Biometric
Biometric
M.B.E.S.SOCIETY’S
INDIA-431517
ACKNOWLEDGEMENT
we offer my sincere and hearty thanks, with a deep sense of gratitude to my guide Prof.Dr.V.V
Yerigiri and Head of Department Prof.Dr.V.V. Yerigiri for their valuable direction and guidance
to my project "Biometric", for their attention towards my project work without taking care of
their voluminous work.
Last but not Least I am thankful to my friends and well-wishers, to whom I am indebted for
their constant help, encouragement and support, without whom this project would not have
beena success.
What is Biometrics?
Definition:-
"Biometrics is the automated identification, or verification of human identity through the
measurement of repeatable physiological, or behavioral characteristics"
Identification:-
The search of a biometric sample against a database of other samples in order to ascertain
whether the donor is already contained in, or new to the database.
Verification:-
It refers to the 'one to one' comparison between a sample and another to ask the question, 'are
you who you say you are."
The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For
our use, biometrics refers to technologies for measuring and analyzing a person's physiological
or behavioral. characteristics, such as fingerprints, irises, voice patterns, facial patterns, and
hand measurements, for identification and verification purposes.
Identification and verification have long been accomplished by showing something you have,
such as a license a passport. Sometimes it also required something you know, such as a
password or a PIN. As we move into a time when we need more secure and accurate measures,
we begin to look at using something you are: biometrics.
European Origins:
Until the late 1800s, identification largely relied upon "photographic memory." In the 1890s, an
anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the
problem of identifying convicted criminals and turned biometrics into a distinct field of study.
He developed a method of multiple body measurements which got named after him
(Bertillonage). His system was used by police authorities throughout the world, until it quickly
faded when it was discovered that some people shared the same measurements and based on
the measurements alone, two people could get treated as one. After the failure of Bertillonage,
the police started using finger printing, which was developed by Richard Edward Henry of
Scotland Yard, essentially reverting to the same methods used by the Chinese for years.
Modern Times:
In the past three decades biometrics has moved from a single method (fingerprinting) to more
than ten discreet methods. Companies involved with new methods number in the hundreds
and continue to improve their methods as the technology available to them advances. Prices
for the harware required continue to fall making systems more feasible for low and mid-level
budgets. As the industry grows however, so does the public concern over privacy issues. Laws
and regulations continue to be drafted. and standards are beginning to be developed. While no
other biometric has yet reached the breadth of use of fingerprinting, some are beginning to be
used in both legal and business areas.
WORKING PRINCIPLE OF BIOMETRICS
Biometric devices consist of a reader or scanning device, software that converts the gathered
information into digital form, and a database that stores the biometric data for comparison
with previous records. When converting the biometric input, the software identifies specific
points of data as match points. The match points are processed using an algorithm into a value
that can be compared with biometric data in the database.
Enrollment Mode:
A sample of the biometric trait is captured, processed by a computer, and. stored for later
comparison. Biometric recognition can be used in Identification mode, where the biometric
system identifies a person from the entire enrolled population by searching a database for a
match based solely on the biometric. For example, an entire database can be searched to verify
a person has not applied for entitlement benefits under two different names. This is sometimes
called "one-to-many" matching.
Verification Mode:
In this mode biometric system authenticates a person's claimed identity from their previously
enrolled pattern. This is also called "one-to-one" matching. In most computer access or network
access environments, verification mode would be used. A user enters an account, user name, or
inserts a token such as a smart card, but instead of entering a password, a simple glance at a
camera is enough to authenticate the user.
TYPES OF BIOMETRICS
Physical biometries:
Fingerprint-Analyzing fingertip patterns.
Facial Recognition - Measuring facial characteristics.
Hand Geometry Measuring the shape of the hand.
Iris recognition - Analyzing features of colored ring of the eye.
Vascular Patterns - Analyzing vein patterns.
Retinal Scan-Analyzing blood vessels in the eye.
Bertillonage - Measuring body lengths (no longer used).
Behavioral biometrics:
Speaker Recognition - Analyzing vocal behavior.
Signature Analyzing signature dynamics.
