25-12-2010, 06:00 PM
plz send me information..
25-12-2010, 06:00 PM
plz send me information..
25-12-2010, 09:32 PM
Hi,
visit the previous pages of this thread for full report of this topic: https://seminarproject.net/Thread-biomet...d-abstract
17-02-2011, 03:14 PM
BIOMETRICS.ppt (Size: 505.5 KB / Downloads: 219) BIOMETRICS PAST METHODS FOR SECURITY DISADVANTAGES EMERGENCE OF BIOMETRICS AVENUES WHERE BIOMETRICS FINDS ITS WAY OMPUTER NETWORKS AUTOMATIC TELLAR MACHINES IN NETWORK SECURITY AND AUTENTICATION INTERNET BANKING CELL PHONE INDUSTRY BIOMETRICS IN NETWORK AUTHENTICATION PREVIOUS FORMS WHY BIOMETRICS IN AUTHENTICATION HOW IS IT IMPLEMENTED BIOMETRICSROS AND CONS ADVANTAGES DISADVANTAGES DIFFERENT KINDS OF BIOMETRIC SYSTEMS FINGER PRINT READERS HAND SCANS VOICE AUTHENTICATION SYSTEM RETINA SCANS IRIS SCANS FACIAL SCANS FINGER PRINT READERS PROS CONS HAND SCANS PROS CONS
18-02-2011, 03:51 PM
bio-metrics.docx (Size: 30.74 KB / Downloads: 135) Biometrics IN THE REALM OF computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified. In other words, we all have unique personal attributes that can be used for distinctive identification purposes, including a fingerprint, the pattern of a retina, and voice characteristics. Although the field of biometrics is still in its infancy, it’s inevitable that biometric systems will play a critical role in the future of security. Strong or two-factor authentication—identifying oneself by two of the three methods of something you know (for example, a password), have (for example, a swipe card), or is (for example, a fingerprint)—is becoming more of a de facto standard in secure computing environments. Some personal computers today can include a fingerprint scanner where you place your index finger to provide authentication. The computer analyzes your fingerprint to determine who you are and, based on your identity followed by a passcode or passphrase, allows you different levels of access. Access levels can include the ability to open sensitive files, to use credit card information to make electronic purchases, and so on. If you’ve ever watched hi-tech spy movies, you’ve most likely seen biometric technology. Several movies have depicted biometric technologies based on one or more of the following unique identifiers: ✓ Face ✓ Fingerprint ✓ Handprint ✓ Iris ✓ Retina ✓ Signature ✓ Voice ✓ Watermarking But how realistic are they in today’s computing world, and how can they help you? This text answers these questions and provides templates for biometric applications. Introduction Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. This identification method is preferred over traditional methodsinvolving passwords and PINs (personal identification numbers) for several reasons, including the person to be identified is required to be physically present at the point of identification and/oridentification based on biometric techniques obviates the need to remember a password or carry atoken. With the increased use of computers as vehicles of information technology, restrictingaccess to sensitive/personal data is necessary. By replacing PINs, biometric techniques can potentiallyprevent unauthorized access to or fraudulent use of the following: ✓ ATMs ✓ Cellular phones ✓ Smart cards ✓ Desktop PCs ✓ Workstations ✓ Computer networks PINs and passwords may be forgotten, and token-based identification methods such as passportsand driver’s licenses may be forged, stolen, or lost. Thus, biometric systems of identificationare enjoying a new interest. Various types of biometric systems are being used for real-time identification.The most popular are based on face recognition and fingerprint matching; however,other biometric systems use iris and retinal scans, speech, facial feature comparisons and facialthermograms, and hand geometry. In History The term biometrics is derived from the Greek words bio (life) and metric (to measure).Among the first known examples of practiced biometrics was a form of memberprintingused in China in the fourteenth century, as reported by the Portuguesehistorian Joao de Barros. The Chinese merchants were stamping children’s palm andfootprints on paper with ink to distinguish the babies from one another.In the 1890s, an anthropologist and police desk clerk in Paris named AlphonseBertillon sought to fix the problem of identifying convicted criminals and turnedbiometrics into a distinct field of study. He developed a method of multiple body measurements that was named after him (the Bertillonage technique—measuringbody lengths). Police throughout the world used this system until it proved to beexceedingly prone to error as many people shared the same measurements. After thisfailure, the police started using fingerprinting—developed by Richard Edward Henryof Scotland Yard—after the methods used by the Chinese centuries before. biometric system is essentially a pattern-recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessedby the user. An important issue in designing a practical system is to determine how anindividual is identified. Depending on the conext, a biometric system can be either a verification(authentication) or an identification system. Verification versus IdentificationToday, wehave the technology and processing power to employ advanced, cost-effective, and much more accurate biometric identification systems. There are two different ways to resolve a person’sidentity: verification