Seminar Report On Bio Metrics

Embed Size (px)

Citation preview

  • 8/7/2019 Seminar Report On Bio Metrics

    1/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 1

    Guided By Submitted By

  • 8/7/2019 Seminar Report On Bio Metrics

    2/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 2

    ABSTRACT:-

    Bio-metrics is modern security system. It uses a persons biological features to giveaccess rights. The biological features like finger print, voice print, iris pattern, face print,

    signature(dynamic), retina, hand geometry, ear form , DNA, odor, keyboard stroke,finger geometry, vein structure of back of hand etc. are used. So, in this anyunauthorized person cannot trap the information or assets. Today, to prevent illegal

    operations this technique is widely used. It is a user- friendly technique, which isaccepted by almost all fields.

    The problem of the personal identification has become a great matter in todays world.Biometrics, which means biological features based identity recognition, has provided aconvenient and reliable solution to this problem. This recognition technology is relatively

    new with many significant advantages, such as speed, accuracy, hardware, simplicity and

    applicability

    Biometrics is a means of identifying a person by measuring a particular physical or

    behavioral characteristic and later comparing it to a library of characteristics belonging

    to many people. Biometric systems have two advantages over traditional ID methods.

    First, the person to be identified does not have to present anything but himself. Second,

    the critical variable for identification cannot be lost or forged. Retinal identification is

    the most accurate of the biometric methods used at this time. It will replace traditional

    ID methods such as P.I.N. numbers for accessing A.T.M.s and virtually every other

    electronic device used for conducting business where identification is a requirement

    and prerequisite.

    After the arrival of IT(Information Technology) this technique is used along withcomputer and this embedding gives the perfect result.

  • 8/7/2019 Seminar Report On Bio Metrics

    3/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 3

    Contents:- page-no:-

    1) Brief on Security System 1

    2) Introduction to Bio-metrics 2

    3) A Few Defination 3

    4) History of Bio-metrics 4

    5) International Bio-metrics society 55.1 Purpose

    5.2 Journal5.3 Meetings

    5.4 Biometrics Bulletin

    6) Generic model of bio-metrics 66.1 Data Acquisition:-6.2 Transmission: -

    6.3 Signal Processing:-6.4 Decision Making:-

    6.5 Data Storage:-

    7) Phases of Bio-metrics 87.1 Input7.2 Process7.3 Output

    8) Bio-metrics Identification 108.1 Voice Print8.2 Finger Print8.3 Iris Pattern

    8.4 Face Print

    8.5 Hand Geometry8.6 Retinal Scan8.7 Keystroke Dynamics

    8.8 Facial Recognition8.9 Signature Recognition

  • 8/7/2019 Seminar Report On Bio Metrics

    4/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 4

    9) Captured Using Web Cam and Microphone 19

    10)Comparision of Bio-metrics technique 2010.1 Uniqueness of biometric features

    11)How well do Bio-metrics works? 2311.1 False Accept Rates11.2 False Reject Rates

    11.3 Equal Error Rates11.4 Validity of Test Data

    12) Is DNA Bio-metrics ? 25

    12)About Bio-metrics 26

    13.1 Will Bio-metrics solve all security concerns ?13.2 Which is the best identification technique ?

    13.3 Is Bio-metrics more secure then password ?13.4 Applications13.5 New Opportunities

    13.6 Future Technology13.7 Benefits

    15) Conclusion 30

    16) Reference 31

  • 8/7/2019 Seminar Report On Bio Metrics

    5/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 5

    1. WHAT SECURITY ? WHY SECURITY ?

    From the beginning of the human culture, people are always trying to secure their

    properties. Because some people are always eager to snatch others properties.

    Security refers to prohibit some unauthorized persons from some important dataor from some precious assets.

    To restrict this kind of theft human beings are making special systems that canprevent the thieves such systems are known as security systems.

    We can consider the starting of these kinds of systems through lock and key.

    A Frenchman Alexander Fish has made a strong, fire proof safe in 1844. AndLinas Yel an American, has invented a Pin lock kind of lock. Both these

    equipments are used to provide security to money, important documents andjewellary. So this is the first step in the world of security system.

    At that point of time this arrangement for security was considered the best. But astime passes it was found that any unauthorized person could access these through

    duplicate keys or using any technique. So as the world progresses, the thievesbecome more intelligent to break the security.

    Thus, we always need a new and strong security system to protect our assets.

    So, security system is ever developing field.

    Today in the world of e-commerce and Internet this thing is becoming more and

    more important because today the world is like village, from anywhere, any time,any body can harm you.

    e.g. :-If you are purchasing something from web and because oflack of security someone come to know your bank account

    number. Then that person will have all the information of your bankaccount, which can perhaps put you in a big trouble!

    Now a days, there are many security systems are available. But we shall

    concentrate on BIO-METRICS.

