0% found this document useful (0 votes)
93 views

Biometrics 1

The document discusses various biometric technologies including fingerprint scanning, retina scanning, iris recognition, hand geometry, voice patterns, signature patterns, and keystroke patterns. It provides details on fingerprint scanning such as how electronic scanners capture digital images of fingerprints and how they are processed into templates for authentication. It also briefly mentions retina scanning and other biometric technologies.

Uploaded by

Naman Jain
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Biometrics 1

The document discusses various biometric technologies including fingerprint scanning, retina scanning, iris recognition, hand geometry, voice patterns, signature patterns, and keystroke patterns. It provides details on fingerprint scanning such as how electronic scanners capture digital images of fingerprints and how they are processed into templates for authentication. It also briefly mentions retina scanning and other biometric technologies.

Uploaded by

Naman Jain
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

A Report

On
Biometrics

By
Harshit Goyal
(22CSU082)

Submitted to
Dr. Divyabha Vashisth

15th May, 2023


Copyright Notice

@ NCU 2023

All rights reserved.

No parts of this report may be reproduced in any


form or any means without permission in writing
from the publisher.
Table of Contents
Acknowledgements………………………….
Preface……………………………………………
1.Introduction………………………………….
2. Discussion…………………………………….
Biometric Technology
Fingerprint Authentication

Retina Scanning
Iris Recognitions
Hand Geometry
Voice Pattern
Signature Pattern
Key Stroke
Facial Recognition

3.Conclusion………………………………….
4.Recommendations………………………
5.Bibliography……………………………….
6.List of References……………………….
7.Glossary……………………………………….
Appendix 1

Acknowledgement
I would like to present my gratitude for the kind support
and help of many individuals and sources. I would like to
extend my sincere thanks to all of them.

I am highly indebted to my English professor Ms Divyabha


Vashisth for encouraging me to take this study.

I would also like to express my gratitude towards my


parents and my friends for their kind cooperation and
encouragement which helped me in the completion of this
project.
Preface

Humans recognize each other according to their various characteristics for ages. We
recognize others by their face when we meet them and by their voice as we speak to
them. Identity verification (authentication) in computer systems has been traditionally
based on something that one has (key, magnetic or chip card) or one knows (PIN,
password). Things like keys or cards, however, tend to get stolen or lost and passwords
are often forgotten or disclosed.
To achieve more reliable verification or identification we should use something that
really characterizes the given person. Biometrics offer automated methods of identity
verification or identification on the principle of measurable physiological or behavioral
characteristics. The characteristics are measurable andunique. Biometrics is the
development of statistical and mathematical methods applicable to data analysis
problems in the biological sciences.Physical characteristics such as fingerprints, retinas
and irises, palm prints, facial structure, and voice recognition are just some of the many
methods of biometric encryption. Depending on the context, a biometric system can be
either a verification (authentication) system or an identification system. Biometrics is a
rapidly evolving technology which has been widely used in forensics such as criminal
identification and prison security. Recent advancements in biometric sensors and
matching algorithms have led to the deployment of biometric authentication in a large
number of civilian applications. With the increased use of computers as vehicles of
information technology, it is necessary to restrict access to sensitive/personal data. Real-
time biometric systems can be used to prevent unauthorized access to ATMs, cellular
phones, smart cards, desktop PCs, workstations, computer networks and electronic
banking.

1. INTRODUCTION
Reliable user authentication is becoming an increasingly important task in the
Web- enabled world. The consequences of an insecure authentication system in a
corporate or enterprise environment can be catastrophic, and may include loss of
confidential information, denial of service, and compromised data integrity. The value
of reliable user authentication is not limited to just computer enhanced security.

The prevailing techniques of user authentication, which involve the use of either
passwords and user IDs (identifiers), or identification cards and PINs (personal
identification numbers), suffer from several limitations. Passwords and PINs can be
illicitly acquired by direct covert observation. Once an intruder acquires the user ID or
network access. Many other applications in everyday life also require user
authentication, such as banking, e- commerce, and physical access control to computer
resources, and could benefit from and the password, the intruder has total access to the
user’s resources. In addition, there is no way to positively link the usage of the system or
service to the actual user, that is, there is no protection against repudiation by the user
ID owner. For example, when a user ID and password is shared with a colleague there is
no way for the system to know who the actual user is. A similar situation arises when a
transaction involving a credit card number is conducted on the Web. Even though the
data are sent over the Web using secure encryption methods, current systems are not
capable of assuring that the rightful owner of the credit card initiated the transaction.
In the modern distributed systems environment, the traditional authentication policy
based on a simple combination of user ID and password has become inadequate.
Fortunately, automated biometrics in general, and fingerprint technology in particular,
can provide a much more accurate and reliable user authentication method. Biometrics
is a rapidly advancing field that is concerned with identifying a person based on his or
her physiological or behavioural characteristics. Biometrics is derived from the
conjunction of the Greek words bios and metrics that mean life and to measure
respectively. Examples of automated biometrics include fingerprint, face, iris, and
speech recognition. Since biometrics is extremely difficult to forge and cannot be
forgotten or stolen, Biometric authentication offers a convenient, accurate,irreplaceable
and high secure alternative for an individual, which makes it has advantages over
traditional cryptography-based authentication schemes. It has become a hot
interdisciplinary topic involving biometric and Cryptography. Biometric data is
personal

