Anda di halaman 1dari 11

A Technical Paper On

MULTI-BIOMETRICS (Network Security By Using Multi - BioMetrics)

By
G.JAGAN MOHAN KUMAR I-M.C.A 09481F0010

GUDLAVALLERU ENGINEERING COLLEGE GUDLAVALLERU KRISHNA DISTRICT

ABSTRACT:

Biometrics are automated methods of recognizing a person based on a physiological Among or the behavioral features characteristic.

other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs).

measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. There are many needs for biometrics beyond Homeland Security. Enterprise-wide infrastructures, transactions, network secure retail security electronic sales, law

INTRODUCTION:
Biometrics are automated methods of recognizing a person based on a physiological Among or the behavioral features characteristic.

measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.

banking, investing and other financial enforcement, and health and social services are already benefiting from these technologies. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and

DEFINITION:
Biometrics involves identifying a person based on a unique physical characteristic that is different from any other person. Biometrics can be either

innate such as fingerprints, face or iris; or behavioral such as handwriting, gait or typing Style. Biometric characteristics are measured using sensors that produce data values that can then be processed by a computer using specialized algorithms for analysis and comparison. Biometric system is the integrated biometric hardware and software used to conduct biometric identification or verification.

protection accelerating

and the

Homeland development of

Defense/Security requirements. ITL is biometric standards (e.g., technologyindependent interoperability and data interchange) Federal in collaboration other with Agencies, end-users,

biometric vendors and the IT industry.

HOW BIOMETRIC SYSTEM WORKS?


Biometric devices and systems have their own operating methodology, there are some generalisations for biometric systems implementation as shown in the fig.

NEED OF BIOMETRICS:
An indication of the current substantial biometrics activities. growth is the and interest in of emergence have

biometrics industry standards and related Standards become strategic business issues. For any given technology, industry standards assure the availability of multiple sources for comparable products and of competitive products in the marketplace. Standards will support the expansion of the marketplace for biometrics. After the tragic events of September 11, there is an increased emphasis on biometrics standards. ITL is in a unique position to help end-users and the industry in accelerating the deployment of needed, standards-based security solutions in response to Critical Infrastructure

A biometric system, which relies only on a single biometric identifier in making a personal identification, is often

not able to meet the desired performance requirements. We introduce a multimodal biometric system, which integrates face recognition, fingerprint verification, and speaker verification in making a personal identification. This system

device or remotely in a central repository or on a portable token such as a chip card. The last one is an attractive option for two reasons. Firstly, it requires no local or central storage of templates and secondly, the user carries their template with them and can use it at any authorized reader position.

takes advantage of the capabilities of each individual biometric. A multimodal biometric speaker figure. system verification integrates in face a recognition, fingerprint verification, and making personal identification as shown in

[C] The network:


Networks may rely on the vendors systems design and message functionality, together with their own software. Or the user can himself design networking, message passing and monitoring system ,taking advantage of the recent generic biometric APIs and accessing the reader functions directly. This provides absolute flexibility and control over systems design.

[A] Enrollment:
The process whereby a users initial biometric sample or samples are collected, assessed, processed, and stored for ongoing use in a biometric system. These samples are referred as templates. A poor quality template will often cause considerable problems for the user, often resulting in a reenrolment.

[D] Verification:
The verification process requires the user to claim an identity by either entering a PIN or presenting a token, and then verify this claim by providing a live biometric to be compared against the claimed reference template. There will be a resulting match or no match accordingly. A record of this transaction will then be generated and stored, either locally within the device or remotely via a network and host (or indeed both).

[B] Template storage :


It is an area of interest particularly with large scale applications which may accommodate many thousands of individuals. The possible options are as follows; Store the template within the biometric reader

[E] Transaction storage:


Some devices will store a limited number received. of transactions internally, scrolling over as new transactions are

opened, access can be provided, or time recorded. The reading and verification process takes less than a second with impeccable reliability.

[F] The network (again):


Here transactions, the which network is of handles critical

Applications:
Time & Attendance Identity Verification Access Control

importance in some applications.

