Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views42 pages

Poojithadocument 11

Uploaded by

21wj1a04q0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views42 pages

Poojithadocument 11

Uploaded by

21wj1a04q0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

A SEMINAR REPORT ON

“ BIOMETRIC TECHNOLOGY”
A seminar submitted to

GURU NANAK INSTITUTIONS TECHNICAL CAMPUS


(AUTONOMOUS)

In partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY IN ELECTRONICS AND


COMMUNICATION ENGINEERING
Submitted by
MUMMADI POOJITHA
(21WJ1A04K8)

Under the guidance of


Mrs. K. Nadiya
Assistant Professor

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING
GURU NANAK INSTITUTIONS TECHNICAL CAMPUS SCHOOL OF ENGINEERING
(UGC Autonomous Institution-Affiliated to JNTUH, NBA, NAAC A+)
Ibrahimpatnam, Ranga Reddy District -501506 Telangana. Academic
Year 2024-2025

1|Page
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING

CERTIFICATE

This is to certify that the Technical Seminar entitled “BIOMETRIC


TECHNOLOGY” is being presented with report by MUMMADI POOJITHA
bearing Roll.No.21WJ1A04K8, in partial fulfillment for the award of Degree of
Bachelor of Technology in Electronics and Communication Engineering to
Guru Nanak Institutions Technical Campus (Autonomous) affiliated to
Jawaharlal Nehru Technological University, Hyderabad during the academic
Year 2024-2025.

Seminar Incharge HEAD OF DEPARTMENT

Mrs. K. Nadiya Dr.Maheswara Reddy Sura

Assistant Professor Professor & HOD-EC

2|Page
ACKNOWLEGEMENT
I would like to express my sincere gratitude to my supervisor Mrs. K.Nadiya
Assistant Professor, Department of Electronics and Communication Engineering,
for her excellent guidance and invaluable support, which helped me accomplish
my Bachelor degree and prepared me to achieve more life goals in the future.
Her total support of our dissertation and countless contributions to our technical
and professional development made for a truly enjoyable and fruitful experience.
Special thanks are dedicated for the discussions we had on almost every working
day during our seminar period and for reviewing our dissertation.
I am very much grateful to Seminar Co-Ordinator Mrs.K.Nadiya , Assistant
Professor of ECE, GNITC, Hyderabad, who has not only shown utmost patience,
but was fertile in suggestions, vigilant in directions of error and has been
infinitely helpful. I am also thankful to our Academic Co-Ordinator, IV Year, Mr. D.
Surendra Rao, Associate Professor of ECE, GNITC, Hyderabad, for his support.
I am also thankful to Dr. Maheswara Reddy Sura, Professor & HOD of ECE &
Academic Coordinator, GNITC, Hyderabad, for being so helpful with valuable
insights and guidance during our technical seminar. I am incredibly grateful to
our Mentor Mr. K Krishna Kumar & Mr.S. Kishore Krishna Kumar, Assistant
Professors of ECE, GNITC, Hyderabad for being so thoughtful and helpful with
truly valuable insights and guidance during technical seminar
I am thankful to Dr. P. Parthasaradhy, Joint Director, GNITC for his
good …..support and providing valuable inputs in our technical seminar work I
express my deepest gratitude and thanks to Dr.S. Sreenatha Reddy, Director,
GNITC for his constant support and encouragement and for providing us all the
facilities in the college during our technical seminar work My sincere thanks to
all our faculties, administrative staff, and management of GNITC, without whose
support our work would always remain incomplete. On a more personal note, I
thank our beloved parents and friends for their moral support while my technical
seminar.
In All Sincerity,

MUMMADI POOJITHA

(21WJ1A04K8)

3|Page
ABSTRACT
Humans recognize each other according to their various characteristics for ages.
We recognize others by their face when we meet them and by their voice as we
speak to them. Identity verification (authentication) in computer systems has
been traditionally based on something that one has (key, magnetic or chip card)
or one knows (PIN, password).
Things like keys or cards, however, tend to get stolen or lost and passwords are
often forgotten or disclosed. To achieve more reliable verification or
identification we should use something that really characterizes the given
person. Biometrics offer automated methods of identity verification or
identification on the principle of measurable physiological or behavioral
characteristics.
The characteristics are measurable andunique. Biometrics is the development
of statistical and mathematical methods applicable to data analysis problems in
the biological sciences.Physical characteristics such as fingerprints, retinas and
irises, palm prints, facial structure, and voice recognition are just some of the
many methods of biometric encryption. Depending on the context, a biometric
system can be either a verification (authentication) system or an identification
system.
Biometrics is a rapidly evolving technology which has been widely used in
forensics such as criminal identification and prison security. Recent
advancements in biometric sensors and matching algorithms have led to the
deployment of biometric authentication in a large number of civilian
applications. With the increased use of computers as vehicles of information
technology, it is necessary to restrict access to sensitive/personal data. Real-
time biometric systems can be used to prevent unauthorized access to ATMs,
cellular phones, smart cards, desktop PCs, workstations, , computer networks
and electronic banking