privacy information, which uniquely and permanently associated with a person and
cannot be replaced like passwords or keys. Once an adversary compromises the
biometric data of a user, the data is lost forever, which may lead to a huge financial loss.
Hence, one major concern is how a person’s biometric data, once collected, can be
protected.

User authentication methods can be broadly classified into three categories as


shown in Table 1.1. Because a biometric property is an intrinsic property of an
individual, it is difficult to surreptitiously duplicate and nearly impossible to share.
Additionally, a biometric property of an individual can be lost only in case of serious
accident.

Method Examples Properties

What you know? User ID Shared


Passwor Many passwords easy to
d PIN guess
Forgotten
What you have? Cards Shared
Badge Can be
s duplicated Lost
Keys or stolen
What you know and what you ATM card + PIN Shared
have? PIN a weak link
(Writing the PIN on the
card)
Something unique about the user Fingerpri Not possible to
nt Face share Repudiation
Iris unlikely Forging
Voice print difficult
Cannot be lost or stolen

BIOMETRIC TECHNOLOGY

FINGERPRINT SCANNING:

• "Fingerprint authentication" describes the process of obtaining a digital


representation of a fingerprint and comparing it to a stored digital version of a
fingerprint.

• Fingerprints have long been recognized as a primary and accurate identification


method.

PROCESS:

Figure Fingerprint Authentication Process


• Electronic fingerprint scanners capture digital "pictures" of fingerprints, either
based on light reflections of the finger's ridges and valleys, or the electrical
properties of the finger's ridges and valleys.

• These pictures are then processed into digital templates that contain the unique
extracted features of a finger.Uses the ridge endings and bifurcation's on a
persons finger to plot points known as Minutiae.The number and locations of
the minutiae vary from finger to finger in any particular person, and from
person to person for any particular finger

• These digital fingerprint templates can be stored in databases and used in place
of traditional passwords for secure access.

• Instead of typing a password, users place a finger on an electronic scanner. The


scanner, or reader, compares the live fingerprint to the fingerprint template
stored in a database to determine the identity and validity of the person
requesting access.

• Finally it gives decision that access to application or access denied.


MATCHING APPROACH:

Two basic classes of matching techniques:

 Image techniques
Use both optical and numerical image correlation techniques

 Feature techniques
Extracts features and develop representations from these features

 Combining the above two techniques:


Hybrid techniques ,with improved
accuracy
RETINA SCAN:

Figure Retina Scan

 The human retina is a thin tissue composed of neural cells that is located in the
posterior portion of the eye.

 Because of the complex structure of the capillaries that supply the retina with
blood, each person’s retina is unique.
 The network of blood vessels in the retina is so complex that even identical twins do
not share a similar pattern. Although retinal patterns may be altered in
cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically
remains unchanged from birth until death.

 A biometric identifier known as a retinal scan is used to map the unique patterns of
a
person’s retina.

 The blood vessels within the retina absorb light more readily than the
surrounding tissue and are easily identified with appropriate lighting. A retinal
scan is performed by casting a beam of low-energy infrared light into a person’s
eye as they look through the scanner’s eyepiece.
 The pattern of variations is converted to computer code or template and
stored in a database.

 Pattern is matched against stored templates

IRIS SCAN:

Figure Iris Scan

 The iris is a thin, circular structure in the eye, responsible for controlling the
diameter and size of the pupils and thus the amount of light reaching the retina.

 The iris is the colored portion of the eye surrounding the pupil. Its pattern
results from a meshwork of muscle ligaments, and its color and contrast are
determined bypigmentation.

 “Eye color” is the color of the iris, which can be green, blue, or brown. In some
cases it can be hazel (a combination of light brown, green and gold), grey, violet,
or even pink.

 In response to the amount of light entering the eye, muscles attached to the iris
expand or contract the aperture at the center of the iris, known as the pupil.

 The larger the pupil, the more light can enter. Iris recognition is an automated
method of biometric identification that uses mathematical pattern-recognition
techniques on video images of the iries of an individual’s eyes, whose complex
random patterns are unique and can be seen from some distance.

 Digital templates encoded from these patterns by mathematical and statistical


algorithms allow unambiguous positive identification of an individual.

 Databases of enrolled templates are searched by matcher engines .


