Professional Documents
Culture Documents
Biometrics (ancient Greek: bios life, metron measure) refers to two very different fields of study and application. The first, which is the older and is used in biological studies, is the collection, synthesis, analysis and management of data in biology. Biometrics in reference to biological sciences, or biostatistics, has been studied since the early twentieth century.[1] Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Biometric characteristics can be divided in two main classes, as represented in figure on the right:
Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, hand and palm geometry and iris recognition. Behavioral are related to the behavior of a person. Characteristic implemented by using biometrics are signature verification, keystroke dynamics, and voice.
Physiological
Fingerprints: The patterns of friction ridges and valleys on an individual's fingertips are unique to that individual. For decades, law enforcement has been classifying and determining identity by matching key points of ridge endings and bifurcations. Fingerprints are unique for each finger of a person including identical twins.
Face Recognition: The identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visible spectrum using an optical camera or by using the infrared patterns of facial heat emission. Facial recognition in visible light typically model key features from the central portion of a facial image. Using a wide assortment of cameras, the visible light systems extract features from the captured image(s) that do not change over time while avoiding superficial features such as facial expressions or hair. Several approaches to modeling facial images in the visible spectrum are Principal Component Analysis, Local Feature Analysis, neural networks, elastic graph theory, and multi-resolution analysis Hand and Finger Geometry: These methods of personal authentication are well established. Hand recognition has been available for over twenty years. To achieve
personal authentication, a system may measure either physical characteristics of the fingers or the hands. These include length, width, thickness and surface area of the hand. One interesting characteristic is that some systems require a small biometric sample (a few bytes). Hand geometry has gained acceptance in a range of applications
It is also used for capturing criminals in the very prestigious CENTRAL BUREAU OF INVESTIGATION, INTELLIGENCE BUREAU, etc. Unlike another less prevalent ocular based technology called iris scanning, Iris recognition uses latest camera technology, with harmless infra red illumination which is passed into the eye for a second .then it is converted into a digital template. PROCEDURE: 1.At first the eye is kept at the base of the iris recognition machine and a digital photograph of the iris is taken.
2.The Pixels of iris are converted into bit wise manner so as to make easy for the conversion. 3.Now this is inturn converted into a phase sequence of 512 bytes of iris code. 4. The obtained digital template value is there by used for verification with another stored digital template value &hence verified. ADVANTAGES: 1.Biggest advantage is its reliability& the process gets over in just a fraction of two seconds. 2. Iris being well protected inside the eye & doesnt get damaged easily. But if a person is upto some manual labour, the finger prints get ruptured & it becomes difficult to take them. So, iris can be betterly used. 3.Iris is unique for any person in the world where as the finger prints are not unique for more than 5.0% of human population due to mono zygotic twin. 4.. Verification of finger prints is very difficult & time taking because they are too complex. But in case of iris recognition more than 5000 templates can be verirfied just in a minute.. 5. Any kind of surgical operation cannot damage the iris. This has been proven successful since 30 years & it is a great contributon in the field of medicine. After a few years of its it wasnt recognized due to some problems like LIVE TISSUE VERIFICATION. But in the past 10 years, it has been turned into an advanced technology, with its wide range of improvement.
Technology Comparison
Method
Coded Pattern
Security
Applications High-security facilities Universal Low-security facilities Low-security facilities Low-security facilities Telephone service
Iris pattern Fingerprints Size, length and thickness of hands Outline, shape and distribution of eyes and nose Shape of letters, writing order, pen pressure Voice characteristics
1/100
Low
1/100 1/30
Low Low
Iris-Scan Issues
Iris-scan technology requires reasonably controlled and cooperative user interaction - the enrollee must hold still in a certain spot, even if only momentarily. Many users struggle to interact with the system until they become accustomed to its operations. In applications whose user interaction is frequent (e.g. employee physical access), the technology grows easier to use; however, applications in which user interaction is infrequent (e.g. national ID) may encounter ease-of-use issues. Over time, with improved acquisition devices, this issue should grow less problematic.
The accuracy claims associated with iris-scan technology may overstate the real-world efficacy of the technology. Because the claimed equal error rates are derived from assessment and matching of ideal iris images (unlike those acquired in the field), actual results may not live up to the astronomical projections provided by leading suppliers of the technology. Lastly, since iris technology is designed to be an identification technology, fallback procedures may not be as fully developed as in a verification deployment (users accustomed to identification may not carry necessary ID, for example). Though these issues do not reduce the effectiveness of iris recognition technology, they must be kept in mind should a company decide to implement on iris-based solution.
The following table shows a comparison of existing biometric systems in terms of those parameters: Comparison of various biometric technologies, modified from Jain et al., 2004[21] (H=High, M=Medium, L=Low) Biometrics Universalit Uniquenes Permanenc Collectabilit Performanc Acceptabilit Circumventio : y s e y e y n* Face H L M H L H L Fingerprint M H H M H M H Hand M M M H M M M geometry Keystrokes L L L M L M M Hand veins M M M M M M H Iris H H H M H L H Retinal scan H H M L H L H Signature L L L H L H L Voice M L L M L H L Facial thermograp H H L H M H H h Odor H H H L L M L DNA H H H L H L L Gait M L L H L H M Ear Canal M M H M M H M