4|Page
CONTENTS

Chapter -1; Introduction……………………………………………………………7


1.1 History and Development of Biometrics………………………………………………9
1.2 What is Biometric……………………………………………………………………………….10
1.3 Classification………………………………………………………………………………………. 12
1.4 Basic Structure…………………………………………………………………………………..13
Chapter -2 ;Biometric System Components and Process…………14
2.1 Components …………………………………………………………………………………….14
2.2 Process ……………………………………………………………………………………………..14
2.2.1 Enrollment………………………………………………………………………………………14
2.2.2 Verification………………………………………………………………………………………..15
2.3 Types of Biometric System………………………………………………………………….15
2.4 Biometric Accuracy……………………………………………………………………………16
Chapter -3; Biometric Technology……………………………………………17
3.1 Fingerprint Authentication…………………………………………………………………18
3.1.2 Advantages and Disadvantages………………………………………………………..19
3.2 Retina Scanning ………………………………………………………………………………….19
3.2.1 Advantages and Disadvantages…………………………………………………………20
3.3 Iris Recognitions ………………………………………………………………………………….20
3.3.1 Advantages and Disadvantages…………………………………………………………..21
3.4 Hand Geometry …………………………………………………………………………………..22
3.4.1 Advantages and Disadvantages……………………………………………………22-23
3.5 Voice Pattern ………………………………………………………………………………………..23
3.5.1 Advantages and Disadvantages…………………………………………………………….24
3.6 Signature Pattern ………………………………………………………………………………….24
3.6.1 Advantages and Disadvantages……………………………………………………………25

5|Page
3.7 Key Stroke ……………………………………………………………………………………………..26
3.7.1 Advantages and Disadvantages……………………………………………………………27
3.8 Facial Recognition ………………………………………………………………………………….27
3.8.1 Advantages and Disadvantages……………………………………………………………28
3.9 DNA Fingerprint……………………………………………………………………………………28
3.9.1 Advantages and Disadvantages……………………………………………………………29
3.10 Comparison…………………………………………………………………………………………30
Chapter- 4; A Multimodal biometric system…………………………..31
4.1 A multimodal biometric system using fingerprint,face, and speech…..31
4.2 Face and lip movement………………………………………………………………………..32
Chapter -5; Vulnerable Points Of Biometric System…………………..33
Chapter -6; Biometric devices……………………………………………………35
6.1 Iris Scanner………………………………………………………………………………35
6.2 Fingerprint Scanner………………………………………………………………….35
6.3 Face Camera ………………………………………………………………………….36
6.4 Hand Scanner………………………………………………………………………..36
6.5 Retina…………………………………………………………………………………….37
6.6 Multibiometric………………………………………………………………………..37
Chapter-7;Applications………………………………………………………………38
Chapter-8; Future scope …………………………………………………………….39
Chapter-9 conclusion…………………………………………………………………..40
Chapter-10;Reference………………………………………………………………….41

6|Page
1.INTRODUCTION
Reliable user authentication is becoming an increasingly important task in the
Webenabled world. The consequences of an insecure authentication system in
a corporate or enterprise environment can be catastrophic, and may include
loss of confidential information, denial of service, and compromised data
integrity. The value of reliable user authentication is not limited to just
computer enhanced security. The prevailing techniques of user authentication,
which involve the use of either passwords and user IDs (identifiers), or
identification cards and PINs (personal identification numbers), suffer from
several limitations.
Passwords and PINs can be illicitly acquired by direct covert observation. Once
an intruder acquires the user ID or network access. Many other applications in
everyday life also require user authentication, such as banking, e- commerce,
and physical access control to computer resources, and could benefit from and
the password, the intruder has total access to the user’s resources.
In addition, there is no way to positively link the usage of the system or service
to the actual user, that is, there is no protection against repudiation by the user
ID owner. For example, when a user ID and password is shared with a colleague
there is no way for the system to know who the actual user is. A similar
situation arises when a transaction involving a credit card number is conducted
on the Web.
In the modern distributed systems environment, the traditional authentication
policy based on a simple combination of user ID and password has become
inadequate. Fortunately, automated biometrics in general, and fingerprint
technology in particular, can provide a much more accurate and reliable user
authentication method.

