Biometric Unit 1
Biometric Unit 1
RECOGNITION
BIOMETRICS:
HISTORY OF BIOMETRICS
• The biometric system is not new in this world. It was there, since the 14th
century. At that period, China had introduced fingerprinting and had started
taking fingerprints of its merchants and their children to distinguish them from
all others. Fingerprinting has evolved since then.
• In the 19th century, a Scientist named Alphonse Bertillion discovered a
system, i.e., measurements of the body of a person to identify them. It took
the subject's photograph and recorded height, the length of one foot, an arm,
and index finger. He had acknowledged that some traits of the human body
such as the length of the fingers remain unchanged concerning other physical
characteristics such as length of hair, weight, etc., gets altered. This method
disapproved quickly as the persons with same body measurements would be
falsely taken as one. Hence, with the help of this research, a Scotland based
scientist Richard Edward Henry discovered a new method of fingerprinting.
• The notion of retinal identification was first introduced by Dr. Carleton Simon
and Dr. Isadore Goldstein in 1935. First face recognition paper was published
in 1971 (Goldstein et al.).The research and development effort was put in at
Eye Dentify Inc in 1976. The first commercial retina scanning system was
developed in 1981.
• John Daugman introduced the early successful Iris recognition in 1993 at
Cambridge University.
• FBI installed IAFIS in 2000 with a database of about 47 million prints;
average of 50,000 searches per day; 15% of searches are in lights out mode
and 2 hour response time for the criminal search.
• Biometrics Automated Toolset (BAT) was introduced in 2001, which
provided an accurate identification technique.
TYPES OF BIOMETRICS
Behavioral Biometrics:
Behavioral Biometrics is the scientific study of how people's and animals' bodies
function. It is further divided into:
• Signature Recognition
• Voice Recognition
• Keystroke
biometrics
Physical Behavioral
biometrics biometrics
fingerprints
Signature
verification
Face
biometrics Keystroke
recognition
Hand geometry
iris
retina
DNA
Speaker recognition:
Signature recognition:
Signatures have been in use from decades for personal identification as well as for
high-value transactions. It is a behavioral characteristic and can produce a lot of
statistically reliable data and also can be captured by electronic means. Earlier,
manual methods of signature verification were used which includes confirmation of
its shape. The biometric signature recognition system can verify a lot more to make
sure that if it is an authorized user or an imposter. Banks and financial service
providers use signatures for authentication and authorization.
Keystroke Dynamics :
The rhythm with which one types at a keyboard is sufficiently distinctive to form the
basis of the biometric technology known as keystroke dynamics. Different people
have different striking rate and style. It is analyzed and kept as a record for various
security purposes.
Physiological/physical Biometrics
Fingerprint recognition
The Fingerprint recognition is one of the oldest and, an efficient biometrics method
since fingerprints have long been recognized as an accurate and primary
identification method as the fingerprints of different individuals are not the same.
Like all the other biometrics technology, it identifies and verifies a person's
fingerprint with data saved in it beforehand. It has been a part of the forensic
investigation since the early days of fingerprint identification. Fingerprint
recognition has come a long way since then as the process of fingerprint
identification and matching advanced in forensic investigation agencies with the use
of technology. Nowadays, fingerprint recognition is extensively used from mobile
devices to door locks and even for high-security access control. Identification and
authentication have been made possible by tiny yet efficient fingerprint sensors for
mobile devices.
Face biometrics:
Our facial structure is the primary approach that people leverage to remember each
other. It is also a well exposed biometric technology that is used for human
identification and authentication. Now when we have high-quality cameras with the
ability to zoom, it is also likely to recognize a subject from the distance, making
facial recognition also suitable for security and surveillance applications.
Iris biometrics
In the human eye, the iris is the colored portion in the shape of a ring. If you look
closely, you will find it is made of many asymmetric thick thread-like structures.
These thread-like structures are the muscles that help adjust shape of the pupil and
only allow appropriate amount of light in the eye. By measuring the unique folds of
these muscles, biometric authentication tools can confirm identity with incredible
accuracy. Liveness detection – like requiring a user to blink for the scan – adds an
additional layer of accuracy and security.
Retina biometrics
Retinal scans capture capillaries deep within the eye by using unique near-infrared
cameras. The raw image is first preprocessed to enhance the image then processed
again as a biometric template to use during both enrollment and verification.
DNA matching
DNA matching has been introduced in our world a few decades before only. In this
biometric technology, some part of an individual's body like saliva, nail, hair or
blood is picked by forensic folks and then is taken through all forensic labs for
various investigations and medicinal purposes. DNA contains information about
race, paternity, and medical conditions for specific disease. In movies and especially
in CID we have seen these kinds of thrillers and CSI stories. DNA matching is a
proven method of personal identification where a physical sample of an individual
can be analyzed to confirm his/her identity. With the invention of this technology,
forensic investigations have got great relief as this biometrics helps in tracing the
criminals. A DNA sample is always collected with the subject's consent. The DNA
sample is usually gathered through a buckle smear. However, semen, blood, saliva,
etc may also be obtained and used for DNA profiling.
