WOLAITA SODO UNIVERSITY
SCHOOL OF INFROMATICS
DEPARTMENT OF INFROMATION TECHNOLOGY
SEMINAR
ON
BIOMETRICS
Submited By: Tesema Mekuria
Id: Pgs /61401/13
Submited To: Desta.D(Asis.Prop)
Indivdual Assignment: On Seminar
. Submit date: 20/12/2016
Wolaita ,Etheopia
Table of contents
1. Table of Contents
1. Table of Contents ................................................................................................................................... i
1. Introduction .......................................................................................................................................... 1
1.1 WHAT IS BIOMETRIC? .................................................................................................................. 2
1.2 Classification Of Biometrics ............................................................................................................... 2
1.3 Behavioral characteristics of biometrics are: ...................................................................................... 3
1.4 Types Of Biometric System ................................................................................................................ 4
3. A Review Article review (recent reviewed research topics) ................................................................. 4
4. How can technologies was developed and how contribute (or who developed it) ............................. 5
5. How biometrics works .......................................................................................................................... 6
7. 5.2 Disadvantages of biometrics ........................................................................................................... 9
8. Biometric Applications .......................................................................................................................... 9
9. Tools of Biometrics............................................................................................................................. 10
10. Conclusion and summery ................................................................................................................ 10
11. References ...................................................................................................................................... 11
i
List of Figures
Figure 1:biometrics classification.................................................................................................................. 3
Figure 2:Alphonse Bertillon .......................................................................................................................... 5
Figure 3:An example of two stages—enrollmentandverification—inabiometricauthenticationsystem. .... 7
Figure 4:how biometrics works..................................................................................................................... 7
ii
1. Introduction
Biometrics is a technology that uses the unique patterns of physical or behavioral
traits of users for authentication or identification. With biometric scanners on smartphones and
other devices becoming more prevalent, as well as a growing number of services calling for high
security and good customer experience, traditional methods of authentication (e.g., passwords
and PINs) are increasingly being replaced by biometric technology . Passwords have some
obvious drawbacks—they could be stolen, lost, or forgotten. In contrast, biometrics offer an
alternative solution to the task of personal authentication or identification based on biometric
traits. To be forgotten or lost is impossible, and unlike passwords, they are hard to forge.
There are some biometric traits that can be defined for an individual; for example, fingerprint,
finger-vein, iris, voice, face, and so on(Yang et al., 2019) .
Modern technology serves diverse purposes, meeting users' needs comprehensively. In today's
era, it is increasingly common to seamlessly integrate technology into our lives due to its ability
to enhance speed, availability, and efficiency, providing numerous benefits. In the same way, the
education sector has undergone several transformations over the years, including digital
transformation, where ICTs are being implemented, thus adapting to this new environment and
opening new possibilities for directing education becoming more flexible and adaptable to
respond to social demands, making their processes more efficient and providing more beneficial
services for teachers and students who are part of it .
Likewise, educational data analysis (EDA) requires current and new methods to extract the data
generated in the educational institution (Al Rousan & Intrigila, 2020).
In recent years, researchers have been exploring the use of electrocardiogram (ECG) signals as a
biometric recognition trait due to their unique properties:
(liveness detection: Since the ECG is a recording of the electrical activity of the heart, ECG
signals can only be acquired from living individuals high security: ECG signals are extremely
difficult to counterfeit and consequently, a technology to artificially produce them has not been
developed yet combined information: the analysis of ECG signals can give us information
regarding the identity of a person, as well as heart conditions and emotional and physical
status(Pereira et al., 2023).
Biometric identification mainly includes iris recognition facial recognition voice recognition
retina recognition palm print recognition vein recognition fingerprint recognition and so on(Yu
et al., 2023). Biometric technology has vast applicability and business potential. Physiological
1
and behavioral features are constant and distinct, and the likelihood of two individuals having
identical physiological characteristics is quite remote.
Although, fingerprints face and voice recognition have been also widely used as proofs of
identity the iris pattern is more reliable, non-invasive and has higher recognition accuracy rate .
Nowadays, iris recognition is extensively applied in many corporations for identification such as
in security systems, immigration systems, border control systems, attendance systems, and many
more (Hafeez et al., 2022).
1.1 WHAT IS BIOMETRIC?
The term ―biometrics‖ is derived from two Greek words ‗bios‘ for life and ‗metron‘ for measure.
Biometrics is the science of identifying people based on their physical and behavioral and
characteristics.
Some example of biometrics is:
Voice Recognition
Fingerprint scanning
Facial Recognition
Iris recognition
A biometric can be described as a measurable physical and/or behavioral trait that can be
captured and used to verify the identity of a person by comparing the metric to a previously
stored template. The area of biometrics can therefore be defined as the task of automatically
recognizing a person using his/her distinguishing traits. Examples of these ―distinguishing traits‖
are fingerprints, voice patterns, facial characteristics etc. The idea of biometric identification is
not new, it have been around for centuries
1.2 Classification Of Biometrics
Recently, biometrics as a security technique has emerged . Combining the physiological
properties of the human body with computers, optics, and acoustics led to the development of a
range of biometric technologies, including iris, voice, fingerprint, face, etc.
