Biometrics Security System
Biometrics Security System
SEMINAR REPORT ON
BIOMETRIC SECURITY SYSTEM
SUBMITTED TO
RAJASTHAN TECHNICAL UNIVERSITY
(IN PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE)
OF
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
SESSION 2009-2010
PREFACE
ACKNOWLEDGEMENT
Gazal Gupta
VIII SEM
06EJGIT020
Information Technology.
1.
2.
ABSTRACT
1.1
INTRODUCTION
1.2
DEFINITIONS OF BIOMETRIC
1.3
WHAT IS A BIOMETRIC?
BIOMETRIC TECHNOLOGY
2.1
10
3.
BIOMETRIC TYPES
12
4.
16
5.
4.1
16
4.2
AS A PATTERN
16
4.3
APPLICATION
17
4.4
19
4.5
20
4.6
21
22
6.
7.
5.1
FEATURE OF FINGERPRINT
23
5.2
24
5.3
25
5.4
27
5.5
28
5.6
CLASSIFYING FINFERPRINTS
29
31
6.1
EASE OF USE
32
6.2
ACCURACY
33
6.3
COST
BIOMETRIC APPLICATIONS
36
38
41
10.
CONCLUSION
43
11.
BIBLIOGRAPHY
44
ABSTRACT
With the increasing use of electronics and electronic commerce in our
day-to-day lives, the importance of fraud-proof identification and
recognition systems for use in security applications has grown .The
improved understanding of biological systems and the ability to model them
using computer algorithms has led to utilization of biometrics in
authentication systems. Voice, Iris, Face, Signature, Hand Geometry are the
biometrics that have been studied and applied to various kinds of
identification and authentication systems.
Biometrics is a means of using parts of the human body as a
kind of permanent password. Technology has advanced to the point where
computer systems can record and recognize the patterns, hand shapes, ear
lobe contours, and a host of other physical characteristics. Using this
biometrics, laptop and other portable devices can be empowered with the
ability to instantly verify your identity and deny access to everybody else.
CHAPTER 1
BIOMETRICS - AN INTRODUCTION
1.1 INTRODUCTION
Biometrics is a rapidly evolving technology that facilitates the automatic
identification of an individual based on his or her physiological or behavioral
characteristics.
These characteristics are referred to as biometric identifiers and are
unique to each and every one of us. Physiological or physical identifiers do
not change overtime and include a persons fingerprint, facial features, iris,
and retina patterns, along with geometric shape of your hand. Behavioral
identifiers do change over time or with mood and include a persons voice,
signature and the way one types at keyboard.
Users PIN and passwords can be forgotten and token-based ids such as
smart cards, employee badges, passports and drivers license can be lost,
stolen or forged. Biometric identification systems provide a solution to these
problems, since they require the user to be physically present at the point of
identification and unique biometric identifiers are based on who you are, as
opposed to what you know or have in your possession.
7
Biometrics
measure
individuals
unique
physical
or
behavioral
Capture the chosen biometric; Process the biometric and enroll the
biometric template; Store the template; Live-scan the chosen biometric;
Process the biometric and extract the biometric template; Match the scanned
biometric against stored templates; Provide a matching score to business
applications; Record a secure audit trail with respect to system use.
CHAPTER 2
BIOMETRIC TECHNOLOGY
2.1 THE BIOMETRIC MODEL
DATA COLLECTION
SIGNAL
DECISION
PROCESSING
BIOMETRICS
DECISION
PATTERN
MATCHING
PRESENTATION
DATA STORAGE
SENSOR
QUALITY
CONTROL
FEATURE
EXTRACTION
DATABASE
SMARTCARD
TRANSMISSION
IMAGE STORAGE
COMPRESSION
TRANSMISSION
EXPANSION
Components
Three major components are usually present in a biometric system:
A mechanism to scan and capture a digital or analog image of a living
persons biometric characteristic.
Software for storing, processing and comparing the image.
An interface with the applications system that will use the result to
confirm an individuals identity.
2.2
Process
Two different stages are involved in the biometric system process
Enrollment and Verification.
2.2.1 Enrollment.
As shown in Figure 3.1, the biometric image of the individual is
captured during the enrollment process (e.g., using a sensor for fingerprint,
microphone for voice verification, camera for face recognition, scanner for
eye scan). The unique characteristics are then extracted from the biometric
image to create the users biometric template. This biometric template is
stored in a database or on a machine-readable ID card for later use during an
identity verification process.
