Subject: Biometric Security
Subject: Biometric Security
html
ABSTRACT:
Today we live in the age were security is very important parameter.
Traditional ways of security is password security. But there are chances of
password to be stolen or forgotten. So we would like to give information on more
secured way, which is biometrics security.
Thus from cost point of view password system is better and simple to
implement.
But biometrics security provides a very high security and thus eliminates its
demerit of cost from security point of view. So where security is highly required,
implementation of biometrics security is a very good solution as there is to fear of
stealing or forgetting the password.
1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
INTRODUCTON
WHAT IS BIOMETRICS?
• A biometric is a measurable, physical characteristic or personal behavioral trait
used to recognize the identity or verify the claimed identity of an enrolled user.
• In the development of biometric identification systems, physical and behavioral
features for recognition are required which:
• are as unique as possible, that is, an identical trait won't appear in two people:
Uniqueness
• occur in as many people as possible: Universality
• don't change over time: Permanence
• are measurable with simple technical instruments: Measurability
• are easy and comfortable to measure: User friendliness
1. Finger recognition.
2. Hand geometry.
3. Face recognition.
4. Voice recognition.
5. Iris recognition.
FINGER RECOGNITION:
2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
verify the identity of an individual. There are basically two different types of
finger-scanning technology that make this possible.
There are a range of ways to identify fingerprints. They include traditional police
methods of matching minutiae, straight pattern matching, moiré fringe patterns and
ultrasonics.
Fingerprint Classification:
The classifier is tested on 4,000 images in the database. . For the four-class
problem (arch and tented arch combined into one class), we are able to achieve a
classification accuracy of 94.8%.
3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
FACE RECOGNITION:
Facial recognition technology
Computers can do increasingly amazing things, but they are not magic. If human
beings often can't identify the subject of a photograph, why should computers be able to
do it any more reliably? The fact is that faces are highly complex patterns that often differ
in only subtle ways, and that it can be impossible for man or machine to match images
when there are differences in lighting, camera, or camera angle, let alone changes in the
appearance of the face itself.
In addition, questions have been raised about how well the software works on
4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
dark-skinned people, whose features may not appear clearly on lenses optimized for
light-skinned-people.
Samir Nanavati of the International Biometric Group, a consulting firm, sums it
up: "You could expect a surveillance system using biometrics to capture a very, very
small percentage of known criminals in a given database."
It would work especially poorly in the frenetic environment of an airport, where
fast-moving crowds and busy background images would further reduce its already limited
effectiveness.
When a person uses the scanner, it compares the shape of the user's
hand to a template recorded during an enrollment session. If the template
and the hand match, the scanner produces an output--it may unlock a door,
transmit data to a computer, verify identification, or log the person's arrival
or departure time.
5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Applications
Geometry scanners verify identity at the front entrances of over half
the nuclear power plants in the U.S.
IRIS RECOGNITION:
6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Iris’ are composed before birth and, except in the event of an injury to
the eyeball, remain unchanged throughout an individual’s lifetime. Iris
patterns are extremely complex, carry an astonishing amount of information
and have over 200 unique spots. The fact that an individual’s right and left
eyes are different and that patterns are easy to capture, establishes iris-scan
technology as one of the biometrics that is very resistant to false matching
and fraud.
Important points:
• The iris is a thin membrane on the interior of the eyeball. Iris patterns are
extremely complex.
• Patterns are individual (even in fraternal or identical twins).
• Patterns are formed by six months after birth, stable after a year. They remain the
same for life.
• Imitation is almost impossible.
• Patterns are easy to capture and encode
7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
VOICE RECONITION:
"Biometric technologies - those use voice - will
be the most important IT innovations of the next
several years. "
-Bill Gates at Gartner Group Itexpo '97.
• User's first, middle and last name .User's date and month of birth Mother's first,
middle and last maiden name .Home telephone number
8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
SIGNATURE RECONITION:
CONCLUSION:
Misidentification
Method Coded Pattern Security Applications
rate
High-security
Iris Recognition Iris pattern 1/1,200,000 High
facilities
9 Email: chinna_chetan05@yahoo.com