Classification of biometric divided in to two: they are physical and behavioral characteristics
biometric are:
2
Figure 1:biometrics classification
Physical characteristics of biometrics are:
Fingerprint- Analyzing fingertip patterns.
Facial Recognition- Measuring facial characteristics.
Hand Geometry- Measuring the shape of the hand.
Iris recognition- Analyzing features of colored ring of the eye.
Vascular Patterns- Analyzing vein patterns.
Retinal Scan- Analyzing blood vessels in the eye.
Bertillon age- Measuring body lengths (no longer used).
A behavioral characteristic is more a reflection of an individual‘s psychological makeup.
A signature is the most common behavioral biometric used for identification. Because most
behavioral characteristics vary over time, an identification system using these must allow
updates to enrolled biometric references.
For decades, signatures have been used as proof of identity and for high-quality, secure
transactions. It is an observable function and can generate several analytical, accurate details and
it can also be electronically captured(Al Rousan & Intrigila, 2020).
1.3 Behavioral characteristics of biometrics are:
Speaker Recognition- Analyzing vocal behavior.
Signature- Analyzing signature dynamics.
Keystroke- Measuring the time spacing of typed words.
3
2. Importance of of biometrics are:
Biometrics are quick and seamless.
Biometrics are always with you and cannot be lost or forgotten.
Biometrics can‘t be stolen like a password or key can.
Biometrics are the strongest and most accurate physical security technique that is used
for identity verification
Biometrics are accurate and based on an individual's unique physiological and behavioral
aspects, which are significantly harder to copy.
Biometrics are fraud-proof and built with fail-safes if biometric data is stolen or
compromised.
1.4 Types Of Biometric System
There are two kinds of Biometric System are:
Recognition System
Identifying a person among the whole group of users enrolled in the system.
It must be an online system.
Typical applications : Forensics
Identification (1-to-many comparison) verifies if the individual exists within a known
population.
Authentication Systems are:
Verifying the identity that user claims to have.
It can be offline.
Typical applications:
.
Authentication (1-to-1 comparison) confirms that the credential belongs to the individual
presenting it.
The methodological approach adopted was inductive allowing for an exploration of extant
literature in the subject field.
3. A Review Article review (recent reviewed research topics)
A Review of Fingerprint Sensors: Mechanism, Characteristics, and Applications
4
Real-Time Human Authentication System Based on Iris Recognition
Biometric Recognition: A Systematic Review on Electrocardiogram Data Acquisition
Methods
Systematic Literature Review: Biometric Technology Applied to Educational Institutions
Security and Accuracy of Fingerprint-Based Biometrics: A Review
A Comparative Analysis of Biometrics Types: Literature Review
4. How can technologies was developed and how contribute (or
who developed it)
As an early form of recognition, people have used sight to identify each other based on facial
images scanned by the human eye, as well as voices recognized by their ears and memorized by
the human brain. At the end of the 19th century, Bertillon, a French police officer, took the first
steps in scientific policing.
The use of biometrics as a tool for identification and security purposes began in the late 19th
century with the work of Alphonse Bertillon.
The father of biometrics is Alphonse Bertillon.
Figure 2:Alphonse Bertillon
Alphonse Bertillon (French: 22 April 1853 – 13 February 1914) was a French police officer and
biometrics researcher who applied the anthropological technique of anthropometry to law
enforcement creating an identification system based on physical measurements
5
5. How biometrics works
A biometric system works with the obtained biometric data of a person, from which a special
algorithm selects characteristics to create a biometric template.
The system can then verify the identity of the person in reference to the biometric database.
A software-based biometric system consists of multiple vital components that are important for
the overall identification and verification process.
All biometric system works in a four stages are:
Capture
Extraction
Comparison
Match/non match
How biometric work
New biometric sample is requested
6
Figure 3:An example of two stages—enrollmentandverification—inabiometricauthenticationsystem.
Figure 4:how biometrics works.
Biometric sensors are a mechanical or electronic technology that captures biometric data (i.e.
the face, palm print, or iris) digitally in a way that can be turned into a biometric template. So for
example, the biometric sensor for the face is a device's camera. For fingerprints, it is a fingerprint
pad/sensor.
Biometric Systems Components
Data storage one of the first decisions prior to setting up a biometric system is the represent at•
There are three basic models for storing and sharing considerable amounts of data:
• Local database
Peer-to-peer network
• Cloud storage Local database
7
Local storage involves storing data on physical drives such as hard drives, or Network Attached
Storage (NAS) drives directly on an entity‘s premises
Peer-to-peer network
In a peer-to-peer network, computers on the network are considered equal, with each workstation
providing access to resources and data.
Cloud storage
Amazon AWS describes cloud storage form of storage as ―Cloud storage is a cloud computing
model that stores data on the Internet through a cloud computing provider who manages and
operates data storage as a service. It's delivered on demand with just-in-time capacity and costs,
and eliminates buying and managing your own data storage infrastructure ion that will be used to
store the biometric data.
