Bio-metrics

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Bio-metrics as PDF for free.

More details

  • Words: 1,893
  • Pages: 12
PAPER PRESENTATION ON BIO METRICS

SUBMITTED BY: K.KALA BHARATHI

L.GAYATRI

MCA(2/3)YEAR

MCA(2/3)YEAR

Y6MC37017

Y6MC37012

KLCE

KLCE

VADDESWARAM

VADDESWARAM

[email protected]

[email protected]

ABSTRACT Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.

Biometric technologies are becoming the

foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. There are many needs for biometrics beyond Homeland Security. Enterprise-wide

network

security

infrastructures,

secure

electronic

banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Enterprisewide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs).

INTRODUCTION: Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.

Biometric technologies are becoming the

foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. WHAT ARE BIOMETRICS? Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometric technologies are becoming the foundation of an extensive array of

highly

secure

identification

and

personal

verification

solutions.

Biometrics is expected to be incorporated in solutions to provide for Homeland Security including applications for improving airport security, strengthening our national borders, in travel documents, visas and in preventing ID theft. Now, more than ever, there is a wide range of interest in biometrics across federal, state, and local governments. Congressional offices and a large number of organizations involved in many markets are addressing the important role that biometrics will play in identifying and verifying the identity of individuals and protecting national assets. NEED OF BIOMETRICS: An indication of the current substantial growth and interest in biometrics is the emergence of biometrics industry standards and related activities. Standards have become strategic business issues. For any given technology, industry standards assure the

availability of multiple sources for comparable products and of competitive products in the marketplace. Standards will support the expansion of the marketplace for biometrics. After the tragic events of September 11, there is an increased emphasis on biometrics standards. ITL is in a unique position to help end-users and the industry in accelerating the deployment of needed, standards-based security solutions in response to Critical Infrastructure protection and Homeland

Defense/Security

development

of

biometric

requirements. standards

ITL

(e.g.,

is

accelerating

the

technology-independent

interoperability and data interchange) in collaboration with Federal Agencies, other end-users, biometric vendors and the IT industry. BIOMETRIC TECHNOLOGIES: Some of main technologies used in biometrics are Fingerprint, Hand geometry, Facial and Iris recognition. ●FINGERPRINT TECHNOLOGY: Human fingerprints are unique to each person and can be regarded as some sort of signature, certifying the person's identity. The most famous application of this kind is in criminology. However, nowadays, automatic fingerprint matching is becoming increasingly popular in systems which control access to physical locations,

computer/network

resources,

employee attendance time in enterprises.

bank

accounts,

or

register

Straightforward

matching between the fingerprint pattern to be identified and many already known patterns would not serve well due to its high sensitivity to errors. A more advanced solution of this problem is to extract features of so called minutiae points (points where capillary lines have branches or ends) from the fingerprint image, and check matching between the sets of fingerprint features. Recognition Systems' fingerprint readers analyze fingerprints located between the tip of a finger and first knuckle. An image is captured by a patented algorithm which then extracts unique points from the image and converts the data into a unique mathematical template. The fingerprint reader compares this information with a "template" of the

individual's print that has previously been stored. Once the person has been verified as a valid user, a door can be opened or access can be granted. Advantages: • Low cost biometric technology • Low volume, low throughput openings • High security environments Application: Access Control

● HAND GEOMETRY: Recognition Systems' biometric HandReaders simultaneously analyze more than 31,000 points and instantaneously records more than 90 separate measurements of an individual's handincluding length, width, thickness and surface area-to verify that the person using the device is really who he or she claims to be. The Hand Reader compares this information with a "template" of the individual's hand that has previously been stored in the reader, on a server or on a card. Once the person has been identified as a valid user, a door can be opened, access can be provided, or time recorded. The reading and verification process takes less than a second with impeccable reliability Applications: •Time & Attendance Control

• Identity Verification

• Access

Advantages: • High volume, high throughput openings • Maintains industry leading performance in harsh environments • High security environments •Identity Verification ● FACIALTECHNO LOGY: Recognition Systems' face recognition readers analyze faces based on the found face and eyes position. The method involved in this is as follows: >Any kind of data source is used for input it is either a still image, a video stream or a connection to a face image database. >Normalization: based on the found face and eyes position, the image is scaled, rotated and finally presented at a fixed size >Preprocessing: standard techniques applied like histogram equalizations, intensity normalization >The images are analyzed to determine the position and size of one or more faces. The eyes centers are located and marked. Images including eyes positions are taken as Primary Facial Data.

