0% found this document useful (0 votes)
187 views

Bio Metrics

Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views

Bio Metrics

Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 9

BIOMETRICS

1.Definition:

Biometrics comprises methods for uniquely recognizing humans based upon one or
more intrinsic physical or behavioral traits. In information technology, in particular,
biometrics is used as a form of identity access management and access control. It is
also used to identify individuals in groups that are under surveillance.

Biometric characteristics can be divided in two main classes:

• Physiological are related to the shape of the body. Examples include, but are
not limited to fingerprint, face recognition, DNA, hand and palm geometry,
iris recognition, which has largely replaced retina, and odor/scent.
• Behavioral are related to the behavior of a person. Examples include, but are
not limited to typing rhythm, gait, and voice. Some researchers have coined
the term behavior metrics for this class of biometrics.

1
2.Biometric system:

A biometric system can operate in the following two modes:

• Verification – A one to one comparison of a captured biometric with a stored


template to verify that the individual is who he claims to be. Can be done in
conjunction with a smart card, username or ID number.
• Identification – A one to many comparisons of the captured biometric against
a biometric database in attempt to identify an unknown individual. The
identification only succeeds in identifying the individual if the comparison of
the biometric sample to a template in the database falls within a previously set
threshold.

The first time an individual uses a biometric system is called an enrollment. During
the enrollment, biometric information from an individual is stored. In subsequent

2
uses, biometric information is detected and compared with the information stored at
the time of enrollment. Note that it is crucial that storage and retrieval of such systems
themselves be secure if the biometric system is to be robust. The first block (sensor) is
the interface between the real world and the system; it has to acquire all the necessary
data. Most of the times it is an image acquisition system, but it can change according
to the characteristics desired. The second block performs all the necessary pre-
processing: it has to remove artifacts from the sensor, to enhance the input (e.g.
removing background noise), to use some kind of normalization, etc. In the third
block features needed are extracted. This step is an important step as the correct
features need to be extracted in the optimal way. A vector of numbers or an image
with particular properties is used to create a template. A template is a synthesis of the
relevant characteristics extracted from the source. Elements of the biometric
measurement that are not used in the comparison algorithm are discarded in the
template to reduce the file size and to protect the identity of the enrollee.

If enrollment is being performed the template is simply stored somewhere (on a card
or within a database or both). If a matching phase is being performed, the obtained
template is passed to a matcher that compares it with other existing templates,
estimating the distance between them using any algorithm (e.g. Hamming distance).
The matching program will analyze the template with the input. This will then be
output for any specified use or purpose (e.g. entrance in a restricted area).

3.Some Biometrics technologies:


1. Fingerprint Recognition
2. Signature Recognition
3. Iris Recognition
4. Facial Recognition
Fingerprint Recognition:
Fingerprint recognition is in effect one of the oldest biometric technologies and its
application in criminal identification, using the human eye, has been in use for well
over 100 years. Nowadays computer software and hardware can perform the
identification significantly more accurately and rapidly.
Fingerprint technology is one of the most developed of all biometric technologies and
its price is low enough to see it beginning to make inroads into the mass market.

3
Finger print recognitions Software:

Fingerprint recognition or fingerprint authentication refers to the automated


method of verifying a match between two human fingerprints. Fingerprints are one of
many forms of biometrics used to identify an individual and verify their identity. This
article touches on two major classes of algorithms (minutia and pattern).

The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is
a pattern where the ridges enter from one side of the finger, rise in the center forming
an arc, and then exit the other side of the finger. The loop is a pattern where the ridges
enter from one side of a finger, form a curve, and tend to exit from the same side they
enter. In the whorl pattern, ridges form circularly around a central point on the finger.
Scientists have found that family members often share the same general fingerprint
patterns, leading to the belief that these patterns are inherited.

The arch pattern. The loop pattern. The whorl pattern.

Minutia features

The major Minutia features of fingerprint ridges are: ridge ending, bifurcation, and
short ridge (or dot). The ridge ending is the point at which a ridge terminates.
Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or
dots) are ridges which are significantly shorter than the average ridge length on the

4
fingerprint. Minutiae and patterns are very important in the analysis of fingerprints
since no two fingers have been shown to be identical.