11
2.2.2 Verification.
13
CHAPTER 3
BIOMETRIC TYPES
1. Fingerprint Verification
There is variety of approaches to fingerprint verification. Some of them
try to emulate the traditional police method of matching minutiae, others are
straight pattern matching devices, and some adopt a unique approach all of
their own, including moir Fringe patterns and ultrasonic. Some of them can
detect when a live finger is presented, some cannot. There is a greater variety
of fingerprint devices available than any other biometric at present.
of the few devices, which can work well in identification mode. Ease of use
and system integration have not traditionally been strong points with the iris
scanning devices, but we can expect to see improvements in these areas as
new products are introduced.
4. Signature Verification
Signature verification analyzes the way a user signs his/her name.
Signing features such as speed, velocity, and pressure are as important as the
finished signature's static shape. Signature verification enjoys a synergy with
existing processes that other biometrics do not. People are used to signatures
as a means of transaction-related identity verification, and most would see
nothing unusual in extending this to encompass biometrics. Signature
verification devices are reasonably accurate in operation and obviously lend
themselves to applications where a signature is an accepted identifier.
Surprisingly, relatively few significant signature applications have emerged
compared with other biometric methodologies. But if your application fits, it
is a technology worth considering.
5. Facial Recognition
Face recognition analyzes facial characteristics. It requires a digital
camera to develop a facial image of the user for authentication. This
technique has attracted considerable interest, although many people don't
completely understand its capabilities. Some vendors have made extravagant
claimswhich are very difficult, if not impossible, to substantiate in
practicefor facial recognition devices. Because facial scanning needs an
extra peripheral not customarily included with basic PCs, it is more of a
niche market for network authentication. However, the casino industry has
16
6. Hand Geometry
Hand geometry involves analyzing and measuring the shape of the hand.
These biometric offers a good balance of performance characteristics and are
relatively easy to use. It might be suitable where there are more users or
where users access the system infrequently and are perhaps less disciplined
in their approach to the system.
7. Software Analysis
Smart protector allows software products to be simply and effectively
protective against piracy. Part of application code, completely developed in
VB 6.0 is recompiled and transferred at run time executed into a smart card
where, due to physical protection, it is in accessible .Smart protector makes
it possible also for developers who are not expert of smart card technology to
set up, in a very short time, protected and non duplicable software
applications.
17
CHAPTER 4
DETAIL ANALYSIS OF BIOMETRIC
SECURITY SYSTEM USING FACE DETECTION
3. Eye feature extraction: Features of eyes are extracted at the end of this
step
4.5 Face Detection:Two different methods were implemented in the project. They are:
1. Continuously Adaptive Means-Shift Algorithm
2. Haar Face Detection method
4.6 Continuously Adaptive Mean-Shift Algorithm:Adaptive Mean Shift algorithm is used for tracking human faces and is based
on robust non-parametric technique for climbing density gradients to find the
mode (peak) of probability distributions called the mean shift algorithm. As
faces are tracked in video sequences, mean shift algorithm is modified to
deal with the problem of dynamically changing color probability
distributions. The block diagram of the algorithm is given below:
20
CHAPTER 5
DETAIL ANALYSIS OF BIOMETRIC SECURITY SYSTEM
USING FINGERPRINT RECOGNITION
Fingerprints are a distinctive feature and remain invariant over the
lifetime of a subject, except for cuts and bruises. As the first step in the
authentication process, a fingerprint impression is acquired, typically using
an inkless scanner. Several such scanning technologies are available. Figure
5A shows a fingerprint obtained with a scanner using an optical sensor. A
typical scanner digitizes the fingerprint impression at 500 dots per inch (dpi)
with 256 gray levels per pixel. The digital image of the fingerprint includes
several unique features in terms of ridge bifurcations and ridge endings,
collectively referred to as minutiae.
21
quality of input and enrollment data along with the basic characteristics of
the underlying feature extraction and matching algorithm.