  • 8/7/2019 Seminar Report On Bio Metrics

    6/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 6

    2. INTRODUCTION

    BIO=Pertaining to biology; MATRICS=Science and art of measurement.

    o The term 'biometrics' is used to refer to any and all of a variety of

    identification techniques which are based on some physical and difficult-to-alienate characteristic.

    o Today, the science of biometric technology refers to the "automated"methods used to recognize a person based upon physiological orbehavioral characteristics.

    o Biometric technologies are becoming the foundation of an extensive arrayof highly secure identification and personal verification solutions.

    Biometrics is a modern technological field that focuses on identifying an

    individual through his or her unique physical traits.

    A biometric is a measurable, physical characteristic or personal behavioral trait

    used to recognize the identity or verify the claimed identity of an enrolled user.

    Biometrics is automated methods of recognizing a person based on aphysiological or behavioral characteristic.

    Physiological techniques include fingerprint recognition, retinal and irisscanning, facial recognition, hand and finger geometry and DNA analysis.

    Behavioral techniques include handwriting recognition, voice or speech

    recognition, gait, and keystroke dynamics.

    In all automated systems, the fundamental operational steps are:1. Capture: The biometric data is captured, digitized and entered into a database.

    2. Extraction: A template is created using this measurable unique data.3. Comparison: The template is compared with a new sample.4. Match/Non-Match: The existing template matches the new sample or it does not.

    The goal of most automated biometric ID systems is one of two outcomes:1. Verification: Is the person who the they claim to be?2. Identification or recognition: Who is this? Is the person already known to the system

    under a different identity?

    Only biometrics can identify you as you [Not Password].

  • 8/7/2019 Seminar Report On Bio Metrics

    7/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 7

    3. A FEW DEFINATION

    Biometrics Authentication

    Person authentication or simply authentication is a task of confirming or denyinga persons claimed identity. Biometrics is a measurement using a persons behavioural or

    physiological characteristics. Examples of these characteristics are fingerprints, face,voice and signature. Biometric authentication is a task of confirming or denying apersons claimed identity using his behavioural or physiological characteristics.

    Biometrics, Biometric or Biometry

    Biometry refers to a much broader field involving application from statistics tobiology and medicine. Biometrics is a noun and biometric is an adjective.

    Note the distinction between the terms biometrics and biometry. Biometry refers to amuch broader field involving application from statistics to biology and medicine.

    Biometrics is a noun and biometric is an adjective.

    Authentication versus Identification

    According to [Jain, 1999], associating an identity with an individual is calledpersonal identification. This problem can be categorised into: (i) authentication and (ii)

    identification. Authentication refers to the problem ofconfirming or denying a personsclaimed identity while identification refers to the problem of establishing a subjectsidentity. The differences between identification and authentication can be summarised in

    Table A.1.

    Table A.1 Identification versus authentication

    Identification Authentication

    It determines the identity of the person. It determines whether the person is indeed

    who he claims to be.

    There is no identity claim from the user.

    The system has to search through its recordto find the identity. This search is called amany-to-one mapping. The cost of

    computation in the identification taskincreases in proportion to the number of

    record of users.

    The user makes an identity claim. By using

    the claim as a key, the system searches theusers record to compare. It is a one to onemapping. The system uses the identity as a

    key to call for the identitys record. Thecost of computation is not dependant on

    the number of record of users.

    It is often assumed that a capturedbiometric signature comes from a set of

    known biometric feature stored in thesystem. This is referred to as closed-set

    identification.

    The captured biometric signature comesfrom a large set of unknown users. This is

    referred to as open-set verification.

  • 8/7/2019 Seminar Report On Bio Metrics

    8/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 8

    4. HISTORY OF BIO-METRICS

    Francis Galton is one of the founders of Bio- metrics. In 1892, Galton

    invented the first system of fingerprinting.

    He has observed that No two persons have same finger print. Each andevery person has got a unique finger print pattern.

    In 1968, Bio-metrics technique was implemented successfully when well-known bankof New York has arranged the finger print scanning to access the currency walt , firs

    time in the world.

    But after 1990, when IT (Information Technology) comes into the picture, through its

    advancement and simplicity Bio-metrics technique becomes very popular.

    This new technology is very easy to understand compare to its heavy label.Because of user-friendly environment this technique is very well welcomed byvarious fields.

  • 8/7/2019 Seminar Report On Bio Metrics

    9/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 9

    5. THE INTERNATIONAL BIO-METRICS SOCIETY

    The International Biometric Society, founded in 1947, is an internationalorganization for the advancement of the subject-matter sciences through the developmentof quantitative theorgies and the development, application, and dissemination of effective

    mathematical and statistical techniques.

    5.1Purpose

    To this end, it welcomes to membership biologists, statisticians, and othersinterested in applying statistical techniques to research data. The InternationalBiometric Society and its journal, Biometrics, serve as an invaluable means of

    communication between the subject-matter specialists and the statisticians.

    5.2Journal

    Biometrics is published quarterly. Its general objectives are to promote and extendthe use of mathematical and statistica l methods in the various subject- matter

    disciplines, by describing and exemplifying developments in these methods andtheir application in a form readily assimilable by experimenters and those

    concerned primarily with analysis of data. The journal is a ready medium forpublication of papers by both the experimentalist and the statistician. The papersin the journal include statistical, authoritative expository or review articles, and

    analytical or methodological papers contributing to the planning or analysis ofexperiments and surveys, or the interpretation of data. Many of the papers in

    Biometricscontain actual worked examples of the statistical analyses proposed.