Ridge ending Bifurcation Short Ridge


(Dot).

4.Biometric Softwares:
Biometric logon systems and timekeeping software

Tutis Biometric Authentication Software: Biometric Logon for


Securing Desktops, Network and Files

Tutis biometric logon is an elegant, robust and scalable solution that uses biometric
authentications for desktop and network access. Biometric authentication eliminates
the need for remembering complex passwords and periodic changes to the password
mandated by password management practices.

Tutis also allows you to secure your files and folders from unauthorized access by
securing it with your unique fingerprint.

5
TimeKeeper: Biometric Time and Attendance Software:

Time Keeper is Biometrics Fingerprint recognition based Time Attendance System.


This is most suitable for the small and medium size companies having employees less
then 80 to 100. This consists of USB optical scanner SecuGen Hamster III that can get
attached to any standard Computer Time & Attendance software is loaded on same
PC.
Fingerprint based system eliminates proxy usage .As it uses physical presence of the
employee. Being connected to physical attributes of a person it reduces administrative
costs, which are associated with issuing, maintaining magnetic cards.

Finger print recognition Hardware:

Microsoft Fingerprint
Reader (USB)

6
Using this you can log on to your computer and your favorite Web sites with the
touch of your finger, without having to remember all those passwords—simply place
your finger on the receiver whenever a password or username is required.
Easy-to-use software makes replacing passwords with your fingerprint a breeze. The
Registration Wizard helps you register fingerprints for each user. When you first visit
a site that requires a password, just touch the Fingerprint Reader with your registered
finger, enter your data, and then click OK. When you browse back to that Web site,
you can simply log on with your fingerprint. You can also use the Fingerprint Reader
to quickly switch between Windows® user accounts without closing programs and
files—and each user's personal content stays personal.

5.Biometric Applications:
Following September 11th the pace of development of Biometrics applications has
accelerated considerably; at present most are still very high end applications, with
government, defense and airport security being major customers. However there are
some arenas in which biometric applications are moving towards commercial
application.

I. Network / PC Login Security:


Biometric Logon for PC and Networks is now well developed with a number of
players in the market. Best of these in our view is the Identix technology which
is integrated into Windows 2000 Active Directory and provides rapid
verification at logon. The second player in this market is the Digital Persona
UareU system which is slightly behind the Identix system in its development but
still provides a robust and affordable solution.
II. Web Page Security:
For the most effective security for web pages, the Bio Web Server system is the
leading market player. Integrated with a number of hardware options including

7
Digital Persona, which we at EyeNetWatch reckon is the most reliable the
system is easy to install and to integrate with web applications. This system has
provided security for the admin system for Global Real Estate for the last 3
years.
III. Employee Recognition:
There are many employee recognition systems available but Biometrics provides
a cheaper alternative to most, very few people lose their fingers or eyes when
compared with those who lose smartcards or forget passwords.
IV. Time and Attendance Systems:
Time and attendance has always been a problem in some industries. Biometrics
can effectively eliminate problems with buddy clocking by ensuring that the
employee in question is present.

V. Voting Solutions:
The management of voters to ensure no one votes twice has been a notoriously
difficult application, however recent developments in the technology have
allowed governments to adopt a high degree of security to prevent such a
problem. Click here to read a case study using Eyenetwatch technology.

6.Advantages of Biometrics :
* Biometric Time Clocks or Biometric time and attendance systems, which are being
increasingly used in various organisations to control employee timekeeping.
* Biometric safes and biometric locks, provides security to the homeowners.

* Biometric access control systems, providing strong security at entrances.

* Biometric systems are also developed for securing access to pc's and providing
single logon facilities.

* Wireless biometrics for high end security and providing safer transactions from
wireless devices like PDA's, etc.

* Applications of biometrics technology in identifying DNA patterns for identifying


criminals, etc.

8
* Biometrics airport security devices are also deployed at some of the world's
famous airports to enhance the security standards.

.. and much more !


7.Conclusion:
1. Biometric is an emering area with many oppurtunities for growth.
2. Possibly in the near future,you will not have to remember PINs and Password &
Keys in your bags or pockets will be things of the past.

You might also like