Biometrics


Abstract
The idea of the linking physical characteristics to establish a person’s identity is not new. It is well known that every person traints is distinct to each individual. And so people can be identified on the basis of their physical characteristics and this distinct characteristics are the pillar of biometrics concept. The use of biometrics was started in 1882 in the criminal identification division, Police Department in Paris & France and this identification based on the number of bodily measurement and physical description. Nowadays number of simple widely available means of personnel identification including photo ID cards and secrete password. While these simple means of identification work most of the time, they may be compromised easily. For example, ID cards may be lost, stolen or coppied. Similarly password or different indemnification numbers (PIN) may be forgotten or guess by others. But biometrics is one promising area where identification can not be treated share lost, or stolen. In Person can identify from physical characteristics i.e. fingerprint, handprint, face, sent, thermal image or Iris pattern or personnel trait (voice pattern, handwriting or acoustic signature)


Introduction:-
Given The Pervasive use of password and identification codes for user authentification across all aspects of our daily life, attackers have developed powerful password cracking code, well, thank to biometrics , there is a way . Biometrics modes of identification have been found to be most compelling and intriguing authentification technique,

What is biometrics?
Biometrics is mean of using parts of human body as a kind of permanent password. Just as your linger print unlike those of any other person, your eyes, ears, hands, voice, and fare are also unique. Technology has advance to the point where computer system can record and recognise the pattners , hand shapes ear lobe contours ,and a host of other physical characteristics using these biometrics, lapto and other portable device can be empowerd with the ability to instantly verify your identy and deny access to everybody else.


The underlying idea
What are the qualities that distinguish one person from other? of cource , personality differ to some extent, nut there is a physical uniqueness as well, once identify the physical characteristics can be exactly measured and analyzed . The statical use of the characteristics variation in unique element of living organism is know as Biometrics. Biometrics data of human being can be collected and analyzed in a number of ways, and has been introduces as a mode of personal identification. Biometrics system automatically verifies the identity of living person based on physiological characteristics. Physiological characteristics pertain to visible parts of the human body, yhes include fingerprint, retina, palm geometry, iris, facial structure etc. Behavioral based on what person does, this includes voice print, signature, an so on. A verify factor such as mood, stress and how long ago you woke up, can be affect behavioral characteristics.


MODE UNDER BIOMETRICS TECHNIQUES
(1) Face Recognition
(2) Finger Print Scan
(3) Hand Geometry
(4) Retinal/Iris Scanning
(5) Signature Verification
(6)Voice Verification
(7) DNA Profiling

Block Diagram



Face Recognition
The most familiar biometrics technique is facial recognition. Human beings use facial recognition all the time to identify other people. As a result, in the field of biometrics, facial recognition is one of the most active areas of research. Applications of this research range from the design of systems that identify people from still-photograph images of their faces to the design of systems that recognize active and changing facial images against a cluttered background. More advanced systems can recognize a particular individual in a videotape or a movie. Researchers base the patterns used for facial recognition on both specific and general features. The specific features include the location and shape of facial attributes such as the eyes, eyebrows, nose, lips, and chin. More generally, they employ an overall analysis of the facial image and a breakdown of the image into a number of component images. Researchers are unsure whether the face itself, without any additional information, is sufficient for the accurate recognition of one person in a large group of people. Some facial recognition systems impose restrictions on how the facial images are obtained, sometimes requiring a simple background or special lighting.


Fingerprint Identification


A fingerprint is the pattern of ridges and furrows on the surface of Fingertip No two persons have exactly the same arrangement of patterns, and the patterns of anyone individual remain unchanged throughout life. Fingerprints are so distinct that even the prints of identical twins are different. The prints on each finger of the same person are also different. The level of detail in Fingerprint images scanned into a biometrics system depends on several factors. They include the amount of pressure applied to the fingertip during image scanning, the Presence of any cuts or other deformities on the fingertip, and the dryness of the skin. It has many applications, such as laptop computers and cellular telephones. Consequently, researchers expect fingerprint identification to be the leading biometrics technique in the near future. One problem with fingerprint technology is its acceptability in society, because fingerprints have traditionally been associated with criminal investigations and police work. Another problem is that the fingerprints of a small fraction of the .population may be Unsuitable for automatic identification because the prints may be deformed as a result of aging, some genetic condition, or environmental reasons.


Hand Geometry
A variety of measurements of the human hand can be used as biometrics characteristics. These include hand shape, the lengths and widths of the fingers, and the overall size of the hand. Biometrics devices baseed on hand geometry have been installed at many locations around the world. Hand-reader systems are used at some prisons in the United States and the United Kingdom to track the movement of inmates. The United States Immigration and Naturalization Service use hand-reader systems at several major U.S. airports for the rapid admittance of frequent foreign travelers into the United States. The hand-geometry technique is simple, relatively easy to use, and inexpensive. The main disadvantage of this technique is that it does not distinguish well between the hands of different people. In other words, the system can easily determine if a particular hand shape belongs to a specified individual but cannot reliably determine if a particular hand shape belongs to one of several individuals.
Hand geometry information may vary over the lifespan of an individual, especially during childhood, when rapid growth can drastically change hand geometry. In addition, the presence of jewelry or limited dexterity as a result of arthritis may make it difficult for a system to extract correct hand geometry information. Biometrics systems based on hand geometry are large-in size, so they cannot be used in applications with limited space, such as laptop computers.