7|Page
Biometrics is a rapidly advancing field that is concerned with identifying a
person based on his or her physiological or behavioural

characteristics.
Biometrics is derived from the conjunction of the Greek words bios and
metrics that mean life and to measure respectively.
Examples of automated biometrics include fingerprint, face, iris, and speech
recognition. Since biometrics is extremely difficult to forge and cannot be
forgotten or stolen, Biometric authentication offers a convenient,
accurate,irreplaceable and high secure alternative for an individual, which
makes it has advantages over traditional cryptography-based authentication
schemes.
It has become a hot interdisciplinary topic involving biometric and
Cryptography. Biometric data is personal 5 privacy information, which uniquely
and permanently associated with a person and cannot be replaced like
passwords or keys. Once an adversary compromises the biometric data of a
user, the data is lost forever, which may lead to a huge financial loss.

8|Page
1.1 History and Development of Biometrics

The idea of using patterns for personal identification was originally proposed in
1936 byophthalmologist Frank Burch. By the 1980’s the idea had appeared in
James Bond films, but itstill remained science fiction and conjecture. In 1987,
two other ophthalmologists Aram Safirand Leonard Flom patented this idea
and in 1987 they asked John Daugman to try to createactual algorithms for this
iris recognition. These algorithms which Daugman patented in 1994 arethe
basis for all current iris recognition systems and products. Daugman algorithms
are owned by Iridian technologies and the process is licensed toseveral other
Companies who serve as System integrators and developers of special
platformsexploiting iris recognition in recent years several products have been
developed for acquiring itsimages over a range of distances and in a variety of
applications. One active imaging systemdeveloped in 1996 by licensee Sensar
deployed special cameras in bank ATM to capture IRISimages at a distance of
up to 1 meter. This active imaging system was installed in cash machinesboth
by NCR Corps and by Diebold Corp in successful public trials in several
countries during 1997to 1999. a new and smaller imaging device is the low cost
“Panasonic Authenticam” digitalcamera for handheld, desktop, e-commerce
and other information security applications. Ticketless air travel, check-in and
security procedures based on iris recognition kiosks in airports havebeen
developed by eye ticket. Companies in several, countries are now using
Daughman’salgorithms in a variety of products.

9|Page
1.2 WHAT IS BIOMETRIC?

 SINGLE BIOMETRIC
Biometric technologies are defined as automated methods of identifying or
authenticating the identity of a living person based on unique physiological or
behavioural characteristics. Biometrics can provide very secure and convenient
authentication for an individual since they cannot be stolen or forgotten and
are very difficult to forge.

Figure 1.1 Single Biometric


The term “biometrics” is derived from two Greek words ‘bios’ for life and
‘metron’ for measure. A biometric can be described as a measurable physical
and/or behavioral trait that can be captured and used to verify the identity of a
person by comparing the metric to a previously stored template. The area of
biometrics can therefore be defined as the task of automatically recognizing a
person using his/her distinguishing traits. Examples of these “distinguishing
traits” are fingerprints, voice patterns, facial characteristics etc. The idea of
biometric identification is not new, it have been around for centuries. Example
of a biometric is the photo on identification cards and passports, which still is
the most important way of verifying the identity of a person.

10 | P a g e
 MULTIMODAL BIOMETRIC
A multimodal biometric system uses multiple applications to capture different
type biometric. This allows the integration of two or more types of biometric
recognition and verification system in order to meet stringent performance
requirements. A multimodal system could be a combination of finger print
verification, face recognition, voice verification and smart card or any other
combination of biometrics.

Figure 1.2 Multimode Biometric

For instance it is estimated that 5% of the population does not have legible
fingerprints, a voice could be altered by a cold and face recognition systems are
susceptible to changes in ambient light and the pose of the subject. This
enhanced structure takes advantages of the proficiency of each individual
biometric and can be used to overcome some of the limitations of a single
biometric.