    5.3MeetingsEncouragment is given the subject-matter experimenter by holding symposia

    dealing with applied statistics as a part of annual meetings of the biological,

    chemical, engineering, and physical science societies. Such symposia afford anopportunity for subject-matter specialists and statisticians to discuss problems of

    mutual interest. At Regional meetings of the Society, a member is afforded anopportunity to present technical papers. This permits the exchange of ideas andinformation through formal presentation and informal contacts with fellow

    statisticians and experimentalists.

    5.4 Biometric BulletinThe International Biometric Society also publishes an informal newsletter

    containing news about membership activities, letters to the editor, and membershipand editorial commentaries. It is a means for expressing ideas on a wide range of

    statistical and biometrical matters and is also published quarterly.

  • 8/7/2019 Seminar Report On Bio Metrics

    10/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 10

    6. GENERIC MODEL OF BIO-METRICS

    6.1 Data Acquisition:-

    Data collection involves use of sensors to detect & measure an individuals

    physiological or behavioral characteristics. The biometric feature must have thefollowing characteristics:-(a)Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of

    characteristic,

    (c) Permanence, the characteristic should be invariant with time,(d) Measurability, the characteristic can be quantified that is the origin of theCameras used in biometric systems are generally either CCD(charge couple device) or

    CMOS(combined metal oxide semiconductor) image sensors.CCDs are comparativelymore costlier than CMOS. The cost of CCD is nearly 2500 Rs. And CMOS is about 800

    to 1000 Rs. Price depends on the resolution which reflects the accuracy of biometricsystem.

  • 8/7/2019 Seminar Report On Bio Metrics

    11/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 11

    6.2 Transmission: -Not all the biometric systems process and store data on the measuring device.

    Often measurement is made using relatively simple device to a computer or server forprocessing and/or storage. Depending on the system, the data may be relatively large

    and thus would need to be compressed for quick transfer. The compression algorithm

    needs to be selected carefully; otherwise it may introduce some artefacts that couldimpact the decision process.

    In any image scanning Biometric system, JPEG compression is preferred due tothe blockness it produces at high compression ratios. The data can also be transmitted

    to the database for storage as raw data.

    6.3 Signal Processing:-The signal processing unit uses features extraction algorithms to extract true

    biometric information from the sample in presence of noise introduced during datacollection and transmission. Additional measurements are made if any flaw orcorruption is noted, to ensure good quality.

    Pattern matching involves comparing the feature sample to a stored sample.(The b iometric data can be stored locally on the biometric data can be stored locally on

    the biometric device, some central database/server, or on a smart card issued to users.)The result of the comparison is sent to the decision system to determine the match.

    6.4 Decision Making:-The final step is the decision to accept or reject user, and is based on a security

    threshold. The threshold value is either a parameter of comparison process itself, or thesystem compares the resulting match value with the threshold value. If for example, ina system performing identity verification, the match value is equal to or higher than the

    threshold value, the user is accepted. In an identification system, acceptance might

    require a match value that is both higher than threshold value and higher than thesecond-best match by a specific amount.

    6.5 Data Storage:-After extracting the biometric features, the system stores and maintains the new

    master template. Choosing proper discriminating characteristics for categorizing

    records can facilitate future searches. The system stores the templates in one of fourlocations: a card, a servers central database, a workstation, or an authen ticationterminal. If privacy is a concern, a card is the only choice because sensitive biometric

    data should not be stored (and potentially misused) in a central database.

  • 8/7/2019 Seminar Report On Bio Metrics

    12/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 12

    7. PHASE OF BIO-METRICS

    7.1 Input

    Using appropriate input device it will collect the data of the persons

    biological features. These features are known as the master key forthe computer.

    Let us put in a simple manner.

    For recording and converting biometric traits to usable computer data, one needs an

    appropriate sensor (see table). Of course, costs can greatly vary for different sensors.However, we can't forget that many technical devices already have sensors built in, andtherefore, offer possibilities to measure biometric features nearly free of cost.

    Biometric Trait Sensor

    Fingerprint (Minutia) capacitive, optic, thermal, acoustic, pressuresensitive

    Signature (dynamic) Tablet

    Facial Structure CameraIris pattern Camera

    Retina CameraHand geometry CameraFinger geometry Camera

    Vein structure of the back of theHand

    Camera

    Ear form Camera

    Voice (Timbre) MicrophoneDNA Chemical Lab

    Odor Chemical sensorsKeyboard Strokes Keyboard

    Comparison: Password Keyboard

    7.2 Process

    Processes the input data. Here, computer takes the measurement of inputedBiological features.