and identification. Verification (am I whom I claim to be?) involves confirming or denying a person’s claimed identity. In identification, one has to establish a person’s identity(who am I?). Each approach has its own complexities and could probably be solved best by aspecific biometric system, including the following: ✓ Physical biometrics: ■ Fingerprint—Analyzing fingertip patterns (see Figure 1-1) ■ Facial recognition/face location—Measuring facial characteristics ■ Hand geometry—Measuring the shape of the hand ■ Iris scan—Analyzing features of colored ring of the eye (see Figure 1-2) ■ Retinal scan—Analyzing blood vessels in the eye ■ Vascular patterns—Analyzing vein patterns ■ DNA—Analyzing genetic makeup ■ Biometric data watermarking (which is really a method rather than a physicalattribute) is used to store/hide biometric information. ✓ Behavioral biometrics: ■ Speaker/voice recognition—Analyzing vocal behavior ■ Signature/handwriting—Analyzing signature dynamics ■ Keystroke/patterning—Measuring the time spacing of typed word Hand Geometry Medium High Voice Medium High Retina High Low Iris Medium Medium Signature Medium Medium Face Low High from the most accepted to the least accepted: 1. Iris scan 2. Keystroke/patterning 3. Signature/handwriting 4. Speaker/voice recognition 5. Facial recognition/face location 6. Fingerprint 7. Hand geometry 8. Retinal scan to the least effective: 1. Hand geometry 2. Iris scan 3. Retinal scan 4. Fingerprint 5. Speaker/voice recognition 6. Facial recognition/face location 7. Signature/handwriting 8. Keystroke/patterning Applications Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with keyless entry devices. APPLIED BIOMETRICS This book covers the hottest topics in biometrics development for applications, including the following in regards to applied methodology and program development: ✓ Fingerprint identification ✓ Hand geometry ✓ DNA analysis ✓ Speaker recognition ✓ Face location ✓ Retina scanning ✓ Iris scanning ✓ Keyboard recognition ✓ Multibiometrics ✓ Data hiding ✓ Sample solutions It also provides a sample installation and usage of each biometric technology in the data arena where it’s most practical. During the sample installation and usage specific features of the product being used are noted. This becomes an important factor in determining which product is right for you. For example, one product may provide good protection and make accessing Web sites easier, while another product may allow access to specific applications to be controlled. The text also shows how the biometric technology is used to control logon access and, where possible, how it can be used for items such as e-mail and file encryption. For executive and information technology (IT) managers, the following biometric concerns are also covered: ✓ What form of device is most appropriate for your use? ✓ Should the devices be shared or used individually? ✓ How large and how skilled a support staff is needed? ✓ Should users be coming in from multiple places? Over multiple channels, such as a local area network (LAN), Web, wireless, or virtual private network (VPN)? ✓ What other forms of IT security should be in place (Public Key Infrastructure [PKI], security portal, firewall, and so on)? How will they interact? ✓ Will users be switching access modes? ✓ Will different users and groups require different security policies for different applications and transactions? ✓ How should all this be administered? ✓ Is this for inside the firewall, outside the firewall, or mixed use? If you have decided to invest in biometrics, you’ll find some tips to help you leverage your investment. Can the biometric product(s) be used for multiple purposes, such as the following? ✓ Site identification/access ✓ Building identification/access ✓ Secured location identification/access ✓ Equipment identification/access ✓ Mobile device protection PRACTICAL USAGES Throughout this book, you’ll find example scenarios in which biometrics is both a sound practice and a solid investment that can ultimately help ensure security while reducing cost. Additionally, you’ll find some futuristic examples of how biometrics may be used to provide new services while maintaining high security. According to Charles Lynch, Jr. (Vice President of Sales and Marketing for Datastrip, Inc.), vertical markets using biometrics include the following: ✓ Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services, and so on ✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses ✓ Healthcare—Medical insurance cards, patient/employee identity cards ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards ✓ Retail and gaming—Retail programs, such as check cashing, loyalty rewards and promotional cards, and gaming systems for access management and VIP programs ✓ Security—Access control and identity verifications, including time and attendance ✓ Public justice and safety—Prison IDs, county probation offices’ use for identification of parolees, county courthouses’ use for ID systems ✓ Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe. Many new passport and national ID card systems use some type of biometric encoded in a bar code or smart chip. ✓ Driver’s licenses—Technologies being recommended by American Association of Motor Vehicle Administrators (AAMVA), the organization that oversees DMV standards, include biometrics and two-dimensional bar codes. Georgia, North