5.1
FEATURES OF A FINGERPRINT
The AFIS allows a classification using more than one criterion versus a
search based only on a single fingerprint pattern, reducing the number of
fingerprints inspected. The pattern classification divides all fingerprint
templates into five sets. Interestingly, the distribution of fingerprints in these
5 classes is not homogeneous among all people:
22
Figure 5.3 Fingers can then be sorted in the pattern classifications after
computing the core and the delta:
Tented arch class represents 3% of the total
Number of fingerprints
Less than 1% for unusable fingerprints (scar,
Illness of the skin, etc)
5.2
Most often in order to ensure that a good template is obtained, the fingerprint
needs to be captured more than once. Twice is most common but at times an
additional capture may be requested. After the capture of the template, it can
be stored in a database, on a token with 2D barcode, or in a smart card.
5.3
There are two ways a matching algorithm can be implemented, using either
identification matching or authentication matching. In identification
matching, one fingerprint is compared to many fingerprints using an
Automated Fingerprint Identification System (AFIS) that is comprised of
several computers and a database storage system. In authentication
matching, where there is a one to one fingerprint comparison, there needs
24
to be only one fingerprint terminal and a token loaded that contains the
fingerprint template. The matching could be done on token, in the terminal
Or in both the terminal and token.
25
A fingerprint scanner
image. These problems result in inconsistent, irreproducible and nonuniform contacts] and, during each acquisition, their effects on the same
fingerprint results are different and uncontrollable. The representation of the
same fingerprint changes every time the finger is placed on the sensor plate,
increasing the complexity of the fingerprint matching, impairing the system
performance, and consequently limiting the widespread use of this biometric
technology.
3D fingerprint
In order to overcome these problems, lately, non-contact (or touch less) 3D
fingerprint scanners have been developed. Employing the detailed 3D
information, 3D fingerprint scan acquisition provides a digital analogy to
this cumbersome analog process of pressing or rolling the finger. By
controlling the distance between neighboring points, the resolution is scaled
to 500/1000 PPI
5.5 Methods of fingerprint detection
Since the late nineteenth century, fingerprint identification methods have
been used by police agencies around the world to identify both suspected
criminals as well as the victims of crime. The basis of the traditional
fingerprinting technique is simple. The skin on the palmar surface of the
hands and feet forms ridges, so-called papillary ridges, in patterns that are
unique to each individual and which do not change over time. Even identical
28
twins (who share their DNA) do not have identical fingerprints. Fingerprints
on surfaces may be described as patent or latent. Patent fingerprints are left
when a substance (such as paint, oil or blood) is transferred from the finger
to a surface and are easily photographed without further processing. Latent
fingerprints, in contrast, occur when the natural secretions of the skin are
deposited on a surface through fingertip contact, and are usually not readily
visible. The best way to render latent fingerprints visible, so that they can be
photographed, is complex and depends, for example, on the type of surface
involved. It is generally necessary to use a developer, usually a powder or
chemical reagent, to produce a high degree of visual contrast between the
ridge patterns and the surface on which the fingerprint was left.
Developing agents depend on the presence of organic materials or inorganic
salts for their effectiveness although the water deposited may also take a key
role. Fingerprints are typically formed from the aqueous based secretions of
the eccrine glands of the fingers and palms with additional material from
sebaceous glands primarily from the forehead. The latter contamination
results from the common human behaviors of touching the face and hair.
The resulting latent fingerprints consist usually of a substantial proportion of
water with small traces of amino acids, chlorides, etc., mixed with a fatty,
sebaceous component which contains a number of fatty acids, triglycerides,
etc. Detection of the small proportion of reactive organic material such as
urea and amino acids is far from easy.
Crime scene fingerprints may be detected by simple powders, or some
chemicals applied at the crime scene; or more complex, usually chemical
techniques applied in specialist laboratories to appropriate articles removed
from the crime scene. With advances in these more sophisticated techniques
some of the more advanced crime scene investigation services from around
the world are now reporting that 50% or more of the total crime scene
fingerprints
29
Loop
(Right Loop)
Arch
Arch
(Tented Arch)
Whorl
30
CHAPTER 6
SELECTING BIOMETRIC TECHNOLOGY
Hand
Characteristic Fingerprints Geometr Retina Iris
y
Ease of Use
High
Error
incidence
Dryness,
dirt, age
Accuracy
High
Cost
User
acceptance
*
Medium
Face
Mediu
m
Lightin
Hand
Poor
g, age,
injury, Glasses
Lighting glasses,
age
hair
Very Very
High
High
High High
*
*
*
*
Mediu
Mediu
Medium
Medium
m
m
High
Low
Medium
Signature Voice
High
High
Noise,
Changing
colds,
signature
weath
s
er
High
High
Medium High
Required
High
security level
Medium High
Very
High
Mediu
Mediu
Medium
m
m
Long-term
stability
Medium High
High
Mediu
Mediu
Medium
m
m
High
*The large number of factors involved makes a simple cost comparison impractical.