    No two persons have same finger print. So, computer joins the points of that fingerprint features and make the pattern of it and it will store that pattern into its memory

    Then computer compares this pattern against the master keys.

    e.g.: - Putting the tracing paper on Indian map, if we join Banglor,Chennai, Delhi, Hyderabad, Mumbai, Nagpur, Ahmedabad, Jaipur andLukhnow drawing a line then by chance the original map is lost. Now

  • 8/7/2019 Seminar Report On Bio Metrics

    13/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 13

    if we want to know the distance between Ahmedabad and Bhavnagarfor that we require the original one, which is drawn with the same

    measurement. But In this case, actual map is lost so we are helpless.Similarly, the finger print used by the computer to make its pattern is

    deliberately hidden. Thus, the security system does not allow any

    unauthorized person.

    7.3 Output

    Testing of processed data and give the access rights to the person. Here,When any person scanned his/her finger print , computer willstore a Bio-logical featured pattern and compares it against the stored master-

    key in its memory. And if it is matched, then permission granted else not.

  • 8/7/2019 Seminar Report On Bio Metrics

    14/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 14

    8.BIO-METRICS IDENTIFICATION

    CONVENTIONAL METHODS OF BIOMETRIC IDENTIFICATION ARE.1 VOICE PRINT

    2 FINGER PRINT

    3 IRIS PATTERN4 FACE PRINT5 HAND GEOMETRY6 RETINAL SCAN

    7 KEYSTROKE DYNAMICS8 FACIAL RECOGNITION

    9 SIGNATURE RECOGNITION

    8.1 VOICE PRINT: -

    In this world of bio-metrics the first invention is of voice print.

    Voice recognition is very different to speech recognition. Speechrecognition detect words and sentences from an incoming audio signalwhereas voice recognition tries to detect the speaker given a voice

    sample.

    Here voice is recorded by microphones.

    But as each & every person has got different voice pattern thats why

    no two voice prints are matched.

    Voice print is determined by many different factors: size of the vocalcavities (throat, oral, nasal) as well as the characteristics of the vocalchords themselves.

    Your voice is further modified by the way you speak - the way your

    mouth, lips, tongue, jaw and teeth move (these are called articulators).Therefore, the chances of two people have the same vocalcharacteristics are minute.

    But this technique is not 100% authentic because of the followingreasons.

    Each and every persons voice changes as per the mood.

    All microphones, which are used to fetch the voice, may notwork properly.

    During the recording of voice if there is any background soundor noise then it will not be able to give perfect result.

  • 8/7/2019 Seminar Report On Bio Metrics

    15/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 15

    The computer converts the voice pattern into 0 & 1.After taking the

    input that input is also converted into 0 & 1.If the both code matchesthe person is authorized.

    8.2 FINGER PRINT: -

    In this technique, no two persons have the same

    finger print, Francis Galton proves this after a long observation in1892.

    No ID Card is as best as finger print because the possibility ofmatching two persons finger print is 0%.

    Finger print is also called finger scanning.

    To scan the finger print, a special kind of scanner that can work withoptical rays is used.

    When a person put his/her finger on the transparent glass of scanner,CCD chip scans the biological features of finger.

    It fetches the diagram of finger print & delivers it to the computerwhere a special programme measures the distance between the specialfeatures & that print.

    Here, those special features are core, split, island, end & delta.

    The new sophisticated software of bio metrics scans the finger as wellas palm.

  • 8/7/2019 Seminar Report On Bio Metrics

    16/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 16

    In this case, it takes the 90 types of measurement of palm & matches

    that new digits against the stored digits in the computers memory aswell as finger print is matched & then it gives the access rights.

    Hand technology is similar but surprisingly uses smaller amountinformation. Hand technology is also susceptible to injuries to hand

    and can be fairly expensive to install.

    Most fingerprint data takes up around 250Kb.

    Fingerprinting is a widely used and accepted technology with very

    good accuracy rates.

    Thus this technique is more authentic than the voice print.

    The computer converts the finger pattern into 0 & 1.After taking theinput that input is also converted into 0 & 1.If the both code matchesthe person is authorized.

    8.3 PATTERN OF IRIS: -

    an iris has a mesh-like texture to it, with numerous overlays

    and patterns. The iris is located behind the cornea of the eye, but infront of the lens. Its only physiological purpose is to control theamount of light that enters the eye through the pupil, but its

    construction from elastic connective tissue gives it a complex,fibrillous pattern.

    Iris recognition is the epitome of biometric identification - the

  • 8/7/2019 Seminar Report On Bio Metrics

    17/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 17

    entire planet could be enrolled into an iris database and there would

    still be a minute chance of false identification or rejection. In fingerprint technique there are only 90 special features, but in iris pattern

    there are 266 special features.

    In 1998, Dr. John Daugman. -inventor of Cambridge University of

    Britain has compared the approx 3,00,00,000 the iris but he couldntfind at least one similarity.

    In this technique CCD camera, which looks like small camcorders,

    scans the eyes iris pattern.

    The iris pattern of a persons left and right eyes are different.

    Here, CCD scan either left or right eyes iris pattern.

    After scanning that pattern is delivered to the computers processingunit.

    Computer only considers the data of iris and removes other data andanalyzes the total 266 features and assigns a particular value to each

    feature.

    The pattern of iris is converted into the total 4,096 bits of 0 & 1.

