body computing using biometric systems

  • Upload
    12

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

  • 8/14/2019 body computing using biometric systems

    1/24

    and successfully confirmshis identification with his

    finger (biometric template).

  • 8/14/2019 body computing using biometric systems

    2/24

    What Is BIOMETRICS?Biometrics can be defined

    as the technique of studying the

    physical characteristics of a personsuch as fingerprints, handgeometry, eye structure etc. toestablish his or her identity. Thisscience is primarily implemented to

    identify individuals.Biometrics is a moderntechnological field that focuses onidentifying an individual through hisor her unique physical traits.Biometrics spans various fieldssuch as artificial intelligence andbiology, as well as varioushardware-related fields

  • 8/14/2019 body computing using biometric systems

    3/24

    Why BIOMETRICS?

    The use of biometrics is no longer restricted to defense establishmentsor sensitive areas. An increased need for security has prompted even everydayoffice goers to install fingerprint recognition devices to boot up their laptops,thumb drives and other daily use gadgets. The question is, why? Why isnt the16-digit password good enough? Simply because fingerprints are more secure.A password is breakableand anyone with basic knowledge of computers can

    crack passwords using the myriad free programmes available on the Internet.

    For obvious reasons, a fingerprint, however, is difficult to fake withoutthe help of the owner. It is also a lot more convenient to simply place your finger on to a scanner instead of remembering a long and complex series of

    characters and their cases. To make matters worse, they should, ideally, haveno correlation whatsoever. So essentially, for maximum security, your password should be an alphanumeric word that doesnt mean anything.

  • 8/14/2019 body computing using biometric systems

    4/24

    Fujitsus PalmSecure takes on the challengesfaced by many of the current biometric technologiesavailable today. The USP of being purely contactlessmakes PalmSecure an ideal choice for deploymentin various public programs and services and addressesthe concerns of public hygiene and convenience at amass scale and providing lower cost of operations and

    maintenance cost.

  • 8/14/2019 body computing using biometric systems

    5/24

    Biometrics can be separated into twoclassifications, physiological and behavioral. Physicalidentifiers do not change over time or with mood.Behavioral identifiers are generally considered lessconclusive because they are subject to such limitationsas illness, imitation, and mood changes. It is not somuch to see which one is better, but it is important to

    determine which type of security works best in a givenenvironment.

    Physiological classification includes:Behavioral classification includes:Fingerprints Voice AuthenticationHand Geometry Signature AnalysisEye PatternsFacial Recognition

  • 8/14/2019 body computing using biometric systems

    6/24

    How Biometric Processes WorkThe concept of Biometric verification is simple. The system has

    some pre-stored data. When youapproach the system (say a fingerprint

    scanner), your finger is scanned and matched with a record of fingerprints already in its database. Only when it finds a match, access isgranted. The concept might be simple, but the process is quite ingenious.A biometric system is a real-time identification system which identifies aperson by measuring a particular physical or behavioral characteristicand later comparing it to a library of characteristics belonging to manypeople.

    Fingerprint and other biometric devices consist of a reader or scanning device, software that converts the scanned information intodigital form, and wherever the data is to be analyzed, a database thatstores the biometric data for comparison with previous records. Whenconverting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithminto a value that can be compared with biometric data scanned when auser tries to gain access.

  • 8/14/2019 body computing using biometric systems

    7/24

    Verification and identification:Verification The system verifies the claimed identity of the user bycomparing his/her biometric sample with one specific reference template, whichis either physically presented by the user or pointed to in the database.Verification can be knowledge-based (e.g. PIN or password) or token-based(e.g. smart card). The user says, "I am X!" and the system reply with "yes, your are X!" or "no, you are not X!"

    Identification The system identifies the end user from his/her biometric

    sample by associating it with his/her particular reference template based on adatabase search among the reference templates of the entire enrolledpopulation. The user asks, "who am I?" and the system reply with "you are X!"or "you are not an authorized user".

  • 8/14/2019 body computing using biometric systems

    8/24

    MEASUREMENT PARAMETERS :>>Everything, which is under the sun, has a unit or a parameter to describe itscapability. Similarly we have units, to be precise the parameters that

    measure the capability of the type of biometric technique applied. These areFRR and FAR.FAR: - It stands for False Acceptance Rate, which means that

    the rate at which an imposter is accepted as a valid match.FRR: - It stands for False Rejection Rate, which means that

    the rate at which a legitimate match is denied to access .