11 | P a g e
1.3 CLASSIFICATION OF BIOMETRICS

 A physiological characteristic is a relatively stable physical characteristic, such


as an individual’s fingerprint, hand geometry, iris pattern, or blood vessel
pattern on the back of the eye. This type of biometric measurement is usually
unchanging and unalterable without significant duress to the individual.
Physical biometrics:
 Fingerprint- Analyzing fingertip patterns.
 Facial Recognition- Measuring facial characteristics.
 Hand Geometry- Measuring the shape of the hand.
 Iris recognition- Analyzing features of colored ring of the eye.
 Vascular Patterns- Analyzing vein patterns.
 Retinal Scan- Analyzing blood vessels in the eye.
 Bertillonage- Measuring body lengths (no longer used).
 A behavioral characteristic is more a reflection of an individual’s
psychological makeup. A signature is the most common behavioral
biometric used for identification. Because most behavioral characteristics
vary over time, an identification system using these must allow updates to
enrolled biometric reference.

12 | P a g e
Behavioral biometrics:
 Speaker Recognition- Analyzing vocal behavior.
 Signature- Analyzing signature dynamics.
 Keystroke- Measuring the time spacing of typed words

1.4 BASIC STRUCTURE OF A BIOMETRIC SYSTEM

Figure 1.3 Basic Structure of Biometric

Most biometrics systems use a similar procedure to verify a biometric.


procedure can be divided into the following steps: enrolment, live
sample, transaction completion template sample, storage & verification.

13 | P a g e
2. BIOMETRIC SYSTEM COMPONENTS AND PROCESS
2.1 COMPONENTS:
Three major components are usually present in a biometric system:
 A mechanism to scan and capture a digital or analog image of a living
person’s biometric characteristic
 Software for storing, processing and comparing the image.
 An interface with the applications system that will use the result to confirm
an individual’s identity.

2.2 PROCESS:
Two different stages are involved in the biometric system process –
1) Enrollment, 2) Verification.

2.2.1 ENROLLMENT:

Figure 2.1 Enrollment & Verification Process

Biometric recognition can be used in Identification mode, where the biometric


system identifies a person from the entire enrolled population by searching a
database for a match based solely on the biometric. For example, an entire
database can be searched to verify a person has not applied for entitlement

14 | P a g e
benefits under two different names. This is sometimes called "one-to-many"
matching.

2.2.2 VERIFICATION:
In this mode biometric system authenticates a person's claimed identity from
their previously enrolled pattern. This is also called "one-to-one" matching. In
most computer access or network access environments, verification mode
would be used. A user enters an account, user name, or inserts a token such as
a smart card, but instead of entering a password, a simple glance at a camera is
enough to authenticate the user.

2.3 TYPES OF BIOMETRIC SYSTEM:


There are two kinds of Biometric System ;
 Recognition Systems –
 Identifying a person among the whole group of users enrolled in the
system.
 It must be an online system.
 Typical applications : Forensics 14
Identification(1-to-many comparison) verifies if the individual exists within a
known population. Identification confirms that the individual is not enrolled
with another identity and is not on a predetermined list of prohibited persons.
Identification will typically need a secured database containing a list of all
applying individuals and their biometrics. The biometric for the individual being
considered for enrollment would be compared against all stored biometrics.
For many applications, an identification process is us s used only at the time of
enrollment to verify that the individual is not already enrolled.

15 | P a g e
 Authentication Systems –
 Verifying the identity that user claims to have. It can be offline.
 Typical applications: Access Control, all kinds of applications where cards
are used.
Authentication(1-to-1 comparison) confirms that the credential belongs to the
individual presenting it. In this case, the device that performs the
authentication must have access only to the individual’s enrolled biometric
template, which may be stored locally or centrally.

2.4 BIOMETRIC ACCURACY:


A key factor in the selection of the appropriate biometric technology is
its accuracy. Biometric accuracy is the system’s ability of separating legitimate
matches from imposters.
When the live biometric template is compared to the stored biometric
template, a matching score is used to confirm or deny the identity of the user.
System designers set this numeric score to accommodate the desired level of
accuracy for the system, as measured by the False Acceptance Rate (FAR) and
False Rejection Rate (FRR).
• False Rejection Rate (FRR) refers to the statistical probability that the
biometric system is not able to verify the legitimate claimed identity of an
enrolled person, or fails to identify an enrolled person. 15
• False Acceptance Rate (FAR) refers to the statistical probability of False
Acceptance or incorrect verification. In the most common context, both False
Rejection and False Acceptance represent a security hazard.

16 | P a g e
• Equal-Error Rate When the decision threshold is adjusted so that the false-
acceptance rate equal the false-rejection rate.