    Then computer compares the new data of 0 & 1 to the iris print stored

    as master key and if it is matches then gives the access rights. Iris has stable and distinctive features for personal identification. That

    is because every iris has fine and unique patterns and does not change

  • 8/7/2019 Seminar Report On Bio Metrics

    18/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 18

    over time since two or three years after the birth, so it might be calledas a kind of optical finger print

    The Iris Code is so specialized that the chances of two irises havingthe same code are 1 in 1052 !

    SOME CURRENT AND FUTURE APPLICATIONS OF IRISRECOGNITION :

    Secure accesses to bank cash machine accounts:The banks of United, Diebold and Sensar have applied it. After

    enrolling once (a 30 second process), the customers need only

    approach the ATM, follow the instruction to look at the camera, and berecognized within 2-4 seconds. The ultimate aim is to provide safe and

    secure transactions.

    Ticket less, document-free air travel:Passengers and airline employees will store digital images oftheir irises on a database. After the image of your iris is on the file, a

    video camera will be able to instantly verify your identity and clearyou to board the aircraft.

    Computer login: the iris an living password.

    National border controls: the iris as a living passport.

    Premises access control (homes, office, laboratory).

    Credit card authentication.

    Secure financial transactions.

    Internet security.

    8.4 FACE PRINT: -

    Facial biometrics use various features of the face to recognize or verify a

    user.

    Fourth type of biometrics identification is of face print.

    To capture face print of any person special kind of camera is used.

    This vide camera delivers the capture image to compute

  • 8/7/2019 Seminar Report On Bio Metrics

    19/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 19

    Computer make a pattern of that image using a software .

    To make this pattern it will use approx 50 features of face like the distancebetween two eyes, breath of nose, cheeks, area of forehead, jaws etc.

    These features are converted into digital form.

    Though it is not necessary that a high tech and sophisticated softwareidentify proper person.

    The computer converts the face pattern into 0 & 1.After taking the inputthat input is also converted into 0 & 1.If the both code matches the person

    is authorized.

    Here are some possibilities.

    To create a pattern ofa persons face, the face of the person mustbe within the range of 35 degrees. A camera cannot recognize a person wearing goggles.

    e.g.: During a testing at Palm Beach, America, the camera hasrecognized simultaneously two persons as culprit. The face of one

    of them is really stored into the computer software as culprit. Forthat person Bio-metrics technology has been proved 100% true.

    While according to plan other person is eating a Jellybeans candyand he acts as if he is blowing. By doing this face was lookingquite similar to the first one. So, camera recognizes him as a culprit

    by ringing an alarm.

    Because of continuous movement of head camera cannot recognizethe face.

    In short, in compare to finger print and iris pattern - face print isless authentic. In some circumstances this is very useful like whenwe caught the culprit and make him/her to stand against the

    camera.

    A software FaceIt can compare 6,00,00,000 photos against theface/minute.

    In this process there is no chance of any error. But we cannot relayon it completely. Because of Bio-metrics the human body is

    serving s mobile lock and key.

  • 8/7/2019 Seminar Report On Bio Metrics

    20/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 20

    8.5 Hand Geometry: -

    Hand geometry is by far the most widely usedbiometric system. The ID3D Hand key system fromRecognition Systems, Inc. is the most popular.

    Various methods are used to measure the hand; thesemethods generally fall into one of two categories :

    1. Mechanical

    2. Image-edge detectionEither method produces estimates of certain person.

    Key measurements of the hand (length of fingers and thumb,widths, etc.); this data are used to "categorize" a person.

  • 8/7/2019 Seminar Report On Bio Metrics

    21/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 21

    It works as follows:The user first enters a PIN number on a keypad, and then

    positions their hand on a plate using a set of guidance pins whichensures that the hand will be in generally the same position for every

    measurement. Then a digital camera mounted above the plate, with

    the aid of a mirror, takes a picture of the top and side views of thehand. The dimensions of the hand, such as finger length, width and

    area, are extrapolated from the image and the magnification of thecamera. This system, however, is subject to an attack using a fake

    hand modeled after that of an authorized user.

    8.6 Retinal Scan: -

    Retinal Scan technology is based on the blood vessel pattern in the retina of the

    eye. A retinal scan can produce almost the same volume of data as a fingerprint imageanalysis.It works as follows:

    The user positions their head against a support, and a low power infrared light isdirected against the back of the retina. The image of the pattern of veins is reflected back

    to a camera.

    8.7 Keystroke Dynamics: -

    This method analyzes the way in which a user types at a computer keyboard. The

    input is monitored thousands of times a second, and the durations of keystrokes and thelatencies between them are recorded.

    The goal for keyboard dynamics is continual authentication of the user while at acomputer; so that if an intruder user had access to the users session while they were

    away, the machine would eventually be able to recognize the discrepancy. Even thoughtyping patterns are behavioral characteristics, they are very hard to mimic.

