By
G.JAGAN MOHAN KUMAR I-M.C.A 09481F0010
ABSTRACT:
Biometrics are automated methods of recognizing a person based on a physiological Among or the behavioral features characteristic.
other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs).
measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. There are many needs for biometrics beyond Homeland Security. Enterprise-wide infrastructures, transactions, network secure retail security electronic sales, law
INTRODUCTION:
Biometrics are automated methods of recognizing a person based on a physiological Among or the behavioral features characteristic.
measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.
banking, investing and other financial enforcement, and health and social services are already benefiting from these technologies. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and
DEFINITION:
Biometrics involves identifying a person based on a unique physical characteristic that is different from any other person. Biometrics can be either
innate such as fingerprints, face or iris; or behavioral such as handwriting, gait or typing Style. Biometric characteristics are measured using sensors that produce data values that can then be processed by a computer using specialized algorithms for analysis and comparison. Biometric system is the integrated biometric hardware and software used to conduct biometric identification or verification.
protection accelerating
and the
Homeland development of
Defense/Security requirements. ITL is biometric standards (e.g., technologyindependent interoperability and data interchange) Federal in collaboration other with Agencies, end-users,
NEED OF BIOMETRICS:
An indication of the current substantial biometrics activities. growth is the and interest in of emergence have
biometrics industry standards and related Standards become strategic business issues. For any given technology, industry standards assure the availability of multiple sources for comparable products and of competitive products in the marketplace. Standards will support the expansion of the marketplace for biometrics. After the tragic events of September 11, there is an increased emphasis on biometrics standards. ITL is in a unique position to help end-users and the industry in accelerating the deployment of needed, standards-based security solutions in response to Critical Infrastructure
A biometric system, which relies only on a single biometric identifier in making a personal identification, is often
not able to meet the desired performance requirements. We introduce a multimodal biometric system, which integrates face recognition, fingerprint verification, and speaker verification in making a personal identification. This system
device or remotely in a central repository or on a portable token such as a chip card. The last one is an attractive option for two reasons. Firstly, it requires no local or central storage of templates and secondly, the user carries their template with them and can use it at any authorized reader position.
takes advantage of the capabilities of each individual biometric. A multimodal biometric speaker figure. system verification integrates in face a recognition, fingerprint verification, and making personal identification as shown in
[A] Enrollment:
The process whereby a users initial biometric sample or samples are collected, assessed, processed, and stored for ongoing use in a biometric system. These samples are referred as templates. A poor quality template will often cause considerable problems for the user, often resulting in a reenrolment.
[D] Verification:
The verification process requires the user to claim an identity by either entering a PIN or presenting a token, and then verify this claim by providing a live biometric to be compared against the claimed reference template. There will be a resulting match or no match accordingly. A record of this transaction will then be generated and stored, either locally within the device or remotely via a network and host (or indeed both).
opened, access can be provided, or time recorded. The reading and verification process takes less than a second with impeccable reliability.
Applications:
Time & Attendance Identity Verification Access Control
Advantages:
High volume, high throughput openings Maintains industry leading performance in harsh environments High security Identity Verification
2.Facial Technology:
Recognition Systems' face recognition readers analyze faces based on the found face and eyes position. The method involved in this is as follows
i)Eigenfaces:
Developed by Viisage Technology. First, a camera captures the image of a person. The face is mapped into a variety of coefficients depending on the features, which becomes 128 digits, otherwise called a "vector." The vector is the code for the person. When the person presents him/herself later to be identified, he/she must present a PIN or bar code and then allow the camera to take a picture. The difference between the face's vector and the database's vector for the PIN or bar code are placed on a coordinate system called "face space" and the differences between the two of them are determined.If distance
iii)Neural Networks:
Neural Networks is a slight bit more or complicated method. A processing than series units, the of are "eigenfaces" neurons,
connected together. A programmer sets the rules of how the neurons recognize patterns. If the actual output is greatly different than the computed output, then the neurons will adjust itself to fit the situation. More situations lead to more shifts in neurons, which lead to better results. >Any kind of data source is used for input it is either a still image, a video
stream or a connection to a face image database. >Normalization: based on the found face and eyes position, the image is scaled, rotated and finally presented at a fixed size >Preprocessing: standard techniques applied like histogram equalizations, intensity normalization >The images are analyzed to determine the position and size of one or more faces. The eyes centers are located and marked. Images including eyes positions are taken as Primary Facial Data.
vectors represent the Secondary Facial Data and are used for fast comparisons. >Secondary Facial Data can be stored in a central database or on a token storage device, like a smartcard >In case the Secondary Facial Data is stored on a smartcard, only verification is possible. IDENTIFICATION MODE: The presented data is used to scan a data base for most similar faces the most similar reference data is taken as an evidence of the persons identity. VERIFICATION MODE: The presented facial data is compared to data read from the database or token, based on the similarity threshold the identity is confirmed.
