Professional Documents
Culture Documents
USING BIOMETRIC
TECHNIQUES
1
Contents:
Introduction
History
Different methodologies
Fingerprint analysis
Identification
Matching
Pattern types
Implementation
Application of biometrics
Drawbacks
Conclusion
Bibliography
2
actions are increasingly being handled examine all the technological and feasibility
electronically, Instead of with pencil and paper aspects as well as the practical applications. We
or face to face. This growth in electronic will look at many different biometric methods
transactions has resulted in a greater demand of identifying the user. The presentation has
fast and accurate user identification and been divided into the following areas:
authentication. Biometric technology is a way to
achieve fast, user-friendly authentication with a What is biometrics?
high level of accuracy. History of biometrics,
How the system works?
Different methodologies,
While the word “pattern matching using Multimodal biometrics
biometrics” sounds very new and “high-tech” in Several applications of
technical terms, It is the automated technique of biometrics,
measuring a physical characteristic or personal Fingerprint analysis,
trait of an individual and comparing that Benefits of using biometrics,
characteristic or trait to a database for the Drawbacks.
purposes of recognizing an individual. This
report will highlight some of the popular The presentation highlights the need of
methods, multimodal biometrics, some of the biometric pattern matching in our day-to-day
benefits of using this system for authentication, lives, how the system works, and different
performance metrics and emerging applications identification methodologies like the
in day to day life. fingerprint identification, hand geometry, iris
scanning, retinal scanning etc. Besides single
biometrics identification based on a multi-
It is evident that our identity is modal form of biometrics system or multiple
frequently required; for the time being we use a biometrics represents an emerging trend. In this
wide assortment of methods to verify our presentation we focus on fingerprint matching
identity: usernames, passwords, signatures, and its practical implementation where we
keys, cards etc. Biometrics allow us to compare two fingerprints and display whether
authenticate ourselves with things that we carry they are equal or not. Among all the biometric
with us wherever we may go, such as our hands, techniques, fingerprint-based identification is
eyes, voices, faces, fingerprints etc. In addition the oldest method, which has been successfully
to the convenience, this can be much more used in numerous applications.
effective; a key or card, for example, can fall
into someone else's hands. The promise of ease
and increased security are perhaps its most Introduction
appealing features.
A biometric system is essentially a
pattern recognition system, which makes a
personal identification by determining the
Biometrics is seen by many as a solution authenticity of a specific physiological or
to a lot of the user identification and security behavioral characteristic possessed by the user.
problems in today’s networks. Password abuse An important issue in designing a practical
and misuse, intentional and inadvertent is a system is to determine how an individual is
gaping hole in network security. This results identified. Depending on the context, a
mainly from human error, carelessness and in biometric system can be either a verification
some case maliciousness. This removes human (authentication) system or an identification
error from the security equation. Our paper will system
3
In computer technology, biometrics Personal Identification Numbers (PINs)
relates to identity-confirmation and security were one of the first methods used for
techniques that rely on measurable, individual identification. There are also methods that
biological characteristics. For example, involve passwords and physical tokens e.g.
fingerprints, handprints, or voice patterns might smart cards. There are a number of problems
be used to enable access to a computer, to a associated with this kind of identification.
room, or to an electronic commerce account. People forget passwords, lose tokens, reuse
Biometrics is used to identify people based on passwords, write them down, tokens can get
their biological traits. This growing stolen. The recognition of the above does not
technological field has deep implications mean the identification of the person providing
because proving identity is becoming an integral it - they could be presented by anybody.. This
part of our daily lives. results in a deluge of passwords and means of
access, which are often forgotten, misused or
History of biometrics: lost. With the increased population accessing
these networks the risk of attacks on the
The term "biometrics" is derived from networks is increased. Companies are turning to
the Greek words bio (life) and metric (to Biometrics Systems to bring tighter security to
measure). their computer networks.
4
applications, such as laptop computers and
cellular telephones. Consequently, researchers
Popular biometrics methodologies: expect fingerprint identification to be the
leading biometric technique in the near future.
You will see reference to a number of
One problem with fingerprint technology is its
biometrics, some of which are rather impractical
acceptability in society, because fingerprints
even if technically interesting. The ‘popular’
have traditionally been associated with criminal
biometrics seems to gravitate at present around
investigations and police work. Another
the following methodologies.
problem is that the fingerprints of a small
Fingerprint Identification:
fraction of the population may be unsuitable for
Human beings have used fingerprints for automatic identification because the prints may
personal identification for centuries, and they be deformed as a result of aging, some genetic
have used them for criminal investigations for condition, or environmental reasons.
more than 100 years. The validity of
fingerprints as a basis for personal identification
is thus well established.
5
large in size, so they cannot be used in disadvantage of this biometric technique is that
applications with limited space, such as laptop retinal scanners are expensive.
computers.
Facial Recognition:
Iris-Based Identification:
The most familiar biometric technique is
The iris is the colored part of the eye. It facial recognition. Human beings use facial
lies at the front of the eye, surrounding the recognition all the time to identify other people.
pupil. Each iris is unique, and even irises of As a result, in the field of biometrics, facial
identical twins are different. The complex recognition is one of the most active areas of
structure of the iris carries distinctive research. Applications of this research range
information that is useful for identification of from the design of systems that identify people
individuals. from still-photograph images of their faces to
Early results of the design of
research on the accuracy systems that
and speed of iris-based recognize active and
identification have been changing facial
extremely promising. images against a
These results indicate cluttered
that it is feasible to develop a large-scale background. More
recognition system using iris information. advanced systems
Furthermore, the iris is more readily imaged can recognize a
than the retina. particular individual in a videotape or a movie.
Retinal Pattern Recognition
The retina is the innermost layer of the Researchers base the patterns used for
eye. The pattern formed by veins beneath the facial recognition on both specific and general
surface of the retina is unique to each features. The specific features include the
individual. This pattern is a reliable biometric location and shape of facial attributes such as
characteristic. the eyes, eyebrows, nose, lips, and chin. More
Researchers acquire digital images of generally, they employ an overall analysis of
retinal patterns by projecting a low-intensity the facial image and a breakdown of the image
beam of visible or infrared light into a person’s into a number of component images.
eye and scanning an image of the retina. For a Researchers are unsure whether the face itself,
fixed portion of the retina to be used for without any additional information, is sufficient
identification, the person undergoing the scan for the accurate recognition of one person in a
must gaze into an eyepiece and focus on a large group of people. Some facial recognition
predetermined spot. systems impose restrictions on how the facial
The amount of images are obtained, sometimes requiring a
user cooperation simple background or special lighting.
required for a retinal
scan makes this
Signature Recognition:
technique unacceptable
in many applications. Each person has a unique style of
On the other hand, a handwriting and, therefore, a unique signature.
large number of biometric devices based on One problem with signature recognition is that
retinal scans have been installed in prisons and the signature of a particular individual may vary
other highly secure environments. The primary somewhat. Despite the variations, researchers
have designed a few successful systems for
6
signature-based authentication. Biometric
devices based on signature verification are
reasonably accurate, but not accurate enough to
recognize specific individuals in a large
population. However, signature verification is
reliable enough to be used in place of a PIN in
accessing automated teller machines (ATMs).
7
. Identification based on multiple of incorporating a fingerprint-based biometric
biometrics represents an emerging trend. This device affordable in many applications, such as
system takes advantage of the capabilities of laptop computers and cellular telephones.
each individual biometric. It can be used to Consequently, researchers expect fingerprint
overcome some of the limitations of a single identification to be the leading biometric
biometrics. technique in the near future.
Examples: One problem with fingerprint
technology is its acceptability in society,
♦ Integrating Faces and Fingerprints for
because fingerprints have traditionally been
Personal Identification.
associated with criminal investigations and
♦ A Multimodal Biometric System Using police work. Another problem is that the
Fingerprint, Face, and Speech. fingerprints of a small fraction of the population
may be unsuitable for automatic identification
because the prints may be deformed as a result
Fingerprint Analysis: of aging, some genetic condition, or
environmental reasons.
Fingerprint Identification:
Human beings have used fingerprints for Fingerprint Matching:
personal identification for centuries, and they
have used them for criminal investigations for
Among all the biometric techniques,
more than 100 years. The validity of
fingerprint-based identification is the oldest
fingerprints as a basis for personal identification
method, which has been successfully used in
is thus well established.
numerous applications. Everyone is known to
have unique, immutable fingerprints. A
A fingerprint is the pattern of ridges and
fingerprint is made of a series of ridges and
furrows on the surface of a fingertip. No two
furrows on the surface of the finger. The
persons have exactly the same arrangement of
uniqueness of a fingerprint can be determined
patterns, and the patterns of any one individual
by the pattern of ridges and furrows as well as
remain unchanged throughout life. Fingerprints
the minutiae points. Minutiae points are local
are so distinct that even the prints of identical
ridge characteristics that occur at either a ridge
twins are different. The prints on each finger of
bifurcation or a ridge-ending.
the same person are also different.