A meaningful operating point for the threshold is decided based on the


application requirements, and the FAR versus FRR error rates at that 16
operating point may be quite different. To provide high security, biometric
systems operate at a low FAR instead of the commonly recommended equal
error rate (EER) operating point where FAR=FRR

17 | P a g e
3.BIOMETRIC TECHNOLOGY

3.1 FINGERPRINT SCANNING:

• "Fingerprint authentication" describes the process of obtaining a digital


representation of a fingerprint and comparing it to a stored digital version of a
fingerprint.
• Fingerprints have long been recognized as a primary and accurate
identification method.

Figure 3.1 Fingerprint Authentication Process

3.1.1 MATCHING APPROACH:


Two basic classes of matching techniques:
 Image techniques Use both optical and numerical image correlation
techniques
 Feature techniques Extracts features and develop representations from these
features
 Combining the above two techniques: Hybrid techniques ,with improved
accuracy

18 | P a g e
3.1.2ADVANTAGES AND DISADVANTAGES:
Advantages:
 Very high accuracy.
 Is the most economical biometric PC user authentication technique.
 it is one of the most developed biometrics
Disadvantages:
 For some people it is very intrusive, because is still related to criminal
identification.
 It can make mistakes with the dryness or dirty of the finger’s skin, as well
as with the age (is not appropriate with children, because the size of
their fingerprint changes quickly).

3.2 RETINA SCAN:

 The human retina is a thin tissue composed of neural cells that is located in
the posterior portion of the eye.
 Because of the complex structure of the capillaries that supply the retina with
blood, each person’s retina is unique.
 A biometric identifier known as a retinal scan is used to map the unique
patterns of a person’s retina.

19 | P a g e
3.2.1 ADVANTAGES AND DISADVANTAGES
Advantages:
 Very high accuracy.
 The eye from a dead person would deteriorate too fast to be useful, so
no extra precautions have to been taken with retinal scans to be sure the
user is a living human being.
Disadvantages:
 Very intrusive.
 It has the stigma of consumer's thinking it is potentially harmful to the
eye.
 Comparisons of template records can take upwards of 10 seconds,
depending on the size of the database.

3.3 IRIS SCAN:

 The iris is a thin, circular structure in the eye, responsible for controlling the
diameter and size of the pupils and thus the amount of light reaching the retina.
 The iris is the colored portion of the eye surrounding the pupil. Its pattern
results from a meshwork of muscle ligaments, and its color and contrast are
determined bypigmentation.

20 | P a g e
 “Eye color” is the color of the iris, which can be green, blue, or brown. In
some cases it can be hazel (a combination of light brown, green and gold), grey,
violet, or even pink.
 In response to the amount of light entering the eye, muscles attached to the
iris expand or contract the aperture at the center of the iris, known as the pupil.

Figure3.3 iris

3.3.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Very high accuracy.
 Verification time is generally less than 5 seconds.
 The eye from a dead person would deteriorate too fast to be useful, so
no extra precautions have to been taken with retinal scans to be sure the
user is a living human being.
Disadvantages:
 Intrusive.
 A lot of memory for the data to be stored.
 Very expensive

3.4 HAND GEOMETRY:

21 | P a g e
 A camera capture an image of the hand, with the help of a mirror to get
also the edge. The graph of the hand is extracted, and some geometrical
characteristics stored. Hand geometry systems are commonly available in
two main forms. Full hand geometry systems take an image of the entire
hand for comparison while Two Finger readers only image two fingers of
the hand.
 Hand recognition technology is currently one of the most deployed
biometrics discipline. Hand geometry is a biometric that identifies users
by the shape of their hands.
 Usually a specialized reader device to measure aspects such as length,
width, thickness, and surface area of the hand and fingers .

Figure 3.4 Hand Geometry

3.4.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Though it requires special hardware to use, it can be easily integrated
into other devices or systems.

22 | P a g e
 It has no public attitude problems as it is associated most commonly
with authorized access.
 The amount of data required to uniquely identify a user in a system is
the smallest by far, allowing it to be used with SmartCardseasily.
Disadvantages:
 Very expensive
 Considerable size.
 It is not valid for arthritic person, since they cannot put the hand on the
scanner properly

3.5 VOICE PATTERN:

• Identification of the person who is speaking by characteristics of their voices


(voice biometrics), also called Voice Patterns.
• There is a difference between speaker recognition (recognizing who is
speaking) and speech recognition (recognizing what is being said).
• Voice biometrics works by digitizing a profile of a person's speech to produce
a stored model voice print, or template.
• Biometric technology reduces each spoken word to segments composed of
several dominant frequencies called formants.
• Each segment has several tones(pitch, quality, and strength) that can be
captured in a digital format.

