View
225
Download
0
Category
Preview:
Citation preview
7/29/2019 Bio Metrics Basic
1/12
BIOMETRICS AS A BOON TO TWENTY
FIRST CENTURY:
Biometrics (ancient Greek: bios life,
metric measure) refers to two
very different fields of study and
application. Biometrics is the
science and technology of
measuring and analyzing
biological data. In information
technology, biometrics refers to
technologies that measure and
analyze human body
characteristics, such as
fingerprints, eye retinas and
irises, voice patterns, facial
patterns and hand measurements,
for authentication purposes.
Biometrics History :
During the 14th century in the China a
reporter named,Barros wrote that
the Chinese merchants were
stamping children's palm prints
and footprints on paper with ink
so as to differentiate the young
children from one another. This is
one of the most primitive known
cases of biometrics in use and is
still being used today.
ETHICS OF BIOMETRICS:
Let me first of all explain the difference
between identification and
authentication. The identification
process entails matching a physiological
or behavioral characteristic of a person
to an established and pre-confirmed
record of that characteristic. For
example, matching the image of my face
to a photograph in a large number of
photos in a database. Searching, in
other words, to identify a person such
as the rogues gallery used by the police
department.
Authentication is done is through the
presentation of a "token" such as a
PIN, a card, or a biometric whose
validity is confirmed, and thereby
verifying one's eligibility to access a
particular service. There is no
searching and matching to a database,
only the validity of the token is
established, through a single one-to-one
match.
http://en.wikipedia.org/wiki/Greek_languagehttp://en.wikipedia.org/wiki/Greek_language7/29/2019 Bio Metrics Basic
2/12
The problem is that a biometric such as
a fingerprint can be used as a unique
surrogate of one's identity which, as a
unique identifier, can be used to trace
people's transactions and link massive
amounts of personal data about them.
If my fingerprints are stored in a
database, then my transactions,
whereabouts and personal information
can easily be tracked.
The issues with biometric systems:
There are two basic types of recognition
errors: the false accept rate (FAR)
and the false reject rate (FRR). A
False Accept is when a non
matching pair of biometric data is
wrongly accepted as a match by
the system. A False Reject is when
a matching pair of biometric data
is wrongly rejected by the system.
When you try to lower one of the
errors by varying the threshold,
the other error rate automatically
increases.
In a biometric authentication system,
the relative false accept and false
reject rates can be set by choosing
a particular operating point (i.e.,
a detection threshold). To provide
high security, biometric systems
operate at a low FAR instead of
the commonly recommended
equal error rate (EER) operating
point where FAR = FRR.
Biometric characteristics can be divided
in two main classes, as represented
as:
Physiological are related to the shape of
the body. Examples include, but
are not limited to fingerprint,face
recognition, hand and palm
geometry and iris recognition.
Behavioral are related to the behavior
of a person. Characteristic
implemented by using biometrics
http://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Iris_recognitionhttp://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Facial_recognition_systemhttp://en.wikipedia.org/wiki/Iris_recognition7/29/2019 Bio Metrics Basic
3/12
aresignature verification,
keystroke dynamics, and voice.
Physiological Biometrics:
Fingerprints: The patterns of friction
ridges and valleys on an
individual's fingertips are unique
to that individual
One of the most commercially available
biometric technologies users no
longer need to type passwords
instead, only a touch provides
instant access. Fingerprint
systems can also be used in
identification mode.
Face Recognition: The identification of
a person by their facial image can
be done in a number of different
ways such as by capturing an
image of the face in the visible
spectrum using anopticalcamera
or by using the infrared patterns
of facial heat emission.
Hand and Finger Geometry: These
methods of personal
authentication are well
established.
. To achieve personal authentication, a
system may measure either
physical characteristics of the
fingers or the hands. These
include length, width, thickness
and surface area of the hand.
http://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Keystroke_dynamicshttp://en.wikipedia.org/wiki/Speaker_recognitionhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Keystroke_dynamicshttp://en.wikipedia.org/wiki/Speaker_recognitionhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Visible_spectrumhttp://en.wikipedia.org/wiki/Opticalhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/Authentication7/29/2019 Bio Metrics Basic
4/12
Iris Recognition: This recognition
method uses the iris of the eye
which is the colored area that
surrounds the pupil. The iris
patterns are obtained through a
video-based image acquisition
system. The technology works
well in both verification and
identification modes (in systems
performing one-to-many searchesin a database).
Face Recognition : the analysis of facial
characteristics.
Fingerprint: the analysis of an
individuals unique fingerprints .
Hand geometry: the analysis of the
shape of the hand and the length
of the fingers .
Retina: the analysis of the capillary
vessels located at the back of the
eye.
Iris: the analysis of the colored ring that
surrounds the eyes pupil.