  • 8/7/2019 Seminar Report On Bio Metrics

    22/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 22

    8.8 Facial Recognition: -

    Facial recognition technology has recently developed into two areas of study:

    1. Facial metrics

    2. Eigenfaces.

    Facial metrics technology relies on the measurement of specific facial features

    (e.g., the distance between the inside corners of the eyes, the distance between the outsidecorners of the eyes and the outside corners of the mouth, etc.) and the relationship

    between these measurements. Within the past two years, an investigation has been madeinto categorizing faces according to the degree of fit with a set of "eigenfaces". It has

    been postulated that every face can be assigned a "degree of fit" to each of 150eigenfaces; further, only the template eigenfaces with the 40 highest "degree of fit" scoresare necessary to reconstruct a face with over 99% accuracy. The difference between the

    eigenface method of facial categorization and the police artist method of building a facefrom template parts is that the eigenface method is based upon an actual photo of theindividual and the "eigenface" information is derived from a computer-based analysis of

    the digital image of the photo. Eigenfaces are (reportedly) highly repeatable and are notaffected by human subjectivity. Eigenface technology has some promise, but it is a

    technique that is just in the infancy stage of development. Very little data regardingeigenface error rates (false negative, false positive) exists at this point.

    8.9 Signature Recognition: -Signature recognition is based on the dynamics of making the signature, i.e.,

    acceleration rates, directions, pressure, stroke length, etc., rather than a direct comparisonof the signature after it has been written. The problems with signature recognition lie

    in the means of obtaining the measurements used in the recognition process and therepeatability of the signature. The instrumentation cannot consistently measure the

    dynamics of the signature. Also, a person does not make a signature in a fixed manner;therefore, the data obtained from any one signature from an individual has to allow for arange of possibilities. Signature recognition has the same problem with match

    discrimination (i.e., finding a match in a large database) as does hand geometry.

  • 8/7/2019 Seminar Report On Bio Metrics

    23/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 23

    9.Biometrics Captured Using Web Cam and Microphone

    Figure 1 is made up of images of 320240 pixels. Figure 1(a) is the typicalupright front image that we captured before processing it. At 50mm, the shortest depth-

    of-field, we can capture eye at a resolution of 320240, as shown in Figure 1(b). By

    visual judgement, this is quite promising for the authentication purpose, when lightingand reflection can be controlled. Since all eyes are round, colour analysis becomes an

    important property for extraction.

    (a) (b)

    (c) (d) (e)

    Figure 1 : Biometrics captured by the WebCam in this project

    Figure 1(c) shows an ear. An ear has more structure thus creates different shading.

    Segmenting ear can be very challenging. However, if ear can be segmented reliably andrepresented in a canonical image space, it is possible to extract ear shape information.The same goes to fist as shown in Figure 1(d). We tried to capture thumb too in the hope

    that fingerprints might be observed. However, at such resolution, fingerprints are partiallycaptured and is not clear.

    By visual judgement, we have decided to use face biometrics, over eye

    biometrics, ear and fist in decreasing order of priority.

  • 8/7/2019 Seminar Report On Bio Metrics

    24/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 24

    10.COMPARISON OF BIO-METRICS TECHNIQUE

    10.1 Uniqueness of biometric features

    Table shows the cross accuracy of different biometrics.

    Table : Comparison of Biometrics Techniques [Ruggles, 1998]

    Biometrics Crossover Accuracy

    Retinal Scan 1:10,000,000+Iris Scan 1:131,000

    Fingerprints 1:500Hand Geometry 1:500

    Signature Dynamics 1:50Voice Dynamics 1:50

    Crossover accuracy is the ratio of the crossover frequency as compared to thewhole population of test data. The smaller the crossover accuracy, the more unique the

    biometrics is. It should be noted that comparison across biometrics is by no meansmeasurable. Even the quality of same biometrics is difficult to judge unless the results are

    tested on the same data set. [OGorman, 1999]. Therefore, sufficient bias is expectedfrom the readers as well.

    From Table 2, Retinal scan, after [Daugman, 1995], appears to have the highest

    crossover accuracy. Even though Iris scan has high cross over accuracy, its useracceptability is low. Fingerprints and hand geometries are equally unique.

    Signature dynamics and voice dynamics have the lowest accuracy rates accordingto [Ruggles, 1998]. In addition, these two techniques rely on behavioural measurements

    as opposed to physical measurements. In general, behavioural biometrics is less reliablethan physical biometrics.

    Retinal scan has high accuracy but also has a high data collection error rate and

    low user acceptability. For this reason, retinal scan exists only in science fiction moviesbut not in real life applications!

    The fingerprint biometric has a low data collection error rate and high useracceptability. Further, fingerprint technology has had the most research and development

    money applied to both identification and authentication problem. Finally, fingerprintbiometrics has the highest acceptance in the identification community and virtually every

    large biometrics system in operation today uses fingerprint biometrics. Notwithstandingit's association with "criminal" applications, fingerprint biometrics is generally acceptedby clients.

  • 8/7/2019 Seminar Report On Bio Metrics

    25/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 25

    The chosen biometrics in this project, i.e., face and voice, are based on useracceptability and another important factor, the availability of resources in the laboratory.

    Once the system is established, moving into other biometrics would be easier.

