8/12/2019 Image processing domain in biometrics
1/20
KNOWLEDGE
INSTITUTE OF TECHNOLOGY
Biometrics
Y.KARTHICK
CSE II YEAR,
PH: 9150057641MAIL:!"#$%&'!!&($)*+"&.'(
+
K.KUMARESAN
CSE II YEAR
PH: 9715747-04
MAIL:!+"#/"+!15)*+"&.'(+
8/12/2019 Image processing domain in biometrics
2/20
A2STRACT:
Biometrics is seen by many as a
solution to a lot of the user
identification and securityproblems in todays networks.
Password abuse and misuse,
intentional and inadvertent is a
gaping hole in network security.
This results mainly from human
error, carelessness and in some
cases maliciousness. Biometrics
removes human error from thesecurity equation.
ur paper will e!amine all the
technological and feasibility
aspects as well as the practical
applications. "e will look at many
different biometric methods of
identifying the user.
INTRODUCTION:
This paper provides a broad
overview of the sub#ect ofbiometrics, their usage, how
performance is measured, the
typical construction of systems and
practical implementation issues. $
basic understanding of computer
networks is requisite in order to
understand the principles of
network security. $ %NETWORK&
has been defined as %any set of
interlinking lines resembling a net,
a network of roadsan
interconnected system, a network
of alliances. This
definition suits our purpose well. $
interconnected computers.
'oving on to the definition ofbiometrics, it is a means of
identifying a person by measuring
a particular physical or behavioral
characteristic and later comparing
it to those of many people
computer network is simply a
system of that are stored in the dat
base. Biometrics was identified as
one amongst () emerging
8/12/2019 Image processing domain in biometrics
3/20
technologies which would change
the world in the twenty*first
century.
Definition:
The statistical use of the
characteristic variations in unique
elements of living organisms is
known as biometrics.
Why we need biometrics?
+n order to avoid the
problems of forgetting passwords
and + codes, Biometrics based
authentication helps us in verifying
your finger prints, iris pattern and
voice for your identity at $.T.'-s,
$irports etc.., you can unlock your
houses, withdrawing money from a
bank with #ust a blink of an eye, a
tap of your finger or by #ust
showing your face.
Biometrics-what is it?
Biometrics refers to the
automatic identification of a
person based on hisher
physiological or behavioral
characteristics. This method of
identification is preferred over
traditional methods involving
password-s and P+/ numbers for
various reasons:
0i1 The person to be identified
is required to be
physically present at the
point of identification.
0ii1 +dentification based on
biometric techniques
obviates the need to
remember a password or
carry a token. By
replacing P+/-s, biometrictechniques can potentially
prevent unauthori2ed
access to or fraudulent use
8/12/2019 Image processing domain in biometrics
4/20
of $.T.'s, 3mart cards,
computer networks.
0iii1 P+/s passwords may be
forgotten, and token based
methods of identification
like passwords and
driver-s licenses may be
forged, stolen or lost. $
biometric system is
essentially a pattern
recognition system which
makes a personal
identification by
determining the
authenticity of a specific
physiological or
behavioral characteristic
possessed by the user.
Desin iss!es of biometric
systems: $n important issue in
designing a practical system is to
determine how an individual is
identified and are designed by
keeping two characteristics in
mind, they are:
P%&'"
'%"#"'$/#&$&'
P/#(" $#"&$
* 4ingerprint,
5andprint
* 6oice pattern
* 4ace
* 5andwriting
* 3cent, Thermal
image *
$coustic 3ignature
* +ris Pattern
epending on the conte!t a
biometric system can be
8/12/2019 Image processing domain in biometrics
5/20
either a
verification0authentication1
system or an identification
system
"erification "s #dentification:
There are two different
ways to resolve a person-s identity:
verification and identification.
6erification 0$m + whom + claim +
am71 involves confirming are
denying a person-s claimed
identity. +n identification, one has
to establish a person-s identity
0"ho am +71. 8ach one of these
approaches has its own
comple!ities and could probably
be solved best by a certain
biometric system.