7/29/2019 Bio Metrics Basic
5/12
Keystroke dynamics( Typing Dynamics):
Is the detailed timing information
that describes exactly when each
key was depressed and when it
was released as a person is typing
at a computer keyboard.
Signature: the analysis of the way a
person signs his name.
Vein : the analysis of pattern of veins in
the back if the hand and the
wrist .
Voice : the analysis of the tone, pitch,
cadence and frequency of a
persons voice.
At Walt Disney World biometric
measurements are taken from the
fingers of guests to ensure that the
person's ticket is used by the same
person from day to day.
BIOMETRICS:
Offering greater independence and
privacy coupled with easy and fast
entry to legitimate personnel, our
cutting edge biometric systems
recognize individuals not only
from their fingerprints, but
alternative systems are based oniris and voice recognition readers.
http://en.wikipedia.org/wiki/Computer_keyboardhttp://en.wikipedia.org/wiki/Walt_Disney_Worldhttp://en.wikipedia.org/wiki/File:Biometrics.jpghttp://en.wikipedia.org/wiki/Computer_keyboardhttp://en.wikipedia.org/wiki/Walt_Disney_World7/29/2019 Bio Metrics Basic
6/12
DNA Identification technology:
Deoxyribonucleic acid (DNA)
Biometrics could be the most exact
form of identifying any given individual
.Every human being has its own
individual map for every cell made, andthis map, or blueprint as it more often
is called, can be found in every body
cell.
DNA can be collected from any number
of sources: blood, hair, finger nails,
mouth swabs, blood stains, saliva,
straws, and any number of other
sources that has been attached to the
body at some time. DNA matching has
become a popular use in criminal trials,
especially in proving rape cases The
main problems surrounding DNA
biometrics is that it is not a quick
process to identify someone by theirDNA.
DNA Biometrics is not a fool proof
method of identification. If forensic
scientists to not conduct a DNA test
properly, a persons identification code
can be skewed. Another problem is
matching prior DNA samples to new
samples; this is a bigger problem
Biometrics Fingerprint Technology :
1. Why we need
Fingerprints?
With increasingly urgent need for
reliable security, biometrics is being
spotlighted as the authentication
method for the next generation. Among
numerous biometric technologies,
fingerprint authentication has been in
use for the longest time and bears more
advantages than other biometric
technologies do.
2. History of the fingerprint:
7/29/2019 Bio Metrics Basic
7/12
But fingerprint identification
technology did not stop as a forensic
method only. Fingerprints are now
being used as a secure and effective
authentication method in numerous
fields, including financial, medical, e-
commerce and entrance control
applications. Modern applications of
fingerprint technology rely in large part
on the development of exceptionally
compact fingerprint sensors
3. Finger Identification
Process:
Fingerprint identification process
consists of two essential procedures:
enrollment and authentication.
Taking the following stepscompletes each procedure.
Step 1:Image Acquisition
The beginning of fingerprints goes back to as early as the a
times. According to historical findings, fingerprints were used on clay tab
business transactions in ancient Babylon. In China, thumb prints were fou
clay seals in the 19th century.
7/29/2019 Bio Metrics Basic
8/12
Real-time image acquisition method
is roughly classified into optical and
non-optical. Optical method relies
on the total reflection phenomenon
on the surface of glass or reinforced
plastic where the fingertip is in
contact. The sensor normally
consists of an optical lens and a
CCD module or CMOS image
sensor. In contrast, semiconductor
sensors, as a typical example of non-
optical sensors, exploit electrical
characteristics of a fingertip such as
capacitance.
Step 2.Feature Extraction
There are two main ways to compare
an input fingerprint image andregistered fingerprint data. One is to
compare an image with another image
directly. The other is to compare the so-
called 'features' extracted from each
fingerprint image.
The latter is called feature-
based/minutia-based matching..
Every finger has a unique pattern
formed by a flow of embossed lines
called ridges and hollow regions
between them called valleys.
As seen in the Picture 2 below, ridges
are represented as dark lines, while
valleys are bright.
Step 3.Matching
The matching step is classified into 1:1
and 1:N matching according to its
purpose and/or the number of reference
7/29/2019 Bio Metrics Basic
9/12
templates. 1:1 matching is also called
personal identification or verification.
It is a procedure in which a user claims
his/her identity by means of an ID and
proves it with a fingerprint.
The comparison occurs only once
between the input fingerprint image
and the selected one from the database
following the claim by the user.
:: Fingerprint Application
Markets for fingerprint technology
include entrance control and door-lock
applications, fingerprint identificationmouses, fingerprint mobile phones, and
many others.
3S Technologies-Bangalore:
3S Technologies- Bangalore - the
biometrics product Division of
Ability IT Services is a pioneering
solution provider for electronic
Security, Safety & Surveillance.
