biometrics research paper

4

Click here to load reader

Upload: desire120

Post on 28-Jan-2018

823 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Biometrics research paper

Research Paper on Biometrics: Use in Aadhar

Card, Pan Card and Finger Print App Lock

NAME: BHAWNA DOBRIYAL Emai l Id: Bhawna.dobriya l@gmai l .com

ABSTRACT

Biometric is basically used to identify individuals in groups

that are under surveillance. In this biometric identifiers are the

distinctive, measureable characteristics used to label and

describe individuals. In order to provide authentication to

every individual, biometric authentication has to look

everyone is unique and an individual can be identified by his

or intrinsic physical and behavioural traits. Previously,

biometric system were made to use in the identificatory

systems of criminal activity where application of

mathematical models to fingerprints, phrenology, and facial

characteristics as part of “absolute identification” and “a key

to both inclusion and exclusion" of populations but in recent

time or modern era biometric security is developed which

scans the entire body of prospects in order to have guarantee

of better identification on this prospect. Currently, this method

is not globally accepted because it is very complex and

prospects are concerned about their privacy.

INTRODUCTION

Biometrics refers to metrics related to human characteristics.

Biometrics authentication (or realistic authentication) is used

in computer science as a form of identification and access

control. Biometric identifiers are often categorized as physiological versus behavioural characteristics.

Physiological characteristics are related to the shape of the

body. Examples include, but are not limited to fingerprint,

palm veins, face recognition, DNA, palm print, hand

geometry, iris recognition, retina and odour/scent.

Behavioural characteristics are related to the pattern of

behaviour of a person, including but not limited to typing

rhythm, gait, and voice.

More traditional means of access control include token-based

identification systems, such as a driver's license or passport,

and knowledge-based identification systems, such as

a password or personal identification number.

Since, biometric identifiers are unique to individuals, they are

more reliable in verifying identity than token and knowledge-

based methods; however, the collection of biometric

identifiers raises privacy concerns about the ultimate use of

this information.

Types of biometric are:

1. DNA Matching

a) Chemical Biometric: The identification of an

individual using the analysis of segments from

DNA.

b) Ear: Visual Biometric The identification of an

individual using the shape of the ear.

c) Eyes - Iris Recognition

Visual Biometric: The use of the features found

in the iris to identify an individual.

d) Eyes - Retina Recognition

Visual Biometric: The use of patterns of veins in

the back of the eye to accomplish recognition.

2. Face Recognition

Visual Biometric: The analysis of facial features or

patterns for the authentication or recognition of an

individual’s identity. Most face recognition systems

either use local feature analysis.

3. Fingerprint Recognition

Visual Biometric: The use of the ridges and valleys

(minutiae) found on the surface tips of a human

finger to identify an individual.

4. Finger Geometry Recognition

Visual/Spatial Biometric The use of 3D geometry of

the finger to determine identity.

5. Gait

Behavioral Biometric: The use of an individual’s

walking style or gait to determine identity.

6. Hand Geometry Recognition

Visual/Spatial Biometric The use of the geometric

features of the hand such as the lengths of fingers and

the width of the hand to identify an individual.

7. Odor

Olfactory Biometric: The use of an individual’s odor

to determine identity.

Page 2: Biometrics research paper

8. Signature Recognition

Visual/Behavioral Biometric The authentication of

an individual by the analysis of handwriting style, in

particular the signature. There are two key types of

digital handwritten signature authentication, Static

and Dynamic. Static is most often a visual

comparison between one scanned signature and

another scanned signature, or a scanned signature

against an ink signature. Technology is available to

check two scanned signatures using advances

algorithms. Dynamic is becoming more popular as

ceremony data is captured along with the X,Y,T and

P Coordinates of the signor from the signing device.

This data can be utilized in a court of law using

digital forensic examination tools, and to create a

biometric template from which dynamic signatures

can be authenticated either at time of signing or post

signing, and as triggers in workflow processes.

9. Typing Recognition

Behavioral Biometric: The use of the unique

characteristics of a person’s typing for establishing

identity.