Carolina, Kentucky, and others already utilize biometrics on their respective state driver’s licenses. Outside of the government and military arena, corporate America is stepping up to biometrics for applications ranging from employee IDs to time and attendance. The bulk of the biometrics marketplace still consists of traditional systems used to compare fingerprints to vast, centralized databases of criminals’ fingerprints. Where possible, this text also depicts some potential future developments for the technologies discussed. Facts, Characteristics, and HowBiometrics Can Work for You The most popular use of biometrics for network security is for secure workstation logons. Each workstation requires software support for biometric identification of the user, as well as a hardware device, depending on the biometric being used. The cost of hardware devices is one factor note that may lead to the widespread use of voice biometric security identification that can leverage common sound cards and microphones, especially among companies and organizations on a low budget. Hardware devices such as computer mice with built-in thumbprint readers will be the next step. These devices will be more expensive to implement on several computers, because each machine would require its own hardware device. A biometric mouse, with the software to support it, is available in the United States for approximately $120. The advantage of voice recognition software is that it can be centralized, reducing the cost of implementation per machine. At the top of the price range, a centralized voice biometric package can cost up to $50,000 but may be able to manage the secure logon of up to 5000 machines. According to the International Biometric Industry Association (IBIA), the following are important details about current biometrics and the industry
01-03-2011, 03:16 PM
presented by:
Hardik Aniyali Vimal Javia 03-15_BioMetrics.ppt (Size: 437 KB / Downloads: 160) BIOMETRICS WHAT SECURITY ? WHY SECURITY? SECURITY SYSTEM ALEXENDAR FISH & LINAS YEL - 1844 INTRODUCTION BIO = PERTAINING TO BIOLOGY & METRICS = SCIENCE OR ART OF MEASUREMENT FUNDAMENTAL OPERATIONS 1.CAPTURE 2.EXTRACTION 3.COMPARISON 4.MATCH/NONMATCH A FEW DEFINATION BIOMETRICS AUTHENTICATION BIOMETRICS,BIOMETRIC OR BIOMETRY AUTHENTICATION Vs IDENTIFICATION HISTORY OF BIOMETRICS FRANCIS GALTON – 1892. In 1968, Biometrics technique was implemented in New York bank. But after1990, IT comes in picture ,through Its advancement and simplicity Biometrics Technique become very popular. PHASE OF BIOMETRICS 1.INPUT 2.PROCESS 3.OUTPUT BIOMETRICS IDENTIFICATION 1. VOICE PRINT 2. FINGER PRINT 3. IRIS PATTERN 4. FACE PRINT 5. HAND GEOMETRY 6. RETINAL SCAN 7. KEYSTROKE DYNAMICS 8. FACIAL RECOGNITION 9. SIGNATURE RECOGNITION VOICE PRINT Voice print is recorded by microphones. Voice print is determined by many different factors: size of vocalcactivites (throat, oral, nasal) as well as the characteristic of the vocal chords themselves. Your voice is further modified by the way you speak the way your mouth, lips, teeth, jaw and tongue move. Therefore, the chance of two people have FINGER PRINT Finger print is also called finger scanning. To scan the finger print, a special kind of scanner that can work with optical rays is used. it fetches the diagram of finger print & delivers it to the computer where a special programmer measures the distance between the special features & that print. Here, those special features are core, split, island, end &delta. Most fingerprint data takes up around 250kb
10-03-2011, 12:33 PM
Presented by:
G.PPANEETHA A.SRUJANA Y.KANTHI SRI bio metrics (2).doc (Size: 1 MB / Downloads: 108) ABSTRACT: The information age is quickly revolutionizing the way transactions are completed which has led to the invention of many security items. Every day actions are increasingly being handled electronically, this growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Traditional means of security using personal identification numbers (PIN) through passwords or security-access cards (smart cards) has a major drawbacks as they recognize the PIN but not the person who has provided it. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords. Biometric devices consist of a reader or scanning device software that converts the scanned information into digital form, and, wherever the data is to be analyzed, a database that stores the biometric data for comparison with entered biometric data. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometrics is seen by many as a solution to a lot of the user identification and security problems in today’s networks. There are number of applications of biometrics. widely used in forensics such as criminal identification, prison security and in a large number of civilian applications. Biometrics can also help in the prevention of unauthorized access to ATMs ,cellular phones, smart cards, desktop PCs, workstations, and computer networks and it can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking) to minimize risks Biometric authentication offers a highly secure , reliable and efficient solution. So where security is highly required implementation of biometrics security is a very good solution as there is a fear of stealing /forgetting password. 