Ty$es of biometric de%ices and
their ser%ices: /ow let-s see some of the
biometric devices being widely
used in many areas like
computernetwork security,
government organi2ations,
prisons9. They are:
4ingerprint
identification.
4ace recognition.
+ris recognition.
5and geometry.
3ignature recognition.
etinal scanning
6oice verification9.
$nd now let-s see some
of these biometric devices, their
services, advantages and
disadvantages in detail.
&iner$rint reconition:
4inger prints are unique
to each individual and no two
fingerprints are alike. 4ingerprint
recognition is most widelyaccepted biometric among the
technology being used today.
4ingerprints contain patterns of
8/12/2019 Image processing domain in biometrics
6/20
ridges and valleys as well as
minutiae points. 'inutiae points
are local ridge characteristics that
occur at either the ridge bifurcation
or a ridge ending.
There are three methods for
scanning finger prints: 0(1
ptical scanners,
0;1Thermal scanners and0?*coordinate that is then
stored in a file.
The correlation*based
method looks at the entire
pattern of ridges and valleys
in the fingerprint. The
location of the whorls, loops
and arches and the direction
that they flow in are
e!tracted and stored. /either
method actually keeps the
captured image@ only the data
is kept, therefore making it
impossible to recreate the
fingerprints.&
8/12/2019 Image processing domain in biometrics
7/20
nce the scanning is complete, the
analysis is done by a comparison
of several features of the
fingerprint know as minutia.
+nvestigators are systems look at
where the ridge lines end or where
one ridge splits into two
0bifurcation1. The scanning system
uses complicated algorithms to
recogni2e and analy2e the minutia.
+f two prints have three ridge
endings, two bifurcations, and
form the same shape with the same
dimensions, then it is likely the
same person-s fingerprints.
'd%antaes:
5igh accuracy rate.
=an perform (*to*
many comparisons.
+ne!pensive
equipment.
8asy to use 0samples
are easy to capture
and maintain1.
'ost established and
oldest of the biometri
technology.
Disad%antaes:
$ctual finger scan
images cannot be
recreated from a
template image
Asers relate
fingerprint
recognition tocriminal activity.
&ace (or &acial) reconition:
4ace recognition is one of the
newer biometrics technologies.
The technology analy2es facial
characteristics and attempts to
match it to database of digiti2ed
pictures. This technology is
8/12/2019 Image processing domain in biometrics
8/20
relatively new and has only been
commercially available since the
()-s. 4ace recognition has
received a surge of attention since
of disaster of (( for its ability to
identify known terrorists and
criminals.
4ace recognition uses distinctive
features of the face Cincluding the
upper outlines of the eye socket,
the areas surrounding the
cheekbones, the sides of the
mouth, and the location of the nose
and ears C to perform verification
and identification. The first step in
the face recognition is to obtain an
image of an individual and store it
in a database for later use. Asually,
several pictures 0or video images1
at different angles are taken.+ndividuals may also be asked to
make different facial e!pressions
for the data base. /e!t, the images
are analy2ed and e!tracted to
create a template. The last step is
to verify the individual-s identity
by matching images to those
images that been stored in
database.
There are four main methods being
used for facial recognition:
E&*/3"'/:a tool developed
by '+T that e!tracts
characteristics through the
use of two*dimensional
grayscale imagery.
F/"$#/ A"& "(
!( " L('" F/"$#/
A"& LFA:is the mos
widely used technique
because of its ability to
accommodate for facial
changes and aspect. D4$
uses an algorithm to create a
face print 0EF bytes in si2e1
for comparison.
8/12/2019 Image processing domain in biometrics
9/20
N/#" /$(#!:a method
that e!tracts features from
the face and create a
template of contrasting
elements that is then
matched to a template in
database.
A$(+"$/ F"'/
P#('/&* AFP:a
technique that looks for
distances and ratios between
certain facial features, and is
more ideal for poorly lit
areas.