23 | P a g e
Figure 3.5 Voice Pattern

3.5.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Non intrusive. High social acceptability.
 Verification time is about five seconds.
Disadvantages:
 A person’s voice can be easily recorded and used for unauthorised PC or
network.
 Low accuracy.
 An illness such as a cold can change a person’s voice, making absolute
identification difficult or impossible.

3.6 SIGNATURE AND WRITING PATTERNS:

Two kinds of signatures:


• 1. off-line(Static)
• 2. on-line(Dynamic)

24 | P a g e
Static: In this mode, users write their signature on paper, digitize it through an
optical scanner or a camera, and the biometric system recognizes the signature
analyzing its shape. This group is also known as “off-line”.
Dynamic: In this mode, users write their signature in a digitizing tablet, which
acquires the signature in real time. Dynamic recognition is also known as “on-
line”.
 Preprocess the raw data of the given signature
 Extract features and compare distances with the those in the template
 Make decision according to the threshold specified in the template.

Figure 3.6 signature and writing pattern

3.6.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Non intrusive.
 Little time of verification (about five seconds).
 Cheap technology.

Disadvantages:
 Signature verification is designed to verify subjects based on the traits of
their unique signature. As a result, individuals who do not sign their

25 | P a g e
names in a consistent manner may have difficulty enrolling and verifying
in signature verification
 Error rate: 1 in 50.

3.7 KEY STROKE:

• Keystroke dynamics is a biometric based on assumption that different people


type in uniquely characteristic manners
• The rhythms with which one types at a keyboard are sufficiently distinctive
to form the basis of the biometric technology known as keystroke dynamics.
• The way and the manner in which we type on our computer keyboard varies
from individual to individual and is considered to be a unique behavioral
biometric.
• Keystroke Dynamics or Recognition is probably one of the easiest biometrics
forms to implement and manage.

Figure 3.7 key stoke

26 | P a g e
3.7.1 ADVANTAGES AND DISADVANTAGES
Advantages:
 Unique and Permanent by Typing patterns are unique to each individual
and remain permanent over time.
 Convenient are No additional hardware or software is required, making it
easy to implement and use.
 Cost-Effective is Reduces the need for traditional authentication
methods, such as passwords and tokens
Disadvantages:
 Variability Typing patterns can vary over time and may be affected by
various factors, such as fatigue or injury.
 Noise and Interference are Environmental noise and interference can
affect the accuracy of keystroke biometric authentication.
 Template Security are Stored typing patterns must be secure to prevent
unauthorized access.

3.8 FACIAL RECOGNITION SYSTEM:

• A facial recognition system is a computer-driven application for


automaticallyidentifying a person from a digital image. It does that by
comparing selected facialfeatures in the live image and a facial database.
• It is typically used for security systems and can be compared to other
biometrics such asfingerprint or eye iris recognition systems.
• Popular recognition algorithms include eigenface, fisherface, the Hidden
Markov model,and the neuronal motivated Dynamic Link Matching.

27 | P a g e
• A newly emerging trend, claimed toachieve previously unseen accuracies,
is threedimensional face recognition. Anotheremerging trend uses the
visual details of the skin, as captured in standard digital orscanned images.

Figure 3.8 Facial recognition

3.8.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Non intrusive
 Cheap technology
Disadvantages:
 2D recognition is affected by changes in lighting, the person’s hair, the
age, and if the person wear glasses.
 Requires camera equipment for user identification; thus, it is not likely to
become popular until most PCs include cameras as standard equipment.

3.9 DNA FINGERPRINTING:

• The chemical structure of everyone's DNA is the same. The only difference
betweenpeople (or any animal) is the order of the base pairs.
• There are so many millions of basepairs in each person's DNA that every
person has a different sequence. Using these sequences, every person

28 | P a g e
could be identified solely by the sequence of theirbase pairs. However,
because there are so many millions of base pairs, the task would bevery
timeconsuming.
• Instead, scientists are able to use a shorter method, because ofrepeating
patterns in DNA.
• These patterns do not, however, give an individual "fingerprint," but they
are able todetermine whether two DNA samples are from the same person,
related people, or nonrelated people.

