Bio Metrics
Bio Metrics
1.Definition:
Biometrics comprises methods for uniquely recognizing humans based upon one or
more intrinsic physical or behavioral traits. In information technology, in particular,
biometrics is used as a form of identity access management and access control. It is
also used to identify individuals in groups that are under surveillance.
• Physiological are related to the shape of the body. Examples include, but are
not limited to fingerprint, face recognition, DNA, hand and palm geometry,
iris recognition, which has largely replaced retina, and odor/scent.
• Behavioral are related to the behavior of a person. Examples include, but are
not limited to typing rhythm, gait, and voice. Some researchers have coined
the term behavior metrics for this class of biometrics.
1
2.Biometric system:
The first time an individual uses a biometric system is called an enrollment. During
the enrollment, biometric information from an individual is stored. In subsequent
2
uses, biometric information is detected and compared with the information stored at
the time of enrollment. Note that it is crucial that storage and retrieval of such systems
themselves be secure if the biometric system is to be robust. The first block (sensor) is
the interface between the real world and the system; it has to acquire all the necessary
data. Most of the times it is an image acquisition system, but it can change according
to the characteristics desired. The second block performs all the necessary pre-
processing: it has to remove artifacts from the sensor, to enhance the input (e.g.
removing background noise), to use some kind of normalization, etc. In the third
block features needed are extracted. This step is an important step as the correct
features need to be extracted in the optimal way. A vector of numbers or an image
with particular properties is used to create a template. A template is a synthesis of the
relevant characteristics extracted from the source. Elements of the biometric
measurement that are not used in the comparison algorithm are discarded in the
template to reduce the file size and to protect the identity of the enrollee.
If enrollment is being performed the template is simply stored somewhere (on a card
or within a database or both). If a matching phase is being performed, the obtained
template is passed to a matcher that compares it with other existing templates,
estimating the distance between them using any algorithm (e.g. Hamming distance).
The matching program will analyze the template with the input. This will then be
output for any specified use or purpose (e.g. entrance in a restricted area).
3
Finger print recognitions Software:
The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is
a pattern where the ridges enter from one side of the finger, rise in the center forming
an arc, and then exit the other side of the finger. The loop is a pattern where the ridges
enter from one side of a finger, form a curve, and tend to exit from the same side they
enter. In the whorl pattern, ridges form circularly around a central point on the finger.
Scientists have found that family members often share the same general fingerprint
patterns, leading to the belief that these patterns are inherited.
Minutia features
The major Minutia features of fingerprint ridges are: ridge ending, bifurcation, and
short ridge (or dot). The ridge ending is the point at which a ridge terminates.
Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or
dots) are ridges which are significantly shorter than the average ridge length on the
4
fingerprint. Minutiae and patterns are very important in the analysis of fingerprints
since no two fingers have been shown to be identical.
4.Biometric Softwares:
Biometric logon systems and timekeeping software
Tutis biometric logon is an elegant, robust and scalable solution that uses biometric
authentications for desktop and network access. Biometric authentication eliminates
the need for remembering complex passwords and periodic changes to the password
mandated by password management practices.
Tutis also allows you to secure your files and folders from unauthorized access by
securing it with your unique fingerprint.
5
TimeKeeper: Biometric Time and Attendance Software:
Microsoft Fingerprint
Reader (USB)
6
Using this you can log on to your computer and your favorite Web sites with the
touch of your finger, without having to remember all those passwords—simply place
your finger on the receiver whenever a password or username is required.
Easy-to-use software makes replacing passwords with your fingerprint a breeze. The
Registration Wizard helps you register fingerprints for each user. When you first visit
a site that requires a password, just touch the Fingerprint Reader with your registered
finger, enter your data, and then click OK. When you browse back to that Web site,
you can simply log on with your fingerprint. You can also use the Fingerprint Reader
to quickly switch between Windows® user accounts without closing programs and
files—and each user's personal content stays personal.
5.Biometric Applications:
Following September 11th the pace of development of Biometrics applications has
accelerated considerably; at present most are still very high end applications, with
government, defense and airport security being major customers. However there are
some arenas in which biometric applications are moving towards commercial
application.
7
Digital Persona, which we at EyeNetWatch reckon is the most reliable the
system is easy to install and to integrate with web applications. This system has
provided security for the admin system for Global Real Estate for the last 3
years.
III. Employee Recognition:
There are many employee recognition systems available but Biometrics provides
a cheaper alternative to most, very few people lose their fingers or eyes when
compared with those who lose smartcards or forget passwords.
IV. Time and Attendance Systems:
Time and attendance has always been a problem in some industries. Biometrics
can effectively eliminate problems with buddy clocking by ensuring that the
employee in question is present.
V. Voting Solutions:
The management of voters to ensure no one votes twice has been a notoriously
difficult application, however recent developments in the technology have
allowed governments to adopt a high degree of security to prevent such a
problem. Click here to read a case study using Eyenetwatch technology.
6.Advantages of Biometrics :
* Biometric Time Clocks or Biometric time and attendance systems, which are being
increasingly used in various organisations to control employee timekeeping.
* Biometric safes and biometric locks, provides security to the homeowners.
* Biometric systems are also developed for securing access to pc's and providing
single logon facilities.
* Wireless biometrics for high end security and providing safer transactions from
wireless devices like PDA's, etc.
8
* Biometrics airport security devices are also deployed at some of the world's
famous airports to enhance the security standards.