'd%antaes:
5igh accuracy rate.
=an be performed
from a distance.
$ccepted by most
users.
/on*intrusive.
5ands*free.
Disad%antaes:
=annot not always
account for the effect
of aging.
3ensitive to lighting
conditions.
=an perform limited
(*to*many
comparisons.
#ris reconition:
/o two irises are alike, not even in
one individual or in identical
twins. The iris consists of over F))
8/12/2019 Image processing domain in biometrics
10/20
distinguished characteristics.
=ompared to the F) or G) points of
distinct fingerprint characteristics,
the iris has more than ;G) distinct
features. Therefore, iris scanning is
much more accurate than
fingerprints or even /$ analysis
of the distinguishing features.
+ris scanning is e!ecuted by
scanning the measures of the
colored circle that surrounds the
pupil. "ith video technology, a
camera scans the iris pattern,
which consists of corona, pits,
filaments, crypts, striations, and
radial furrows 0page1. The systemsoftware then digiti2es the unique
information of the iris and stores it
for authentication at a later
time. +ris scanning is easy,
accurate, and convenient. ne
significant downfall of +ris
recognition is the initial startup
costs as they are e!tremely high.
+n identifying one-s +ris, there are
two types of methods that are used
by +ris identification systems,
passive and active. The active +ris
system method requires that a user
be anywhere from si! to (F inches
away from the camera. +t also
requires the user to move back and
forth so that the camera can ad#ust
and focus in on the user-s iris. The
passive system allows the user to
be anywhere from one to three fee
http://images.google.co.in/imgres?imgurl=http://www.abcmoney.co.uk/aimage/1136_eye_scanning.jpg&imgrefurl=http://www.abcmoney.co.uk/news/1220062146.htm&h=152&w=225&sz=12&hl=en&start=5&tbnid=tjgRL7vzqcq0LM:&tbnh=73&tbnw=108&prev=/images%3Fq%3Diris%2Bscan%26gbv%3D2%26svnum%3D10%26hl%3Denhttp://en.wikipedia.org/wiki/Image:Humaniris.jpg8/12/2019 Image processing domain in biometrics
11/20
away from the camera0s1 that
locate and focus in on the iris.
This technology-s main uses are
for authentication, identification,
and verification of an individual.
'd%antaes:
5igh accuracy rate
+mitation is almost
impossible
Disad%antaes:
perceived to be
intrusive and invasive
=an be done from a
short distance optical readers are
difficult to operate
requiring advanced
training for employees
*and eometry:
5and geometry is concerned with
measuring the physical
characteristics of the user-s hand
and fingers and it is believed to be
sufficiently unique for use as a
means of biometric authentication.
The technology records various
dimensions of the human hand, it
is relatively easy to use, and offers
a good balance of performance
characteristics. eader
configurations vary among a
softball*shaped device which the
sub#ect grabs in his hand and a flat
plate which the sub#ect places
hisher hand, a bar which the
sub#ect grabs as if opening a door,
and a flat plate which the sub#ect
places hisher hand on.
5and geometry readers are
developed in a wide range of
8/12/2019 Image processing domain in biometrics
12/20
scenarios, including time and
attendance recording where they
have proved e!tremely popular.
The methodology may be suitable
where there is a large user base or
there are users who access the
system infrequently. $ccuracy can
be very high if desired.
5and geometry readers are
relatively large and e!pensive but
the ease of integration into other
systems and processes, small
template si2e 0only bytes for pure
hand geometry template1 and ease
of use makes it a good choice for
many pro#ects.
*and eometry "s &iner$rints:
Anlike
fingerprints
the human hand isn-t unique. ne
can use finger length, thickness
and curvature for the purposes of
verification but not for
identification. 4or some kinds of
access control like immigration
and border control, invasive
biometrics 0e.g., fingerprints1 may
not be desirable as they infringe on
privacy. +n such situations it is
desirable to have a biometric
system that is sufficient for
verification. $s hand geometry is
not distinctive, it is idle choice.
