Anda di halaman 1dari 7

BIOINFORMATICS

(BIOMATRICS IN SECURITY)
Mr. ATUL.A. PADGHAN. SATISH .A. TANPURE atulpadghan@gmail.com stsh.tanpure@gmail.com Mr.

Anuradha Engineering College, Chikhli


Electronic and Telecommunication Engineering
Under Graduate Students (3rd Year)

ABSTRACT
Authentication and security have been major issues right from the beginning of the computer age. The old method of using password for claiming access to a particular system is having many drawbacks such that this system merely tests that the password is correct not if the person using the password authorized to use it. Moreover the password is difficult to remember if one wants them not to be guessed easily. One of the emerging and efficient techniques for implementing security is BIOMETRICS. Using this technique one can definitely assure that he or she is the correct person. Biometrics is the science of measuring physical and behavioral characteristics that are unique to each individual. Biometrics technology verifies that an individual is knows who he or she claims to be common physical. Biometrics are fingerprints facial characteristics hand or palm geometry, retina, iris etc behavioral characteristics are signature voice keystroke etc. Out of these retinas scanning gives more accuracy for identification .An alteration solution is multi model identification system the smartcard and financial service industries

are on the verge of adopting biometrics in a big way. The underlying assumption is that biometric Ids are unmatched for security you cannot forge or presumably steal someones body parts. Keeping this trend in view we may soon be feeding biological information about ourselves into anever-expanding array of computerized bankingfiles credit card registries and election commission files."A biometric is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity." Figure: How a biometric system works

DEFINITION

Biometrics can be used for identification and verification of different things about human beings. Identification a.k.a recognition is oneto-many comparing process for a biometric sample or a code derivate from it against all of the known biometric reference templates on file. If the acquired sample matches a template stored within error marginal the identity of the enrollee is also matched to that of the previously stored reference. The stored identity information really should not reveal the physical identity of the owner of the biometric, but instead a role which authorizes the use of service or access. Verification is process of comparing a submitted biometric sample against single biometric reference of a single enrollee whose identity or role is being claimed. The reference template doesn't have to reside in large database but can be carried with oneself within a smart card or other security device. If the verificationprocess is well designed the biometric information is not revealed to the system, only the result: match or non-match is confirmed. All biometric identification or authentication technologies operate using the following four stage process.

or traits of human body focus on very different features. Only thing common among them is that they are considered unique. EYE Biometrics which analyze the eye are generally thought to offer the highest levels of accuracy. They can be divided in two specific technologies: examination of iris and retina patterns. As internal parts of human eye are very well protected the sight being the most important sensor, the biometric data is also safe and immune to degradation in normal life on the contrary to more external parts like fingertips. In medical science examination of the eye is used as one indication that could reveal the certain illnesses and for example the users excessive usage of drugs and alcohol. This is information the user does not necessarily want to reveal to the operator of the scanning device. According to the equipment manufacturers, they concentrate into extracting the unique pattern from the eye, and not any other information, thus ensuring the privacy of user. Still, as the analysis of the eye information is done in software new features can and could be incorporated in the software without notice. IRIS It has been known for seven decades that the pattern of blood vessels that emanate from the optic nerve and disperse throughout the retina presents an unparalleled source of biometric information. Since no two retinas are the same -

BIOMETRIC
Biometric systems come in many shapes and sizes. This can range from distinct hardware, software to complete systems. All biometric systems have the principles of capture, extractionand comparison and matching in common. Different biometrics, measures

even in identical twins - an individual can be distinguished from all others based on the vascular pattern observed. The iris is a protected internal organ of the eye, behind the cornea and the aqueous humor. Visually examined iris is the colored ring of textured tissue that surrounds the pupil of the eye. Each iris is a unique structure, featuring a complex system which is stable and unchanging throughout life. When the information density of iris patterns analyzed is roughly 3.4 bits per square millimeter and complexity has about 266 degrees of freedom.

The iris is closely connected to the human brain and is said to be one of the first parts of the body to decay after death. This makes recreation or use of a dead eye for fraudulent purposes very difficult. Additional tests that can be used against eye replicas can include testing the natural papillary motion and unique refractions to different infrared light sources.