>Characteristics of the face are extracted and represented as a vector in n-dimensional spaces are

similarity of faces is the distance of two

vectors. The vectors represent the Secondary Facial Data and are used for fast comparisons. >Secondary Facial Data can be stored in a central database or on a token storage device, like a smartcard >In case the Secondary Facial Data is stored on a smartcard, only verification is possible. IDENTIFICATION MODE: The presented data is used to scan a data base for most similar faces the most similar reference data is taken as an evidence of the person’s identity. VERIFICATION MODE: The presented facial data is compared to data read from the database or token, based on the similarity threshold the identity is confirmed.

APPLICATIONS: Physicalaccesscontrol SurveillanceSystems

LogicalAccessControl Point

ofSalesSystems ●IRIS RECOGNITION: Iris recognition is the most powerful biometric technology. The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure that controls the amount of light entering the eye, with intricate details that can be

measured, such as striations, pits, and furrows. The iris is not to be confused with the retina, which lines the inside of the back of the eye.

No two irises are alike. There is no detailed correlation between the iris patterns of even identical twins, or the right and left eye of an individual. The amount of information that can be measured in a single iris is much greater than fingerprints, and the accuracy is greater than DNA. n this method an iris recognition camera takes a black and white picture from 5 to 24 inches away, depending on the type of camera. The camera uses non-invasive, near-infrared illumination (similar to a TV remote control) that is barely visible and very safe. Unlike other biometric technologies that can be used in surveillance mode, iris recognition is an opt-in technology. In order to use the technology you must first glance at a camera. Iris recognition cannot take place without your permission Iris Code: The picture of an eye is first processed by software that localizes the inner and outer boundaries of the iris, and the eyelid contours, in order to extract just the iris portion. Eyelashes and reflections that may cover parts of the iris are detected and discounted. Sophisticated mathematical software then encodes the iris pattern by a process called Demodulation. This creates a phase code for the texture sequence in the iris, similar to a DNA sequence code. The Demodulation process uses functions called 2-D wavelets that make a very compact yet complete description of the iris pattern, regardless of its size and pupil dilation, in just 512 bytes.

The phase sequence is called an IrisCode® template, and it captures the unique features of an iris in a robust way that allows easy and very rapid comparisons against large databases of other templates. The IrisCode template is immediately encrypted to eliminate the possibility of identity theft and to maximize security. Iris Recognition: In less than a few seconds, even on a database of millions of records, the IrisCode® template generated from a live image is compared to previously enrolled ones to see if it matches any of them. The decision threshold is automatically adjusted for the size of the search database to ensure that no false matches occur even when huge numbers of Iris Code templates are being compared with the live one. Some of the bits in an IrisCode template signify if some data is corrupted (for example by reflections, or contact lens boundaries), so that it does not influence the process, and only valid data is compared. Decision thresholds take account of the amount of visible iris data, and the matching operation compensates for any tilt of the iris. A key advantage of iris recognition is its ability to perform identification using a one-to-all search of a database, with no limitation on the number of IrisCode records and no requirement for a user first to claim an identity, for example with a card.

ADVANTAGES: • Most accurate

• Scalable

• Opt-in

• Non-

contact APPLICATIONS: Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives.

CONCLUSION: Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Enterprisewide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law

enforcement, and health and social services are already benefiting from these technologies. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive.

BIBLIOGRAPHY

1. 2. 3. 4. 5.

www.irrsi.com www.irsecurityandsafety.com www.fingerprintlock.com www.neurotechnologija.com www.cognitec-systems.de

Related Documents

Biometrics
May 2020 7
Biometrics
June 2020 6
Biometrics
July 2020 6
Biometrics
June 2020 6
Biometrics
July 2020 8
Biometrics Sj
June 2020 7