Unit 4 Biometric
Unit 4 Biometric
Contents
4.0 Introduction
4.1 Biometrics: Definition and System
4.1.1 Advantages
4.1.2 Disadvantages
4.1.3 Applications of Biometrics
4.2 Types of Biometrics
4.2.1 Finger Print Biometrics
4.2.2 Iris Patterns Biometrics
4.2.3 Retinal Pattern Biometrics
4.2.4 Facial Recognition Biometrics
4.2.5 DNA Biometrics
4.2.6 Handwriting and Voice Biometrics
4.3 Summary
4.4 References
4.5 Answers/Hints to Check Your Progress
LEARNING OBJECTIVES
4.0 INTRODUCTION
‘Forensics’ means ‘for the court’ and it relies on the evidence and
identification. You are well aware that forensic analysis is dependent on the
evidence collected from the crime scene for the identification of the criminal.
With the increase in crimes new techniques for investigation like Biometrics
based on artificial intelligence are being developed.
Biometrics consists of two words ‘Bio’ meaning ‘life’ and ‘metric’ is the
measurement or quantitative based recognition and identification. In
simple words if you have to choose a T-shirt for your blue jeans what you
*
Contributor: Dr Kumud Sarin, Program Director at Bioinformatics Institute of India,
Noida. 73
Human would do? You would choose from a pile and match, much the same way
Identification:
Establishing in Biometrics where we compare given pattern from the existing ones in
Identity-I the data base. Basically, it is related to brain recognition with its stored
observations and is faster with more accuracy.
Source: http://www.biometrika.it/eng/wp_biointro.html
Common:
Fingerprint Recognition
Face Recognition
Speaker Recognition
Iris Recognition
Hand Geometry
Signature Verification
Others:
DNA
Retina Recognition
Thermo Grams
Ear Recognition
74
Skin Reflection Biometrics
Lip Motion
Body Odour
Brain Wave Pattern
Footprint and Foot Dynamics
From diagram you can see that a sensor recognises the information, then
during pre-processing, it extracts information with template for matcher and
identifies the information.
4.1.1 Advantages
Biometrics with any device, either system or characteristics are used with a
common aim to collect the information and compare for identification. The
advantages are:
Universally found in all individuals and unique to differentiate one
individual from another,
Permanent, allowing for change over time
Recordable (with or without consent)
Measurable for future comparison
Forgery-proof (a face, a fingerprint)
Accuracy, improved security systems and quick authentication
75
Human 4.1.2 Disadvantages
Identification:
Establishing
Identity-I Biometric system has advantages nevertheless also has disadvantages like
any other system. Some of the disadvantages are:
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
Biometrics
Structure of Minutiae
Minutiae:
Crossover two ridges cross each other
Core center
Bifurcation ridge separates
Ridge ending end point
Island small ridge between two spaces
Delta space between ridges
Pore human pore
2) Minutia extractions:
Uses the ridge endings and bifurcations on a person’s finger to plot points are
known as Minutiae. The variations in the number and location of minutiae
occurs from person to person, finger to finger in any particular individual
81
Human This level has three stages pre-processing, minutiae extraction and post
Identification:
Establishing processing stage.
Identity-I
Verify
Capture Extraction Comparison
individual?
No Yes
Access denied Access to
cannot application sign
sign record records
Acceptable ?
score
Ending
minutiae
Bifurcation
Identify minutiae
minutiae
Reference minutia
graph for individual
Minutia
graph
3) Minutia Matching
Automatic finger print verification is achieved with minutia matching (point
pattern matching) instead of a pixel-wise matching or a ridge pattern
matching of fingerprint images. First of all, minutia matcher selects two
minutiae as reference minutia pair after that matching of the ridges is done
and finally on the basis of the ridge matching the image are aligned and
82 matching of all minutiae is overseen.
Biometrics
Disadvantages
• Wet or moist fingers, cut fingers, or dirt or grease can sometimes affect
the authentication process.
• It is not right tool for those persons who work in chemical labs.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
The recognition of Iris is carried out on the basis of the following traits:
Iris scanning measures the iris pattern in the coloured part of the eye.
Analysis of the iris of the eye, which is the coloured ring of tissue that
surrounds the pupil of the eye.
85
Human Based on visible features.
Identification:
Establishing Widely regarded as the most safe, accurate biometrics technology
Identity-I
High speed, high accuracy.
86
This is how it happens: Biometrics
Image Iris
Operator Image
Acquisition Localization
1) Image Acquisition
2) Pre-processing
3) Image Analysis
4) Image Recognition
1) Image Acquisition
This is an important step as image acquired would lead to recognition and the
characteristics required are:
Good contrast,
high quality image and
high illumination.
88
“Unwrapping” the iris Biometrics
2) Pre-processing
Next step is to classify whether the image acquired is useful or not which
means the irrelevant parts e.g. eyelids or pupil and the pre-processing would
remove the effect of the spots /holes lying on the pupillary area. This process
also transforms the true colour into intensity image. The two steps of pre-
processing are:
a) Iris Localisation
The outer and inner boundary of the Iris is considered as two circles
that are not co-centric thus inner boundary between the pupil and the
iris is detected. To detect the outer boundary due to its low contrast
between the two sides is found by maximizing changes of the
perimeter- normalised along the circle.
b) Edge Detection
3) Image Analyses
Image analysis visualises the features of Iris and digitised into a 512 byte
(4096 bits) Iris Code record. Half Iris Code describes the features and another
half controls the comparison process.
4) Image Recognition
The database is built by storing the different Iris Code. You can apprehend
that the recognition is same as going to the market to buy a T-shirt of
89
Human particular colour by searching and comparing. Same way an iris is presented
Identification:
Establishing at a recognition point and process is repeated and compares it to every file in
Identity-I the Database Recording of Identities thus the Iris Code record is not stored.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
91
Human 4.2.3 Retinal Pattern Biometrics
Identification:
Establishing
Identity-I Dr. Carleton Simon and Dr Isodore Goldstein in 1930-1935 conducted first
scientific study to describe how every individual possesses a unique Retinal
structure. Because of the differing distribution of blood vessels, they
suggested the use of the Retina to confirm the identity of an individual. Dr.
Paul Tower (1950) reported that even identical twins have a very distinct and
unique set of Retinas and has DNA Strand leading to very stable Biometric
modality and that hardly changes.
Human retina is a thin tissue composed of neural cells located in the posterior
portion of the eye. Retina is a complex structure with a network of blood
capillaries and vessels resulting into the unique feature for every person as
identical twins do not have same features. Retinal patterns are altered due to
medical morbidities otherwise it is same from birth to death. The unique
Retinal patterns of the individual is used as biometric identifier and the blood
vessels within the retina absorb light more readily than the surrounding tissue
which forms the typical smallest template for the Biometric Technology. The
principle for the Retinal scan is carried out by casting an unperceived beam
of low-energy infrared light (IR) into a person’s eye and beam traces a
standardised path on the retina as retinal blood vessels are more absorbent
than the rest of the parts of the eye, then this path is converted to computer
mode.
92
4.2.3.1 Process of Retinal Recognition Biometrics
The individual eye resides on tiny receptacle to receive infrared light beam
for the illumination of retina at 3600. The duration of the process is few
minutes with precaution that the individual must remain still till one rotation
is completed. Five images are taken to create the composite image from
which the unique features are extracted.
Retinal patterns are not genetically controlled thus 400 unique data points are
captured from the Retina, unlike the fingerprint, where only 30-40 unique
data points are captured to create the Enrollment Template with a size of 96
bytes. The small size makes it possible to store number of templates in a
single database and same process leads to creation of Verification Template.
Due to the close proximity of numbers of factors influence the quality of
Enrollment and Verification Templates as mentioned below:
Due to stability and hardly ever changes over the lifetime an individual
retina is a reliable Biometric technology.
Small sized images give quick results for the identity of the individual.
