Bio Metrics

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

PAPER PRESENTATION

ON

BIO METRICS

SUBMITTED BY:

K.KALA BHARATHI L.GAYATRI


MCA(2/3)YEAR MCA(2/3)YEAR
Y6MC37017 Y6MC37012
KLCE KLCE
VADDESWARAM VADDESWARAM
[email protected] [email protected]
ABSTRACT

Biometrics are automated methods of recognizing a


person based on a physiological or behavioral characteristic. Among the
features measured are; face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, and voice. Biometric technologies are becoming the
foundation of an extensive array of highly secure identification and
personal verification solutions. As the level of security breaches and
transaction fraud increases, the need for highly secure identification and
personal verification technologies is becoming apparent.
There are many needs for biometrics beyond Homeland Security.
Enterprise-wide network security infrastructures, secure electronic
banking, investing and other financial transactions, retail sales, law
enforcement, and health and social services are already benefiting from
these technologies.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data privacy. Enterprise-
wide network security infrastructures, government IDs, secure electronic
banking, investing and other financial transactions, retail sales, law
enforcement, and health and social services are already benefiting from
these technologies. Utilizing biometrics for personal authentication is
becoming convenient and considerably more accurate than current
methods (such as the utilization of passwords or PINs).
INTRODUCTION:
Biometrics are automated methods of recognizing a
person based on a physiological or behavioral characteristic. Among the
features measured are; face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, and voice. Biometric technologies are becoming the
foundation of an extensive array of highly secure identification and
personal verification solutions. As the level of security breaches and
transaction fraud increases, the need for highly secure identification and
personal verification technologies is becoming apparent.
WHAT ARE BIOMETRICS?
Biometrics are automated methods of
recognizing a person based on a physiological or behavioral characteristic.
Biometric technologies are becoming the foundation of an extensive array
of highly secure identification and personal verification solutions.
Biometrics is expected to be incorporated in solutions to provide for
Homeland Security including applications for improving airport security,
strengthening our national borders, in travel documents, visas and in
preventing ID theft. Now, more than ever, there is a wide range of
interest in biometrics across federal, state, and local governments.
Congressional offices and a large number of organizations involved in
many markets are addressing the important role that biometrics will play
in identifying and verifying the identity of individuals and protecting
national assets.
NEED OF BIOMETRICS:
An indication of the current substantial
growth and interest in biometrics is the emergence of biometrics industry
standards and related activities. Standards have become strategic
business issues. For any given technology, industry standards assure the
availability of multiple sources for comparable products and of competitive
products in the marketplace. Standards will support the expansion of the
marketplace for biometrics.
After the tragic events of September 11, there is an increased emphasis
on biometrics standards. ITL is in a unique position to help end-users and
the industry in accelerating the deployment of needed, standards-based
security solutions in response to Critical Infrastructure protection and
Homeland Defense/Security requirements. ITL is accelerating the
development of biometric standards (e.g., technology-independent
interoperability and data interchange) in collaboration with Federal
Agencies, other end-users, biometric vendors and the IT industry.
BIOMETRIC TECHNOLOGIES:
Some of main technologies used in
biometrics are Fingerprint, Hand geometry, Facial and Iris recognition.
●FINGERPRINT TECHNOLOGY:

Human fingerprints are unique to


each person and can be regarded as some sort of signature, certifying the
person's identity. The most famous application of this kind is in
criminology. However, nowadays, automatic fingerprint matching is
becoming increasingly popular in systems which control access to physical
locations, computer/network resources, bank accounts, or register
employee attendance time in enterprises. Straightforward
matching between the fingerprint pattern to be identified and many
already known patterns would not serve well due to its high sensitivity to
errors. A more advanced solution of this problem is to extract features of
so called minutiae points (points where capillary lines have branches or
ends) from the fingerprint image, and check matching between the sets of
fingerprint features.

Recognition Systems' fingerprint readers analyze fingerprints


located between the tip of a finger and first knuckle. An image is captured
by a patented algorithm which then extracts unique points from the image
and converts the data into a unique mathematical template. The
fingerprint reader compares this information with a "template" of the
individual's print that has previously been stored. Once the person has
been verified as a valid user, a door can be opened or access can be
granted.

Advantages:
• Low cost biometric technology
• Low volume, low throughput openings
• High security environments
Application:
Access Control