    Table 3 : Comparison of biometrics technologies based on perception of three biometrics

    experts according to [Jain, 1999]

  • 8/7/2019 Seminar Report On Bio Metrics

    26/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 26

    11.HOW WELL DO BIOMETRICS WORK?

    11.1 FALSE ACCEPT RATES11.2 FALSE REJECT RATES

    11.3 EQUAL ERROR RATES11.4 VALIDITY OF TEST DATA

    Biometric devices can be adjusted to favor security or user convenience. How

    well do Biometrics work? Is depending on four points.

    11.1 False Accept Rates

    The probability that a biometric device will allow an

    unauthorized person is called the "False Accept Rate.

    False Accept Rates claimed for today's biometric access systems rangefrom 0.0001% to 0.1%.

    It's important to remember that the only way an unauthorized person

    can get access is if a unauthorized person tries. Thus, the False Accept

  • 8/7/2019 Seminar Report On Bio Metrics

    27/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 27

    Rate must be multiplied by the number of attempts by unauthorizedperson to determine the number of possible occurrences.

    11.2 False Reject Rates

    The probability that a biometric device won't recognize an authorized

    person is called the "False Reject Rate.

    The False Reject Rates quoted for current biometric systems rangefrom 0.00066% to 1.0%.

    A low False Reject Rate is very important for most applications, sinceusers will become extremely frustrated if they're denied access by a

    device that has previously recognized them.

    11.3 Equal Error Rates

    The point where false accept and false reject curves cross is called the"Equal Error Rate.

    Error curves give a patternical representation of a biometric device's"personality."

    The Equal Error Rate provides a good indicator of the unit'sperformance. The smaller the Equal Error Rate, the better.

    11.4 Validity of Test Data

    Here, it checks for validity of the processed data and decides whether

    the person is authorized or not.

    Testing biometrics is difficult, because of the extremely low error rates

    involved. To attain any confidence in the statistical results, thousandsof transactions must be examined.

    It's important to remember that error rates are statistical: they are

    derived from a series of transactions by a population of users.

    In general, the larger the population and the greater the number of

    transactions, the greater the confidence level in the accuracy of theresults.

  • 8/7/2019 Seminar Report On Bio Metrics

    28/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 28

    If the reported error rate is 1:10, then a sample of 100 transactions mayprovide a sufficient confidence level. Conversely, a 100-transaction

    sample would be too small if the error rate was reported as 1:100,000.

    Biometric devices are extremely secure, thanks to the combination of low False Accept

    Rates at moderate sensitivity settings, combined with a short user keypad code.

    At the same time, biometrics are extremely convenient and error-free, thanks to low FalseReject Rates.

  • 8/7/2019 Seminar Report On Bio Metrics

    29/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 29

    12.IS DNA A BIOMETRIC?

    DNA differs from standard biometrics in several ways:DNA requires a tangible physical.DNA matching is not done in real-time, and currently not all stages of

    comparison are automated.DNA matching does not employ templates or feature extraction, but rather

    represents the comparison of actual samples.Regardless of these basic differences, DNA is a type of biometric inasmuch as it

    is the use of a physiological characteristic to verify or determine identity.

  • 8/7/2019 Seminar Report On Bio Metrics

    30/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 30

    13.ABOUT BIO-METRICS

    13.1 WILL BIO-METRICS SOLVE ALL SECURITY CONCERNS?13.2 WHICH IS THE BEST IDENTIFICATION TECHNIQUE ?13.3 IS BIO-METRICS MORE SECURE THEN PASSWORD?

    13.4 APPLICATION13.5 NEW OPPORTUNITIES

    13.6 FUTURE TECHNOLOGY13.7 BENEFITS

    13.1 Will Biometric Solve All Security Concerns?

    No System Can be 100% Safe

    Biometric Measures Can be Very Successful in Fighting Today's SecurityConcerns

    Major Drawback in Adopting Biometric Systems is that Concerned personNeed to be Physically Present

    13.2 Which is the best technique among above ?

    Accordingly, the pattern of iris is the best one to recognize a person. Because thepossibility of two persons having the same iris pattern is 1 per 1000 million , the

    population of earth is 6 million so eyes are 12 million and that is why probability is notat least 1%.

    13.3 Is Bio-metrics more "secure" than passwords?

    This question at least poses two problems: biometrics is not equal to biometrics, and the

    term "secure" is in fact commonly used, but it is not exactly defined. However, we can tryto collect pros and cons in order to find at least an intuitive answer.

    It is a matter of fact that the security of password protected values in particular dependson the user. If the user has to memorize too many passwords, he will to use the same

  • 8/7/2019 Seminar Report On Bio Metrics

    31/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 31

    passwords for as many applications as possible. If this is not possible, he will go toconstruct very simple passwords. If this will also fail (e.g., if the construction rules are

    too complex), the next fall-back stage is to notify the password on paper. This wouldtransform "secret knowledge" into "personal possession". Of course, not every user will

    react this way. Rather the personal motivation plays an important role: is he aware of the

    potential loss caused by careless handling of the password? It is easy if the user is theowner. But often foreign possession (e.g., that of the employer) has to be guarded, whose

    value one often can hardly estimate. If motivation is missing, any password primarilytends to be felt bothersome. In this case, and that seems to be the normal case, it is

    assumed that biometrics has considerable advantages.