4urther more, hand geometry data
is easier to collect. "ith
fingerprint collection good
frictional skin is required by
imaging systems, and with retina*
based recognition systems, speciallighting is necessary. $dditionally
hand geometry can be easily
combined with other biometrics,
8/12/2019 Image processing domain in biometrics
13/20
namely fingerprint. ne can
envision a system where
fingerprints are used for 0in
frequent1 identification and hand
geometry is used for 0frequent1
verification.
+ec!rity concerns:
Biometric systems are not
bulletproof. They present a number
of security concerns absent in
traditional cryptographic systems.
The most important of these as
follows:
+$oofin:
Biometric systems are much more
vulnerable spoofing attacks than a
cryptographic system. The
%leakage& of biometric data iscommon by ways photographs,
sound recordings and fingerprints
left on doorknobs. 6ulnerability is
essentially unavoidable in
biometric systems.
,ni%ersality:
'ost biometric systems are
unusable by non*negligible
percentage of population. $n
estimate shows, for e!ample, that
appro!imately ;.GH of the
population does not have sufficien
quality that can be used for
authentication purpose. Dikewise a
number of users have problematic
irises. 3o, it is recommended that a
biometric device is used in
con#unction with another layer of
security@ either another type of
biometric device or some other
means of authentication, like a
password or a smart card.
ri%acy:The e!tensive use of biometrics
raises serious privacy issues of
anonymity and tracking. +n some
8/12/2019 Image processing domain in biometrics
14/20
ways a combination of privacy and
freedom of movement allows us to
conduct some %public& transactions
without widespread public
knowledge.
Reliability:
The appeal of biometrics
identifiers lies in their low error
rates and automated nature. But
regardless of the actual reliability,
if the popular perception is that
they have virtual infallibility then
we may have a serious problem.
Because in this case, access to
sensitive buildings and computers,
high stakes commercial
transaction, and criminal and civil
litigation may turn on faulty
assumptions about this technology.
APPLICATIONS AREAS:
The uses for biometric security are
varied and growing. +t was
developed in response to a need to
associate human action with
identity C whether conducting a
transaction, accessing a computer
or a critical information system, or
entering secure physical area.
3ome of the e!isting and proposed
applications in general we use are
described below:
.om$!ter/Network sec!rity:
'any stand*alone and network
computer systems carry valuable
and sensitive information.
=ontrolling access to these system
is another ma#or use of biometric
authentication systems.
#nternet transactions:ue to growing security
requirements that results from the
boom in e*commerce, many think
8/12/2019 Image processing domain in biometrics
15/20
of on*line transactions as being an
obvious area for biometrics. The
biometric authentication generates
a greater degree of vendor
confidence because he knows that
person that the person at the
terminal is he who he claims to be.
hysical area sec!rity:
'ilitary, Iovernment, and
=ommercial installations have
sufficiently strong confidentiality
concerns. The biometric identifiers
play a ma#or role in controlling
physical access to these
installations.
Bankin:
'any leading banks have been
e!perimenting with biometrics for
$T' use as a means of combating
card fraud. Beginning ;));, some
companies will being issuing smar
credits cards, with customer-s
fingerprint information embedded.
"otin:
$ logical use of biometrics is in
voting process where eligible
politicians are required to verify
their identity. This is intended to
stop %pro!y& voting.
risons:
8/12/2019 Image processing domain in biometrics
16/20
$n interesting use of biometrics is
in prisons where the visitors to a
prisoner are sub#ected to
verification procedures in order
that identities may not be swapped
during the visit.
0eadin $rod!cts in biometrics:
Biometric is a new but promising
technology and therefore a number
of companies have appeared in the
market in a very short period of
time. 3ome of those products are:
S$"$ (3 2&(+/$#&':
The resent:
There are many various fields in
which biometrics is being used
today and the future holds more
advances. 3ome of such e!amples
are:
$t =oca*=ola =o., hand*
scanning machines recently
replaced the venerable time
card for many workers.