Keystroke-Measuring the time spacing of typed words.
CHARACTERISTICS OF BIOMETRICS
Biometric characteristics can be divided in two main classes, as represented in figure on the
right.
Physiological are related to the shape of the body. The oldest traits, that have been
used for more than 100 years, are fingerprints. Other examples are face recognition,
hand geometry and iris recognition. Behavioral are related to the behavior of a person.
The first characteristic to be used, still widely used today, is the signature. More modern
approaches are the study of keystroke dynamics and of voice.
FUTURE OUTLOOK:
According to most experts, the future of biometrics is dependant upon two critical areas:
standardization and the use of hybrid technologies.
Standardization:
Currently, the biometrics industry is very fragmented, with more than 150 companies with their
own proprietary systems and methodologies. Standards have only recently been established in
order to provide direction for the development of a common interface that will allow for shared
biometric templates. The BioAPI standard created by the BioAPI Consortium, a group of more
than 60 vendors and government agencies, defines a common structure for interfacing with
biometrics. Yet, competitive forces remain as technology giants like Microsoft have abandoned
the consortium and the BioAPI standard in order to develop their own proprietary software
standards. The development and acceptance of a primary standard is critical for the growth and
applicability of the biometrics industry. Only after the technological standard is more
established can systems integrate and interact efficiently.
Hybrid Technologies:
One of the critical concerns with the use of biometric technologies is that of privacy and
security of stored personal biometric data. To have personal data stored in a centralized
databuse leaves the information potentially open to theft or compromise. The concept of
combining smart card or public key infrastructures with biometric readers where the biometric
template is stored on an individually controlled key has been suggested as a solution for the
privacy concem and is considered by some critical to the advancement of biometric
applications.
Biometrics is a powerful combination of science and technology that can be used to protect and
secure our most valuable information and property. The future holds no limits for this industry
as more applications are found. Further, the technology itself continues to improve in terms of
application and accuracy. From the application of total body scanning for highest security areas.
to speed and accuracy of identification when shopping on- line, the applications are boundless.
Imagine a world where interstate air travel is allowed automatically via a full body scan that not
only verifies identity but simultaneously searches. for insecure or illegal paraphernalia. Where
access to one is bank or credit accounts is only granted after identification via iris or retina scan.
Where a shopping trip is made possible by a vehicle that operates only with biometric
verification of ownership and payment is made via a fingerprint scan that links directly to one is
credit account.
In the future, we will live in a faster paced, more secure world where verification of one is
identity is critical for daily activities. While some might argue that privacy and personal
"freedom" are sacrificed with this level of control, most believe that it is the necessary price for
a secure world environment.
BASIC MECHANISM
The diagram shows a simple block diagram of a biometric system. When such a system is
networked together with telecommunications technology, biometric systems become
telebiometric systems. The main operations a system can perform are enrollment and test.
During the enrollment, biometric information from an individual is stored. During the test,
biometric information is detected and compared with the stored information. Note that it is
crucial that storage and retrieval of such systems themselves be secure if the biometric system
is be robust. The first block (sensor) is the interface between the real world and our system; it
has to acquire all the necessary data. Most of the times it is an image acquisition system, but it
can change according to the characteristics desired. The second block performs all the
necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g.
removing background noise), to use some kind of normalization, etc. In the third block features
needed are extracted. This step is an important step as the correct features need to be
extracted and the optimal way. A vector of numbers or an image with particular properties is
used to create a template. A template is a synthesis of all the characteristics extracted from the
source, in the optimal size to allow for adequate identifiability.
BIOMETRICS COLLECTION:-
Biometrics are typically collected using a device called a sensor. These sensors are used to
acquire the data needed for recognition and to convert the data to a digital form.
The quality of the sensor used has a significant impact on the recognition results. Example
"sensors" could be digital cameras (for face recognition) or a telephone (for voice recognition).
BIOMETRIC TEMPLATES:-
A biometric template is a digital representation of an individual's distinct characteristics,
representing information extracted from a biometric sample. Biometric templates are what are
actually compared in a biometric recognition system. Templates can vary between biometric
modalities as well as vendors. Not all biometric devices are template based. For example, voice
recognition is based on "models." The difference between templates and models is beyond the
scope of this paper.