Two basic classes of matching techniques:
Image techniques Use both optical and numerical image correlation techniques
Feature techniques Extracts features and develop representations from these features
Combining the above two techniques: Hybrid techniques with improved accuracy
6. Advantages and Disadvantages of biometrics
5.1 Advantages of biometrics
Increase security
Reduce password administration costs
Make it possible automatically, to know who did what, where and when
Very high accuracy.
Is the most economical biometric PC user authentication technique.
it is one of the most developed biometrics
Easy to use
The eye from a dead person would deteriorate too fast to be useful, so no
extra precautions have to been taken with retinal scans to be sure the user
is a living human being.
Verification time is generally less than 5 seconds.
The eye from a dead person would deteriorate too fast to be useful, so no
extra precautions have to been taken with retinal scans to be sure the user
is a living human being.
8
Though it requires special hardware to use, it can be easily integrated into
other devices or systems.
It has no public attitude problems as it is associated most commonly with
authorized access.
Non-intrusive. High social acceptability.
7. 5.2 Disadvantages of biometrics
Costly
Facial imaging can also hider accurate identification
Missing body part of problem
False acceptances and rejections
Very intrusive.
It has the stigma of consumer's thinking it is potentially harmful to the
eye. Lot of memory for the data to be stored.
It is not valid for arthritic person, since they cannot put the hand on the
scanner properly.
A person‘s voice can be easily recorded and used for unauthorized PC or
network.
Low accuracy.
An illness such as a cold can change a person‘s voice, making absolute
identification difficult or impossible
8. Biometric Applications
For most organizations, data and computer protection has become crucial, particularly in recent
years, with ―hackers‖ growing in number and becoming more skilled in accessing and changing
personal details.
Hackers understand and can use a range of devices to hack into networks and servers, including
sniffers; they crack passwords and rootkits, among other things, that can be found easily on the
Internet(Al Rousan & Intrigila, 2020).
Application of biometrics is:
The Biometric Security.
Biometric Time and Attendance.
Border Control and Airport Biometrics.
Consumer and Residential Biometrics.
Financial Biometrics.
9
Fingerprint & Biometric Locks.
9. Tools of Biometrics
1. Fingerprint Recognition Tools
2. Facial Recognition Tools
3. Iris Recognition Tools
4. Voice Recognition Tools
5. Hand Geometry Recognition Tools and etc.
10. Conclusion and summery
Recent progress in biometric technology has led to greater precision at a lower cost for
some the biometric types, such as fingerprint and facial recognition and also others.
Biometric systems are the foundation for many extremely secure identification solutions
and personalized testing. Biometric solutions are now able to achieve fast, easy-to-use
authentication with high precision at relatively low cost. Biometric technologies will
benefit many areas. For example, highly secure and reliable e-commerce is necessary for
the healthy growth of the global economy(Al Rousan & Intrigila, 2020). The application
of the iris recognition system has been seen in various areas of life such as in crime
detection, airport, business application, banks and industries. Image registration adjust the
angle and alignment of the input image to the reference image(Hafeez et al., 2022).
In particular, fingerprint recognition technology can also be greatly applied to
information security and medical testing of wearable devices. At present, ultrasonic
fingerprint recognition technology is still a challenge to be widely used in life as one of
the fingerprint recognition methods with better recognition effects. However, there is still
lots of work to be carried out to achieve robust, interoperable, secure, privacy-preserving,
and user-friendly systems(Yu et al., 2023).
Therefore, it will not suffice to study only factors like cost versus performance tradeoffs
or usability and security issues before deploying biometric systems. Exceptional care
must be taken regarding what may be done with the acquired biometric data, who may
use it and for what purposes(Al Rousan & Intrigila, 2020).
10
11. References
Al Rousan, M., & Intrigila, B. (2020). A Comparative Analysis of Biometrics Types: Literature
Review. Journal of Computer Science, 16(12), 1778–1788.
https://doi.org/10.3844/jcssp.2020.1778.1788
Hafeez, H., Zafar, M. N., Abbas, C. A., Elahi, H., & Ali, M. O. (2022). Real-Time Human
Authentication System Based on Iris Recognition. Eng, 3(4), 693–708.
https://doi.org/10.3390/eng3040047
Pereira, T. M. C., Conceição, R. C., Sencadas, V., & Sebastião, R. (2023). Biometric
Recognition: A Systematic Review on Electrocardiogram Data Acquisition Methods.
Sensors, 23(3), 1–31. https://doi.org/10.3390/s23031507
Yang, W., Wang, S., Hu, J., Zheng, G., & Valli, C. (2019). Security and accuracy of fingerprint-
based biometrics: A review. Symmetry, 11(2). https://doi.org/10.3390/sym11020141
Yu, Y., Niu, Q., Li, X., Xue, J., Liu, W., & Lin, D. (2023). A Review of Fingerprint Sensors:
Mechanism, Characteristics, and Applications. Micromachines, 14(6).
https://doi.org/10.3390/mi14061253
11