    Contrariwise, passwords feature an unbeatable theoretic protection ability: an eight-digitpassword which is allowed to contain any symbol from an 8-bit alphabet offers 10 20possible combinations! This is a real challenge for any biometric feature. The

    requirements are obvious: such a password is maximally difficult to learn, it must not bewritten down, it must not be passed to anyone, the input must take place absolutely

    secret, it must not be extorted, and the technical implementations must be perfect. Thisleads us to the practical aspects: the implementation must be protected against replayattacks, keyboard dummies (e.g., false ATMs), wiretapping etc. Even biometric features

    have to cope with such problems. However, it can be assumed that the protection ofbiometric feature acquisition is not easier than the acquisition of the password, provided

    the implementation expense is comparable!

    13.4 Where BIO-METRICS is used?

    For Security

    Protect Sensitive Data High degree of identity certainty in transactions

    Create databases with singular identities

    For Accountability

    Improve auditing / reporting / record keeping

    Time keeping

    For Efficiency

    Reduce password-related problems

    It is also used in following areas.

    Enterprise-wide network security infrastructures Secure electronic banking, investing and other financial transactions Retail sales

  • 8/7/2019 Seminar Report On Bio Metrics

    32/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 32

    Law enforcement Health & Social services

    13.5 The New Opportunities For Biometrics

    The unfortunate events of September 11,2001 have placed the recent focus oncreating new systems and installations employing biometrics.

    Examples include facial recognition at airports and fingerprint and iris scanningsolutions at new government facilities.

    Combination of Biometrics with smart cards

    Smart cards, when combined with biometrics, offer a number of benefits.

    o smart cards provide a portable storage mechanism for the biometrictemplate. This means template management is eliminated across thebiometric reader network. Enrolled users present their smart card to the

    biometric reader at any location where the card is valid. The biometrictemplate stored on the card (which is usually encrypted) is compared to

    the live biometric. If the two match, the system grants the user access.

    o Another benefit of combining biometrics with smart cards pertains to dual-technology cards that are embedded with a smart chip. These combination

    cards function as both smart cards and proximity cards. This groupingpermits organizations currently using proximity-based access control toincorporate biometric security and limit card issuance to users who arepermitted access to the biometrically secured area.

    o Lastly, since the biometric templates are stored on individual cards, thenumber of users for any particular biometric reader is unlimited. Thisscenario differs from biometric readers that store the template, therebylimiting the template capacity to the reader's storage capacity.

    13.6 Near Future Technologies

    In near future every person having a Bio-chip in the body.

    This Bio-chip concept is recently used in an African Safaris to trap the activitiesand diseases of animals. For this every animal has a Bio-chip in its body.

    For Bio-chip in human we will store identification information.

  • 8/7/2019 Seminar Report On Bio Metrics

    33/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 33

    So, in future it may not require to ask What is your name? just make a shakehand and allow the Bio-chips to interact and will know the personsIdentification.

    We dont know, But Bio-metrics identification may include brain Chemistrybecause every one has got different brain chemistries.

    Nowadays, a Bio-Processor-chip is available which can recognize the bacteriathat can cause diseases- spread through blood, salivaand urine in few minutes instead of hours.

    13.7 Benefits of Adopting Biometrics

    No Need to Remember Passwords:As it uses our biometry we are not supposed to give any password.

    Because where ever we go our finger print, iris pattern, our face, voicedefinitely with us!

    Unauthorized Access to Personal Data Can be Prevented :It is a one type of security system that no one can hack it because they

    do not have our fingerprint, iris,voice,face etc. So, it prevents the data from anunauthorized person.

    Fraudulent Use of ATMs, Credit Cards Can be Prevented:

    None can use our ATM just by knowing our PIN. Because no numberor password is there.

  • 8/7/2019 Seminar Report On Bio Metrics

    34/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    For Download Visit http://www.nectarkunj.byethost14.com/ 34

    14. CONCLUSION :-

    We conclde that for biometrics is better technique for any security. This technique isimprove then unauthorized person can not access any thing our assets. It depends on

    physical behavior. This technique is possible only on the man identification not its

    document needed for it.

  • 8/7/2019 Seminar Report On Bio Metrics

    35/35

    ------------------------------------------------BIO-METRICS----------------------------------------

    15.REFERENCES:-

    1. SAFARI [June 2003 {Issue No.114}]: - The Monthly Magazine

    2. www.findbiometrics.com

    3. www.howstuffworks.com

    CONCLUSION :-

    We conclde that for biometrics is better technique for any security. This technique is

    improve then unauthorized person can not access any thing our assets. It depends onphysical behavior. This technique is possible only on the man identification not its

    document needed for it.

    http://www.findbiometrics.com/http://www.findbiometrics.com/http://www.howstuffworks.com/http://www.howstuffworks.com/http://www.howstuffworks.com/http://www.findbiometrics.com/