+n /ew Jersey and si! other
states, fingerprint scanners
are now used to crack down
8/12/2019 Image processing domain in biometrics
17/20
on people claiming welfare
benefits fewer than two
different names.
+n =ook =ounty, +llinois, a
sophisticated camera that
analy2es the iris patterns of
an individualKs eyeball is
helping ensure that the right
people are released from #ail.
$t Purdue Aniversity in
+ndiana, the campus credit
union is installing automated
teller machines with a finger
scanner that will eliminate
the need for plastic bankcards
and personal identification
numbers.
'aster=ard +nternational +nc.
and 6isa A3$ +nc., the
worldKs two largest credit
card companies, have begun
to study the feasibility of
using finger*scanning device
at the point of sale to verify
that the card user is really the
card holder.
"alt isney "orld in
rlando has started taking
hand scans of people who
purchase yearly passes.
The technology also received
widespread attention at
lympic Iames $tlanta,
where LG,))) athletes,
coaches and officials used a
hand*scanning system to
enter the lympic 6illage.
'any and many more such
organi2ations at many parts of the
world use biometric devices of
their own choice for their desired
purposes.
8/12/2019 Image processing domain in biometrics
18/20
The &!t!re:
+n future biometrics will be a keyinstrument in our society. The
increase in use of biometrics day to
day shows a vivid picture that it
has to play an important role in the
oncoming days.
Biometrics is a rapidly evolving
technology which is being widely
used in forensics such as criminal
identification and prison security,
and has the potential to be used in
a large range of civilian application
areas. Biometrics can be used to
prevent unauthori2ed access to
$T's, cellular phones, smart
cards, desktop P=s, workstations,
and computer networks. +t can be
used during transactions conducted
via telephone and
internet0electronic commerce and
electronic banking1. +n
automobiles, biometrics can
replace keys with key*less entry
devices.
The future of this technology is
#ust starting to bloom. 'any issues
are arising from this technology
and MP+6$=?M is their main
concern. "ith the increasing rate
of disaster and fraud, biometrics
surely would be an answer for
many oncoming problems, which
are to be faced.
.oncl!sion:
8/12/2019 Image processing domain in biometrics
19/20
The advances in accuracy
and usability and decreasing cost
have made the biometric
technology a secure, affordable
and cost effective way of
identifying individuals. Biometric
parameters such as fingerprint
scanning, iris scanning, retinal
scanning, hand geometry, signature
verification, voice verification andothers are all well established with
their own particular characteristics.
The limiting factors of speed and
band width are now a thing of the
past and their practical
performance might in many
instances be better than e!pected.
Today, it is an efficient and
effective method of replacing
passwords, tokens and smart cards
+t is important to
recogni2e that although biometric
authentication has served
e!tensively in high security
applications in defense industry, it
is still fledgling technology in
commercial world, both in terms o
its technical sophistication and
current e!tent of deployment.
There are no established standards
for biometric system architecture,
for template formation, or even for
biometric reader testing. +t is alsonot clear as which technology or
technologies will dominate the
customer market. +n the absence of
8/12/2019 Image processing domain in biometrics
20/20
standards and direction, the rapid
and wide spread deployment of
biometric authentication system
could easily facilitate the
problematic proliferation of
authentication and tracking of the
people.
R/3/#/'/:
Web sites:
www1interhack1networksec!
rity
www1fa2s1intr!sion
www1co!nter$ane1com
www1irisscan1com
www.biometrics.co.in
Books:
Network +ec!rity
'ssessment
Network +ec!rity Essentials
'. $. abbah, ". D. "oo,
and 3. 3. lay, M3ecure
$uthentication for 4ace
ecognition,M presented at=omputational +ntelligence in
+mage and 3ignal Processing
;))N. =++3P ;))N. +888
3ymposium on, ;))N