• The collected sample is collected through one of many methods available for
DNA profiling like STR Analysis, RFPL Analysis, AmpFLP, PCR Analysis,
etc.
• The outcomes are then compared with other fetched samples to find a match.
DNA profiling is an exact and accurate method of identification.
There are two main processes in biometric systems, enrollment and recognition.
The generalized architecture of enrolment process.
Performance
This size is the amount of bytes required to store a template. This amount
further affects the storage capacity and the amount of time required to
transfer the template across a network. The size can be reduced to
enhance the performance of a system but keeping in mind that the
inherent content of input should, not be lost.
Biometric functionalities:
Best biometric measure or trait can be selected on the basis of the following
characteristics:
1. Unique: It must be different across users.
2. Repeatable: it must be similar across for each user.
3. Accessible: it should be easily linked to sensors.
4. Universal: It should work for all the people.
5. Acceptable: It must not he objectionable to display by user.
Verification and identification:
Recognition is based on verification and identification. Two types of matching are there,
one-to-one and one-to-many
It is very important to note that even though various technologies differ in many
ways but the basic working concept particularly of matching of templates is
almost similar.
Template Transformations
1. The function F must not change the length of the template otherwise the content
of the input trait may change.
2. F must not change the value of the any specific bits used for encoding.
3. F must not change the number of data bit pairs for matching or mismatching.
Most of the problems are found in uni-modal biometrics in which only one biometric
trait is involved. The implementation of multimodal systems helps avoid or diminish
these problems to certain extent. Reliability is a very important issue in multimodal
systems.
The accuracy of biometric techniques as: false match (imposter or a false person
is identified), match (correct user is rejected), failure to enroll (user cannot
register in the system). False match rate (FMR) or false acceptance rate (FAR)
are used as performance measures in biometrics. False non-match rate (FNMR) or
false rejection rate (FRR) represents the probability that a user's verification
template will be judged not to match that same user's enrolment template. Failure
to enroll (FTE) rate represents the probability that a particular user will be
unable to enroll in a biometric system due to insufficient biometric samples.
The performance measures have been discussed as follows:
Each type of biometrics has its own advantages and challenges. All the requirements
and performance measures cannot be achieved satisfactorily in any of the
biometrics. Therefore, multimodal biometrics is recommended for important
applications.
For each type of decision, there are two possible outcomes, true or false, that is
match or non-match. This results in possible outcomes such as, a true individual
is accepted, a true individual is rejected, an imposter is accepted or rejected.
FAR and FRR are always recommended for evaluating.
APPLICATIONS OF BIOMETRICS
Commercial Sector
Commercial applications of biometrics are largely used by banking and financial
service sectors. Some of the commercial applications are reported as under:
1. Account access
The use of biometrics for accessing an account in a particular bank helps the
bank authority to check the authority of customers
2. ATM
Use of biometrics enhances the security of transaction made in ATM
booths.
3. Expended service kioks
Special purpose kioks that would offer a wider variety Of financial
transactions may be set up where biometrics can find sample application
for identification.
4. Online banking
Apart from Passwords and virtual keyboards available to the customers of
internet banking, there are many more security enhancement techniques
yet to be achieved.
5. Telephonic transactions
Voice based biometrics may be deployed for verification of customers
and secure transactions could be made.
6. Personal computer/Network security
Biometric based tools can be embedded and implemented to protect the
unauthorized access of computers and networks to protect the databases.
7. E-commerce
Similar to online transactions, biometrics can be used to enhance security
of transaction in e-commerce applications.
Government Sector
There are numerous applications of biometrics in government sector. In many
government driven programs and activities, biometrics is widely used. Some of
the typical applications of biometrics in this sector are:
Employee Authentication
Military Programs
In all military headquarters and important offices, authentication measures are
stringent. Until the person being tested is identified and verified, he is not
permitted to enter the premises.
Health Care
2. Fast processing: Being electronic, the existing biometric systems are very
fast in processing of authentication applications.
CHARACTER RECOGNITION
Apply morphological
operation
Database of training
Train the characters
weights and features
using neural networks
Character is recognized
or classified
Data acquisition:
The samples are first scanned and then stored. Upper case letters are taken without
any constraints to style the writing. The characters required are then isolated.
Input characters stored (A to D) as images.
Preprocessing:
The optical character recognition system first converts scanned pages into separate
characters. This step is known as preprocessing and converts RGB or color image
into gray scale image that again gets converted into binary image.
(a) (b)
Morphological operations:
The term morphology usually means a study that deals with the form and structure
of animals and plants. The morphological operations here, are used to obtain the
structure of various images. The operations are performed in extracting various
image components such shape, boundaries or skeleton as structure. In character
recognition, two main operations — dilation and erosion have been used. These are
further used in the opening operation for salt noise reduction from the digital images.
Following is the sequence of steps performed by morphological operations:
• Detection of edges:
Edge detection contains high contrast value in the image. image segmentation and
clustering are mainly based on edge detection. When the edges are recovered the data
storage gets reduced to some extent.
