of identifying a person by measuring a particular physical or behavioral characteristic and later comparing it to those of many people that are stored in the data base. The main advantage of Biometrics is it needs the person himself for identification and these critical details cannot be lost or forged.
Here in this paper we present detailed walkthroughs in few types of biometrics such as:
• Hand Scan
• Finger Scan
• Facial Scan
• Iris Scan
• Retinal Scan
• Voice Recognition
• Signature Scan
In addition to this, this paper also deals with working of a typical biometric system, its performance characteristics and applications.
INTRODUCTION:
This paper provides a broad overview of the subject of biometrics, their usage, how performance is measured, the typical construction of systems and practical implementation issues.
What are biometrics and why should we be concerned with them?
Biometrics are best defined as measurable physiological or behavioral characteristics that can be utilized to verify the identity of an individual. They include facial recognition, fingerprints, hand geometry, retinal and iris scanning, voice patterns, and other techniques. They are applied in the regions where it is important to verify the true identity of an individual. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations.
TYPES OF BIOMETRIC SCAN
1. HAND-SCAN:
Geometric Hand Measuring - The extern Hand scans, also known as hand geometry, a biometric authentication technology, which dominates an important segment of the biometric industry. Hand-scan reads the top and sides of the hands and fingers, using such metrics as the height of the fingers, distance between joints, and shape of the knuckles. Although not the most accurate physiological biometric, hand scan has proven to be an ideal solution for low-to mid-security applications where deterrence and convenience are as much a consideration as security and accuracy.
The system uses infrared light to look into an individual's hand, like an x-ray it uses this image to compare to a computer database. When someone grabs the device, infrared light takes a digital picture of the inside of an individual's hand. A computer then analyzes the data and since no two hands are alike, the computer can make a positive identification of that individual.
2. FINGER SCAN
Finger scan technology is the most prominent biometric authentication technology, one used by millions of people worldwide and for decades in forensic applications. Although more accurate technologies exist, finger-scan is still considered highly accurate; and although less expensive technologies exist, prices have dropped to the point that the average home user can control his or her PC with a peripheral finger-scan device.
3. FACIAL-SCAN:
Just as with hand scan biometrics, there are various methods by which facial scan technology recognizes people. All share certain commonalties, such as emphasizing those sections of the face which are less susceptible to alteration, including the upper outlines of the eye sockets, the areas surrounding one's cheekbones, and the sides of the mouth.
Most technologies are resistant to moderate changes in hairstyle, as they do not utilize areas of the face located near the hairline. All of the primary technologies are designed to be robust enough to conduct 1-to-many searches in the database. The system designs for facial scan verification vs. identification differ in a number of ways. The primary difference is that identification does not require a claimed identity. A second variable in identification is the dynamic between the target subjects and capture device. In verification, one assumes a cooperative audience, one comprised of subjects who are motivated to use the system correctly.
Facial scan systems, depending on the exact type of implementation, may also have to be optimized for non-cooperative and uncooperative subjects. Non-cooperative subjects are unaware that a biometric system is in place, or don't care, and make no effort to either be recognized or to avoid recognition. Uncooperative subjects actively avoid recognition, and may use disguises or take evasive measures. Facial scan technologies are much more capable of identifying cooperative subjects, and are almost entirely incapable of identifying uncooperative subjects.
Automatic Face Processing (AFP) is a more rudimentary technology, using distances and distance ratios between easily acquired features such as eyes, end of nose, and corners of mouth. Though overall not as robust as eigenfaces, feature analysis, or neural network, AFP may be more effective in dimly lit, frontal image capture situations.
4. IRIS-SCAN:
Iris identification technology is a tremendously accurate biometric. Only retinal scan can offer nearly the security that iris scan offers, and the interface for retina scan is thought by many to be more challenging and intrusive. More common biometrics provides reasonably accurate results in verification schematics, whereby the biometric verifies a claimed identity, but they cannot be used in large-scale identification implementations like iris recognition.
Iris recognition leverages the unique features of the human iris to provide an unmatched identification technology. So accurate are the algorithms used in iris recognition that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejection.
The technology also addresses the FTE (failure to enroll) problems, which lessen the effectiveness of other biometrics. The tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other biometric technologies. All iris recognition technology is based on research and patents held by Dr. John Daugman.
Iris recognition also accounts for those ongoing changes to the eyes, which are defining aspects of living tissue. The pupil's expansion and contraction, a constant process separate from its response to light, skews and stretches the iris.
The algorithm accounts for such alteration after having located the boundaries of the iris. Dr. Daugman draws the analogy to a "homogenous rubber sheet" which, despite its distortion, retains certain consistent qualities. Regardless of the size of the iris at any given time, the algorithm draws on the same data, and its resultant Iris Code is stored as a 512-byte template.
A question asked of all biometrics is their ability to determine fraudulent samples. Iris recognition can account for this in several ways: the detection of papillary (pupil) changes; reflections from the cornea; detection of contact lenses on top of the cornea; and use of infrared illumination to determine the state of the sample eye tissue.
5. RETINAL-SCAN:
Iris identification technology is a tremendously accurate biometric. Only retinal scan can offer nearly the security that iris scan offers, and the interface for retina scan is thought by many to be more challenging and intrusive.
Retina scan devices read through the pupil - this requires the user to situate his or her eye within 1/2 inch of the capture device, and to hold still while the reader ascertains the patterns. The user looks at a rotating green light as the patterns of the retina are measured at over 400 points. This leads to a very high level off accuracy in comparison to most other biometrics.
Iris identification technology is a tremendously accurate biometric. Only retinal scan can offer nearly the security that iris scan offers, and the interface for retina scan is thought by many to be more challenging and intrusive.
No reliable statistics are available regarding the Failure to Enroll rate, or the number of users who are simply unable to perform an acceptable enrollment. Based on experience, it is fair to conclude that a statistically significant number of people, perhaps 5-10%, may be unable to perform a satisfactory enrollment.
6. VOICE RECOGNITION:
Voice scan, also known as voice or speaker verification, is a biometric authentication technology well suited for a handful of applications and systems in which other biometric technologies would be difficult to use. Making use of distinctive qualities of a person's voice, some of which are behaviorally determined and others of which are physiologically determined, voice scan is deployed in areas such as call centers, home imprisonment, banking, account access, home PC and network access, and many others.
Voice-scan is most often deployed in environments where the voice is already captured, such as telephony and call centers. If users become accustomed to speaking to their PC, especially in speech-to-text applications, voice-scan may also become a solution for PC and web access.
7. SIGNATURE- SCAN:
Signature scan, also known as Dynamic Signature Verification, is a biometric technology which has not seen broad usage, but may soon help address the very large demand for document authentication.
Measuring the manner in which one signs his or her signature or password, signature scan looks for stroke order, speed, pressure, and other factors which relate to the actual behavior of signing a tablet. Although not yet a very accurate behavioral biometric, signature scan has drawn significant interest from software companies looking to develop non-repudiated document trails. Signature-Scan.com will cover the following aspects of the signature verification industry.