Figure Iris Segmentation

Figure Boundary Detection


Figure Iris Polar Mapping
Figure 3.7 Polar Code
HAND GEOMETRY:

Figure Hand Geometry

Hand geometry systems are commonly available in two main forms. Full hand geometry
systems take an image of the entire hand for comparison while Two Finger readers only
image two fingers of the hand.

Hand recognition technology is currently one of the most deployed biometrics discipline.

Hand geometry is a biometric that identifies users by the shape of their hands. Usually a
specialized reader device to measure aspects such as length, width, thickness, and
surface area of the hand and fingers .
A camera capture an image of the hand, with the help of a mirror to get also the edge.
The graph of the hand is extracted, and some geometrical characteristics stored.

Hand geometry readers measure a user's hand along many dimensions and compare
those measurements to measurements stored in a file.
VOICE PATTERN

Figure Voice Pattern


• Identification of the person who is speaking by characteristics of their voices
(voice biometrics), also called Voice Patterns.
• There is a difference between speaker recognition (recognizing who is speaking)
and speech recognition (recognizing what is being said).
• Voice biometrics works by digitizing a profile of a person's speech to produce a
stored model voice print, or template.
• Biometric technology reduces each spoken word to segments composed of
several dominant frequencies called formants.
• Each segment has several tones(pitch, quality, and strength) that can be
captured in a digital format.
• The tones collectively identify the speaker's unique voice print.
• Voice prints are stored in databases in a manner similar to the storing of
fingerprints or other biometric data.
• Popular and low-cost, but less accurate and sometimes lengthy enrollment.
• Voice recognition can be divided into two classes:
• template matching - template matching is the simplest technique and has
the highest accuracy when used properly, but it also suffers from the most
limitations.
• feature analysis
• The first step is for the user to speak a word or phrase into a microphone.
• The electrical signal from the microphone is digitized by an "analog-to-digital
(A/D) converter", and is stored in memory.
• To determine the "meaning" of this voice input, the computer attempts to match
the input with a digitized voice sample, or template, that has a known meaning.
• This technique is a close analogy to the traditional command inputs from a
keyboard. The program contains the input template, and attempts to match this
template with the actual input using a simple conditional statement.

SIGNATURE AND WRITING PATTERNS:

Two kinds of signatures:

• 1. off-line(Static)
• 2. on-line(Dynamic)

Static:
In this mode, users write their signature on paper, digitize it through an optical scanner
or a camera, and the biometric system recognizes the signature analyzing its shape. This
group is also known as “off-line”.

Dynamic:

In this mode, users write their signature in a digitizing tablet, which acquires the signature
in
real time. Dynamic recognition is also known as “on-line”.

• Dynamic information usually consists of the following information:


• spatial coordinate x(t)
• spatial coordinate y(t)
• pressure p(t)
• inclination in(t)
• pen up/down

PROCEDURE FOR SIGNATURE VERIFICATION

1). Preprocess the raw data of the given signature.

Figure Raw Data in Signature writing


2). Extract features and compare distances with the those in the template.

Feature Extraction/Selection

• Global features: #Width, Height, #Duration, #Orientation

• Local features: #X-coordinates, #Y-coordinates , #Curvature

• Dynamic features: #Velocity, #Acceleration, #Pressure,


#Pressure changing

• Other features: # Number of segments, #Critical points, etc.

Figure Feature Extraction

3). Make decision according to the threshold specified in the template.

Figure Feature Comparison


KEY STROKE:

• Keystroke dynamics is a biometric based on assumption that different people


type in uniquely characteristic manners.

• The rhythms with which one types at a keyboard are sufficiently distinctive to
form the basis of the biometric technology known as keystroke dynamicThe way
and the manner in which we type on our computer keyboard varies from
individual to individual and is considered to be a unique behavioral biometric.
• Keystroke Dynamics or Recognition is probably one of the easiest biometrics
forms to implement and manage.
• This is so because at the present time, Keystroke Recognition is completely a
software based solution.
• There is no need to install any new hardware and even software.
• All that is needed is the existing computer and keyboard that is already in place
and use.

FEATURES

• Often used
– Latency between keystrokes
– Duration of keystroke, hold-time
• Seldom used
– Overall typing speed
– Frequency of errors
– Habit of using additional keys (numpad…)
– Capital letters (order of releasing shift and letter)
– Force of hitting keys (special keyboard needed)

EXAMPLE

Latencies between keystrokes when writing “password” by two persons


Figure Key Stroke

FACIAL RECOGNITION SYSTEM:

A facial recognition system is a computer-driven application for


automaticallyidentifying a person from a digital image. It does that by comparing
selected facialfeatures in the live image and a facial database.

