a seminar report+ biometric
Post on 06-Apr-2018
220 Views
Preview:
TRANSCRIPT
-
8/3/2019 A Seminar Report+ Biometric
1/29
A SEMINAR REPORT
ON
BIOMETRIC
Submitted by
Priyashri Mishra
Regd. No.:- 0801402059
GANDHI INSTITUTE FOR TECHNOLOGY
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY
ROURKELA, ORISSA
OCTOBER 2011
Supervised by
Mr. Kailash Chandra Rout
Mr. S.K Behera
-
8/3/2019 A Seminar Report+ Biometric
2/29
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY
ROURKELA, ORISSA
BONAFIDE CERTIFICATE
This is to be certified that this seminar report BIOMETRIC isthe bonafide work of Ms. Priyashri Mishra who carried out the
seminar work under our supervision.
SIGNATURE SIGNATURE
SUPERVISOR SUPERVISOR
Senior Lecturer Senior Lecturer
ECE Department ECE Department
GANDHI INSTITUTE FOR
TECHNOLOGY
GANDHI INSTITUTE FOR
TECHNOLOGY
SIGNATURE
Mr. Kailash Chandra Rout
HEAD OF THE DEPARTMENT
ECE Department
GANDHI INSTITUTE FOR TECHNOLOGY
-
8/3/2019 A Seminar Report+ Biometric
3/29
ACKNOWLEDGEMENT
I owe a great many thanks to a great many people who helped andsupported me to complete my seminar.
My deepest thanks to Lecturers, Mr.S.K Behera, the Guide of the seminar
and Mr.K.C Rout for guiding and correcting various documents of mine
with attention and care. They have gone through the project and have
made necessary correction as and when needed.
I would also thank my Institution and my faculty members without whom
this project would have been a distant reality. I also extend my heartfelt
thanks to my family and well wishers.
-
8/3/2019 A Seminar Report+ Biometric
4/29
Table Of Contents
1. Abstract----------------------------------------------------------------------------- 5
2. Introduction------------------------------------------------------------------------6
3. Parameter---------------------------------------------------------------------------7
4. Design Issues-----------------------------------------------------------------------8
5. Working principle-----------------------------------------------------------------9
6. Modes-------------------------------------------------------------------------------9
7. Physiological biometric----------------------------------------------------------11
8. Behavioral biometric-------------------------------------------------------------14
9. Advantage and Disadvantage---------------------------------------------------15
10.Application------------------------------------------------------------------------18
11.Conclusion------------------------------------------------------------------------20
12.Bibliography----------------------------------------------------------------------21
-
8/3/2019 A Seminar Report+ Biometric
5/29
ABSTRACT
Biometrics is the development of statistical and mathematical methods
applicable to data analysis problems in the biological sciences. It is a new
method of verifying authenticity. Biometrics uses biological traits or
behavioral characteristics to identify an individual. A Biometrics system is
actually a pattern recognition system that utilizes various patterns like iris
patterns, retina patterns and biological traits like fingerprints, facial
geometry, voice recognition and hand recognition etc. What makes
Biometrics really attractive is the fact that the various security codes like
the passwords and the PIN can be interchanged between people the
physiological traits cant be.The current applications of Biometric authentication are Entry control,
ATM's and Government programs. The most obvious use of biometrics for
network security is for secure workstation logons for a workstation
connected to a network. The main use of Biometric network security will
be to replace the current password system. The most popular biometric
authentication scheme employed for the last few years has been Iris
Recognition. Many companies are adding biometric authentication
features to their products. This toolkit finds use in the area of Internet
Banking.There are various pros and cons to Biometrics that ought to be considered
.The advantages mainly are the high levels of security it provides when
compared to conventional methods, the uniqueness of biometric
attributes makes them an ideal candidate authenticating users, problems
associated with passwords can be avoided and that a Biometric
characteristic cant be stolen as opposed to passwords etc. The various
disadvantages are the low acceptance rate, high costs associated with
Biometric authentication and the acquisition of the hardware and the
software, the danger of an individuals biometric data can be exploited
and there are instances especially in voice recognition where the
individual is restricted access due to a change in Biometric characteristics
due to a cold etc. So, all these disadvantages have to be worked upon to
ensure that this brilliant technology be incorporated into all the security
systems to ensure safer transactions and restricted access to them to
prevent any kind of breach of security.
-
8/3/2019 A Seminar Report+ Biometric
6/29
INTRODUCTION
The first modern biometric device was introduced on a commercial basis
over 25 years ago when a machine that measured finger length was
installed for a time keeping application at Shearson Hamil on Wall Street.