10. Vein Recognition

Vein recognition is a type of biometrics that can be

used to identify individuals based on the vein

patterns in the human finger or palm.

11. Voice / Speaker Recognition

There are two major applications of speaker

recognition:

A) Voice - Speaker Verification / Authentication

Auditory Biometric: The use of the voice as a

method of determining the identity of a speaker

for access control. If the speaker claims to be of

a certain identity and the voice is used to verify

this claim. Speaker verification is a 1:1 match

where one speaker's voice is matched to one

template (also called a "voice print" or "voice

model"). Speaker verification is usually

employed as a "gatekeeper" in order to provide

access to a secure system (e.g.: telephone

banking). These systems operate with the user's

knowledge and typically require their

cooperation.

For example, presenting a person’s passport at

border control is a verification process - the

agent compares the person’s face to the picture

in the document.

B) Voice - Speaker Identification

Auditory Biometric Identification is the task of

determining an unknown speaker's

identity. Speaker identification is a 1: N (many)

match where the voice is compared against N

templates. Speaker identification systems can

also be implemented covertly without the user's

knowledge to identify talkers in a discussion,

alert automated systems of speaker changes,

check if a user is already enrolled in a system,

etc.

For example, a police officer compares a sketch

of an assailant against a database of previously

documented criminals to find the closest

matches. In forensic applications, it is common

to first perform a speaker identification process

to create a list of "best matches" and then

perform a series of verification processes to

determine a conclusive match.

Note: There is a difference between speaker

recognition (recognizing who is speaking) and

speech recognition (recognizing what is being

said). These two terms are frequently confused,

as is voice recognition. Voice recognition is a

synonym for speaker, and thus not speech,

recognition. In addition, there is a difference

between the act of authentication (commonly

referred to as speaker verification or speaker

authentication) and identification.

What biometrics include?

1. Aadhar card

2. Pan card

3. Finger print screen lock

AADHAR CARD

What was the reason behind in interlinking in Aadhar

Card?

The reason behind of interlinking in Aadhar card was that

every individual has to give their finger & thumb prints, face

and iris recognition which give security & reliability unique

Aadhar ID Number.

.

What was the effect on biometric in Aadhar card?

Through biometric sensor increasingly implementing live

detection in preventing fake fingers/iris etc Biometric locking

feature allows Aadhaar holders to lock their biometrics and

unlock only when needed.

Due to this various people are finding aadhar card more

convenient than other cards.

How use of biometric in Aadhar card has changed its

outlook?

Through Aadhar number one can access useful services such

as mobile phone and cooking gas connections and banking.

Due to this effect, people can use their aadhar cards more

often than other and also their satisfaction level would

increase.

Page 3: Biometrics research paper

PAN CARD

What was the reason behind interlinking in PAN card?

The reason behind interlinking in Pan cards was PAN cards

would be biometric to taxpayers across the country in order to

erase delicacy and fake one and this decision was taken to

ensure that a single tax payer is not issued multiple cards

which could create them hurdles or problems at the time of

payment of their respective tax within or out of the due course

of time (allotted time period).

What was the effect of biometric in PAN card?

PAN cards validate the identity of a person by checking the

intrinsic physical or behavioural traits of that person which

include fingerprint impressions, or scans of the iris or retina of

a person, hand geometry, voice recognition and signature.

Due this type of effect many tax payers are finding more

convenient than the older one.

How biometrics is been used in PAN cards in opening

various paths in maintaining authenticity and security

measures?

Biometrics in PAN cards have opened various paths with the

help of biometric smart cards which reduce the chances of

duplication since the biometric identification parameter is

unique to each individual in getting forged, misplaced or lost.

FINGER PRINT LOCK APP

What was the reason behind the interlinking of biometrics

in Finger Print Lock App?

The reason behind the interlinking of biometrics in finger

print lock app as it shows your own wallpaper behind the lock

screen, even Live Wallpaper includes large, visible time and

date and Customizable Features, including Themes and Fonts

with adjustable positions for everything.

What was the effect of biometrics in Finger Print Lock

App?

