28-07-2011, 09:51 AM
PRESENTED BY:
N.Prema chowdary
M.A.Deepthi
bio metrics1.DOC (Size: 489.5 KB / Downloads: 40)
Definition:
The statistical use of the characteristic variations in unique elements of living organisms is known as biometrics.
Why we need biometrics?
In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M’s, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face.
Biometrics-what is it?
Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving password’s and PIN numbers for various reasons:
(i) The person to be identified is required to be physically present at the point of identification.
(ii) Identification based on biometric techniques obviates the need to remember a password or carry a token. By replacing PIN’s, biometric techniques can potentially prevent unauthorized access to or fraudulent use of A.T.M‘s, Smart cards, computer networks.
(iii) PIN‘s passwords may be forgotten, and token based methods of identification like passwords and driver’s licenses may be forged, stolen or lost. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.
Design issues of biometric systems:
An important issue in designing a practical system is to determine how an individual is identified and are designed by keeping two characteristics in mind, they are:
Physical characteristics Personal traits
- Fingerprint, Handprint - Voice pattern
- Face - Handwriting
- Scent, Thermal image - Acoustic Signature
- Iris Pattern
• Depending on the context a biometric system can be either a verification(authentication) system or an identification system
Verification Vs Identification:
There are two different ways to resolve a person’s identity: verification and identification. Verification (Am I whom I claim I am?) involves confirming are denying a person’s claimed identity. In identification, one has to establish a person’s identity (Who am I?). Each one of these approaches has its own complexities and could probably be solved best by a certain biometric system.
Types of biometric devices and their services:
Now let’s see some of the biometric devices being widely used in many areas like computer/network security, government organizations, prisons…. They are:
Fingerprint identification.
Face recognition.
Iris recognition.
Hand geometry.
Signature recognition.
Retinal scanning
Voice verification….
And now let’s see some of these biometric devices, their services, advantages and disadvantages in detail.
Fingerprint recognition:
Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometric among the technology being used today. Fingerprints contain patterns of ridges and valleys as well as minutiae points. Minutiae points are local ridge characteristics that occur at either the ridge bifurcation or a ridge ending.
There are three methods for scanning finger prints: (1) Optical scanners,
(2) Thermal scanners and
(3) Capacitance (solid state) scanners
Currently, there are two accepted methods for extracting the fingerprint data
(I) Minutia-based and
(II) Correlation-based
“Minutia-based is the more microscopic of the two. This method locates the ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file.
The correlation-based method looks at the entire pattern of ridges and valleys in the fingerprint. The location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints.”
Once the scanning is complete, the analysis is done by a comparison of several features of the fingerprint know as minutia. Investigators are systems look at where the ridge lines end or where one ridge splits into two (bifurcation). The scanning system uses complicated algorithms to recognize and analyze the minutia. If two prints have three ridge endings, two bifurcations, and form the same shape with the same dimensions, then it is likely the same person’s fingerprints.
Advantages:
• High accuracy rate.
• Can perform 1-to-many comparisons.
• Inexpensive equipment.
• Easy to use (samples are easy to capture and maintain).
• Most established and oldest of the biometric technology.
Disadvantages:
• Actual finger scan images cannot be recreated from a template image
• Users relate fingerprint recognition to criminal activity.
N.Prema chowdary
M.A.Deepthi
bio metrics1.DOC (Size: 489.5 KB / Downloads: 40)
Definition:
The statistical use of the characteristic variations in unique elements of living organisms is known as biometrics.
Why we need biometrics?
In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M’s, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face.
Biometrics-what is it?
Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving password’s and PIN numbers for various reasons:
(i) The person to be identified is required to be physically present at the point of identification.
(ii) Identification based on biometric techniques obviates the need to remember a password or carry a token. By replacing PIN’s, biometric techniques can potentially prevent unauthorized access to or fraudulent use of A.T.M‘s, Smart cards, computer networks.
(iii) PIN‘s passwords may be forgotten, and token based methods of identification like passwords and driver’s licenses may be forged, stolen or lost. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.
Design issues of biometric systems:
An important issue in designing a practical system is to determine how an individual is identified and are designed by keeping two characteristics in mind, they are:
Physical characteristics Personal traits
- Fingerprint, Handprint - Voice pattern
- Face - Handwriting
- Scent, Thermal image - Acoustic Signature
- Iris Pattern
• Depending on the context a biometric system can be either a verification(authentication) system or an identification system
Verification Vs Identification:
There are two different ways to resolve a person’s identity: verification and identification. Verification (Am I whom I claim I am?) involves confirming are denying a person’s claimed identity. In identification, one has to establish a person’s identity (Who am I?). Each one of these approaches has its own complexities and could probably be solved best by a certain biometric system.
Types of biometric devices and their services:
Now let’s see some of the biometric devices being widely used in many areas like computer/network security, government organizations, prisons…. They are:
Fingerprint identification.
Face recognition.
Iris recognition.
Hand geometry.
Signature recognition.
Retinal scanning
Voice verification….
And now let’s see some of these biometric devices, their services, advantages and disadvantages in detail.
Fingerprint recognition:
Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometric among the technology being used today. Fingerprints contain patterns of ridges and valleys as well as minutiae points. Minutiae points are local ridge characteristics that occur at either the ridge bifurcation or a ridge ending.
There are three methods for scanning finger prints: (1) Optical scanners,
(2) Thermal scanners and
(3) Capacitance (solid state) scanners
Currently, there are two accepted methods for extracting the fingerprint data
(I) Minutia-based and
(II) Correlation-based
“Minutia-based is the more microscopic of the two. This method locates the ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file.
The correlation-based method looks at the entire pattern of ridges and valleys in the fingerprint. The location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints.”
Once the scanning is complete, the analysis is done by a comparison of several features of the fingerprint know as minutia. Investigators are systems look at where the ridge lines end or where one ridge splits into two (bifurcation). The scanning system uses complicated algorithms to recognize and analyze the minutia. If two prints have three ridge endings, two bifurcations, and form the same shape with the same dimensions, then it is likely the same person’s fingerprints.
Advantages:
• High accuracy rate.
• Can perform 1-to-many comparisons.
• Inexpensive equipment.
• Easy to use (samples are easy to capture and maintain).
• Most established and oldest of the biometric technology.
Disadvantages:
• Actual finger scan images cannot be recreated from a template image
• Users relate fingerprint recognition to criminal activity.