In the ensuing years, hundreds of these hand geometry devices were
installed at high security facilities operated by Western Electric, Naval
Intelligence, the Department of Energy, and the like. There are now over
20,000 computer rooms, vaults, research labs, day care centers, blood
banks, ATMs and military installations to which access is controlled using
devices that scan an individual's unique physiological or behavioral
characteristics. Reduced prices have lead to increased awareness of
biometric technologies; this coupled with lower overall prices will certainly
bode well for this industry as we move through the new millennium.
The term BIOMETRICS is defined from the Greek words bio meaning
life and metric means to measure. Biometrics is the identification or
verification of human identity through the measurement of repeatable
physiological and behavioral characteristics.The term biometrics refers tothe emerging field of technology devoted to the identification of
individuals using biological traits or behaviors. In practice, this meanscapturing an image of a unique feature of an individual such as a
fingerprint, hand, eye or face, and comparing it with a template captured
previously. For ease of explanation this has been over-simplified, but in
essence this is how biometric technology works.
Biometrics refers to the automatic identification of a person based on
his/her physiological or behavioral characteristics. This method of
identification is preferred over traditional methods involving passwords
and PIN numbers for various reasons:
(i) The person to be identified is required to be physically present at the
point of identification.
(ii) Identification based on biometric techniques obviates the need to
remember a password or carry a token. By replacing PINs, biometric
techniques can potentially prevent unauthorized access to or fraudulent
use of A.T.Ms, Smart cards, computer networks.
(iii) PINs passwords may be forgotten, and token based methods of
identification like passwords and drivers licenses may be forged, stolen orlost. A biometric system is essentially a pattern recognition system which
-
8/3/2019 A Seminar Report+ Biometric
7/29
makes a personal identification by determining the authenticity of a
specific physiological or behavioral characteristic possessed by the user.
-
8/3/2019 A Seminar Report+ Biometric
8/29
PARAMETERS
Universality: each person should have the characteristic. People whoare mute or without a fingerprint will need to be accommodated in someway. Distinctiveness: any two persons should be sufficiently different interms of the characteristic. Generally, no two people have identicalcharacteristics. However, identical twins are hard to distinguish. Permanence: the characteristic should be sufficiently invariant (withrespect to the matching criterion) over a period of time. Thecharacteristics should not vary with time. A person's face, for example,may change with age. Collectability: the characteristic can be measured quantitatively. The
characteristics must be easily collectible and measurable.
However, in a practical biometric system (i.e., a system that employsbiometrics for personalrecognition), there are a number of other issues that should beconsidered, including:
Performance: which refers to the achievable recognition accuracy andspeed, the resources required to achieve the desired recognition accuracyand speed, as well as the operational and environmental factors thataffect the accuracy and speed. The method must deliver accurate results
under varied environmental circumstances.Acceptability: which indicates the extent to which people are willing toaccept the use of aparticular biometric identifier (characteristic) in their daily lives.Thegeneral public must accept the sample collection routines. Nonintrusivemethods are more acceptable. Circumvention: which reflects how easily the system can be fooledusing fraudulentmethods. The technology should be difficult to deceive.
A practical biometric system should meet the specified recognitionaccuracy, speed, and resource requirements, be harmless to the users, beaccepted by the intended population, and be sufficiently robust to variousfraudulent methods and attacks to the system.
-
8/3/2019 A Seminar Report+ Biometric
9/29
-
8/3/2019 A Seminar Report+ Biometric
10/29
DESIGN ISSUES
An important issue in designing a practical system is to determine how anindividual is identified and are designed by keeping two characteristics in
mind, they are:
A) PHYSIOLOGICAL: are based on a person's physical characteristics
which are assumed to be relatively unchanging such as fingerprints,
iris patterns, retina patterns, facial features, palm prints, or hand
geometry. We all use a form of physiological biometrics when we
recognize our friends and acquaintances. You know what they look
like and sound like so you are usually able to recognize them when
you see them or hear them. Turning those characteristics into
reproducible electronic data is quite an art however and no perfect
system has yet been developed that is absolutely foolproof -
although some are pretty good. Eg: face recognition, finger-print,
hand geometry, iris and retina scan, DNA, etc.
B) BEHAVIORAL: are biometric characteristics that are acquired over
time by an individual, and are at least partly based on acquired
behaviour. Behavioral characteristics tend to dominate in such
biometric systems as signature recognition and keystroke dynamics.