Figure 3.9 DNA Fingerprint

3.9.1 ADVANTAGES AND DISADVANTAGES


Advantages:
 Very high accuracy.
 It impossible that the system made mistakes.
 It is standardized.
Disadvantages:
 Extremely intrusive.
 Very expensive

29 | P a g e
3.10 COMPARISON:

Figure 3.10 Comparison of Biometric Technology

30 | P a g e
4. A MULTIMODAL BIOMETRIC SYSTEM
4.1 A MULTIMODAL BIOMETRIC SYSTEM USING FINGERPRINT, FACE,
AND SPEECH:
A biometric system which relies only on a single biometric identifier in making
a personal identification is often not able to meet the desired performance
requirements. Identification based on multiple biometrics represents an
emerging trend. We introduce a multimodal biometric system, which integrates
face recognition, fingerprint verification, and speaker verification in making a
personal identification. This system takes advantage of the capabilities of each
individual biometric. It can be used to overcome some of the limitations of a
single biometrics. Preliminary experimental results demonstrate that the
identity established by such an integrated system is more reliable than the
identity established by a face recognition system, a fingerprint verification
system, and a speaker verification system.

Figure 4.1 Multimode Biometric Using Fingerprint, Face and Voice

4.2 FACE AND LIP MOVEMENT:

31 | P a g e
The systemacquires (records), preprocesses, and classifies eachbiometric
feature separately. During the training(enrollment) of the system, biometric
templates aregenerated for each feature. For classification, the
systemcompares these templates with the newly recordedpattern. Then, using
a strategy that depends on thelevel of security required by the application, it
combinesthe classification results into one result by whichit recognizes persons.

Figure 4.2 Multimode Biometric Using Face and Lip Movement

5. VULNERABLE POINTS OF BIOMETRIC SYSTEM

32 | P a g e
A generic biometric system can be cast in the framework of a pattern
recognition system. The stages of such a generic system are shown in Figure 5.1

Figure 5.1 Vulnerable Points Of Biometric System

The first stage involves biometric signal acquisition from the user (e.g., the
inkless fingerprint scan). The acquired signal typically varies significantly from
presentation to presentation; hence, pure pixel-based matching techniques do
not work reliably. For this reason, the second signal processing stage attempts
to construct a more invariant representation of this basic input signal (e.g., in
terms of fingerprint minutiae). The invariant representation is often a spatial
domain characteristic or a transform (frequency) domain characteristic,
depending on the particular biometric.
During enrollment of a subject in a biometric authentication system, an
invariant template is stored in a database that represents the particular
individual. To authenticate the user against a given ID, the corresponding
template is retrieved from the database and matched against the template
derived from a newly acquired input signal.

33 | P a g e
There are eight places in the generic biometric system of Figure 5.1 where
attacks may occur. The numbers in Figure 9.1 correspond to the items in the
following list.
1. Presenting fake biometrics at the sensor: In this mode of attack, a possible
reproduction of the biometric feature is presented as input to the system.
Examples include a fake finger, a copy of a signature, or a facemask.
2. Resubmitting previously stored digitized biometrics signals: In this mode of
attack, a recorded signal is replayed to the system, bypassing the sensor.
3. Overriding the feature extraction process: The feature extractor is attacked
using a Trojan horse, so that it produces feature sets preselected by the
intruder.
4. Tampering with the biometric feature representation: The features
extracted from the input signal are replaced with a different, fraudulent feature
set (assuming the representation method is known.
5. Corrupting the matcher: The matcher is attacked and corrupted so that it
produces preselected match scores.
6. Tampering with stored templates: The database of stored templates could
be either local or remote. The data might be distributed over several servers.
7. Attacking the channel between the stored templates and the matcher: The
stored templates are sent to the matcher through a communication channel.
The data traveling through this channel could be intercepted and modified.
8. Overriding the final decision: If the final match decision can be overridden
by the hacker, then the authentication system has been disabled. Even if the
actual pattern recognition framework has excellent performance characteristics,
it has been rendered useless by the simple exercise of overriding the match
result.

6.BIOMETRIC DEVICES

34 | P a g e
6.1 IRIS SCANNER

Figure 6.1 Iris Scanner

6.2 FINGERPRINT SCANNER

Figure 6.2 Fingerprint Scanner

6.3 FACE CAMERA

35 | P a g e
Figure 6.3 Face Camera

6.4 HAND SCANNER

Figure 6.4 Hand Scanner

6.5 RETINA SCANNER

36 | P a g e
Figure 6.5 Retina Scanner

6.6 MULTIBIOMETRICS

Figure 6.6 Multi Biometrics

APPLICATIONS

37 | P a g e
In the last years has considerably increased the area of application of
biometrics and it's expected that in the near future, we will use biometry many
times in our dayly activities such as getting in the car, openning the door of our
house, accessing to our bank acount, shoping by internet, accessing to our PDA,
mobil phone, laptops, etc. Depending of where the biometrics is deployed, the
applications can be categorized in the following five main groups: forensic,
government, commercial, health-care and traveling and immigration. However,
some applications are common to these groups such as physical access,
PC/network access, time and attendance, etc