It is typically used for security systems and can be compared to other biometrics such
asfingerprint or eye iris recognition systems.Popular recognition algorithms include
eigenface, fisherface, the Hidden Markov model,and the neuronal motivated Dynamic
Link Matching. A newly emerging trend, claimed toachieve previously unseen
accuracies, is three- dimensional face recognition. Anotheremerging trend uses the
visual details of the skin, as captured in standard digital orscanned images.
CONCLUSION

Biometrics can only be limited by limiting one's imagination. Biometric technology is


now being used in almost every area. Not only that, but various types of biometric
systems are being used to achieve various functionalities.

There are many mature biometric systems available now. Proper design and
implementation ofthe biometric system can indeed increase the overall security. There
are numerous conditionsthat must be taken in account when designing a secure
biometric system. First, it is necessary torealize that biometrics is not secrets. This
implies that care should be taken and it is not secureto generate any cryptographic keys
from them. Second, it is necessary to trust the input deviceand make the communication
link secure. Third, the input device needs to be verified .

The ultimate form of electronic verification of a person’s identity is biometrics;


using a physical attribute of the person to make a positive identification. People have
always used the brain’s innate ability to recognize a familiar face and it has long been
known that a person’s fingerprints can be used for identification. The challenge has
been to turn these into electronic processes that are inexpensive and easy to use.

Banks and others who have tested biometric-based security on their clientele,
however, say consumers overwhelmingly have a pragmatic response to the technology.
Anything that saves the information-overloaded citizen from having to remember
another password or personal identification number comes as a welcome respite.

Biometrics can address most of the security needs, but at what cost?
Surprisingly, the benefits quickly outweigh the costs. Like so many technological
developments, innovative people have found new ways to implement biometric systems,
so prices have come down dramatically in the last year or two. As prices have come
down, the interest level and the knowledge about how to effectively utilize these systems
have increased.

REFERENCE

1. Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani, Venu Govindaraju,


“Symmetric
Hash functions for Secure Finger print biometric systems”.
2. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
Private Biometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric and
T.Kevenaar, Eds., chpt5,pp.79-77, Springer-Verlag, 20012.
3. Direct Indirect Human Computer Interaction Based Biometrics International
Journal of Emerging Engineering Research and Technology Volume 3, Issue 3, March
2015.
4. A.A.E. Ahmed, I. Traore, “A new biometric technology based on mouse dynamics,
IEEE
Transactions on dependable and Secure Computing” 4 (3) (2007) 165–179.
5. Deshpande, S. Chikkerur, V. Govindaraju, Accent classification in speech, Fourth
IEEE Workshop on Automatic Identification Advanced Technologies, 17–18 October,
2014, pp. 139–143.
6. F. Bannister and R. Connolly, “New Problems for Old? Defining e-Governance”,
proceedings of the 44th Hawaii International Conference on System Sciences, (2012).
7. W.-S. Chen, K.-H. Chih, S.-W. Shih and C.-M. Hsieh, “Personal Identification
Technique based on Human Iris Recognition with Wavelet Transform”, 2005 IEEE,
ICASSP, (2012), pp. II -949.
8. R. Germain, A. Califano, and S. Colville, “Fingerprint Matching Using
Transformation Parameter Clustering,” IEEE Computational Science and Engineering 4,
No. 4, 42–49 (2014).
9. L. O’Gorman, “Practical Systems for Personal Fingerprint Authentication,” IEEE
Computer 33, No. 2, 58–60 (2013).
10 N. K. Ratha and R. M. Bolle, “Smart Card Based Authentication,” in Biometrics:
Personal Identification in Networked Society, A. K. Jain, R. M. Bolle, and S. Pankanti,
Editors, Kluwer Academic Press, Boston, MA (2013), pp. 369–384.
11. T. Rowley, “Silicon Fingerprint Readers: A Solid State Approach to Biometrics,”
Proceedings of the CardTech/SecureTech Conference, CardTech/SecureTech, Bethesda,
MD (2013), pp. 152–159.
12. B. Miller, “Vital Signs of Identity,” IEEE Spectrum 31, No.2, 22–30 (2013).
13. B. Schneier, “The Uses and Abuses of Biometrics,” Communications of the ACM 42,
No. 8, 136 (2012).

Bibliography
 International Biometrics + Identity Association:
https://www.ibia.org/

 Biometrics Institute: https://www.biometricsinstitute.org/

 National Institute of Standards and Technology (NIST) -


Biometrics: https://www.nist.gov/topics/biometrics

 European Association for Biometrics: https://www.eab.org/

 Biometric Update: https://www.biometricupdate.com/

 IEEE Biometrics Council: https://ieee-biometrics.org/

 Biometric Research Group:


https://www.biometricupdate.com/research

 Biometric Technology Today:


https://www.biometrictechnologytoday.com/

 Biometrics.gov: https://www.biometrics.gov/

 Biometric Consortium: https://www.biometriccoe.gov/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy