Biometrics 1
Biometrics 1
On
Biometrics
By
Harshit Goyal
(22CSU082)
Submitted to
Dr. Divyabha Vashisth
@ NCU 2023
Retina Scanning
Iris Recognitions
Hand Geometry
Voice Pattern
Signature Pattern
Key Stroke
Facial Recognition
3.Conclusion………………………………….
4.Recommendations………………………
5.Bibliography……………………………….
6.List of References……………………….
7.Glossary……………………………………….
Appendix 1
Acknowledgement
I would like to present my gratitude for the kind support
and help of many individuals and sources. I would like to
extend my sincere thanks to all of them.
Humans recognize each other according to their various characteristics for ages. We
recognize others by their face when we meet them and by their voice as we speak to
them. Identity verification (authentication) in computer systems has been traditionally
based on something that one has (key, magnetic or chip card) or one knows (PIN,
password). Things like keys or cards, however, tend to get stolen or lost and passwords
are often forgotten or disclosed.
To achieve more reliable verification or identification we should use something that
really characterizes the given person. Biometrics offer automated methods of identity
verification or identification on the principle of measurable physiological or behavioral
characteristics. The characteristics are measurable andunique. Biometrics is the
development of statistical and mathematical methods applicable to data analysis
problems in the biological sciences.Physical characteristics such as fingerprints, retinas
and irises, palm prints, facial structure, and voice recognition are just some of the many
methods of biometric encryption. Depending on the context, a biometric system can be
either a verification (authentication) system or an identification system. Biometrics is a
rapidly evolving technology which has been widely used in forensics such as criminal
identification and prison security. Recent advancements in biometric sensors and
matching algorithms have led to the deployment of biometric authentication in a large
number of civilian applications. With the increased use of computers as vehicles of
information technology, it is necessary to restrict access to sensitive/personal data. Real-
time biometric systems can be used to prevent unauthorized access to ATMs, cellular
phones, smart cards, desktop PCs, workstations, computer networks and electronic
banking.
1. INTRODUCTION
Reliable user authentication is becoming an increasingly important task in the
Web- enabled world. The consequences of an insecure authentication system in a
corporate or enterprise environment can be catastrophic, and may include loss of
confidential information, denial of service, and compromised data integrity. The value
of reliable user authentication is not limited to just computer enhanced security.
The prevailing techniques of user authentication, which involve the use of either
passwords and user IDs (identifiers), or identification cards and PINs (personal
identification numbers), suffer from several limitations. Passwords and PINs can be
illicitly acquired by direct covert observation. Once an intruder acquires the user ID or
network access. Many other applications in everyday life also require user
authentication, such as banking, e- commerce, and physical access control to computer
resources, and could benefit from and the password, the intruder has total access to the
user’s resources. In addition, there is no way to positively link the usage of the system or
service to the actual user, that is, there is no protection against repudiation by the user
ID owner. For example, when a user ID and password is shared with a colleague there is
no way for the system to know who the actual user is. A similar situation arises when a
transaction involving a credit card number is conducted on the Web. Even though the
data are sent over the Web using secure encryption methods, current systems are not
capable of assuring that the rightful owner of the credit card initiated the transaction.
In the modern distributed systems environment, the traditional authentication policy
based on a simple combination of user ID and password has become inadequate.
Fortunately, automated biometrics in general, and fingerprint technology in particular,
can provide a much more accurate and reliable user authentication method. Biometrics
is a rapidly advancing field that is concerned with identifying a person based on his or
her physiological or behavioural characteristics. Biometrics is derived from the
conjunction of the Greek words bios and metrics that mean life and to measure
respectively. Examples of automated biometrics include fingerprint, face, iris, and
speech recognition. Since biometrics is extremely difficult to forge and cannot be
forgotten or stolen, Biometric authentication offers a convenient, accurate,irreplaceable
and high secure alternative for an individual, which makes it has advantages over
traditional cryptography-based authentication schemes. It has become a hot
interdisciplinary topic involving biometric and Cryptography. Biometric data is
personal
privacy information, which uniquely and permanently associated with a person and
cannot be replaced like passwords or keys. Once an adversary compromises the
biometric data of a user, the data is lost forever, which may lead to a huge financial loss.
Hence, one major concern is how a person’s biometric data, once collected, can be
protected.
BIOMETRIC TECHNOLOGY
FINGERPRINT SCANNING:
PROCESS:
• These pictures are then processed into digital templates that contain the unique
extracted features of a finger.Uses the ridge endings and bifurcation's on a
persons finger to plot points known as Minutiae.The number and locations of
the minutiae vary from finger to finger in any particular person, and from
person to person for any particular finger
• These digital fingerprint templates can be stored in databases and used in place
of traditional passwords for secure access.
Image techniques
Use both optical and numerical image correlation techniques
Feature techniques
Extracts features and develop representations from these features
The human retina is a thin tissue composed of neural cells that is located in the
posterior portion of the eye.