FUTURE SCOPE

38 | P a g e
The future of biometric technology holds immense potential, promising to
revolutionize how we interact with the digital and physical worlds. As a highly
secure and efficient method of identity verification, biometrics is expected to
replace traditional systems like passwords, keys, and access cards in various
industries.
In everyday life, biometrics will offer seamless user experiences,
whether through facial recognition for unlocking devices or voice
authentication for making payments. Healthcare will see significant
advancements with biometrics enhancing patient identification, medical record
access, and personalized treatments.
In the financial sector, biometrics will enable secure, frictionless
transactions, reducing fraud while improving accessibility. Similarly, public
safety and law enforcement will leverage biometric systems for criminal
identification, surveillance, and border security, enhancing security at national
and global levels.
Emerging trends like contactless and behavioral biometrics,
powered by AI and machine learning, will make systems more accurate and
adaptable, even in diverse environments. However, the widespread adoption of
biometrics will also raise critical concerns about privacy, data security, and
ethical use, requiring robust frameworks to ensure trust and transparency.
Despite these challenges, the integration of biometrics into various
sectors is poised to transform security, convenience, and efficiency, making it
an indispensable part of the future.

CONCLUSION

39 | P a g e
Biometrics can only be limited by limiting one's imagination. Biometric
technology is now being used in almost every area. Not only that, but various
types of biometric systems are being used to achieve various functionalities.
There are many mature biometric systems available now.
Proper design and implementation ofthe biometric system can indeed
increase the overall security. There are numerous conditionsthat must be taken
in account when designing a secure biometric system. First, it is necessary
torealize that biometrics is not secrets.
This implies that care should be taken and it is not secureto generate
any cryptographic keys from them. Second, it is necessary to trust the input
deviceand make the communication link secure.Third, the input device needs
to be verified .
The ultimate form of electronic verification of a person’s identity is
biometrics; using a physical attribute of the person to make a positive
identification. People have always used the brain’s innate ability to recognize a
familiar face and it has long been known that a person’s fingerprints can be
used for identification.
The challenge has been to turn these into electronic processes that
are inexpensive and easy to use. Banks and others who have tested biometric-
based security on their clientele, however, say consumers overwhelmingly have
a pragmatic response to the technology.
Anything that saves the information-overloaded citizen from having to
remember another password or personal identification number comes as a
welcome respite.Biometrics can address most of the security needs, but at
what cost? Surprisingly, the benefits quickly outweigh the costs.

40 | P a g e
REFERENCE
1. Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani, Venu Govindaraju,
“Symmetric Hash functions for Secure Finger print biometric systems”.
2. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
Private Biometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric
and T.Kevenaar, Eds., chpt5,pp.79-77, Springer-Verlag, 20012.
3. Direct Indirect Human Computer Interaction Based Biometrics International
Journal of Emerging Engineering Research and Technology Volume 3, Issue 3,
March 2015.
4. A.A.E. Ahmed, I. Traore, “A new biometric technology based on mouse
dynamics, IEEE Transactions on dependable and Secure Computing” 4 (3) (2007)
165–179.
5. Deshpande, S. Chikkerur, V. Govindaraju, Accent classification in speech,
Fourth IEEE Workshop on Automatic Identification Advanced Technologies, 17–
18 October, 2014, pp. 139–143.
6. F. Bannister and R. Connolly, “New Problems for Old? Defining e-
Governance”, proceedings of the 44th Hawaii International Conference on
System Sciences, (2012).
7. W.-S. Chen, K.-H. Chih, S.-W. Shih and C.-M. Hsieh, “Personal Identification
Technique based on Human Iris Recognition with Wavelet Transform”, 2005
IEEE, ICASSP, (2012), pp. II -949.
8. R. Germain, A. Califano, and S. Colville, “Fingerprint Matching Using
Transformation Parameter Clustering,” IEEE Computational Science and
Engineering 4, No. 4, 42–49 (2014).
9. L. O’Gorman, “Practical Systems for Personal Fingerprint Authentication,”
IEEE Computer 33, No. 2, 58–60 (2013).

41 | P a g e
42 | P a g e

You might also like