1..Introduction: Biometrics is the science and technology of authentication (i.e. establishing the identity of an individual) by measuring the person's physiological / behavioral features. The term is derived from the Greek words "bios" for life and "metron" for degree. Biometrics ensures that the individual trying to log on is actually the authorized person and not just someone who maliciously found a card or cracked a password. This technology gathers unique physiological and behavioral attributes of a person for storing in a database or comparing it with one already present. In the development of biometric identification systems, physical and behavioral features for recognition are required which must possess: •Uniqueness: that is, an identical trait shouldn't appear in two people: •Universality: occur in as many people as possible •Permanence: don't change over time •Measurability: measurable with simple technical instruments •User-friendliness: easy and comfortable to measure: Thus, 2 categories of biometrics are present: 1) Physiological, called static biometrics: Biometrics based on data derived from the measurement of a part of person's anatomy. E.g.: fingerprints, iris patterns, facial features, hand geometry, retinal blood vessels. 2) Behavioral: Biometrics based on data derived from measurement of an action performed by a person and distinctly, incorporating time as a metric, i.e. the measured action. Eg:voice(speaker verification). Biometric systems seems to be complicated, but they all use the same three steps: • Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait. • Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. • Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be. Systems also use the same three components: 1) A sensor that detects the characteristics being used for identification 2) A computer that reads and stores the information 3) A Software that analyzes the characteristics, translates it into a graph or code and performs the actual comparisons 2.History: Initially British scientist Sir Francis Galton proposed the use of fingerprints for identification purposes in the late 19th century. Later, British police official Sir Richard Edward Henry introduced fingerprinting in the 1890s as a means of identifying criminals. Automatic finger print based identification systems have been commercially available since the early 1960s. Until the 1990s these systems were used primarily by the police and in certain security applications Personal Identification Numbers (PIN) were one of the first methods used for identification. 3.THE POPULAR BIOMETRICS TECHNOLOGIES 1. Finger print recognition. 2. Face recognition. 3. Hand geometry. 4. Voice recognition. 5. Iris recognition. 6. Signature recognition. 3.1.FINGER-PRINT RECOGNITION: Among all the biometric techniques, fingerprint-based identification is the oldest method which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minute points. Minute points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending
11-03-2011, 02:04 PM
presented by:
T.Sreedhar M.Suresh BioMetrics.doc (Size: 73.5 KB / Downloads: 88) ABSTRACT: In recent years there has been a wealth of information amassed in the area of biological sciences and this necessitated the development of altogether new area called “BIO METRICS”. Biometrics requires an unambiguous understanding of modern bio chemistry, micro biology, bio and electrical technology by use of state of art techniques and tools developed by and employed in computer science, information technology and mathematics Biometrics are best defined as measurable physiological and / or behavioral characteristics that can be utilized to verify the identity of an individual. They are of interest in any area where it is important to verify the INTRODUCTION Biometrics is the technique of using unique, non-transferable, physical characteristics, such as fingerprints, to gain entry for personal identification. This replaces pin codes and passwords, which can be forgotten, lost or stolen. Biometric IDs cannot be transferred true identity of an individual. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations WHAT IS BIOMETRICS The security field uses three different types of authentication: something you know—a password, PIN, or piece of personal information (such as your mother's maiden name); something you have—a card key, smart card, or token (like a Secured card); and/or Something you are—a biometric. Biometrics involve directly the human being for the identification or verification. Traditionally many security system employ the verification technique rather than the identification which is the main aim of biometrics. Although it doesn’t totally remove the pin/password but with that tool it provide a very tight security system.
17-03-2011, 04:59 PM
PRESENTED BY:
PRASANNA PASAM BIOMETRICS_ppt.ppt (Size: 711 KB / Downloads: 132) BIOMETRICS VERIFICATION Vs IDENTIFICATION INTRODUCTION : WHAT IS BIOMETRICS? NEED OF BIOMETRICS. RECOGNITION BASED ON THE AUTHENICITY OF PHYSIOLOGICAL AND BEHAVIORAL CHARACTERISTICS OF USER. VERIFICATION & IDENTIFICATION. APPLICATIONS : FINGERPRINT MATCHING : • MINUTIAE-BASED. • CORRELATION-BASED. FIGERPRINT CLASSIFICATION : • CLASSIED INTO FIVE TYPES : WHORL,RIGHT LOOP,LEFT LOOP,ARCH,AND TENTED ARCH FINGERPRINT IMAGE ENHANCEMENT : • THIS ALGORITH IMPROVES THE QUALITY OF THE FINGERPRINT. • EXPERIMENTAL RESULTS ARE GIVEN BELOW : CAPTURING HAND IMAGES AND EXTRACTING FEATURES : • THE IMAGE ACQUISTION SYSTEM IS HOOKED TO A P.C WITH A GUI APPLICATION,PROVIDES TOP & SIDE VIEWS.