These traits are stored in a similar way to the physiological traits
except they are updated regularly to cope with the ever changing
patterns in the trait. These algorithms have to take into account that
the users voice might be affected by the cold or illness that they
are experiencing or that the document they are typing has to be
completed within the hour. Eg: keystroke verification, signature
verification, voice and speech recognition, etc.
Both types are relevant to different situations and circumstances.
Naturally the physiological biometrics have proved more reliable then the
behavioural as the physical traits generally stay the same all the time,
whilst the ever changing behavioural traits have more chance for error.
-
8/3/2019 A Seminar Report+ Biometric
11/29
WORKING PRINCIPLE
Biometric devices consist of a reader or scanning device, software that
converts the gathered information into digital form, and a database that
stores the biometric data for comparison with previous records. When
converting the biometric input, the software identifies specific points of
data as match points.
The match points are processed using an algorithm into a value that can
be compared with biometric data in the database. All Biometricauthentications require comparing a registered or enrolled biometric
sample (biometric template or identifier) against a newly captured
biometric sample (for example, a fingerprint captured during a login).
MODES
A biometric system is essentially a pattern recognition system that
operates by acquiring biometric data from an individual, extracting a
feature set from the acquired data, and comparing this feature set against
the template set in the database. Depending on the application context, a
biometric system may operate either in verification mode or identification
mode:
In the verification mode, the system validates a persons identity by
comparing the captured biometric data with her own biometrictemplate(s) stored system database. In such a system, an individual who
-
8/3/2019 A Seminar Report+ Biometric
12/29
desires to be recognized claims an identity, usually via a PIN (Personal
Identification Number), a user name, a smart card, etc., and the system
conducts a one-tonne comparison to determine whether the claim is true
or not (e.g., Does this biometric data belong to Bob?). Identity
verification is typically used forpositive recognition, where the aim is toprevent multiple people from using the same identity.
In the identification mode, the system recognizes an individual by
searching the templates of all the users in the database for a match.
Therefore, the system conducts a one-to-many comparison to establish an
individuals identity (or fails if the subject is not enrolled in the system
database) without the subject having to claim an identity (e.g., Whose
biometricdata is this?). Identification is a critical component in negative
recognition applications where the system establishes whether the person
is who she (implicitly or explicitly) denies to be. The purpose of negativerecognition is to prevent a single person from using multiple identities.
Identification may also be used in positive recognition for convenience
(the user is not required to claim an identity). While traditional methods of
personal recognition such as passwords, PINs, keys, and tokens may work
for positive recognition, negative recognition can only be established
through biometrics.
During Enrollment, as shown in the picture above, a sample of thebiometric trait is captured, processed by a computer, and stored for later
comparison. Biometric recognition can be used in Identification mode,
where the biometric system identifies a person from the entire enrolled
population by searching a database for a match based solely on the
biometric. For example, an entire database can be searched to verify a
person has not applied for entitlement benefits under two different
names. This is sometimes called one-to many matching.
A system can also be used in Verification mode, where the biometric
system authenticates a persons claimed identity from their previously
-
8/3/2019 A Seminar Report+ Biometric
13/29
enrolled pattern. This is also called one-to-one matching. In most
computer access or network access environments, verification mode
would be used. A user enters an account, user name, or inserts a token
such as a smart card, but instead of entering a password, a simple glance
at a camera is enough to authenticate the user.
-
8/3/2019 A Seminar Report+ Biometric
14/29
PHYSIOLOGICAL BIOMETRIC
DNA: Deoxyribo Nucleic Acid (DNA) is the one-dimensional ultimate
unique code for ones individuality - except for
the fact that identical twins have identical DNA
patterns. It is, however, currently used mostly in
the context of forensic applications for person
recognition. Three issues limit the utility of this
biometrics for other applications: (i)
contamination and sensitivity: it is easy to steal
a piece of DNA from an unsuspecting subjectthat can be subsequently abused for an ulterior
purpose; (ii) automatic real-time recognition
issues: the present technology for DNA matching requires cumbersome
chemical methods (wet processes) involving an experts skills and is not
geared for on-line non-invasive recognition; (iii) privacy issues:
information about susceptibilities of a person to certain diseases could be
gained from the DNA pattern and there is a concern that the unintended
abuse of genetic code information may result in discrimination, e.g., in
hiring practices.