Picture 2: Visualization of iris scan and

extracted "IrisCode" Picture (C) IriScan, Inc. The image of iris is captured with a black and white video camera in a well lit environment. The pattern is extracted after elastic deformations, such as papillary dilation and constriction, are reversed mathematically which is possible after localizing the inner and outer boundaries of iris. After pseudo polar coordinate mapping and using method called complex valued 2D Gabber wavelets a bit stream, typically total 256 bytes of information, is obtained. The amount and uniqueness of extracted information make the False Accept probability lowest of all known biometrics. The scanning can be made from the distance of few meters so the user does not feel the process intrusive. FACE Face recognition technologies analyze the unique shape, pattern and positioning of facial features. The face is natural biometric because it is a key component in the way we humans remember and recognize each other. Face recognition is very complex technology and largely software based. Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image, measure characteristics such as the distance between the eyes, the length of the nose, and angle of the jaw, and create a unique file called "template." Using templates, the software then compares that image with another image and produces a score that measures how similar the images are to each other. Typical sources of images for use in facial

recognition include video camera signals and pre-existing photos such as those in driver's license databases. Artificial intelligence is used to simulate human interpretation of faces. The problem with human face is that people do change over time; wrinkles, beard, glasses and position of the head can affect the performance considerably. To increase the accuracy and adapt to these changes some kind of machine learning has to be implemented.

itself without source of external radiation these systems can capture images despite the lighting conditions, even in the dark. The drawback is cost, thermal cameras are significantly more expensive than standard video. [15, 16] One-to-one verification is mainly used with this method. Certain new systems have announced the possibility to one-to-many identification, even real time from live video feed. An example application of using face biometric could be strict file access control: the video stream from camera attached to monitor is monitored by program which ensures that the legitimate user's face is on the sight all the time when classified information is manipulated onscreen. If the user turns away or goes away from the screen the secret files are hidden from the screen.

There are essentially two methods of capture: using video or thermal imaging. Video is more common as standard video cameras can be used. The precise position and angle of the head and surrounding lightning conditions may affect the system's performance. The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth and nostrils as a example. More advanced technologies make three-dimensional map of the face which multiplies the possible measurements that can be made. Thermal imaging has better accuracy as it uses facial temperature variations caused by vein structure as the distinguishing trait. As the heat pattern is emitted from the face

FINGERPRINT
Fingerprint scanning a.k.a finger scanning is one of the most commercially successful biometric technologies today. [16] It is widely accepted that no fingers have identical prints, even from the same person or identical twins. Systematic classification of fingerprints started in the 1800's and is developed further trough extensive use in forensic societies. The technology has got fairly positive user response in the enrolled pilot projects, while drawbacks and disappointments have occurred trough the years. Taking ones

fingerprints is often associated in the way criminals are treated. Also the used systems have not always shown even nearly the ideal performances which have been reached in clean and sterile laboratory environment. Traditional finger scanning technique is analysis of small unique marks of the finger image known as minutiae. Minutiae points such as finger image ridge endings or bifurcations, branches made by ridges. The relative position of minutiae is used for comparison, and according to empirical studies, two individuals will not have eight or more common minutiae. A typical livescan fingerprint will contain 30-40 minutiae. Other systems analyze tiny sweat pores on the finger which, in the same way as minutiae, are uniquely positioned. Finger scanning is not immune to environmental disturbance. As the image is captured when the finger is touching the scanner device it is possible that dirt, condition of the skin, the pressure and alignment of the finger all affect the quality of fingerprint. This has appeared to be a problem with the introduction of the system; users had to wipe and clean their fingers each time before scanning their finger if they did not want to be falsely rejected.

Picture 3: Digitized fingerprint image with the minute points extracted

HAND GEOMETRY

When measuring hand geometry biometrics, three-dimensional image of the hand is taken and the shape and length of fingers and knuckles are measured. Hand geometry has been in use for many years in various applications, predominantly for access control. The technology does not achieve the highest levels of accuracy but it is convenient and fast to use. On the capture process a user places a hand on the reader, aligning fingers with specially positioned guides. Cameras, positioned on above and on the side of hand capture images from which measurements are taken at selected points. As the hand geometry is not found to be as unique as for example fingerprints or eye scans it cannot be used as accurate identification. Because of its user-friendliness it is well suited to user id verification.