Because of the complex structure of the capillaries that supply the retina with
blood, each person’s retina is unique.
The network of blood vessels in the retina is so complex that even identical twins do
not share a similar pattern. Although retinal patterns may be altered in
cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically
remains unchanged from birth until death.
A biometric identifier known as a retinal scan is used to map the unique patterns of
a
person’s retina.
The blood vessels within the retina absorb light more readily than the
surrounding tissue and are easily identified with appropriate lighting. A retinal
scan is performed by casting a beam of low-energy infrared light into a person’s
eye as they look through the scanner’s eyepiece.
The pattern of variations is converted to computer code or template and
stored in a database.
IRIS SCAN:
The iris is a thin, circular structure in the eye, responsible for controlling the
diameter and size of the pupils and thus the amount of light reaching the retina.
The iris is the colored portion of the eye surrounding the pupil. Its pattern
results from a meshwork of muscle ligaments, and its color and contrast are
determined bypigmentation.
“Eye color” is the color of the iris, which can be green, blue, or brown. In some
cases it can be hazel (a combination of light brown, green and gold), grey, violet,
or even pink.
In response to the amount of light entering the eye, muscles attached to the iris
expand or contract the aperture at the center of the iris, known as the pupil.
The larger the pupil, the more light can enter. Iris recognition is an automated
method of biometric identification that uses mathematical pattern-recognition
techniques on video images of the iries of an individual’s eyes, whose complex
random patterns are unique and can be seen from some distance.
Hand geometry systems are commonly available in two main forms. Full hand geometry
systems take an image of the entire hand for comparison while Two Finger readers only
image two fingers of the hand.
Hand recognition technology is currently one of the most deployed biometrics discipline.
Hand geometry is a biometric that identifies users by the shape of their hands. Usually a
specialized reader device to measure aspects such as length, width, thickness, and
surface area of the hand and fingers .
A camera capture an image of the hand, with the help of a mirror to get also the edge.
The graph of the hand is extracted, and some geometrical characteristics stored.
Hand geometry readers measure a user's hand along many dimensions and compare
those measurements to measurements stored in a file.
VOICE PATTERN
• 1. off-line(Static)
• 2. on-line(Dynamic)
Static:
In this mode, users write their signature on paper, digitize it through an optical scanner
or a camera, and the biometric system recognizes the signature analyzing its shape. This
group is also known as “off-line”.
Dynamic:
In this mode, users write their signature in a digitizing tablet, which acquires the signature
in
real time. Dynamic recognition is also known as “on-line”.
Feature Extraction/Selection
• The rhythms with which one types at a keyboard are sufficiently distinctive to
form the basis of the biometric technology known as keystroke dynamicThe way
and the manner in which we type on our computer keyboard varies from
individual to individual and is considered to be a unique behavioral biometric.
• Keystroke Dynamics or Recognition is probably one of the easiest biometrics
forms to implement and manage.
• This is so because at the present time, Keystroke Recognition is completely a
software based solution.
• There is no need to install any new hardware and even software.
• All that is needed is the existing computer and keyboard that is already in place
and use.
FEATURES
• Often used
– Latency between keystrokes
– Duration of keystroke, hold-time
• Seldom used
– Overall typing speed
– Frequency of errors
– Habit of using additional keys (numpad…)
– Capital letters (order of releasing shift and letter)
– Force of hitting keys (special keyboard needed)
EXAMPLE
It is typically used for security systems and can be compared to other biometrics such
asfingerprint or eye iris recognition systems.Popular recognition algorithms include
eigenface, fisherface, the Hidden Markov model,and the neuronal motivated Dynamic
Link Matching. A newly emerging trend, claimed toachieve previously unseen
accuracies, is three- dimensional face recognition. Anotheremerging trend uses the
visual details of the skin, as captured in standard digital orscanned images.
CONCLUSION
There are many mature biometric systems available now. Proper design and
implementation ofthe biometric system can indeed increase the overall security. There
are numerous conditionsthat must be taken in account when designing a secure
biometric system. First, it is necessary torealize that biometrics is not secrets. This
implies that care should be taken and it is not secureto generate any cryptographic keys
from them. Second, it is necessary to trust the input deviceand make the communication
link secure. Third, the input device needs to be verified .
Banks and others who have tested biometric-based security on their clientele,
however, say consumers overwhelmingly have a pragmatic response to the technology.
Anything that saves the information-overloaded citizen from having to remember
another password or personal identification number comes as a welcome respite.
Biometrics can address most of the security needs, but at what cost?
Surprisingly, the benefits quickly outweigh the costs. Like so many technological
developments, innovative people have found new ways to implement biometric systems,
so prices have come down dramatically in the last year or two. As prices have come
down, the interest level and the knowledge about how to effectively utilize these systems
have increased.
REFERENCE
Bibliography
International Biometrics + Identity Association:
https://www.ibia.org/
Biometrics.gov: https://www.biometrics.gov/