Biometrics Technology
Ravinder Vishnoi
three main types of authentication available today are:
something you know, like a password, PIN, or code. something you have, like a swipe card, smart card, token, or key. something you are, which is biometrics.
What is a biometric?
Biometrics
Is the term given to the use of
biological traits OR behavioral characteristics
to identify an individual.
Characteristics
The common Physical characteristics are: Fingerprint Face Retina
Iris Vein pattern, and Hand and finger geometry
Characteristics
Behavioral characteristics are:
Keystroke dynamics Voice Gait, and Signature dynamics
The Biometric importance
The security is needed in every place.
Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.
The Biometric importance (Cont.)
Improves convenience, security, and privacy.
The first and most critical link in the security chain. presented to counteract security threats.
Biometrics History
The term "biometrics" is derived from the Greek words bio which means (life) and metric means (to measure).
Biometrics History (Cont.)
the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.
Biometrics History (Cont.)
In the 1890s, 'Bertillonage', created a method of bodily measurement with the criminals who repeated the crimes with different names and looks.
Biometrics History (Cont.)
After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.
Biometrics Process
new biometric sample is requested.
No
Signal Processing, Feature Extraction, Representation
Biometric Data Collection
Transmission
Quality Sufficient? Yes
Generate Template
Database
Yes No
Template Match
Decision Confidence?
Physical Characteristics
Fingerprint Recognition:
Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
Fingerprint Recognition steps:
Database
Face Recognition:
Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.
Face recognition process:
Input face image
Extraction of face image
Extraction of face features
Positive Database negative
Iris Identification:
The iris is the colored ring of textured tissue that surrounds the pupil of the eye.
Iris Identification Steps:
Input of face image Detection of eye regions Recognition of iris pattern
Put iris in focus
accept
reject
Database
Veins Recognition:
Venial Recognition: A system for Identification using a persons unique vein patterns. as a biometrics tool involve the measurement of the blood vessels on the back of your hand.
Veins
Vein Recognition System:
Input of palm picture The output picture Generate veins structure
match
Not match Database
Behavioral Characteristics
Voice Recognition:
Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.
Voice Identification System
Construct voice reference template Database
Signature Identification:
Signature identification: is the analyses of the way a user signs his or her name. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).
Signature Verification Process (Cont.)
the angle at which the pen is held,
the number of times the pen is lifted,
the time it takes to write the entire signature, the pressure exerted by the person while signing, Biometric trait
the variations in the speed with which different parts of the signature are written.
Signature Verification Process
Profile
Database
Movies to Real World
Applications of Biometric
Applications of Biometric
Access control : Disney World (fingerprint scanner).
Child day care centers ( hand geometry systems )
Applications of Biometric (Cont.)
Time and attendance management: Hospitals (hand geometry systems)
Other Applications
Airports:
Heathrow airport (iris recognition)
ATMs: (face recognition)
Other Applications (Cont.)
Pc access: GM and Hertz (voice identification technology) to protect their computer facilities.
Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.
Other Applications (Cont.)
Prisons: Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.
Advantages of biometrics
1. 2. 3. 4. 5. 6.
Uniqueness
Universality
Permanence Measurability User friendliness Accuracy
7.
Comfort
Disadvantages of Biometrics
1.
costly.
2.
Facial imaging can also hinder accurate identifications.
3.
Missing body part problem.
Disadvantages of Biometrics
(Cont.)
4.
False acceptances and rejections.
5. 6.
The amount of comfort. The scanning of eye is fearful.
7.
The nervousness that people feel about the scanners identification.
Future Prospects
Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:
1. 2.
Ear shape identification. Body odor identification.
3.
4. 5.
Body salinity identification.
EEG Fingerprint DNA matching
Conclusion
Not
perfect yet.
Successful
Decreasing Increasing The
applications.
costs and increasing convenience.
both privacy and identity security.
field of biometrics is evolving. from this technology .
Benefit
References:
The Biometric Consortium - http://www.biometrics.org/ National Institute of Standards and Technology - http://www.nist.gov/ The Biometric Catalog - http://www.biometricscatalog.org/ ITPro - http://www.computer.org/ Georgia Institute of Technology - http://www.gatech.edu/ http://www.biometricgroup.com/abio1/technology/researchtechnology.htm http://www.conspiracyarchive.com/images/biometrics.jpg http://www.information-security-topics.org/information_security_index/V http://www.bromba.com/faq/fpfaqe.htm