    The following four-stage process illustrates the way biometric systemsoperate:

    1.Capture a physical or behavioral sample is capturedby the system during enrollment.

    2. Extraction unique data is extracted from the sampleand a template is created.

    3. Comparison the template is then compared with a newsample.

    4. Match/non-match the system then decides if the featuresextracted from the new sample are a

    match or a non-match.

  • 8/14/2019 body computing using biometric systems

    9/24

    Fingerprint Matching: Among all the biometric techniques, fingerprint-based identificationis the oldest method which has been successfully used in numerousapplications. Everyone is known to have unique, immutable

    fingerprints. A fingerprint is made of a series of ridges and furrowson the surface of the finger. The uniqueness of a fingerprint can bedetermined by the pattern of ridges and furrows as well as theminutiae points. Minutiae points are local ridge characteristics thatoccur at either a ridge bifurcation or a ridge ending.Fingerprint matching techniques can be placed into two categories:minutae-based and correlation based. Minutiae-based techniquesfirst find minutiae points and then map their relative placement onthe finger. However, there are some difficulties when using thisapproach. It is difficult to extract the minutiae points accuratelywhen the fingerprint is of low quality

    Fingerprint classification is a techniqueto assign a fingerprint into one of theseveral pre-specified types alreadyestablished in the literature which can

    provide an indexing mechanism.Fingerprint classification can be viewedas a coarse level matching of thefingerprints. An input fingerprint is firstmatched at a coarse level to one of thepre-specified types and then, at a finer

    level, it is compared to the subset of thedatabase containing that type of

  • 8/14/2019 body computing using biometric systems

    10/24

    AUTHENTICATION METHODS:

    Fingerprint .In recent years, fingerprints have rallied significant support

    as the biometric technology that will probably be most widely usedin the future. In addition to general security and access controlapplications, fingerprint verifiers are installed at military facilities,including the pentagon and government labs. Although machinestend to reject over 3% of authorized users, the false accept rate isless than one in a million. Today, the largest application of fingerprint technology is in automated fingerprint identificationsystems (afis) used by police forces throughout the U.S. and inover 30 foreign countries.

    Verification of fingerprints is also fast and reliable. Usersexperience fewer errors in matching when they use fingerprintsversus many other biometric methods. In addition, a fingerprint

    identification device can require very little space on a desktop orin a machine. Several companies have produced capture unitssmaller than a deck of cards.

    Security Level OverviewSecurity Level Overview

  • 8/14/2019 body computing using biometric systems

    11/24

    Access AuthorizationAccess Authorizationand Identity Managementand Identity Management

    through Fingerprintthrough Fingerprint

    Level ILevel ISECURITYSECURITY

    Level IILevel IILevel IIILevel III

    Security Level OverviewSecurity Level Overview

  • 8/14/2019 body computing using biometric systems

    12/24

    logon with bioLocklogon with bioLock

    bioLockbioLock

    Logon authorizedLogon blocked

    Logon bioLock checksauthentication rules

    bioLockuser/

    function

    bioLock prompts you for fingerprint

    Fingerprint comparison with table

    bioLocktemplates

    Our technology identifies unique points on your finger and creates an

    encrypted, digital template we never take an actual image of the finger!!!

    Please

    Note:

  • 8/14/2019 body computing using biometric systems

    13/24

    Humans have fingerprints for the exact same reason that tyres havetreads. It helps in better grip and, by a bizarre twist of nature,different people have entirely different sets of fingerprints, whichenables identification. A fingerprint is made up of ridges and valleys(lines and the gaps separating them) and it is these ridges and

    valleys which are scanned to verify the authenticity of a print. Toauthenticate a set of prints, a scanner needs to do two things: first,it needs to get the image of the prints which are to beauthenticated, and second, it needs to actually go about thebusiness of verifying them.

    The most commonly used method of scanning is opticalscanning. An optical scanner has a CCD sensor (Charge CoupledDevice) similar to the ones used in digital cameras. There is an arrayof light sensitive diodes (photosites). When these diodes come incontact with light, they generate an electrical signal. Everyphotosite records a pixel representing the light it came in contact

    with. An analogue to digital converter (ADC) system in the scannerprocesses the electrical signals to generate digital representationsof the image. It is not necessary that the same kind of light falls onall diodes. So what is generated is a mix of dark and light areas,which together make up the image. The process begins as soon asyou place your finger on the glass plate.