The following table shows a comparison of existing biometric systems in terms of those
parameters:
M-Medium, L-Low)
BIOMETRIC MODALITIES
Different applications and environments have different constraints. For instance, adequate
fingerprint samples require user cooperation; whereas, a face image can be Captured by a
surveillance camera. Furthermore, Fingerprints are not available for many of the suspects on
Watch lists. There are also multiple biometric modalities for technical and financial reasons.
Many scientists become interested in developing a system based. on their own research. Upon
a successful implementation, venture capitalist, interested in the implementation of such a
system, commercialize a product. Therefore, wide varieties of modalities are being researched
and are available on the market.
Fingerprint
The patterns of friction ridges and valleys on an individual's fingertips are unique to that
individual. For decades, law enforcement has been classifying and determining identity by
matching key points of ridge endings and bifurcations. Fingerprints are unique for cach finger of
a person including identical twins. One of the most commercially available biometric
technologies, fingerprint recognition devices for desktop and laptop access are now widely
available from many different vendors at a low cost. With these devices, users no longer need
to type passwords instead, only a touch provides instant access. Fingerprint systems can also be
used in identification mode. Several states check fingerprints for new applicants to social
services benefits to ensure recipients do not fraudulently obtain benefits under fake names.
New York State has over 900,000 people enrolled in such a system.
Advantages:
Subjects have multiple fingers. Easy to use, with some training
Some systems require little space.
Large amounts of existing data to allow background and/or watchlist checks.
Has proven effective in many large scale systems over years of use. Fingerprints are
unique to each finger of each individual and the ridge arrangement remains permanent
during one's lifetime.
Disadvantages:
Public Perceptions.
Privacy concerns of criminal implications,
Health or societal concerns with touching a sensor used by countless. Individuals Face
FACE
The identification of a person by their facial image can be done in a number of different ways
such as by capturing an image of the face in the visible spectrum using an inexpensive camera
or by using the infrared patterns of facial heat emission. Facial recognition in visible light
typically model key features from the central portion of a facial image. Using a wide assortment
of cameras, the visible light systems extract features from the captured image(s) that do not
change over time while avoiding superficial features such as facial expressions or hair. Several
approaches to modeling facial imsages in the visible spectrum are Principal Component
Analysis, Local Feature Analysis, neural networks, elastic graph theory, and multi-resolution
analysis.
Some of the challenges of facial recognition in the visual spectrum include reducing the impact
of variable lighting and detecting a mask or photograph. Some facial recognition systems may
require a stationary or posed user in order to capture the image, though many systems use a
real-time process to detect a person's head and locate the face automatically. Major benefits of
facial recognition are that it is non-intrusive, hands-free, continuous and accepted by most
users.
Advantages:
No contact required.
Disadvantages:
Face can be obstructed by hair, glasses, hats, scarves etc.
Sensitive to changes in lighting, expression, and poses faces change over time..
Propensity for users to provide poor-quality video images yet to expect accurate results.
Hand Geometry
These methods of personal authentication are well established. Hand recognition has been
available for over twenty years. To achieve personal authentication, a system may measure
either physical characteristics of the fingers or the hands. These include length, width, thickness
and surface area of the hand. One interesting characteristic is that some systems require a
small biometric sample (a few bytes). Hand geometry has gained acceptance in a range of
applications. It can frequently be found in physical access control in commercial and residential
applications, in time and attendance systems and in general personal authentication
applications
Advantages:
Easy to capture,
Disadvantages:
Use requires some training.
enrollment identity.
enrollment of one or more voice passwords. Text-prompted input is used whenever there is
concem of imposters. The various technologies used to process and store voiceprints includes
hidden Markov models, pattem matching algorithms, neural networks, matrix representation
and decision trees. Some systems also use "anti-speaker" techniques, such as cohort models,
and world models.
Ambient noise levels can impede both collection of the initial and subsequent voice samples.