Face: Face recognition is a non-intrusive method, and facial images are
probably the most common biometric characteristic used by humans to
make a personal recognition. The applications of
facial recognition range from a static, controlled
mug-shot verification to a dynamic, uncontrolled
face identification in a cluttered background (e.g.,
airport). The most popular approaches to face
recognition are based on either (i) the location and
shape of facial attributes, such as the eyes,
eyebrows, nose, lips, and chin and their spatial
relationships, or (ii) the overall (global) analysis of the face image that
represents a face as a weighted combination of a number of canonical
faces. These systems also have difficulty in recognizing a face from
images captured from two drastically different views and under different
illumination conditions. It is questionable whether the face itself, without
any contextual information, is a sufficient basis for recognizing a person
from a large number of identities with an extremely high level of
confidence. In order that a facial recognition system works well inpractice, it should automatically (i) detect whether a face is present in the
-
8/3/2019 A Seminar Report+ Biometric
15/29
acquired image; (ii) locate the face if there is one; and (iii) recognize the
face from a general viewpoint (i.e., from any pose).
Fingerprint: Humans have used fingerprints for personal identification for
many centuries and the matching accuracy using fingerprints has been
shown to be very high. A fingerprint is the pattern of ridges and valleys on
the surface of a fingertip, the formation of which is determined during the
first seven months of fetal development. Fingerprints of identical twins are
different and so are the prints on each finger
of the same person. Multiple fingerprints of a
person provide additional information to allow
for large-scale recognition involving millions of
identities. One problem with the current
fingerprint recognition systems is that they
require a large amount of computationalresources, especially when operating in the
identification mode. Finally, fingerprints of a
small fraction of the population may be
unsuitable for automatic identification because
of genetic factors, aging, environmental, or occupational reasons (e.g.,
manual workers may have a large number of cuts and bruises on their
fingerprints that keep changing).
Hand geometry: Hand geometry recognition systems are based on anumber of measurements taken from the human hand, including itsshape, size of palm, and lengths and widths of the fingers. Commercialhand geometry-based verification systems have been installed inhundreds of locations around the world. The technique is very simple,relatively easy to use, and inexpensive. Environmental factors such as dryweather or individual anomalies such as dry skin do not appear to haveany negative effects on the verification accuracy of hand geometry-basedsystems. The geometry of the hand is not known to be very distinctiveand hand geometry-based recognition systems cannot be scaled up forsystems requiring identification of an individual from a large population.
Further, handgeometry informationmay not be invariantduring the growthperiod of children. Inaddition, anindividual's jewellery(e.g., rings) orlimitations in
dexterity (e.g., from arthritis), may pose further challenges in extractingthe correct hand geometry information. The physical size of a hand
geometry-based system is large, and it cannot be embedded in certaindevices like laptops. There are verification systems available that are
-
8/3/2019 A Seminar Report+ Biometric
16/29
based on measurements of only a few fingers (typically, index and middle)instead of the entire hand. These devices are smaller than those used forhand geometry, but still much larger than those used in some otherbiometrics (e.g., fingerprint, face, voice).
Iris:The iris is the annular region of the eye bounded by the pupil and thesclera (white ofthe eye) on either side. The visual texture of the iris isformed during fatal development and stabilizes duringthe first two years of life. The complex iris texturecarries very distinctive information useful for personalrecognition. The accuracy and speed of currentlydeployed iris-based recognition systems is promising and point to thefeasibility of large-scale identification systems based on iris information.Each iris is distinctive and, like fingerprints, even the irises of identicaltwins are different. It is extremely difficult to surgically tamper the textureof iris. Further, it is rather easy to detect artificial irises (e.g., designercontact lenses). Although, the early iris-based recognition systemsrequired considerable user participation and were expensive, the newersystems have become more user-friendly and cost-effective.
Palmprint:The palms of the human hands contain pattern of ridges andvalleys much likethe fingerprints. The area of the palm is much larger than the area of afinger and as a result, palmprints are expected to be even moredistinctive than the fingerprints. Since palmprint
scanners need to capture a large area, they arebulkier and more expensive than the fingerprintsensors. Human palms also contain additionaldistinctive features such as principal lines andwrinkles that can be captured even with a lowerresolution scanner, which would be cheaper.Finally, when using a high resolution palmprintscanner, all the features of the palm such ashand geometry, ridge and valley features (e.g.,minutiae and singular points such as deltas), principal lines, and wrinklesmay be combined to build a highly accurate biometric system.
Retinal scan:The retinal vasculature is rich in structure and is supposed tobe acharacteristic of each individual and each eye. It is claimed to be the mostsecure biometricsince it is not easy to change or replicate the retinal vasculature. Theimage acquisitionrequires a person to peep into an eye-piece and focus on a specific spot in
the visual field so that apredetermined part of the
retinal vasculature could beimaged. The image acquisition
-
8/3/2019 A Seminar Report+ Biometric
17/29
involves cooperation of the subject, entails contact with the eyepiece, andrequires a conscious effort on the part of the user. All these factorsadversely affect the public acceptability of retinal biometric. Retinalvasculature can reveal some medical conditions, e.g., hypertension, whichis another factor deterring the public acceptance of retinal scan based
biometrics.