BIOMETRIC TECHNOLOGIES: Some of main technologies used


in biometrics are Palm Vien Technology, Facial recognition and Iris recognition etc.

Advantages:

1.Palm Vien Technology:


Recognition Systems' biometric HandReaders simultaneously analyze more than 31,000 points and instantaneously records more than 90 separate measurements of an individual's hand-including length, width, thickness and surface area-to verify that the person using the device is really who he or she claims to be. The Hand Reader compares this information with a "template" of the individual's hand that has previously been stored in the reader, on a server or on a card. Once the person has been identified as a valid user, a door can be environments

High volume, high throughput openings Maintains industry leading performance in harsh environments High security Identity Verification

2.Facial Technology:
Recognition Systems' face recognition readers analyze faces based on the found face and eyes position. The method involved in this is as follows

between the images is small enough, access is granted, else denied.

ii)Local Feature Analysis:


Local Feature Analysis (LFA) is another algorithm. First, the camera takes a picture of the face and cuts out the background and other faces. LFA is based on idea that all faces are made of building blocks. However, every face uses different building blocks and puts them together in a unique manner. LFA translates the building blocks into a code called "face print." The "face print" is stored in a database for identification.

i)Eigenfaces:
Developed by Viisage Technology. First, a camera captures the image of a person. The face is mapped into a variety of coefficients depending on the features, which becomes 128 digits, otherwise called a "vector." The vector is the code for the person. When the person presents him/herself later to be identified, he/she must present a PIN or bar code and then allow the camera to take a picture. The difference between the face's vector and the database's vector for the PIN or bar code are placed on a coordinate system called "face space" and the differences between the two of them are determined.If distance

LFA is also used for verification.

iii)Neural Networks:
Neural Networks is a slight bit more or complicated method. A processing than series units, the of are "eigenfaces" neurons,

connected together. A programmer sets the rules of how the neurons recognize patterns. If the actual output is greatly different than the computed output, then the neurons will adjust itself to fit the situation. More situations lead to more shifts in neurons, which lead to better results. >Any kind of data source is used for input it is either a still image, a video

stream or a connection to a face image database. >Normalization: based on the found face and eyes position, the image is scaled, rotated and finally presented at a fixed size >Preprocessing: standard techniques applied like histogram equalizations, intensity normalization >The images are analyzed to determine the position and size of one or more faces. The eyes centers are located and marked. Images including eyes positions are taken as Primary Facial Data.

vectors represent the Secondary Facial Data and are used for fast comparisons. >Secondary Facial Data can be stored in a central database or on a token storage device, like a smartcard >In case the Secondary Facial Data is stored on a smartcard, only verification is possible. IDENTIFICATION MODE: The presented data is used to scan a data base for most similar faces the most similar reference data is taken as an evidence of the persons identity. VERIFICATION MODE: The presented facial data is compared to data read from the database or token, based on the similarity threshold the identity is confirmed.

3. Iris Recognition:
Iris recognition is the most powerful biometric technology. The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be >Characteristics of the face are extracted and represented as a vector in n-dimensional spaces are similarity of faces is the distance of two vectors. The

the iris patterns of even identical twins, or the right and left eye of an individual. The amount of information that can be measured in a single iris is much greater than fingerprints, and the accuracy is greater than DNA. n this method an iris recognition camera takes a black and white picture from 5 to 24 inches away, depending on the type of camera. The measured, such as striations, pits, and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye. camera uses non-invasive, near-infrared illumination (similar to a TV remote control) that is barely visible and very safe. Unlike that other can biometric be used in technologies

surveillance mode, iris recognition is an opt-in technology. In order to use the technology you must first glance at a camera. Iris recognition cannot take place without your permission Iris Code: The picture of an eye is first processed by software that localizes the inner and outer boundaries of the iris, and the eyelid contours, in order to extract just the iris portion. Eyelashes and reflections that may cover parts of the iris are detected and discounted. Sophisticated mathematical software then encodes the iris pattern by No two irises are alike. There is no detailed correlation between a process called Demodulation. This creates a phase code for the texture