8
there are some difficulties when using this
approach. It is difficult to extract the minutiae
points accurately when the fingerprint is of low Implementation:
quality. Also this method does not take into
account the global pattern of ridges.
In this presentation we have
Correlation-based techniques require the precise
implemented the program for matching of two
location of a registration point and are affected
fingerprints using two TIF files (Tagged Image
by image translation and rotation.
File format) of 100x100 resolution in c and c++.
Program results in whether the two fingerprints
are equal or not.
Fingerprint Pattern Types
The comparison of two fingerprints:
Fingerprints are the result of minute
ridges int compare(int *img1[100],int *img2[100])
and valleys found on the hand of every {
int i,j,k=0,l=0,flag,m=0,ct=0,n=0,count=0;
person. In the fingers and thumbs, these for(i=0;i<=60;i+=20)
ridges form patterns of loops, whorls and for(j=0;j<=60;j+=20)
arches. {
if(ct==1) k=0;
for(;k<=60;k+=20)
{
if(ct==1) l=0;
Loop for(;l<=60;l+=20)
{
In a loop pattern, the ridges ct=0;
for(m=0;m<20;m++)
enter from either side, re- {
curve and pass out or tend to for(n=0;n<20;n++)
pass out the same side they {
entered. if(img1[i+m][j+n]!=img2[k+m][l+n])
{
ct=1;break;
}
Whorl }//for n
if(ct==1) break;
}//for m
In a whorl pattern, the ridges if(ct==0) break;
are usually circular. }//for l
if(ct==0)
{
count++; break
}
Arch }//for k
}//for j
In an arch pattern return(count);
the ridges enter }
from one side,
make a rise in the Applications:
center and exit
generally on the The bulk of biometric applications to
opposite side date are probably in areas that you will never
hear of. This is because there are a very large
9
number of relatively small security related ‘proxy’ voting where the vote may not go as
applications undertaken by specialist security expected.
systems suppliers. These systems account for
the majority of unit sales as far as the device In addition there are numerous applications
manufacturers are concerned and are often in gold and diamond mines, bullion warehouses
supplied via a third party distribution chain. and bank vaults, as indeed you might expect, as
well as the more commonplace physical access
The applications that you will here of are control applications in industry.
those in the public domain. These include:
Future Applications-Some common
Prison visitor systems, where visitors to ideas:
inmates are subject to verification
procedures in order that identities may not There are many views concerning potential
be swapped during the visit - a familiar biometric applications, some popular examples
occurrence among prisons worldwide. being;
10
organizations, and that the system will
entrench fraud and criminality
• That such identification schemes are the
mechanism foretold in religious
prophecy (e.g. 'the Mark of the Beast').
Conclusion:
The coming years are going to witness is
gaint expansion in hardware software changing
conventions of speed on a much broader
spectrum. Security will become a critical issue
and there will definitely a need to protect data
from unauthorized users in much efficient ways.
Hence biometrics techniques will span the entire
information globe irrespective of the increased
costs when compared to level of security they
offer.
Bibliography:
1. [Bigun, 1997] Bigun, E.S., J. Bigun, Duc,
B.: “Expert conciliation for multi modal
person authentication systems by Bayesian
statistics,” In Proc. 1st Int. Conf. On Audio
Video-Based Personal Authentication, pp.
327-334, Crans-Montana, Switzerland, 1997
2. [Brunelli et al, 1995] R. Brunelli, and D.
Falavigna, "Personal identification using
multiple cues," IEEE Trans. on Pattern
Analysis and Machine Intelligence, Vol. 17,
No. 10, pp. 955-966, 1995
3. [Dieckmann et al, 1997] Dieckmann, U.,
Plankensteiner, P., and Wagner, T.:
“SESAM: A biometric person identification
system using sensor fusion,” In Pattern
Recognition Letters, Vol. 18, No. 9, pp.
827-833, 1997.
11