-
8/3/2019 A Seminar Report+ Biometric
18/29
BEHAVIORAL BIOMETRIC
Keystroke: It is hypothesized that each person types on a keyboard in acharacteristic way. This behavioral biometric is not expected to be uniqueto each individual but it offerssufficient discriminatory information to permit identity verification.
Keystroke dynamics is a behavioralbiometric; for some individuals, one mayexpect to observe large variations intypical typing patterns. Further, thekeystrokes of a person using a systemcould be monitored unobtrusively as that
person is keying in information.
Signature:The way a person signs hername is known to be a characteristic of
that individual. Although signatures require contact with the writinginstrument and an effort on the part of the user, they have been acceptedin government, legal, and commercial transactions as amethod of verification.Signatures are a behavioralbiometric that change over a period of time and areinfluenced by physical and emotional conditions of thesignatories. Signatures of some people varysubstantially: even successive impressions of theirsignature are significantly different. Further,professional forgers may be able to reproduce signatures that fool thesystem.
Voice: Voice is a combination of physiological and behavioral biometrics.The features ofan individuals voice are based on the shape and size of the appendages(e.g., vocal tracts,mouth, nasal cavities, and lips) that are used in the synthesis of the
sound. Thesephysiological characteristics of human speech are invariant for anindividual, but thebehavioral part of the speech of a person changes over time due to age,medical conditions
(such as common cold), emotional state, etc. Voice is alsonot very distinctive and may not be appropriate for large-scale identification. A text-dependent voice recognitionsystem is based on the utterance of a fixed predeterminedphrase. A text-independent voice recognition systemrecognizes the speaker independent of what she speaks. A
text independent system is more difficult to design than atext-dependent system but offers more protection against
-
8/3/2019 A Seminar Report+ Biometric
19/29
fraud. A disadvantage of voice-based recognition is that speech featuresare sensitive to a number of factors such as background noise. Speakerrecognition is most appropriate in phone-based applications but the voicesignal over phone is typically degraded in quality by the microphone andthe communication channel.
-
8/3/2019 A Seminar Report+ Biometric
20/29
ADVANTAGES AND DISADVANTAGES
Let us now examine the advantages and disadvantages of biometrics intwo groups of applications: the commercial positive recognition
applications that may work either in the verification or the identificationmodes, and the government and forensic negative recognitionapplications that require identification.
Positive Recognition in Commercial ApplicationsThe traditional technologies available to achieve a positive recognitioninclude knowledge-based methods (e.g., PINs and passwords) and token-based methods (e.g., keys and cards). Most people set their passwordsbased on words or digits that they can easily remember, such as namesand birthdays of family members, favorite movie or music stars, anddictionary words (A survey of 1,200 British office workers in year 2001found that almost half chose their own name, the name of a pet, or that ofa family member as a password; others based their passwords on thenames such as Darth Vader and Homer Simpson). Such passwords areeasy to crack by guessing or by a simple brute force dictionary attack.Although it is possible, and even advisable, to keep different passwordsfor different applications and change them frequently, most people usethe same password across different applications and never change them.If a single password is compromised, it may result in a breach in securityin many applications.
For example, a hacker may create a bogus web site that entices userswith free air miles if they were to register on the website with a loginname and password. The hacker may then try to use the same login nameand password to attack the users corporate accounts, and most likelysucceed. Longer passwords are more secure but harder to rememberwhich prompts some users to write them down in accessible locations(e.g., on a Post-it note) and hide it under the keyboard. Strongpasswords are difficult to remember and result in more Help Desk calls forforgotten or expired passwords. Cryptographic techniques such asencryption can provide very long passwords (encryption keys) that are notrequired to be remembered but that are in turn protected by simple
passwords, thus defeating their purpose. Further, a hacker needs to breakonly one password among all the employees to gain access to acompanys Intranet and thus, a single weak password compromises theoverall security of every system that the user has access to.