Performance degradation can result from changes in behavioral attributes of the voice and
from enrollment using one telephone and verification on another telephone. Voice changes due
to aging also need to be addressed by recognition systems. Many companies market speaker
recognition engines, often as part of large voice processing, control and switching systems.
Capture of the biometric is seen as non-invasive. The technology needs little additional
hardware by using existing microphones and voice-transmission technology allowing
recognition over long distances via ordinary telephones (wire line or wireless).
Advantages:
Public Acceptance.
No Contact Required.
Disadvantages
Difficult to control sensor and channel variances that significantly impact capabilities.
This recognition method uses the iris of the eye which is the colored area that surrounds the
pupil. Iris patterns are thought unique. The iris patterns are obtained through a video-based
image acquisition system. Iris scanning devices have been used in personal authentication
applications for several years. Systems based on iris recognition have substantially decreased in
price and this trend is expected to continue. The technology works well in both verification and
identification modes (in systems performing one-to-many searches in a database). Current
systems can be used even in the presence of eyeglasses and contact lenses. The technology is
not intrusive. It does not require physical contact with a scanner. Irns recognition has been
demonstrated to work with individuals from different ethnic groups and nationalities
Advantages:
No contact Required.
Disadvantages:
Difficult to capture for some individuals,
cornea
Public myths and fears related to "scanning" the eye with a light source
Acquisition of an iris image requires more training and attentiveness than most biometrics.
Lack of existing data deters ability to use for background or watch list checks.
The idea of using iris patterns for personal identification was originally documented in an
ophthalmology textbook by James Doggurts in 1949, and may have been proposed as early as
1936 by ophthalmologist Frank Burch. By the 1980's the idea had appeared in James Bond films,
but it still remained science fiction and conjecture
In 1987 two other ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and in
1989 they asked John Daugman (then teaching at Harvard University) to try to create actual
algorithms for iris recognition. These algorithms, which Daugman patented in 1994, are the
basis for all current iris recognition systems and products
The Daugman algorithms are owned by Iridian Technologies, and the process is licensed to
several other companies who serve as systems integrators and developers of special platforms
exploiting iris recognition.
Iris structure
The ins is a protected internal organ of the eye, located behind the cornea and the aqueous
humour, but in front of the lens. The false acceptance rate for iris recognition systems is in 1 in
1.2 million, that is every 1 in 1.2 million iris is found to be unique in it's features. It is seen in
cross-section in the anatomical drawing above. It is the only internal organ of the body that is
normally visible extermally, Images of the iris iris ad adequate for personal identification with
very high confidence can be acquired from distances of up to about 3 feet (1 meter)
Among the visible features of an iris are the trabecular mesh works of connective tissue
(pectinate ligament), the collagenous tissue of the stroma. ciliary's processes, contraction
furrows, crypts, rings, a corona and pupillary frill, colouration, and sometimes freckles. The
striated anterior layer covering the trabecular meshwork creates. the predominant texture seen
v with visible light
The human iris begins to form during the third month of gestation. The structures creating its
distinctive pattern are complete by the eighth month of gestation, but pigmentation continues
into the first years after birth. The layers of the iris have both ectodermal and mesodermal
embryological origin, consisting of (from back to front): a darkly pigmented epithelium;
pupillary dilator and sphincter muscles; heavily vascularized stroma (connective tissue of
interlacing ligaments containing melanocytes), and an anterior layer of chromataphores and
melanocytes with a genetically determined density of melanin pigment granules.
The combined effect is a visible pattern displaying various distinctive features such as arching
ligaments, crypts, furrows, ridges, and a zigzag collarette. Iris colour is determined mainly by
the density of the stroma and its melanin content, with blue irises resulting from an absence of
pigment: longer wavelengths differentially penetrate while shorter wavelengths are reflected
and scattered, a phenomenon resembling that which makes the sky blue.
Further properties of the iris that enhance its suitability for use in high confidence identification
systems include:
The impossibility of surgically modifying iris without unacceptable risk to vision. Its physiological
response to light, which provides one of several natural tests against artifice.