Retinal or Iris Scanning
The retina is the innermost layer of the eye. The pattern formed by veins beneath the surface of the retina is unique to each individual. This pattern is a reliable biometrics characteristic. Researchers acquire digit images of retinal patterns by projecting a low-intensity beam of visible or infrared light into a person's eye and scanning an image of the retina. For a fixed portion of the retina to be used for identification, the person undergoing the scan must gaze into an eyepiece and focus on a predetermined spot. The amount of user cooperation required for 'a retinal scan makes this technique unacceptable in many applications. On the other hand, a large number of biometrics devices based on retinal scans have been installed in prisons and other highly secure environments. The primary disadvantage of this biometrics technique is that retinal scanners are expensive.
The iris is the colored part of the eye. It lies at the front of the eye, surrounding the pupil. Each iris is unique, and even irises of identical twins are different. The complex structure of the iris carries distinctive information that is useful for identification pf individuals. Early results of research on the accuracy and speed of iris-based identification have been extremely promising. These results indicate that it is feasible to develop a large-scale recognition system using iris information. Furthermore, the iris is more readily imaged than the retina.

Signature Verification



Each person has a unique style of handwriting and, therefore, a unique signature. One problem with signature recognition is that the signature of a particular individual may vary somewhat. Despite the variations, researchers have designed a few successful systems for signature-based authentication. Biometrics devices based on signature verification are reasonably accurate, but not accurate enough to recognize specific individuals in a large population. However, signature verification is reliable enough to be used in place of a PIN in accessing automated teller machines (ATMs). If there are two approaches to identification based on signature verification: static and dynamic. Static signature verification uses only the geometric (shape) features of a signature, such as the degree of slant, breadth and height of letters, and space between lines, letters, and

words. Dynamic signature verification uses both geometric features and dynamic features, such as the speed a person writes and the pressure of the writing implement. Dynamic verification requires a special pen. It is resistant to forgery, as it is virtually impossible for a forger to replicate both the shape of a signature and the speed and pressure with which another person signs his or her name. An inherent advantage of a signature-verification system is that the signature is already an acceptable form of personal identification. It can, therefore, be incorporated easily into existing business processes, such as credit card transactions.

Voice Verification
Like signature, speech is mostly a behavioral characteristic. However, speech has some biological aspects that make speech 'characteristics similar for all people. These similarities are due to the relatively similar shape and size of individuals' vocal tracts, mouths, nasal cavities, and lips, all of which help produce the sounds of speech. The speech of a specific individual is distinctive but may not contain sufficient information to be of value in large scale recognition. Voice recognition is based on either text-dependent speech input or a1 text independent speech input. A text dependent system verifies the identity of an individual on the basis of the utterance of a fixed predetermined phrase, such as the person's name. A text independent system verifies the identity of a speaker regardless of what he or she Text-independent voice recognition is more difficult than text-dependent verification but Offers more protection against fraud.
Speech-based features are sensitive to factors such as background noise and the emotional and physical state of the speaker. In addition, some people are extraordinarily skilled at mimicking other people's voices. This popular perception of the vulnerability of voice recognition may be a reason why speech-based authentication is not widely used in high security applications. For example, access to a nuclear power plant may require a biometrics system with a FAR of 0.001 percent (one impostor admitted in 100,000 attempts) and an FRR of 0.1 percent (one valid user rejected in 1,000 attempts). Current voice-recognition systems cannot provide this level of accuracy. However, in an application to provide security for a telephone account voice-recognition system is preferred. Such a biometrics system can be easily» integrated into the existing telephone,' system, as speech sensors are already available
in telephones.

DNA Profiling
DNA profiling is one of the most unique biometrics. To obtain DNA, a sample of hair, skin, blood, or other body tissue must be taken. However, DNA processing and matching systems employ several advanced biotechniques.

WHAT FACTORS CAUSE BIOMETRIC SYSTEMS TO FAIL?
Biometric system performance varies according to sample quality and the environment in which the sample is being submitted. While it is not possible to definitely state if a biometric submission will be successful, it is possible to locate factors that can reduce affect system performance.
The IBG Strike System details, technology-by-tecfmology, aspects that work against a successful verification. Some of These strikes are listed below.
Finger-scan
1. Cold finger
2. Dry/oily finger
3. High or low humidity
4. Angle of placement
5. Pressure of placement
6. Location of finger on platen (poorly placed core)
7. Cuts to fingerprint
8. Manual activity that would mar or affect fingerprints (construction, gardening)


Application
The No. of facinating biometrics application are all ready in use with many more on the drawing bond . Banks & the Financial Institution Are Experimenting. With biometrics model of autheriilcation Ex. ATM to combat card fraud .It is also used in nationwide building society.


Conclusion:-
In this ways Biometrics Provide us Security in the field of banking, lnternet, Defence
And Vast Other Fields.

BY-

Miss. Chinmayee Pande
Mr. Anand Gujar











Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.

0 comments:

Post a Comment

Thanks for your Valuable comment