Thus, the security of the entire system is only as good as the weakestpassword. Finally, when a password is shared with a colleague, there is noway for the system to know who the actual user is. Similarly, there aremany problems with possession-based personal recognition. For example,keys and tokens can be shared, duplicated, lost or stolen and an attacker
may make a master key that may open many locks. It is significantlymore difficult to copy, share, and distribute biometrics with as much ease
-
8/3/2019 A Seminar Report+ Biometric
21/29
as passwords and tokens. Biometrics cannot be lost or forgotten andonline biometrics-based recognition systems require the person to berecognized to be present at the point of recognition. It is difficult to forgebiometrics and extremely unlikely for a user to repudiate, for example,having accessed a computer network. Further, all the users of the system
have relatively equal security level and one account is no easier to breakthan any other (e.g., through social engineering methods). Biometricsintroduces incredible convenience for the users (as users are no longerrequired to remember multiple, long and complex, frequently changingpasswords) while maintaining a sufficientlyhigh degree of security.Certain commercial applications would like to operate the biometricsystem in an identification mode instead of the verification mode for theadded convenience of not requiring the users to claim an identity. Usually,speed is perceived as the biggest problem in scaling up an identificationapplication. However, the fact is that the identification accuracy scaleseven worse than the speed. Consider an identification application with10,000 users.
Negative Recognition in Government and Forensic ApplicationsIn negative recognition applications such as employee backgroundchecking and preventingterrorists from boarding airplanes, the personal recognition is required tobe performed in the identification mode. As mentioned earlier, achievingthe same accuracy in an identification system as in a verification systemis a much harder problem due to the large number of comparisons that
are required to be performed. If faces are used instead of fingerprints forthe identification (face recognition may be preferred for an airportapplication because faces can be acquired covertly), the number ofmisses and false alarms will be considerably higher, given the rather pooraccuracy of face identification systems, especially in environments withcluttered background and varying lighting conditions. Although,multimodal biometric systems can significantly improve the identificationaccuracy, exclusively relying on automatic biometric systems for negativeidentification may be unfeasible.
Traditional personal recognition tools such as passwords and PINs are not
at all useful fornegative recognition applications. While biometric systems may not yet beextremely accurate to support large-scale identification applications, theyare the only choice for negative recognition applications. Further, ifoperated in a semi-automatic mode where a human expert examines allthe alarms generated by the system for the final decision, biometricsystems can be quite effective. For example, if 100 airport security agentsare required to manually match every person at an airport against theFBIs 100 most wanted, only 5 agents may be required to take a closerlook at the 200 alarms generated daily by the biometric system. We need
to understand that in such semi-automatic applications, the biometricsystem only generates an alarm that calls for a closer (manual)
-
8/3/2019 A Seminar Report+ Biometric
22/29
examination of the individual and an alarm does not directly translate intocatching a terrorist.
Other negative recognition applications such as background checks andforensic criminal
identification are also expected to operate in semi-automatic mode andtheir use follows a similar cost-benefit analysis. For example, in a latentsearch, an AFIS (Automatic FingerprintIdentification System) is typically used by law enforcement agencies onlyto narrow down the number of fingerprint matches to be performed by ahuman expert from a few million to a few hundred. A forensic expertalways makes the final decision. In our opinion, use of biometrics innegative recognition applications does not infringe upon the civil libertiesof individuals since if you are not in the criminal database already, therecognition system does not keep a record of you (does not rememberyou). However, appropriate legislation is required to protect the abuse ofsuch systems.
-
8/3/2019 A Seminar Report+ Biometric
23/29
Biometric systems that operate using any single biometric characteristichave the followinglimitations:
1. Noise in sensed data: The sensed data might be noisy or distorted. Afingerprint with a scar, or a voice altered by cold are examples of noisydata. Noisy data could also be the result of defective or improperlymaintained sensors (e.g., accumulation of dirt on a fingerprint sensor) orunfavorable ambient conditions (e.g., poor illumination of a user's face ina face recognition system). Noisy biometric data may be incorrectlymatched with templates in the database resulting in a user being incorrectly rejected.2. Intra-class variations: The biometric data acquired from an individualduring authentication may be very different from the data that was usedto generate the template during enrollment, thereby affecting thematching process. This variation is typically caused by a user who is
incorrectly interacting with the sensor, or when sensor characteristics aremodified (e.g., by changing sensors - the sensor interoperability problem)during the verification phase. As another example, the varyingpsychological makeup of an individual might result in vastly differentbehavioral traits at various time instances.3. Distinctiveness: While a biometric trait is expected to vary significantlyacross individuals,there may be large inter-class similarities in the feature sets used torepresent these traits. This limitation restricts the discriminabilityprovided by the biometric trait. Golfarelli et al have shown that the
information content(number of distinguishable patterns) in two of themost commonly used representations of hand geometry and face are onlyof the order of 105 and 103, respectively. Thus, every biometric trait hassome theoretical upper bound in terms of its discrimination capability.4. Non-universality: While every user is expected to possess the biometrictrait being acquired, in reality it is possible for a subset of the users to notpossess a particular biometric. A fingerprint biometric system, forexample, may be unable to extract features from the fingerprints ofcertain individuals, due to the poor quality of the ridges. Thus, there is afailure to enroll (FTE) rate associated with using a single biometric trait. Ithas been empirically estimated that as much as 4% of the population may
have poor quality fingerprint ridges that are difficult to image with thecurrently available fingerprint sensors and result in FTE errors. den Os etal. report the FTE problem in a speaker recognition system.5. Spoof attacks: An impostor may attempt to spoof the biometric trait ofa legitimate enrolled user in order to circumvent the system. This type ofattack is especially relevant when behavioral traits such as signature andvoice are used. However, physical traits are also susceptible to spoofattacks. For example, it has been demonstrated that it is possible(although difficult and cumbersome and requires the help of a legitimateuser) to constructartificial fingers/fingerprints in a reasonable amount of time to circumventa fingerprint
-
8/3/2019 A Seminar Report+ Biometric
24/29
verification system.