18-03-2011, 09:10 AM
Biometrics in Network Security.doc (Size: 305 KB / Downloads: 77) Abstract: In today’s information technology world, security for systems is becoming more and more important. One area where security can be improved is in authentication. Biometric, provides one of the most secure methods of authentication and identification Biometric identification utilizes physiological and behavioural characteristics to authenticate a person’s identity, which are both unique and measurable. Some common physical characteristics that may be used for identification include fingerprints, palm prints, hand geometry, retinal patterns and iris patterns. Behavioural characteristics include signature, voice pattern and keystroke dynamics. Among all these techniques we have chosen iris recognition because, that no two irises are alike, even in twins, thus making them a good biometric. In this paper, we deduced the most important, efficient and accurate method of authentification and verification using Iris Recognition Technology. In addition to these we have also discussed the advantages of Iris Recognition Technology including its applications. INTRODUCTION Iris recognition, a biometric, provides one of the most secure methods of authentication and identification thanks to the unique characteristics of the iris. An Iris Recognition system works by capturing and storing the biometric information and then comparing the scanned biometric with what is stored in the repository. Once the image of the iris has been captured using a standard camera, the authentication process, involving comparing the current subject’s iris with the stored version, is one of the most accurate with very low false acceptance and rejection rates. This makes the technology very useful in areas such as information security, physical access security, ATMs and airport security. The technology is accurate, easy to use, non-intrusive, and difficult to forge. Iris recognition technology does provide a good method of authentication to replace the current methods of passwords, token cards or Pin’s and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger. KNOWLEDGE OF IRIS: The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be measured, such as striations, pits and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye. The amount of information that can be measured in a single iris is much greater than fingerprints, and accuracy is greater than DNA IRIS RECOGNITION PROCESS: The process of Iris Recognition is made up of three steps: Capturing the image Defining the location of the iris and optimizing the image Storing and comparing the image. 1. CAPTURING THE IMAGE The image of the iris can be captured using a standard camera using both visible and infrared light and may be either a manual or automated procedure. The camera can be positioned between three and a half inches and one meter to capture the image. In the manual procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six to twelve inches of the camera. This process is much more manually intensive and requires proper user training to be successful. The automatic procedure uses a set of cameras that locate the face and iris automatically thus making this process much more user friendly. 2. DEFINING THE LOCATION OF THE IRIS AND OPTIMIZING THE IMAGE 2.1 LOCATION OF IRIS Once the camera has located the eye, the iris recognition system then identifies the image that has the best focus and clarity of the iris. The image is then analyzed to identify the outer boundary of the iris where it meets the white sclera of the eye, the pupillary boundary and the centre of the pupil. This results in the precise location of the circular iris.
18-03-2011, 10:02 AM
sir plz send me the link to download :
Biometrics (Download Full Report And Abstract) to alien.earth26[at]gmail.com
19-03-2011, 03:18 PM
Presented by:
Abhinav Goel. Rohit.doc (Size: 94 KB / Downloads: 153) Definition Of Biometrics The term is derived from the Greek words “bios” which means life and “metrics” for measure. Biometrics can be defined as the technique of studying physical characteristics of a person such as finger prints, hard geometry, eye structure etc. to establish his or her identity. This science is primarily implemented to identify individuals. Techniques Used In Identification Fingerprint Scanning Retinal Scanning Iris Scanning Facial Recognition Voice Recognition HISTORY OF BIOMETRICS Way back to the 1880s, while in Japan, Henry Faulds studied the prints left behind by craftsmen on ancient clay fragments. He then went on to study his own and his colleagues’ fingerprints. This convinced him that each individual had unique fingerprints. A little later, a fellow worker was arrested by the police for a pretty crime. Faulds exonerated the man by showing that the finger prints on the crime scene did not match with those of his friends. Thus began the journey of the most promising science of identification and recognition: Biometrics. Today, apart from fingerprints, we have discovered facial recognition, DNA, retinal scanning, and voice recognition. What Is Biometrics? The term is derived from the Greek word “bios” which means life and “metrics” for measure. Biometrics can be defined as the technique of studying physical characteristics of a person such as finger prints, hard geometry, eye structure etc. to establish his or her identity. This science is primarily implemented to identify individuals. Need Of Biometrics The use of biometrics is no longer restricted to define establishment or sensitive areas. An increased need for security has prompted even everybody office goers to install fingerprint recognition devices to boot up their laptops, thumb devices & other daily use gadgets. The question is, why? Why isn’t the 16-digit password good enough? Simply because fingerprints are more secure. A password is breakable & anyone with basic knowledge of computers can crack password using the myriad free programmes available on the Internet. But a fingerprint however is difficult to fake without the help of the owner. Secondly it is more convenient to simply place your finger on to a scanner instead of remembering a long & complex series of characters & their cases. Biometric systems have the potential to identify individuals with a very high degree of certainty. Forensic DNA evidence enjoys a particularly high degree of public trust. Substantical claims are being made is respect of this recognition technology, which has the capacity to discriminate between the individuals with identical DNA. Working Of Biometric Processes The concept of biometric verification is simple. The system already has some prestored data. When you approach the system, say a fingerprint scanner, your finger is scanned & matched with a record of fingerprint already in its database. Only when it finds a match access is granted. The concept might be simple, but the process is quite ingenious. Fingerprint Scanning Fingerprint is a unique feature to an individual. It stays with the person throughout his or her life. This makes the fingerprint the most reliable kind of personal identification because it can not