A property the iris shares with fingerprints is the random. morphogenesis of its minutiae.
Because there is no genetie penetrance in the expression of this organ beyond its anatomical
form, physiology, colour and general appearance, the iris texture itself is stochastic or possibly
chaotic.
Its detailed morphogenesis depends on initial conditions in the embryonic mesoderm from
which it develops, the phenotypic expression even of two irises with the same genetic genotype
(as in identical twins, or the pair possessed by one individual) have uncorrelated minutiae
The ease of registering iris image at some distance from a Subject without physical contact,
unintrusively and perhaps inconspicuously
It's intrinsic polar geometry, which imparts a natural coordinate system and an origin of
coordinates.
The high level of randomness in iris pattern, creating inter-Subject variability spanning about
250 degrees-of-freedom, and an entropy (information density) of about 3.2 bits per square-
millimeter of iris tissue.
The iris-scan process begins with a photograph. A specialized camera, typically very close to the
subject, no more than three feet, uses an infrared imager to illuminate the eye and capture a
very high-resolution photograph.
This process takes only one to two seconds and provides the details of the iris that are mapped,
recorded and stored for future matching/verification The inner edge of the iris is located by an
iris-scan algorithm, which maps
the iris' distinct patterns and characteristics. An algorithm is a series of directives that tell a
biometric system how to interpret a specific problem. Algorithms have a number of steps and
are used by the biometric system to determine if a biometric sample and record is a match A
general iris recognition system for personal identification is composed of four steps
1) Iris Image Acquisition- an image containing the user's eye is captured by the high resolution
Iris Camera.
2) Image Preprocessing- the image is then preprocessed to normalize the scale and illumination
of the iris and localize the iris from the acquired image
An important and difficult step of an iris recognition system is image ocquisition. Since iris is
small in size and dark in color, using some specialized camera iris image can be easily acquired
for analysis
Image Preprocessing
The acquired image always contains not only the useful parts (iris) but also some irrelevant
parts (eg. eyelid, pupil etc.). Under some conditions, the brightness is not uniformly distributed.
In addition, different eye-to camera distance may result in different image sizes of the same
eye. For the purpose of analysis, the original image needs to be preprocessed. The
preprocessing is composed of three steps
Iris Localization.
Iris Normalization.
Image Enhancement
PERFORMANCE MANAGEMENT:
False accept rate (FAR) or false match rate (FMR): The probability that the system incorrectly
declares a successful match. between the input pattern and a non-matching pattern in the
database. It measures the percent of invalid matches. Th These systems are critical since they
are commonly used to forbid certain actions by disallowed
people. False reject rate (FRR) or false non-match rate (FNMR): The probability that the system
incorrectly declares failure of match between the input pattern and the matching template in
the database. It
Receiver (or relative) operating characteristic (ROC): In general, the matching algorithm
performs a decision using some parameters (e.g. a threshold). In biometric systems the FAR and
FRR can typically be traded off against each other by changing those parameters. The ROC plot
is obtained by graphing the values of FAR and FRR, changing the variables implicitly. A common
variation is the Detection error trade-off (DET), which is obtained using normal deviate scales
on both axes. This more linear graph illuminates the differences for higher performances (rarer
errors)
Equal error rate (EER): The rate at which both accept and reject errors are equal, ROC or DET
plotting is used because how FAR and FRR can be changed, is shown clearly. When quick
comparison of two systems is required, the ERR is commonly used. Obtained from the ROC plot
by taking the point where FAR and FRR have the same value. The lower the EER, the more
accurate the system is considered
Failure to enroll rate (FTE or FER): The percentage of data input is considered invalid and fails
to input into the system. Failure to enroll happens when the data obtained by the sensor are
considered invalid or of poor quality.
Failure to capture rate (FTC): Within automatic systems, the probability that the system fails to
detect a biometric characteristic when presented correctly.
Template capacity: The maximum number of sets of data which can be input in to the system.
A concern is how a person's biometric, once collected, can be protected. Australia has therefore
introduced a Biometrics Institute Privacy Code Biometrics Institute in order to protect
consumer personal data beyond the current protections offered by the Australian Privacy Act.