3. Iris Recognition:
Iris recognition is the most powerful biometric technology. The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be >Characteristics of the face are extracted and represented as a vector in n-dimensional spaces are similarity of faces is the distance of two vectors. The
the iris patterns of even identical twins, or the right and left eye of an individual. The amount of information that can be measured in a single iris is much greater than fingerprints, and the accuracy is greater than DNA. n this method an iris recognition camera takes a black and white picture from 5 to 24 inches away, depending on the type of camera. The measured, such as striations, pits, and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye. camera uses non-invasive, near-infrared illumination (similar to a TV remote control) that is barely visible and very safe. Unlike that other can biometric be used in technologies
surveillance mode, iris recognition is an opt-in technology. In order to use the technology you must first glance at a camera. Iris recognition cannot take place without your permission Iris Code: The picture of an eye is first processed by software that localizes the inner and outer boundaries of the iris, and the eyelid contours, in order to extract just the iris portion. Eyelashes and reflections that may cover parts of the iris are detected and discounted. Sophisticated mathematical software then encodes the iris pattern by No two irises are alike. There is no detailed correlation between a process called Demodulation. This creates a phase code for the texture
sequence in the iris, similar to a DNA sequence process code. uses The Demodulation called 2-D functions
the size of the search database to ensure that no false matches occur even when huge numbers of Iris Code templates are being compared with the live one. Some of the bits in an IrisCode template signify if some data is corrupted (for example by reflections, or contact lens boundaries), so that it does not influence the process, and only valid data is compared. data, and Decision the thresholds take operation account of the amount of visible iris matching compensates for any tilt of the iris. A key advantage of iris recognition is its ability to perform identification using a
wavelets that make a very compact yet complete description of the iris pattern, regardless of its size and pupil dilation, in just 512 bytes.
The phase sequence is called an IrisCode template, and it captures the unique features of an iris in a robust way that allows easy and very rapid comparisons against large databases of other templates. The IrisCode template is immediately encrypted to eliminate the possibility of identity theft and to maximize security. Iris Recognition: In less than a few seconds, even on a database of millions of records, the IrisCode template generated from a live image is compared to previously enrolled ones to see if it matches any of them. The decision threshold is automatically adjusted for
one-to-all search of a database, with no limitation on the number of IrisCode records and no requirement for a user first to claim an identity, for example with a card.
FUTURE APLICATIONS:
i. ATM machine use:
Most of the leading banks have been experimenting with biometrics for ATM machine use and as a general means of combating card fraud. Workstation and network access: Many are viewing this as the application, which will provide critical mass for the biometric transition public general. industry and create the between sci-fi device to awareness and lowering
Tests Passenger
stored on computer. Instead of showing their passport on arrival they will go into a kiosk where in seconds a camera will check that the pattern of their iris matches computer records
buying beer bottles. The biometrics market is expected to grow to $1.8 billion by 2004.
CONCLUSION:
Biometrics makes automated use of physiological or behavioral characteristics to determine or verify identity. Finger biometrics are most popular and one of the most accurate and cost effective solutions. Hand geometry, signature-scan, keystroke-scan, palmscan are some more biometric technologies in use. With Biometrics there is no problem of ID being stolen. Many institutions and organizations are trying to use this type of technology.
BENFITS:
>Increased security when controlling access to confidential data and IT systems. > Reduced risk of fraudulent use of identity by employees. >Enhanced user convenience. > Increased costs savings due to reduced password maintenance costs. >User convenience due to no passwords to remember or reset and faster login. >Privacy ability to transact anonymously.
REFERENCES:
1. A Machine Learning Approach by S. Y. Kung, M. W. Mak, S. H. Lin. 2. Implementing Biometric Security by John Chirillo, Scott Blaul "IN THE REALM OF computer security, biometrics. www.irsecurityandsafety.com www.fingerprintlock.com www.neurotechnologija.com
BIOMETRIC IN FUTURE:
In future with Biometrics, one can go to shopping without money purse or credit card. It just needs to place his/her finger on the reader device and can debit money from their bank accounts. In credit cards system if a mother and daughter have a joint account, then they cannot know how much each one uses. But with biometrics mother will know her daughter secretly