-
8/3/2019 A Seminar Report+ Biometric
25/29
APPLICATION
The applications of biometrics can be divided into the following three maingroups:
Commercial applications such as computer network login, electronicdata security, ecommerce, Internet access, ATM,credit card, physical access control, cellularphone, PDA, medical records management,distance learning, etc. Government applications such asnational ID card, correctional facility,drivers license, social security, welfare-disbursement, border control, passportcontrol, etc. Forensic applications such as corpseidentification, criminal investigation,terrorist identification, parenthooddetermination, missing children, etc.Traditionally, commercial applications have used knowledge-basedsystems (e.g., PINs and passwords), government applications have usedtoken-based systems (e.g., ID cards and badges), and forensicapplications have relied on human experts to match biometric features.Biometric systems are being increasingly deployed in large scale civilianapplications.
ATM iris recognition.Using an iris recognition ATM, a customer simply walks up to the ATM andlooks in a sensor camera to access their accounts. The camera instantly
photographs the customers iris. If thecustomers iris data matches the record stored adatabase access is granted. At the ATM, apositive authentication can be read throughglasses, contact lenses and most sunglasses. Irisrecognition proves highly accurate, easy to useand virtually fraud proof means to verifycustomers identity.In 1999 national Bank
United in the USA installed biometricauthentication in three ATM outlets in Houston,Dallas and ft. Worth. The scheme employed an
iris recognition system created by DieBold Inc, a company specializing iniris recognition.
Internet Banking
One area where the tool kit could be used is for enhancing security forInternet banking. A bank, contracting with an ASP (application serviceprovider), could require biometric verificationfor a high-value transaction over the Internet. Avendor seeking to wire money using the
-
8/3/2019 A Seminar Report+ Biometric
26/29
Internet would go to the bank's Web page, fill out the required informationand submit the transaction. If the transaction is for a high value, the bankwould decide it needs biometric verification and automatically send amessage to the Keyware LBV server requesting that the vendor speak apassphrase and use the fingerprint scanner.
Physical Access:Here, you can learn about application of biometricidentification to control employee access to sensitive areas ofbusiness organizations, banks, airportsand other places. Physicalaccess to homes and garages can also be controlled by thistechnology.
PC and Network Access:You will be delighted to learn about biometricapplications in controlling unauthorized access to computers andnetworks in an organization or at home. The section is of greatimportance, if you have an organization with computers andnetwork resources as its vital components.
Time and Attendance:The significance of biometric in maintainingemployee time and attendance in an organization has increasedmanifolds in past few years. You can learn about the same bynavigating to this page.
Logical Access:Biometric security plays an important role incontrolling logical access to computers, facilitated by passwords andother identification tools. Learn how this technology can avoid
information theft from your computers. Financial Security:E-commerce transactions, online
insurance purchasing and other similar activities
require advanced procedures like biometricidentification.You can learn about the same byspending time in this section.
Healthcare Industry:HIPAA compliant biometric devices are usedwidely to protect identities of users. Moreover, providing security athospital premises is one of the biometric applications you can learnhere.
Law Enforcement:Learn how police departments and other lawenforcement bodies make use of biometricidentification for catching criminals andinvestigating.
Immigration and Airports:Biometricapplications are also prospering in field ofimmigration industry and at airports to ensuresafety against terrorism and you can learn aboutit here.