sequence in the iris, similar to a DNA sequence process code. uses The Demodulation called 2-D functions

the size of the search database to ensure that no false matches occur even when huge numbers of Iris Code templates are being compared with the live one. Some of the bits in an IrisCode template signify if some data is corrupted (for example by reflections, or contact lens boundaries), so that it does not influence the process, and only valid data is compared. data, and Decision the thresholds take operation account of the amount of visible iris matching compensates for any tilt of the iris. A key advantage of iris recognition is its ability to perform identification using a

wavelets that make a very compact yet complete description of the iris pattern, regardless of its size and pupil dilation, in just 512 bytes.

The phase sequence is called an IrisCode template, and it captures the unique features of an iris in a robust way that allows easy and very rapid comparisons against large databases of other templates. The IrisCode template is immediately encrypted to eliminate the possibility of identity theft and to maximize security. Iris Recognition: In less than a few seconds, even on a database of millions of records, the IrisCode template generated from a live image is compared to previously enrolled ones to see if it matches any of them. The decision threshold is automatically adjusted for

one-to-all search of a database, with no limitation on the number of IrisCode records and no requirement for a user first to claim an identity, for example with a card.

ADVANTAGES: Most accurate Scalable Opt-in Non-contact

iii. Workstation and network access:


Many are viewing this as the application, which will provide critical mass for the biometric industry and create the transition between sci-fi device to regular systems component, thus raising public awareness and lowering resistance to the use of biometrics in general.

FUTURE APLICATIONS:
i. ATM machine use:
Most of the leading banks have been experimenting with biometrics for ATM machine use and as a general means of combating card fraud. Workstation and network access: Many are viewing this as the application, which will provide critical mass for the biometric transition public general. industry and create the between sci-fi device to awareness and lowering

iv. Telephone transactions:


Many telesales and call center managers have pondered the use of biometrics.

REALTIME APPLICATIONS: i. U.K Airport Eye IDs:


Heathrow is the first UK airport to carry out a large-scale trial of the iris recognition technology, which examines a passenger's eye, rather than their passport as they go through immigration control. The aim is to speed up the movement of passengers through the terminal and detect illegal immigrants. Each passenger will have an image of one of his or her eye's iris

regular systems component, thus raising resistance to the use of biometrics in

Tests Passenger

ii)Travel and tourism:


There are multi application cards for travelers which, incorporating a biometric, would enable them to participate in various frequent flyer and border control systems as well as paying for their air ticket, hotel room, hire care etc.

stored on computer. Instead of showing their passport on arrival they will go into a kiosk where in seconds a camera will check that the pattern of their iris matches computer records

buying beer bottles. The biometrics market is expected to grow to $1.8 billion by 2004.

CONCLUSION:
Biometrics makes automated use of physiological or behavioral characteristics to determine or verify identity. Finger biometrics are most popular and one of the most accurate and cost effective solutions. Hand geometry, signature-scan, keystroke-scan, palmscan are some more biometric technologies in use. With Biometrics there is no problem of ID being stolen. Many institutions and organizations are trying to use this type of technology.

BENFITS:
>Increased security when controlling access to confidential data and IT systems. > Reduced risk of fraudulent use of identity by employees. >Enhanced user convenience. > Increased costs savings due to reduced password maintenance costs. >User convenience due to no passwords to remember or reset and faster login. >Privacy ability to transact anonymously.

REFERENCES:
1. A Machine Learning Approach by S. Y. Kung, M. W. Mak, S. H. Lin. 2. Implementing Biometric Security by John Chirillo, Scott Blaul "IN THE REALM OF computer security, biometrics. www.irsecurityandsafety.com www.fingerprintlock.com www.neurotechnologija.com

BIOMETRIC IN FUTURE:
In future with Biometrics, one can go to shopping without money purse or credit card. It just needs to place his/her finger on the reader device and can debit money from their bank accounts. In credit cards system if a mother and daughter have a joint account, then they cannot know how much each one uses. But with biometrics mother will know her daughter secretly

Anda mungkin juga menyukai