be forgotter, misplaced or stoles. A fingerprint is made up of ridges and valleys (lines and gapes separating them) & it is these ridges & valleys which are scanned to verify the authenticity of a print. The most commonly used method of scanning is optical scanning. An optical scanner has a CCD (Charge Coupled Device) sensor similar to the ones used in digital cameras. There is an array of light sensitive diodes (photosites). When these diodes come in contact with light, they generate an electrical signal. Every photosites record a pixel representing the light it came in contact with. An analog to digital converter (ADC) system in the scanner processes the electrical signals to generate digital representations of the image. It is not necessary that the same kind of light falls on all diodes. So what is generated is a mix of dark & light areas, which together make up the image. It is not necessary that the same kind of light falls on diodes. So what is generated is a mix of dark and light areas, which together make up the image. The process begins as soon as you place your finger on the glass plate. The scanner has its own source of light (mostly an array of LEDs) which illuminate the finger & the CCD inside takes a picture of the finger. After that it checks for the integrity of the image in terms of contrast, sharpness & sheer quality. The system checks the average pixel darkness. If the image is too dark or too light, it is rejected. Exposure settings are then accordingly adjusted and the print rescanned. If the exposure level is found to be correct, it goes on to check the sharpness of the fingerprint. It does so by analyzing severals straight lines moving horizontally & vertically across the image. If the definition is good, a line running perpendicular to ridges will comprise alternating segments of light and dark pixels. If this is found to be in order, the scanner will compare the fingerprint with those in the database. Matching of prints is a fairly complex process in itself & is far removed from the super-imposing method commonly shown in films. This is so because smudging (due to scan surface or oily fingers) can make the same print appear different photos. Also, scanning and matching the entire finger consumes a lot of processing power. An individual can even fool a fingerprint detector by using a piece of sticky tape gelatin with an authentic fingerprint on it. Retinal Scanning Retinal scanning is rather old in the chronology of technology innovations. For the retina to be scanned, the user looks through s small hole in the scanning device and focuses on a particular point for the time period during which, a low intensity light and a CCD analyse the layer of blood vessels at the back of the eye for matching patterns and then validate the person identity. This technology is still not in public domain (unlike fingerprint recognition, which is) and is used only to secure highly sensitive security areas. Unlike fingerprints, there is absolutely no known method of replicating a person’s retina. Iris Scan Iris scans, though relating to the eye (like retinal scan) uses a completely different method of identification. The Iris scan is the colored ring surrounding the pupil. The scan analyses the features that exist in this colored tissue. Over 200 points can be used for comparison such as rings, furrows and freckles. The scan is done with a regular camera and the subject stands about a foot from the lens of the camera. The Iris pattern is much more unique than a fingerprint. A statistical analysis puts the probability of two irises matching at 1 in 10 to the power 78 while the population of humans on earth is 7 billion that is 7 to the power 9. Facial Recognition A Facial recognition system is a computer drives application for automatically identifying a person from a digital image, it does meant by comparing selected facial features in the live image and a facial database. Fingerprinting and retinal scanning are relatively easy to administer, since the people going through the process are aware of it and are consenting to subject themselves to these measures, the main application of facial recognition is in security where the software is expected to pick a face out of, say, thousands of passengers at the airport, and match it with a database of wanted criminals and positively state whether or not that face belong to the guilty party. To make the computer recognize a face from a picture or a video feed is quite an achievement in itself, but the bigger achievement is to identify clearly if the face is that of wanted man or not. If you look in the mirror, or at a persons face for that manner, you will notice that every face has certain characteristics and distinguishable feature, which allows us to differentiate between two people. The facial recognition software divides the face into 80 nodes, some of common ones being distance between eyes, width of nose, and depth of eye sockets, cheekbones, jaw lines, and the chin. The system generally needs to match between 14-25 nodes in order to obtain a positive ID. Now, obviously these are a lot of people coming in and out of a place where this system is setup (stadiums, airports etc.).The real challenge is to recognize face instantaneously. To facilitate this, a database is created with the help of an algorithm, which goes through the characteristics of the faces and stores them as a string of numbers. This string is called a face print. Following are the steps processed by the facial recognition software:- Face Detection First of all the camera pans around looking for a face, as it e1ncounters a face, it starts scanning it and than proceeds to identifying the various nodes. Detection Of Orientation Once the face is detected, the system determines the size of the head and position. Generally, a face needs to be around 40 degree towards the camera for the system to register and analyse it. Mapping The facial image is scaled down to the level of the images in the database and is then rotated and otherwise adjusted to match the formatting of the images in the database. Encoding The algorithm then converts the face into a face print based on the pre-defined criteria programmed into the algorithm. Matching This new data is then used as a fitter to sort through the database of faces at a very fast speed to find a match. Since it uses a variety of nodes, simple alternations of the face will not fool it. However, twins might; so the system certainly not infallible. Voice Recognition Like fingerprints and face attributes, every person has a unique speech pattern. Voice recognition works by first storing voice pattern and then using them as a database to authenticate a subject. Voice recognition is often confused with speech recognition, which is technology that converts speech to text and conversion software were needs to go through extensive training by the user before any suitable and acceptable result are obtained. Voice recognition works by nothing a person’s voice (physical characteristics of the vocal tract, the harmonic and the resonant frequencies) and converts it into an audio file which is known as voice print.