Others - Laptops, PDAs, Locks
-
8/3/2019 A Seminar Report+ Biometric
27/29
CONCLUSION
Human factors dictate the success of a biometric-based identificationsystem to a large extent. The ease and comfort in interaction with a
biometric system contribute to its acceptance. For example, if a biometricsystem is able to measure the characteristic of an individual withouttouching, such as those using face, voice, or iris, it may be perceived tobe more user-friendly and hygienic. Additionally, biometric technologiesrequiring very little cooperation or participation from the users (e.g., faceand face thermograms) may be perceived as being more convenient tousers. On the other hand, biometric characteristics that do not requireuser participation can be captured without the knowledge of the user, andthis is perceived as a threat to privacy by many individuals.The very process of recognition leaves behind trails of private information.For example, ifa person is identified each time she makes a purchase, information aboutwhere this person shops and what she buys can be simply collected andused by telemarketers to invade her privacy. The issue of privacybecomes more serious with biometric-based recognition systems becausebiometric characteristics may provide additional information about thebackground of an individual. For example, retinal patterns may providemedical information about diabetes or high blood pressure in anindividual. A health insurance company may use this information in anunethical way for economic gains by denying benefits to a persondetermined to be of high risk. More importantly, people fear that biometric
identifiers could be used for linking personal information across differentsystems or databases.
On the positive side, biometrics can be used as one of the most effectivemeans for protecting individual privacy. In fact, biometrics ensuresprivacy by safeguarding identity and integrity. For example, if a personloses a credit card and an adversary finds it, then the credit history of thisperson is compromised. To alleviate these fears, companies and agenciesthat operate biometric systems have to assure the users of these systemsthat their biometric information remains private and is used only for theexpressed purpose for which it was collected. Legislation is necessary to
ensure that such information remains private and that its misuse isappropriately punished. Most of the commercial biometric systemsavailable today do not store the sensed physical characteristics in theiroriginal form but, instead, they store a digital representation (a template)in an encrypted format.
Reliable personal recognition is critical to many business processes.Biometrics refers to automatic recognition of an individual based on herbehavioral and/or physiological characteristics. Biometric-based systemsalso have some limitations that may have adverse implications for the
security of a system. Security is a risk management strategy thatidentifies, controls, eliminates, or minimizes uncertain events that may
-
8/3/2019 A Seminar Report+ Biometric
28/29
adversely affect system resources and information assets. There are anumber of privacy concerns raised about the use of biometrics. Asbiometric technology matures, there will be an increasing interactionamong the market, technology, and the applications. This interaction willbe influenced by the added value of the technology, user acceptance, and
the credibility of the service provider. It is too early to predict where andhow biometric technology would evolve and get embedded in whichapplications. But it is certain that biometric-based recognition will have aprofound influence on the way we conduct our daily business.
-
8/3/2019 A Seminar Report+ Biometric
29/29
BIBLIOGRAPHY
[1] S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric Recognition:
Security and PrivacyConcerns, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42,2003.[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook ofFingerprint Recognition,Springer, NY, 2003.[3] A. K. Jain, R. Bolle, and S. Pankanti (editors), Biometrics: PersonalIdentification in NetworkedSociety, Kluwer Academic Publishers, 1999.[4] CNN World News, Schiphol Backs Eye Scan Security, March 27 2002.Available athttp://www.cnn.com/2002/WORLD/europe/03/27/schiphol.security/.[5] J. Daugman, Recognizing Persons by Their Iris Patterns, In A. K. Jain,R. Bolle, and S.Pankanti, editors, Biometrics: Personal Identification in a NetworkedSociety, pp. 103-121,Kluwer Academic Publishers, 1999.[6] L. O'Gorman, Seven Issues With Human AuthenticationTechnologies, Proc. of Workshop onAutomatic Identification Advanced Technologies (AutoID), pp. 185-186,Tarrytown, New York,
March 2002.[7] E. d. Os, H. Jongebloed, A. Stijsiger, and L. Boves, Speaker Verificationas a User-FriendlyAccess for the Visually Impaired, Proc. of the European Conference onSpeech Technology,pp. 1263-1266, Budapest, 1999.[8] A. Eriksson and P. Wretling, How Flexible is the Human Voice? A CaseStudy of Mimicry,Proc. of the European Conference on Speech Technology, pp. 1043-1046,Rhodes, 1997.[9] W. R. Harrison, Suspect Documents, Their Scientific Examination,
Nelson-Hall Publishers,1981.[10] D. A. Black, Forgery Above a Genuine Signature,Journal of CriminalLaw, Criminologyand Police Science, Vol.50, pp. 585-590, 1962.
top related