• Dilation:
Its another morphological operation which is applied on binary images. The dilation
operator takes inputs as image and structuring element. The image which is to be
dilated is subjected to the dilation operator and structuring element is used as
kernel element which is a set of coordinate points. The boundaries of foreground
pixels are gradually enlarged in binary image. Generally, the foreground pixels
are white. So, as the area of foreground pixels incr,:ases in size, the holes within
those regions become small.
• Hole filling:
The marker image is chosen as zero everywhere except on the image boundary. For
boundaries of an image, marker is set to one. On selecting the marker images and
applying hole filling, the resulting image can be seen as
Character detection
In character detection process, the input image is converted into binary image
which contains only zero and one pixel values. All the dark or black pixels carry
zero whereas the bright or white pixels carry one. Characters are detected by using
two main following steps:
However, the above image might be achieved with some amount of noise
because no imaging system is perfect and free from noise. The possible
noisy image of the above image is
Neural networks are used for the purpose of classification. . Since the neural
network is analogy of human brain, it is known as artificial neural network.
The neural network consists of three main layers- input, output and hidden layers.
Input layer has 35 nodes assuming 7 x 5 grid size of character so the number of
nodes in input layer is 35. The hidden layer comprises of 20 nodes and an output
layer consists of 26 nodes for 26 different alphabetical characters.
Input Layer: As the name suggests, it accepts inputs in several different formats
provided by the programmer.
Hidden Layer: The hidden layer presents in-between input and output layers. It
performs all the calculations to find hidden features and patterns.
Output Layer: The input goes through a series of transformations using the hidden
layer, which finally results in output that is conveyed using this layer.
The term Neural Network is derived from Biological neural networks that develop
the structure of a human brain. Similar to the human brain that has neurons
interconnected to one another, artificial neural networks also have neurons that are
interconnected to one another in various layers of the networks. These neurons are
known as nodes
A multi-layer neural network contains more than one layer of artificial neurons or
nodes. They differ widely in design.
Neural network accepts 35 input Boolean values through 35 nodes as 35
element input vector. Output vector has 26 elements for presenting 26
letters. If a character is recognized, it results as output value of one. Due to
some amount of noise in image, classification and recognition may have some
error still in the output with certain value of mean and standard deviation.
An error with zero mean value and standard deviation less than 0.2 is
recommended.
The neural network receives 35 inputs and 26 neurons are there in its
output layer to identify the letters. Three layered neural network uses log
sigmoid function to produce output. The log sigmoid transfer function is
preferred since its output range from zero to one which is compatible for
learning Boolean values.
Once a network has been structured for a particular application, that network is ready
to be trained. To start this process the initial weights are chosen randomly. Then, the
training, or learning, begins.
The vast bulk of networks utilize supervised training. Unsupervised training is used
to perform some initial characterization on inputs.
Supervised training: In supervised training, both the inputs and the outputs are
provided. The network then processes the inputs and compares its resulting
outputs against the desired outputs. Errors are then propagated back through the
system, causing the system to adjust the weights which control the network. This
process occurs over and over as the weights are continually tweaked. The set of
data which enables the training is called the "training set." During the training of a
network the same set of data is processed many times as the connection weights
are ever refined.
The performance of the neural network used for character recognition system
is evaluated by testing the network with many input vectors with varying
amount of noise. Noise with a mean of,-(and a standard deviation from 0 to
0.5 is added to input vectors.
The solid line in the plot shown in Figure indicates the reliability for the
network trained with noise. The performance of the same network for the
training without noise can be seen as dashed line. Apparently, training the
network for noisy input vector has larger error. If higher accuracy is required
then the network can be trained for a longer time and with increased number
of neurons in hidden layer.
System performance plot
Once the characters are written using Microsoft(MS) paint, they are stored as
binary image that consists of a large white background with a black foreground
in front. Features of the image invariant to translation, scaling and rotation are
extracted. The features are extracted from all the images in the database and are applied
to HMM training.
Original image for character ka and image after performing scaling and
translation
HMM approach:
The HMM is a doubly stochastic process. Since the process is not observable,
the model is called hidden but second process can be observed through another
stochastic process which produces the sequence of observations. The process
involved in HMM approach consists of a set of states connected to each other
by transitions with probabilities. The observed process includes set of
outputs or observations, each of which is emitted by a state. This is done
in accordance with some output probability density function (PDF).
Different types of HMM models can be developed based on different PDFs.
The HMM with multivariant Gaussian state conditional distribution
function consists of row vector which further contains probability distribution
for the first unobserved state. The mean vector and covariance matrix are stored
one above the other in two different ways, depending upon whether full or diagonal
covariance matrices are used. For isolated handwritten character recognition, it is
useful to consider the left-to-right models. In the left-to-right model, transition
from state i to state j is only allowed if j>= I, resulting in a smaller number
of translation probabilities to be trained.
The matching process computes a matching score between the
sequence of observation vector and each character model using the Viterbi
algorithm. After post processing, a lexicon sorted by matching score is
the final output of the character recognition system.