31
False accept rates (FAR) indicate the likelihood that an impostor may be
falsely accepted by the system.
False reject rates (FRR) indicate the likelihood that the genuine user may
be rejected by the system.
32
Plot, you can compare these rates to determine the crossover error rate. The
lower the CER, the more accurate the system.
Figure 9: Crossover error rate attempts to combine two measures of biometric accuracy
6.3 COST
33
CHAPTER 7
BIOMETRICS APPLICATIONS
34
36
CHAPTER 8
COMBINING BIOMETRICS WITH SMART CARDS
Smart cards are widely acknowledged as one of the most secure and reliable
forms of electronic identification. To provide the highest degree of
confidence in identity verification, biometric technology is considered to be
essential in a secure identification system design. This section summarizes
the key benefits of a secure ID system that combines smart cards and
biometrics.
8.1
Enhanced Privacy
Using smart cards significantly enhances privacy in biometric ID
systems. The smart card provides the individual with a personal database, a
personal firewall and a personal terminal. It secures personal information on
the card, allowing the individual to control access to that information and
removing the need for central database access during identity verification.
8.2 A Personal Database.
How and where an ID system keeps personal information about its
members is an important privacy consideration, affecting a systems real and
perceived privacy behavior. Most ID systems store personal information for
all system members in a central database. This centralization leads many to
be concerned that their personal information is less protected, or at a
minimum, more vulnerable to compromise. Smart cards store and safeguard
personal information on the individuals card.
The use of smart card IDs can promote confidence in an ID system by
offering each member a unique secure, portable and personal database,
separating their information from other members data. With a smart card ID
37
uniformed officer who requests to see an ID. But is this officer a valid
officer? And what portion of the personal information is he or she authorized
to see? With a smart card ID, the card would authenticate the officer through
a portable card reader and release only the information that is relevant to the
officers responsibilities. The same ID card could be used to prove legal age
when purchasing from a bar. In this case, the smart card ID would just
confirm age, but not divulge any other personal information. Once personal
information is released, it is very hard to control what happens to the
information, including how it might be used. It is an important privacy
consideration for individuals to clearly understand when and to whom
personal information is released by an ID system. The release of personal
information is hard to control when carried out by a centralized database
somewhere on a network, without the information owners knowledge or
consent. A smart card based ID system gives the cardholder control over
who can access personal information stored on the card. A biometric further
enhances this control, ensuring that only the rightful cardholder can
authorize access to personal information.
8.4
Enhanced Security
Biometric technologies are used with smart cards for ID system
40
CHAPTER 9
THE FUTURE OF BIOMETRICS
There are many views concerning potential biometric applications, some
popular examples:
ATM machine use:
Most of the leading banks have been experimenting with biometrics for
ATM machine use and as a general means of combating card fraud.
Surprisingly, these experiments have rarely consisted of carefully integrated
devices into a common process, as could easily be achieved with certain
biometric devices. Previous comments in this paper concerning user
psychology come to mind here and one wonders why we have not seen a
more professional and carefully considered implementation from this sector.
The banks will of course have a view concerning the level of fraud and the
cost of combating it via a technology solution such as biometrics. They will
also express concern about potentially alienating customers with such an
approach. However, it still surprises many in the biometric industry that the
banks and financial institutions have so far failed to embrace this technology
with any enthusiasm.
There are many in this industry who have the vision of a multi
application card for travelers which, incorporating a biometric, would enable
them to participate in various frequent flyer and border control systems as
well as paying for their air ticket, hotel room, hire care etc., all with one
41
convenient token.
42
CHAPTER 10
CONCLUSION
The ultimate form of electronic verification of a persons
identity is biometrics; using a physical attribute of the person to make
a positive identification. People have always used the brains innate
ability to recognize a familiar face and it has long been known that a
persons fingerprints can be used for identification. The challenge has
been to turn these into electronic processes that are inexpensive and
easy to use.
BIBLIOGRAPHY
44