    The scanner has its own source of light (mostly an array of

  • 8/14/2019 body computing using biometric systems

    14/24

    Retinal ScanningDespite being shown as the absolute cutting edge, retinal

    scanning is actually rather old in the chronology of technologyinnovations and research on this started way back in the 1930s. For the retina to be scanned, the user looks through a small hole in thescanning device and focuses on a particular point for the time periodduring which, a low intensity light and a CCD analyse the layer of blood vessels at the back of the eye for matching patterns (akin tofingerprint checking) and validate or repudiate the persons identity.This technology is still not in the public domain (unlike fingerprintrecognition, which is) and is used only to secure highly sensitivesecurity areas. Unlike fingerprints, there is absolutely no knownmethod of replicating a persons retina and to use a dead personsretina is no good as it deteriorates too fast to be of any help.

  • 8/14/2019 body computing using biometric systems

    15/24

    Iris ScanIris Scan, though relating to the eye (like retinal scan)

    uses a completely different method of identification. The Irisis the coloured ring surrounding the pupil. The scananalyses the features that exist in this coloured tissue. Over 200 points can be used for comparison such as the rings,furrows and freckles. The scan is done with a regular

    camera and the subject stands about a foot from the lens (of the camera) so it is a lot more convenient. The Iris pattern ismuch more unique than a fingerprint. A statistical analysisputs the probability of two irises matching at 1 in 10 to the

    power 78 while the population of humans on earth is roughly7 billion that is 7 to the power 9.

  • 8/14/2019 body computing using biometric systems

    16/24

    Signature verification

    Signature verification enjoys a synergy withexisting processes that other biometrics do not as peopleare used to signatures as a means of transaction relatedidentity verification and mostly see nothing unusual inextending this to encompass biometrics. Signatureverification devices have proved to be reasonablyaccurate in operation and obviously lend themselves toapplications where the signature is an accepted identifier.

  • 8/14/2019 body computing using biometric systems

    17/24

    Facial RecognitionWhile fingerprinting and retinal scanning are relatively easy to

    administer, since the people going through the process are aware of it and areconsenting to subject themselves to these measures, the main application of facial recognition is in security wherein the software is expected to pick a face

    out of, say, thousands of passengers at the airport, and match it with a databaseof wanted criminals and positively state whether or not that face belongs to theguilty party.

    To make the computer recognise a face from a picture or a video feed isquite an achievement in itself, but a bigger achievement is to identify clearly if the face is that of the wanted man or not. If you look in the mirror, or at a

    persons face for that matter, you will notice that every face has certaincharacteristics and distinguishable features, which allow us to differentiatebetween two people. The equipment used here is not really too fancy or cuttingedge, and the brains for this lie entirely in the software. The software divides theface into 80 nodes, some of the common ones being distance between eyes,width of nose, and depth of eye sockets, cheekbones, jaw line, and chin. The

    system generally needs to match between 14-25 nodes in order to obtain apositive ID.

  • 8/14/2019 body computing using biometric systems

    18/24

    As suggested by thegraphic, distinctivecharacteristics of the entireface are highlighted for use

    in future authentication. Thevast majority of faces can bereconstructed by combiningfeatures of approximately100-125 eigenfaces. Uponenrollment, the subject'seigenface is mapped to a

    series of numbers(coefficients). For 1-to-1authentication, in which theimage is being used toverify a claimed identity,one's "live" template iscompared against theenrolled template todetermine coefficientvariation. The degree of variance from the template,of course, will determineacceptance or rejection. For

    1-to-many identification, thesame principle applies, but

    Facial Scan Technologies

  • 8/14/2019 body computing using biometric systems

    19/24

    Voice RecognitionLike fingerprints and face attributes, every person has aunique speech pattern. Voice recognition works by firststoring voice patterns and then using them as a databaseto authenticate a subject. Voice recognition is oftenconfused with speech recognition, which is a technologythat converts speech to text and the conversion softwareneeds to go through extensive training by the user beforeany suitable and acceptable results are obtained. Voicerecognition works by noting a persons voice (physicalcharacteristics of the vocal tract, the harmonic and theresonant frequencies) and converts it into an audio file

    which is known as a voice print. During the creation of avoice print, the subject is asked to choose a phrase andasked to repeat it. The phrase should be 1 to 1.5 secondsin length since a smaller phrase provides the system withtoo little data, and beyond that, too much data. Both of

    these conditions result in reduced accuracy. The problemwith voice recognition does not lie in its integrity since