More number of unique data points and makes error less identity.
Retina is present within the eye thus not affected by the external
environment like fingerprints.
Disadvantages
The individuals are not comfortable to place their eye on the receptacle
with the direct infrared light.
93
Human Retinal Recognition requires high level of cooperation and motivation
Identification:
Establishing from the end user to capture high quality, raw images leading to low
Identity-I verification with a metric of 85% as compared to 100%.
The cooperation of the end user leads one to take numerous attempts and
a long time till the final result is obtained therefore there are many false
rejections.
Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Resistance to circumvention
Similarities:
94
o Iris scanning is more widely accepted as a commercial modality than Biometrics
retinal scanning
o Retinal scanning is invasive but not iris.
The primary function of Iris is to allow the requisite amount of light required
for proper vision. The retina is located at the back of the eye and links front
of the optic nerve to the brain therefore the function of retina is to send visual
information and cues to the brain for processing.
In other words, at Retina, image is formed that means it acts like a film of
camera.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
Match/Non
Capture Comparison Match
Extraction
Accept/
Project
i) Image Acquisition
The static camera or video system acquires image of quality and resolution,
an essential component for verification, identification and authentication.
ii) Image Processing
The image processing steps:
Detect the face or faces at crime scene
Normalise and localise the face to bring the dimensions in live facial sample
Crop the image to get ovoid facial image
Coloured images conversion to black and white
Initial comparisons on grey scale basis
Align the facial sample with the templates
Distinctive Characteristic Location
The features used for matching are upper ridges of the eye sockets, areas
around the cheekbones, sides of the mouth, nose shape, and the position of
major features relative to each other and these features hardly change.
Template Creation and Matching
Processed facial images help to create enrolment template of varying size
from 100 bytes to 3K and larger templates are related to behavioural
biometrics. Matching is done 1:1 verification within facial scan system and it
is not as effective as other scans and many are returned.
97
Human 4.2.4.4 Face Recognition Systems Working
Identification:
Establishing
Identity-I Everyone has distinguishable points on the face i.e. valleys and peaks which
are defined as nodal points in software. There are 80 nodal points on human
face that are measured by software i.e.
For the general representation of face 70 nodal points are used to construct
the face bunch graph and an image template is matched with this face graph
in order to get the same points. The measured nodal points are given
numerical code and strings of numbers represent a face in the database called
face print.
4.2.4.6 Applications
Face recognition biometrics has replaced PIN naturally and other applications
as listed below:
Government Use:
• Law Enforcement
98 • Security/Counter terrorism
• Immigration: Rapid progression through customs Biometrics
• Voter verification
Commercial Use:
• Residential Security: Alert homeowners of approaching personnel
• Banking using ATM: Customer’s face identified quickly with the software
• Physical access
• Face Recognition technology has now progressed and become cost
effective, reliable and highly accurate thus being applied at many
places.
4.2.5 DNA Biometrics
Behavioural or physiological traits in Biometric systems are pertaining to
individual recognition and out of which DNA profiling and fingerprinting is
the most reliable accurate method as it is intrinsically digital, and not altered
during lifetime or death. DNA profiling is known as ultimate identifier.
DNA Biometrics is defined as a specific pattern obtained from a person or
sample from the crime scene. DNA fingerprinting, is also known as DNA
typing, DNA profiling, genetic fingerprinting, genotyping, or identity testing
and it is the method of isolating and identifying variable elements within the
base-pair sequence of DNA (deoxyribonucleic acid). British geneticist Alec
Jeffreys (1984) developed the DNA Fingerprinting with a principle of
isolating and identifying variable elements within the base-pair sequence of
DNA which do not participate in functioning and highly variable called
minisatellites. Jeffrey reported that unique pattern of minisatellites are
present in every individual and only exception is identical twins from single
zygote. At present DNA fingerprinting is making usage of microsatellites of
short tandem repeats (STR) of 2-5 base pairs long.