19-03-2011, 06:22 PM
22-03-2011, 12:19 PM
Presented by:
Vartika Paul 23636365-biometrics-seminar-report.doc (Size: 575.5 KB / Downloads: 162) BIOMETRICS What is Biometrics? Definition "Biometrics is the automated identification, or verification of human identity through the measurement of repeatable physiological, or behavioral characteristics” Identification: The search of a biometric sample against a database of other samples in order to ascertain whether the donor is already contained in, or new to the database. Verification: It refers to the 'one to one' comparison between a sample and another to ask the question, 'are you who you say you are.' The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics, such as fingerprints, irises, voice patterns, facial patterns, and hand measurements, for identification and verification purposes. Identification and verification have long been accomplished by showing something you have, such as a license or a passport. Sometimes it also required something you know, such as a password or a PIN. As we move into a time when we need more secure and accurate measures, we begin to look at using something you are: biometrics. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. History of BIOMETRICS: Chinese Precursor: Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children's palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today. European Origins: Until the late 1800s, identification largely relied upon "photographic memory." In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed a method of multiple body measurements which got named after him (Bertillonage). His system was used by police authorities throughout the world, until it quickly faded when it was discovered that some people shared the same measurements and based on the measurements alone, two people could get treated as one. After the failure of Bertillonage, the police started using finger printing, which was developed by Richard Edward Henry of Scotland Yard, essentially reverting to the same methods used by the Chinese for years. Modern Times: In the past three decades biometrics has moved from a single method (fingerprinting) to more than ten discreet methods. Companies involved with new methods number in the hundreds and continue to improve their methods as the technology available to them advances. Prices for the harware required continue to fall making systems more feasible for low and mid-level budgets. As the industry grows however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the breadth of use of fingerprinting, some are beginning to be used in both legal and business areas. WORKING PRINCIPLE OF BIOMETRICS Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. All Biometric authentications require comparing a registered or enrolled biometric sample (biometric template or identifier) against a newly captured biometric sample (for example, a fingerprint captured during a login). Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison. Biometric recognition can be used in Identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match based solely on the biometric. For example, an entire database can be searched to verify a person has not applied for entitlement benefits under two different names. This is sometimes called “one-to-many” matching. Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern. This is also called “one-to-one” matching. In most computer access or network access environments, verification mode would be used. A user enters an account, user name, or inserts a token such as a smart card, but instead of entering a password, a simple glance at a camera is enough to authenticate the user. TYPES OF BIOMETRICS: There are two types of biometrics: behavioral and physical. Behavioral biometrics - Used for verification . Physical biometrics - Used for either identification or verification. Physical biometrics : Fingerprint - Analyzing fingertip patterns. Facial Recognition - Measuring facial characteristics. Hand Geometry - Measuring the shape of the hand. Iris recognition - Analyzing features of colored ring of the eye. Vascular Patterns - Analyzing vein patterns. Retinal Scan - Analyzing blood vessels in the eye. Bertillonage - Measuring body lengths (no longer used). Behavioral biometrics: Speaker Recognition - Analyzing vocal behavior. Signature- Analyzing signature dynamics. Keystroke - Measuring the time spacing of typed words. CHARACTERISTICS OF BIOMETRICS: Biometric characteristics can be divided in two main classes, as represented in figure on the right: • Physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition. • Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice. FUTURE OUTLOOK: According to most experts, the future of biometrics is dependant upon two critical areas: standardization and the use of hybrid technologies. Standardization: Currently, the biometrics industry is very fragmented, with more than 150 companies with their own proprietary systems and methodologies. Standards have only recently been established in order to provide direction for the development of a common interface that will allow for shared biometric templates. The BioAPI standard created by the BioAPI Consortium, a group of more than 60 vendors and government agencies, defines a common structure for interfacing with biometrics. Yet, competitive forces remain as technology giants like Microsoft have abandoned the consortium and the BioAPI standard in order to develop their own proprietary software standards. The development and acceptance of a primary standard is critical for the growth and applicability of the biometrics industry. Only after the technological standard is more established can systems integrate and interact efficiently. Hybrid Technologies: One of the critical concerns with the use of biometric technologies is that of privacy and security of stored personal biometric data. To have personal data stored in a centralized database leaves the information potentially open to theft or compromise. The concept of combining smart card or public key infrastructures with biometric readers where the biometric template is stored on an individually controlled key has been suggested as a solution for the privacy concern and is considered by some critical to the advancement of biometric applications. Biometrics is a powerful combination of science and technology that can be used to protect and secure our most valuable information and property. The future holds no limits for this industry as more applications are found. Further, the technology itself continues to improve in terms of application and accuracy. From the application of total body scanning for highest security areas to speed and accuracy of identification when shopping on-line, the applications are boundless. Imagine a world where interstate air travel is allowed automatically via a full body scan that not only verifies identity but simultaneously searches for insecure or illegal paraphernalia. Where access to one is bank or credit accounts is only granted after identification via iris or retina scan. Where a shopping trip is made possible by a vehicle that operates only with biometric verification of ownership and payment is made via a fingerprint scan that links directly to one is credit account. In the future, we will live in a faster paced, more secure world where verification of one is identity is critical for daily activities. While some might argue that privacy and personal "freedom" are sacrificed with this level of control, most believe that it is the necessary price for a secure world environment.