● HAND GEOMETRY:
Recognition Systems' biometric HandReaders
simultaneously analyze more than 31,000 points and instantaneously
records more than 90 separate measurements of an individual's hand-
including length, width, thickness and surface area-to verify that the
person using the device is really who he or she claims to be. The Hand
Reader compares this information with a "template" of the individual's
hand that has previously been stored in the reader, on a server or on a
card. Once the person has been identified as a valid user, a door can be
opened, access can be provided, or time recorded. The reading and
verification process takes less than a second with impeccable reliability
Applications:
•Time & Attendance • Identity Verification • Access
Control
Advantages:
• High volume, high throughput openings
• Maintains industry leading performance in harsh
environments
• High security environments
•Identity Verification
● FACIALTECHNO
LOGY:
Recognition Systems' face recognition readers analyze faces based on
the found face and eyes position. The method involved in this is as
follows:
>Any kind of data source is used for input it is either a still image, a
video stream
or a connection to a face image database.
>Normalization: based on the found face and eyes position, the image is
scaled,
rotated and finally presented at a fixed size
>Preprocessing: standard techniques applied like histogram equalizations,
intensity normalization
>The images are analyzed to determine the position and size of one or
more faces.
The eyes centers are located and marked. Images including eyes
positions are
taken as Primary Facial Data.
>Characteristics of the face are extracted and represented as a vector in
n-dimensional spaces are similarity of faces is the distance of two
vectors. The
vectors represent the Secondary Facial Data and are used for fast
comparisons.
>Secondary Facial Data can be stored in a central database or on a token
storage
device, like a smartcard
>In case the Secondary Facial Data is stored on a smartcard, only
verification is
possible.
IDENTIFICATION MODE: The presented data is used to scan a data base
for
most similar faces the most similar reference data is taken as an
evidence of the
person’s identity.
VERIFICATION MODE: The presented facial data is compared to data read
from the database or token, based on the similarity threshold the identity
is confirmed.
APPLICATIONS:
Physicalaccesscontrol LogicalAccessControl
SurveillanceSystems Point
ofSalesSystems
●IRIS RECOGNITION:
Iris recognition is the most powerful biometric technology. The
iris is the plainly visible, colored ring that surrounds the pupil. It is a
muscular structure that controls the amount of light entering the eye, with
intricate details that can be

measured, such as striations, pits, and furrows. The iris is not to be


confused with the retina, which lines the inside of the back of the eye.
-
No two irises are alike. There is no detailed correlation between the
iris patterns of even identical twins, or the right and left eye of an
individual. The amount of information that can be measured in a single iris
is much greater than fingerprints, and the accuracy is greater than DNA. n
this method an iris recognition camera takes a black and white picture
from 5 to 24 inches away, depending on the type of camera. The camera
uses non-invasive, near-infrared illumination (similar to a TV remote
control) that is barely visible and very safe. Unlike other biometric
technologies that can be used in surveillance mode, iris recognition is an
opt-in technology. In order to use the technology you must first glance at
a camera. Iris recognition cannot take place without your permission
Iris Code:
The picture of an eye is first processed by software that localizes
the inner and outer boundaries of the iris, and the eyelid contours, in
order to extract just the iris portion. Eyelashes and reflections that may
cover parts of the iris are detected and discounted.
Sophisticated mathematical software then encodes the iris pattern by a
process called Demodulation. This creates a phase code for the texture
sequence in the iris, similar to a DNA sequence code. The Demodulation
process uses functions called 2-D wavelets that make a very compact yet
complete description of the iris pattern, regardless of its size and pupil
dilation, in just 512 bytes.
The phase sequence is called an IrisCode® template, and it captures the
unique features of an iris in a robust way that allows easy and very rapid
comparisons against large databases of other templates. The IrisCode
template is immediately encrypted to eliminate the possibility of identity
theft and to maximize security.
Iris Recognition:
In less than a few seconds, even on a database of
millions of records, the IrisCode® template generated from a live image is
compared to previously enrolled ones to see if it matches any of them.
The decision threshold is automatically adjusted for the size of the search
database to ensure that no false matches occur even when huge numbers
of Iris Code templates are being compared with the live one. Some of the
bits in an IrisCode template signify if some data is corrupted (for example
by reflections, or contact lens boundaries), so that it does not influence
the process, and only valid data is compared. Decision thresholds take
account of the amount of visible iris data, and the matching operation
compensates for any tilt of the iris. A key advantage of iris recognition is
its ability to perform identification using a one-to-all search of a database,
with no limitation on the number of IrisCode records and no requirement
for a user first to claim an identity, for example with a card.
ADVANTAGES:
• Most accurate • Scalable • Opt-in • Non-
contact
APPLICATIONS:
Biometric-based authentication applications include
workstation, network, and domain access, single sign-on, application
logon, data protection, remote access to resources, transaction security
and Web security. Trust in these electronic transactions is essential to the
healthy growth of the global economy. Utilized alone or integrated with
other technologies such as smart cards, encryption keys and digital
signatures, biometrics are set to pervade nearly all aspects of the
economy and our daily lives.

CONCLUSION:

Biometric-based solutions are able to provide for


confidential financial transactions and personal data privacy. Enterprise-
wide network security infrastructures, government IDs, secure electronic
banking, investing and other financial transactions, retail sales, law
enforcement, and health and social services are already benefiting from
these technologies. Utilizing biometrics for personal authentication is
becoming convenient and considerably more accurate than current
methods (such as the utilization of passwords or PINs). This is because
biometrics links the event to a particular individual (a password or token
may be used by someone other than the authorized user), is convenient
(nothing to carry or remember), accurate (it provides for positive
authentication), can provide an audit trail and is becoming socially
acceptable and inexpensive.

BIBLIOGRAPHY

1. www.irrsi.com
2. www.irsecurityandsafety.com
3. www.fingerprintlock.com
4. www.neurotechnologija.com
5. www.cognitec-systems.de

You might also like