The effect of biometrics in finger print lock app as it locks

your phone by preventing button presses, no notification bar

and all button presses are disabled (including Home and Back

buttons) and themes with options to customize your own

personal lock screen and set positions and sizes of the Time,

Date, and everything else.

How use of biometrics in Finger Print Lock App has

opened different areas in measuring security and safety

measures?

The use of biometric in Finger Print lock App has opened

different areas in measuring security and safety measures as

it change scanner images, including the scan area, and the

scan line colour, shows your own personal wallpaper,

including Live Wallpapers and includes home screen Widget

to run the app. Due to this app, women can secure their

personal details and also can provide safeguard to those

informations which could be easily misused by others.

CONCLUSION

Biometric verification is any means by which a person can be

uniquely identified by evaluating one or more distinguishing

biological traits. Unique identifiers include fingerprints, hand

geometry, earlobe geometry, retina and iris patterns, voice

waves, DNA, and signatures.

The oldest form of biometric verification is fingerprinting.

Historians have found examples of thumbprints being used as

a means of unique identification on clay seals in ancient

China. Biometric verification has advanced considerably with

the advent of computerized databases and the digitization

of analog data, allowing for almost instantaneous personal

identification. Iris-pattern and retina-pattern authentication

methods are already employed in some bank automatic teller

machines. Voice waveform recognition, a method of

verification that has been used for many years with tape

recordings in telephone wiretaps, is now being used for access

to proprietary databanks in research facilities. Facial-

recognition technology has been used by law enforcement to

pick out individuals in large crowds with considerable

reliability. Hand geometry is being used in industry to provide

physical access to buildings. Earlobe geometry has been used

to disprove the identity of individuals who claim to be

someone they are not (identity theft). Signature comparison is

not as reliable, all by itself, as the other biometric verification

methods but offers an extra layer of verification when used in

conjunction with one or more other methods. No matter what

biometric methodology is used, the identification verification

process remains the same.

A record of a person's unique characteristic is captured and

kept in a database. Later on, when identification verification is

required, a new record is captured and compared with the

previous record in the database. If the data in the new record

matches that in the database record, the person's identity is

confirmed. As, authentication through biometric verification is

increasingly becoming common in corporate and public

security systems, consumer electronics, and point-of-sale

applications the driving force behind biometric verification

has been convenience, as there are no passwords to remember

or security tokens to carry.

In India, Aadhar is the largest biometric database in the world

which is a biometrics-based digital identity assigned for a

person's lifetime, verifiable online instantly in the public

Page 4: Biometrics research paper

domain, at any time, from anywhere, in a paperless way which

enable government agencies to deliver a retail public service

securely based on biometric data (fingerprint, iris scan and

face photo), along with demographic data (name, age, gender,

address, parent/spouse name, mobile phone number) of a

person.

Moreover, due to security point of view and for minimizing

the threat of fraudulation in PAN card it has recently got

linked with the Aadhar. Along with this, in finger print screen

lock maximum individuals place the finger on the lock and

then on the scan place and it works through this it develop

ability to individual fingerprint assign to each app.

BIBLIOGRAPHY

1. HTTPS://EN.WIKIPEDIA.ORG/WIKI/BIOMETRICS

2. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITI

ON/BIOMETRICS

3. HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID=

COM.YCDROID.FINGERLOCK&HL=EN

4. HTTP://UIDAI.GOV.IN/WHAT -IS-AADHAAR.HTML

5. HTTPS://WWW.YOUTUBE.COM/WATCH?V=YC8WJGSK

PCO

6. HTTP://WWW.MAPSOFINDIA.COM/MY-

INDIA/GOVERNMENT /AADHAAR-CARD-USES-

OBJECTIVES-AND-BENEFITS

7. HTTP://WWW.BUSINESSTODAY.IN/MAGAZINE/TRENDS/

GET -A-BIOMETRIC-PAN-CARD/STORY/93.HTML

8. HTTP://WWW.GEEKOMAD.COM/2013/08/5-BEST -

FINGERPRINT -LOCK-SCREEN-FREE-APPS.HTML