Picture 4: Hand with biometric measurements visualized Image (C) Michigan State University

FINGER GEOMETRY
Finger geometry biometric is very closely related

to hand geometry. The use of just one or two fingers means more robustness, smaller devices and even higher throughput. Two variations of capture processes are used, first being similar to hand geometry presented above. The second technique requires the user to insert a finger into a tunnel so that threedimensional measurements of the finger can be made. PALM Palm biometrics is close to finger scanning and in particular AFIS technology. Ridges, valleys and other minutiae data are found on the palm as with finger images. Main interest in palm biometrics industry is law enforcement as latent images - "palm prints" - found from the crime scenes are equally useful as latent fingerprints. Certain vendors are also looking at the access control market and hope to follow the footsteps of finger scanning. FUTURE BIOMETRICS A system that analyses the chemical make-up of body odor is currently in development. In this system sensors are capable of capturing body odor from non-intrusive parts of the body such as the back of the hand. Each unique human smell consists of different amount of volatiles. These are extracted by the system and converted into a biometric template. All testing and fastest possible analysis of the human DNA takes at least 10 minutes to complete and it needs human assistance. Thus, it cannot be considered as biometric technology in its sense of being fast and automatic. Additionally current DNA capture mechanisms, taking a blood sample or a test swab inside of the mouth, are extremely intrusive compared to other biometric systems. Apart from these problems DNA, as a concept, has a lot of potential. Ear shape biometrics research is based on law

enforcement needs to collect ear markings and shape information from crime scenes. It has some potential in some access control applications in similar use as hand geometry. There are not excessive research activities going on with the subject. UNDERSTANDING MULTIMODAL BIOMETRIC SYSTEMS A multimodal biometric system uses multiple applications to capture different types of biometrics.

This allows the integration of two or more types of biometric recognition and verification systems in order to meet stringent performance requirements. Multimodal system could be, for instance, a combination of fingerprint verification, face recognition, voice verification and smart-card or any other combination of biometrics. This enhanced structure takes advantage of the proficiency of each individual biometric and can be used to overcome some of the limitations of a single biometric. A multimodal system can combine any number of independent biometrics and overcome some of the limitations presented by using just one biometric as your verification tool.

APPLICATIONS
Thunder Bay Becomes First Canadian Airport to Use Facial Recognition 1] Thunder Bay International Airport is the first Canadian airport to deploy facialrecognition technology. 2] A second use of the technology was at the

2001 Super Bowl in Tampa, where pictures were taken of every attendee as they entered the stadium through the turnstiles and compared against a database of some undisclosed kind. 3] In America and Japan, the main applications have been entry control, ATMs, and Government programs. In Britain, The Nationwide Building Society introduced iris recognition within its cash dispensing machines (in lieu of PIN numbers) in 1998.

Fingerprint based recognition The figure to the beneath shows a door control system, where the user needs to prove his irdentity before entering the premises of the building, this is done by authenticating his fingerprints on the device shown This figure to the above shows us what is called as smart card which can be authenticated by fingerprints holding the finger on the sensor. Biosmartcard BioSmartCard - the biometric solution to

Smartcard owner authentication. A Smartcard can be used by anyone. BioSmartCard can only be used by authorized user Smartcards are credit-card sized cards with processing chips embedded into them. BioSmartCards rely on the unique characteristics of a person's fingerprint. To register, the owner's fingerprint is digitally embedded into the card. Only your fingerprint can unlock your card. Now that's Really SMART! E-commerceApplicatinos E-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading partys identity. For example, many banks are interested in this combination to better authenticate costumers and ensure no repudiation of online banking trading, and par chasing transactions. CONCLUSIONS The security field uses three different type of authentication Something you know-a password, PIN, or piece of personal information ( such as your mothers maiden name ); Something you have-a card key smart card, or token (like a securID card ); and/or Something you are-a biometric. Of these, a biometric is the most secure and convenient authentication tool. It cant be borrowed, stolen or forgotten and forging one is practically impossible. REFERENCE [1] URL http://www.biometrics.org [2] URL http://www.ibia.org [3[ URL http://www.zdnet.com [4] URL http://www.iriscan.com

Anda mungkin juga menyukai