3S Technologies Bangalore - India
offer state-of-the-art security
systems to provide foolproof
security to facilities as well as the
computer networks,using
Biometrics and Smartcard
Technologies.
BARTRONICS:
Incorporated in 1990, Bartronics is a
Hyderabad based company that
started with providing solutions in
Bar Coding, one of the oldest
AIDC technologies, RFID, POS,
Smart Cards working as AIDC
division, RFID division, Smart
Card Division and Retail-IT
division in separate.
7/29/2019 Bio Metrics Basic
10/12
Our knowledge of products,
technologies, implementation
skills and understanding of the
market place make us a dominant
player in the domestic markets,
and help us share .
Biometrics Nutrition And Fitness:
Anyone who tells you that you can lose
weight in a healthy manner
without improved eating and
exercise regimens is out of touch
with the reality of dieting. These
two issues form the pillars of
healthy living and true weight
loss. Thats why a number of
programs have been developed in
order to help people gain
discipline in these areas. The
Biometrics program is designed tohelp people get their eating and
exercise habits in line through the
mediation of a personal or group
trainer. Here well take a closer
look at Biometrics to see what this
program might provide for the
average dieter.
ADVANTAGES / DISADVANTAGES OF
BIOMETRIC SYSTEMS:
Here are some of the advantages and
disadvantages of fully developed
biometric systems that are fairly
accurate:
Retinal scans (electronic scan of the
innermost layer of the eyeball's wall):
Advantages: ;Retina generally remains
stable through life, ensuring accuracy. -
Disadvantages: Requires close physical
contact MW scanning device; may not
be generally accepted by public.
Iris recognition (recording of iris using
standard video technology):
Advantages: Non-invasive procedure
(close physical contact not required).
Disadvantages: Relatively expensive;
requires large amount of computerstorage; may not be generally accepted
by public.
Hand geometry (three-dimensional
recording of length, width and height of
7/29/2019 Bio Metrics Basic
11/12
hand and fingers, using optical
scanner):
Advantages: User-friendly; requires
small amount of computer storage
space.
Disadvantages: Isn't as unique as other
biometric methods; hand injury can
cause recognition problems.
Voice verification or recognition
(acoustic signal of voice converted into
digital code):
Advantages: Works well over the
telephone.
Disadvantages: Requires large amount
of computer storage; people's voices
can change; background noises can
interfere.
Signature recognition (computer record
of pen/stylus speed, pressure, direction
and other characteristics of signature):
Advantages: People are used to
providing a signature.
Disadvantages: Poor long-term
reliability; accuracy difficult to ensure.
CURRENT USES OF BIOMETRICS:
MasterCard International Inc. and Visa
USA Inc., the world's two largest credit
card companies, have begun to study
the feasibility of using finger-scanning
devices at the point of sale to verify that
the card user is really the card holder.
The scanners would compare
fingerprints with biometric information
stored on a microchip embedded in the
credit card.
Walt Disney World in Orlando has
started taking hand scans of people who
purchase yearly passes. These visitors
now must pass through a scanner when
entering the park preventing them from
lending their passes to other people.
The Immigration and Naturalization
Service is letting a select group of
travelers bypass lengthy lines at New
York's John F. Kennedy International
Airport and Newark international
Airport by sticking their bands and
special cards the service has issued into
an automated turnstile.
Criminal Booking Systems:
7/29/2019 Bio Metrics Basic
12/12
Managing criminal identity begins at the
booking process.
Processing a subject under a wrong
name, or capturing low-quality
biometric data can stand in the way of
saving lives and preventing further
crime. Our booking solutions ensure
maximum accuracy of the arrest record
to verify that a subject is who s/he
claims to be, and that s/he can be
properly identified as s/he moves
through the criminal justice system.
FUTURE OF BIOMETRICS:
The future of this technology is just
starting to bloom. Many issues are
arising from this technology and
"PRIVACY" is the main concern. Even
if we are told that the government will
not use the data or release the data to
anyone, how can that be proven? It is
YOUR right as an individual and
person to protect your privacy about
yourself and the direction of this
technology seems to spell "D-I-S-A-S-T-
E-R" for everyone "PRIVACY.
Reference:www.biometrics.com
http://images.google.co.in/imgres?imgurl=http://i.ehow.com/images/GlobalPhoto/Articles/4609194/84704_Full.jpg&imgrefurl=http://www.ehow.com/how-does_4609194_criminal-record-check-work.html&usg=__BibMXAxdHPH7IfK8KEtcq03DnrI=&h=399&w=600&sz=39&hl=en&start=16&tbnid=4FCT7dIcvM4cbM:&tbnh=90&tbnw=135&prev=/images%3Fq%3Dcriminals%2Bfinger%2Bprints%26gbv%3D2%26ndsp%3D20%26hl%3Den%26sa%3DNRecommended