Sociological concerns
As technology advances, and time goes on, more private companies and public utilities may use
biometrics for safe, accurate identification. These advances are likely to raise concerns such as:
Physical-Some believe this technology can cause physical harm to an individual using the
methods, or that instruments used are unsanitary. For example, there are concerns that retina
scanners might not always be clean.
Personal Information There are concems whether our personal information taken through
biometric methods can be misused, tampered with, or sold, e.g. by criminals stealing,
rearranging or copying the biometric data. Also, the data obtained using biometrics can be used
in unauthorized ways without the individual's consent.
When thieves cannot get access to secure properties, there is a chance tha ers of secured
itemst the thieves will stalk and assault the property owner to gain access. If the item is secured
with a biometric device, the damage to the owner could be irreversible, and potentially cost
more than the secured property. In 2005, Malaysian car thieves cut off the finger of a
Mercedes- Benz S-Class owner when attempting to steal the car
Cancelable Biometrics
Physical features, such as face, fingerprint, iris, retina, hand, or behavioral features, such as
signature, voice, gait, must fulfill a certain criteria to qualify for use in recognition. They must be
unique, universal, acceptable, collectable and convenient to the person, in addition, to
reliability at recognition, performance and circumvention. However, most importantly,
permanence is a key feature for biometrics. They must retain all the above features in particular
the uniqueness unchanged, or acceptably changed, over
Biometric Time Clocks-Which are being increasingly used in
various organisations to control employee timekeeping. Biometric safes and biometric locks
Provides security to the
homeowners.
Biometric access control systems Providing strong security at entrances. Biometric systems are
also developed for securing access to pe's and providing single logon facilities.
Wireless biometrics for high end security and providing safer transactions from wireless devices
like PDA's, etc.
Identifying DNA Patterns of biometrics technology in identifying DNA patterns for identifying
criminals, etc.
Biometrics airport security devices are also deployed at some of the world's famous airports to
enhance the security standards
BIOMETRICS DEVICES
Our biometric hamster is the next generation model of popular and versatile biometric
fingerprint readers. Packaged in a comfortable, ergonomic design, this biometric scanner
features the industry's most rugged and advanced optical sensor using patented SEIR
fingerprint biometric technology.
OptiMouse
OptiMouse is an innovative optical tracking mouse that can operate on almost any surface with
exceptional response, it features the industry's most rugged and advanced optical sensor using
patented SEIR fingerprint biometric technology.
iGuard-Integrated Access Control and Time Attendance. System
Guard is a complete solution combining a access control system and time attendance system. It
utilizes patented embedded web server technology combined with biometrics and smart card
authentication. This is the world's only available system that has achieved advanced operability
using world- renowned TCP/IP networking protocol without having to compromise on security
Biometric personal safes are revolutionary locking storage cases that open with just the touch
of your finger. These products are designed as "access denial secure storage for medications,
jewelry, weapons, documents, and other valuable or potentially harmful items.
Biometric Fingerprint Door Locks
Your fingerprint is the key with our revolutionary fingerprint door lock. This amazing new
product replaces keyed locking mechanisms with a fingerprint sensor that actually recognizes
who is and who is not authorized to enter
legal process. Forensic usually requires days of processing and are held to much higher accuracy
requirements.
Biometrics are also used for accountability applications such as recording the biometric
identities of individuals..
WIRELESS BIOMETRICS
As biometrics systems improve, become smaller and require less power for operation, the
potential to integrate into new application grows. The ability to operate the biometrics
verification solution from battery supply is unprecedented. Previously, biometrics have been
used in combination with personal computers and based on a stringent platform to maintain
reasonable performance.
However, as the technology for fingerprint recognition is being miniaturized and streamlined
for performance, new avenues of application can be found. when technologies are integrated
together in small, simple and stand-alone packaging
Wireless biometrics will consists of both the hardware and software for the fingerprint scanning
devices that will be embedded in wireless handheld devices. The solution will come as a bundle
of a range of validation, transaction management and content protection services based on the
devices.