Every individual has same chemical structure with a unique set of genes and
1% of DNA differs from person to person in sequence arrangement and it can
be understood as STOP and POTS use same letters but meaning differ. DNA
profiling is dependent on VNTR (Variable Number Tandem Repeats) which
are of two types: minisatellites and microsatellites. DNA profiling uses
repetitive sequences. VNTR loci are very similar between closely related
individuals. The analysis of variable number of tandem repeats (VNTRs) is to
detect the degree of relatedness to another sequence of oligonucleotides,
making them ideal for DNA finger printing. There are two principal families
of VNTRs:
a) Microsatellites
b) Minisatellites
Microsatellites are defined as repeating sequences of 2-6 base pairs of DNA
which are also called Simple Sequence Repeats (SSRs) or Short Tandem
Repeats (STRs). VNTR of 10-60 base pairs are named as minisatellites and
their analysis has direct application genetics, forensics, biology and DNA
fingerprinting.
99
Human 4.2.5.1 Technique of DNA Fingerprinting
Identification:
Establishing Step-1 Collection and Isolation of DNA
Identity-I
Reference Sample i.e. DNA sample of an individual of buccal swab or blood
or biological samples collected from the crime scene. Significance of DNA
analysis is that very small amount of sample is required in microliters. Alkali
and salt treatment is done on sample to get purified DNA without proteins.
Step-2 Cutting, Size and Sorting
DNA is cut into small fragments by employing Restriction Enzymes which
cut DNA at specific sites e.g. EcoR1 will cut DNA when the
sequence5’..GAATTC..3’ occurs.
Cutting of DNA yields short and long fragments which are sorted according
to size
100
Step-4 Southern Blotting and Hybridisation Biometrics
The final DNA fingerprint is built by using several probes (5-10 or more)
simultaneously and the bar codes are used like in shops. DNA Fingerprint is
then analysed by comparing the victim and the suspect. The matching of the
profile generates strong evidence that the suspect was at the crime scene but
does not hint that he/she has committed the crime as it does not match, then
eliminated from the enquiry.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
102
8) How can DNA be a useful tool in the forensic applications? Biometrics
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
In the second step these smaller segments are “captured” in a digital form and
plotted on a spectrum.
Another layer of security for computer systems which are more efficient and
cost effective adding up no ID access cards thus saves time.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
4.2.6.1 Handwriting
Handwriting detection is a technique operated by Computers with the
processes to receive and interpret intelligible handwritten input from sources
e.g. paper documents, touch screen, photo graphs etc.
Way to Recognize
Handwriting
106
Biometrics
Writer-1
Identification
System Writer-2
Query Sample
Online Recognition
Offline Recognition
types of handwriting
number of scriptors
size of the vocabulary
spatial layout
Disadvantages
108
Handwriting methodologies are difficult to operate but generate accurate Biometrics
data.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
4.3 SUMMARY
Biometrics helps to establish a person’s identity on the basis of personal traits
by employing information technology techniques with accuracy. Biometrics
is a technique employed to measure, compare, analyse and identify the person
in terms of characteristics features like fingerprints, face, retina etc. The
personal characteristic attributes like hand geometry, colour of iris, or
behavioural characteristics etc. make every individual different thus
biometrically scan, compare and identify with following three types
modalities:
• Physiological
• Behavioural
• Both physiological and behaviour
4.4 REREFERNCES
Daugman, J.G. (1993). High confidence visual recognition of person by a test
of statistical independence. IEEE Trans. PAMI 15, 1148-1161
Parmar, D.N, & Mehta, B.B. (2014). Face recognition methods and
applications.
6) Retinal recognition requires that the end user must be in close proximity
to retinal scanning device. The process has following steps:
110
• Image/Signal Acquisition and Processing: Biometrics
8) The double helical structure of the DNA present on saliva, hair follicles,
bones, blood and sperm serve as a useful tool in the forensic studies. This
can be done as the DNA from an individual’s tissue shows the same
degree of polymorphism. These polymorphic characters are inheritable
from parents to their children.
111