  • 8/14/2019 body computing using biometric systems

    20/24

    DNA samples can be taken from the body if the subject or hispersonal belongings are passed through chemical processes. This DNAfingerprint is in the form of a sequence of As, Ts, Gs, Us and Cs inrandom order. These alphabets refer to the nitrogenous bases. Here Astands for Adenine, T stands for Thymine, G stands for Guanine, Ustands for Uracil and C stands for Cytosine. The length of thissequence is immense and beyond comprehension!

    DNA matching has advantages over other means of biometricverification. DNA samples can be collected in many more forms thanblood samples, retina scans or fingerprints. Even the personalbelongings of people like hairbrushes, toothbrushes or clothes carry their DNA from phenomenon like natural skin flaking. So it becomes close toimpossible for an imposter to fake a DNA sample or avoid leaving a trace

    at a crime scene. Microsoft has recently declared that they will introducebiometrics in their coming versions of windows operating system. Well,nothing wrong with that buy hope that they dont use DNA fingerprintingbecause if that is the case then if you want to start your PC on Saturdaythan you either you have to switch on your PC either on Wednesday or on

    Tuesday. Present day technology still takes more than couple of days for DNA verification.

    DNA (Deoxyribo Nucleic Acid)

    A idl d h ill i S i d A

  • 8/14/2019 body computing using biometric systems

    21/24

    As we rapidly move towards the new millennium, Security and AccessControl are becoming more important than ever before.

    Passwords, though still extensively used, are fast becoming a hazard,requiring an enhanced method of security.

    Positive Identification of individuals is now a serious business

    considering the fact that people have to be allowed access to areas only if theyare authorized.Attendance is to be recorded in all kinds of workplaces eliminating buddy

    Punching and ghost workers.Money is to paid over wires - the internet obviating the need for people

    to go to banks.

    Criminals have to be caught and proven guilty without a doubt social andmedical benefits have to be paid by the state.

    Newer chip designs and supporting software, has spurred thedevelopment of solutions based on these crucial needs beyond boundaries.

    Parts of the human body - the hand, the iris/retina, the face and the voice,all provide a means of positive verification. Commendable progress has been

    made by various companies using the above parts of the human body withvarious levels of success.

    Although Card Based systems have been in the market for several yearsnow, the latest and most secure technology involves the use of the human body -both physical and behavioral - for positive verification and identification - knownas Biometrics.

  • 8/14/2019 body computing using biometric systems

    22/24

    Biometrics in Public Contactless Biometrics the most viable option

    Future Applications(Some Common Ideas)With the increased use of computers as vehicles of information technology, it

    is necessary to restrict access to sensitive/personal data. By replacing PINs,biometric techniques can potentially prevent unauthorized access to orfraudulent use of ATMs, cellular phones, smart cards, desktop PCs,workstations, and computer networks. PINs and passwords may be forgotten,and token-based methods of identification like passports and driver'slicenses may be forged, stolen, or lost. Thus biometric systems of identification are enjoying a renewed interest.

    There are many views concerning potential biometric applications, somepopular examples being ATM machine use - Most of the leading banks are considering usingbiometrics for ATM machine and as a general means of combating card fraud.Workstation and network accessPublic identity cardsInternet transactionsTelephone transactionsGunlock - A miniature electronic fingerprint capture and verification device isbeing developed. When built into the authorized user of the gun would beable to fire it.Elections - This technology can also be integrated with voting procedure sothat, the cases of fraud or bogus voting is reduced to minimal .

    Automated Border Control - This idea is covered in airport security and isvery similar to that. This technology can also be implemented in railways.

  • 8/14/2019 body computing using biometric systems

    23/24

    Conclusion:

    The increased need of privacy and security in our daily life has given birth to this new area of science.These devices are here and are present around useverywhere in the society and are here to stay for a

    long time to come. Indeed, it will be interesting towatch the future impact that they will have on our day-to-day lives ...Biometrics is a very interesting and exciting field that

    has been growing exponentially in recent years(especially 2008). The wide variety of physicallyunique traits of our bodies will soon allow us to live ina very secure password-less world.

  • 8/14/2019 body computing using biometric systems

    24/24