22-03-2011, 04:55 PM
BIOMETRICS.docx (Size: 59.87 KB / Downloads: 78) BIOMETRICS INTRODUCTION: Biometrics refers to two very different fields of study and application. The first, which is the older and is used in biological studies, is the collection, synthesis, analysis and management of data in biology. Biometrics in reference to biological sciences, or biostatistics, has been studied since the early twentieth century. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. More recently and incongruously, the term's meaning has been broadened to include the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology particularly, biometrics is a form of identity access management and access control. Some researchers have coined the term behaviometrics for behavioral biometrics such as typing rhythm or mouse gestures where the analysis can be done continuously without interrupting or interfering with user activities. Biometrics is used to identify the input sample when compared to a template, used in cases to identify specific people by certain characteristics. i. possession-based ii. using one specific "token" such as a security tag or a card iii. knowledge-based iv. The use of a code or password. CLASSIFICATION: Biometric characteristics can be divided in two main classes, as represented in figure on the right: Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, hand and palm geometry and iris recognition. Behavioral are related to the behavior of a person. Characteristic implemented by using biometrics are signature verification, keystroke dynamics, and voice. The analysis and recognition of facial features is a tool used in the detection of criminals and undesirables. Conventional biometric methods introduced to improve security are mainly based on cross matching the face of the person with that recorded in their databases. At present, the data is static and would not, for example, identify suspects with cosmetic or plastic surgery modification of their faces to escape identification. However, it is possible to train persons that could be referred to as "face-minders", to memorized faces of suspects on a watch-list, by way of example. Recently, a new trend has been developed that merges human perception to computer database in a brain-machine interface. This approach has been referred to as cognitive biometrics. Cognitive biometrics is based on specific responses of the brain to stimuli which could be used to trigger a computer database search. Currently, cognitive biometrics systems are being developed to use brain response to odor stimuli, facial perception and mental performance for search at ports and high security areas. . Strictly speaking, voice is also a physiological trait because every person has a different pitch, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral. Other biometric strategies are being developed such as those based on gait (way of walking), retina, hand veins, finger veins, ear canal, facial thermo gram, DNA, odor and scent, palm prints and footprints. BIOMETRICS: The diagram on right shows a simple block diagram of a biometric system. When such a system is networked together with telecommunications technology, biometric systems become telebiometric systems. The main operations a system can perform are enrollment and test. During the enrollment, biometric information from an individual is stored. During the test, biometric information is detected and compared with the stored information. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. The first block (sensor) is the interface between the real world and our system; it has to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalization, etc. In the third block features needed are extracted. This step is an important step as the correct features need to be extracted and the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of all the characteristics extracted from the source, in the optimal size to allow for adequate identifiability. If enrollment is being performed the template is simply stored somewhere (on a card or within a database or both). If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area) .
23-03-2011, 12:38 PM
Presented By V Pravin pres1.ppt (Size: 942.5 KB / Downloads: 414) BIOMETRICS BIOMETRICS Forget passwords ... Forget pin numbers ... Forget all your security concerns ... WHAT IS BIOMETRICS? Automated method Pattern recognition system Specific physiological or behavioral characteristics WHY USE IT? Traditional methods involving passwords and PIN numbers Biometrics highest level of security CHARACTERISTICS USED • Fingerprints • Voiceprints • Facial features • Writing patterns • Iris patterns • Hand geometry BIOMETRIC SYSTEM Data Collection Transmission Signal Processing Data Storage Decision BIOMETRIC SYSTEM The hardware captures the salient human characteristic The software interprets the resulting data and determines acceptability. FINGER PRINT Oldest form of Biometrics Highly Reliable Uses distinctive features of fingers FINGER PRINT RECOGNITION Global features Local features STAGES Fingerprint Scanning Fingerprint Matching Identification IMAGE CAPTURE Optical Thermal Capacitance Ultra Sound IMAGE ACQUISITON BRIDGE CODE SPUR CODE PROCESS IRIS RECOGNITION Pattern recognition technique Identification by mathematical analysis of the random patterns. Based upon the qualities of the Iris Iris is a protected internal organ whose random texture is stable throughout life IRIS PROPERTIES High degree of Randomness No two Iris are alike Stable in a persons life Doesn't vary with changes IRIS SCAN Camera at close proximity Captures photograph Uses Infra red light to illuminate High resolution photograph IRIS SCAN IMAGE IRIS CODE Localization of inner and outer boundaries Pattern of 512 bytes Complete and Compact description More complete than features of DNA IRIS SYTEM IRIS RECOGNITION Database of millions of records Iris code generated is compared Searching algorithm based on Properties of Iris Order of a few seconds AVIATION – IRIS DEVICES BIOMETRIC PERFORMANCE FAR The FAR is the chance that someone other than you is granted access to your account. Low false acceptance rate is most important when security is the priority FRR The FRR is the probability that are not authenticated to access your account. A low FRR is required when convenience is the important factor FINGERPRINT PERFORMANCE FAR - As low as 1 in 1,000,00 FRR –around 4% IRIS PERFORMANCE FAR - As low as 1 in 1,000,000 FRR –around 2% APPLICATIONS Criminal identification Prison security ATM Aviation security Border crossing controls Database access |
|