Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Biometrics
1. Project proposal
TOPIC: BIOMETRICS
NADEEM AHMED FROM DEPALPUR
COMSATS University
Islamabad sahiwal
campus
Introduction:
Biometrics is the technical term for body measurements
and calculations. It refers to metrics related to human
characteristics. Biometrics authentication (or realistic
authentication is used in computer science as a form of
identification and access control. It is also used to identify
individuals in groups that are under surveillance.
2. Biometric identifiers are the distinctive, measurable
characteristics used to label and describe
individuals. Biometric identifiers are often categorized as
physiological versus behavioral
characteristics. Physiological characteristics are related to
the shape of the body. Examples include, but are not
limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral
characteristics are related to the pattern of behavior of a
person, including but not limited to typing rhythm, gait,
and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-
based identification systems, such as a driver's
license or passport, and knowledge-based identification
systems, such as a password or personal identification
number. Since biometric identifiers are unique to
individuals, they are more reliable in verifying identity
than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy
concerns about the ultimate use of this information.
Biometric terms comes from the Greek words bios (life)
and metric (measure).Biometric systems are automated
methods of recognizing or verifying the living person
identity on the basis of some physiological characteristics,
like face pattern, fingerprint and hand, or some aspects of
3. behavior, like keystroke patterns, signature and voice. No
system can be secure completely. So, it is very difficult to
compromise the system. The security becomes more
intrusive, if the system is more secure. Bertillon age is the
first type of biometrics came into form in 1890, created
by an anthropologist named AlphonseBertillon. He based
his system on the claim that measurement of adult bones
does not change after the age of 20.Biometric method
consisting of various body measurements of a person like
height, arm length, breadth and circumference of the
head, the length of forearms, the length of different finger,
length of feet etc.
Problem statement:
Unlike the use of other forms of authentication, such as
passwords or tokens, biometric recognition provides a
strong link between an individual and a data record.
One area where biometrics can provide substantial help
is in guarding against attempts to fraudulently establish
multiple identities. By searching through the enrolled
biometric references, individuals who appear to have
previously enrolled using a different identity can be
highlighted for further investigation. It is very difficult to
perform this type of check without the use of biometrics.
4. Selection of a suitable biometric product for a particular
application is not simple. Without biometrics we can’t do
following things easily.
Accuracy of discrimination between individuals
Speed of operation
The ability to deal with present and future numbers
of individuals
Environmental robustness
Ease of use
Wide accessibility by the intended population of
users, e.g. young and old, short and tall
Social acceptability, i.e. people are happy to use it
Secure and robust against potential attackers.
These things were creating problems for society .
biometrics slove this problem.
Types :
Biometrics measures biological characteristics for
identification or verification purposes of an individual.
Since IDs and passports can be forged, more
sophisticated methods needed to be put into place to
5. help protect companies and individuals. There are two
types of biometric methods. One is called Physiological
biometrics used for identification or verification
purposes. Identification refers to determining who a
person is. This method is commonly used in criminal
investigations. Behavioral biometrics is the other type. It
is used for verification purposes. Verification is
determining if a person is who they say they are. This
method looks at patterns of how certain activities are
performed by an individual.
1.Physiological Type of Biometric:
The physical characteristics of a person like finger prints,
hand geometry, iris, face and DNA are known as
biometrics. Each biometric trait has its strengths and
weaknesses.
Fingerprints:
A fingerprint is a pattern of ridges and furrows located
on the tip of each finger. Fingerprints were used for
personal identification for many centuries and the
6. matching accuracy was very high . Patterns have been
extracted by creating an inked impression of the fingertip
on paper. Today, compact sensors provide digital images
of these patterns. Fingerprint recognition for
identification acquires the initial image through live scan
of the finger by direct contact with a reader device that
can also check for validating attributes such as
temperature and pulse. Since the finger actually touches
the scanning device, the surface can become oily and
cloudy after repeated use and reduce the sensitivity and
reliability of optical scanners. This method is traditional
and it gives accuracy for currently available Fingerprint
Recognition Systems for authentication.
Hand Geometry:
Hand geometry systems produce estimates of certain
measurements of the hand such as the length and the
7. width of fingers. Various methods are used to measure
the hand. These methods are most commonly based
either on mechanical or optical principle. The latter ones
are much more common today. The hand geometry is
used for identification and recognition of a person.
Iris:
The iris begins to form in the third month of gestation
and the structures creating its pattern are largely
complete by the eight month. Its complex pattern can
contain many distinctive features such as arching
ligaments, furrows, ridges, crypts, rings, corona, freckles
and a zigzag collarets . Iris scanning is less intrusive than
retinal because the iris is easily visible from several
meters away. Responses of the iris to changes in light can
provide an important secondary verification that the iris
presented belongs to a live subject. Irises of identical
twins are different, which is another advantage.
Face Facial recognition:
it is the most natural means of biometric identification.
The approaches to face recognition are based on shape
of facial attributes, such as eyes, eyebrows, nose, lips,
8. chin and the relationships of these attributes. As this
technique involves many facial elements; these systems
have difficulty in matching face images
DNA:
DNA(Deoxyribonucleic Acid) sampling is rather intrusive
at present and requires a form of tissue, blood or other
bodily sample. This method of capture still has to be
refined. So far the DNA analysis has not been sufficiently
automatic to rank the DNA analysis as a biometric
technology. The analysis of human DNA is now possible
within 10 minutes. As soon as the technology advances
so that DNA can be matched automatically in real time, it
may become more significant. At present DNA is very
9. entrenched in crime detection and so will remain in the
law enforcement area for the time being.
2.Behavioral type of Biometric :
Behavior methods of identification pay attention to the
actions of a person, giving the user an opportunity to
control his actions. Biometrics based on these methods
takes into consideration high level of inner variants
(mood, health condition, etc), that is why such methods
are useful only in constant use. It includes keystroke,
signature and voice.
Keystroke Keyboard:
is the part that helps us to communicate with computer.
People use keyboard in different ways. Some people type
fast, some slow. The speed of the typing also depends on
the mood of a person and a time of a day. Biometric
keystroke recognition – is a technology of recognizing
people from the way they are typing. It is rather
important to understand that this technology does not
deal with “what” is written but “how” it is written.
Signature:
10. The way a person signs his or her name is known to be
characteristic of that individual.Signature is a simple,
concrete expression of the unique variations in human
hand geometry. Collecting samples for this biometric
includes subject cooperation and requires the writing
instrument. Signatures are a behavioral biometric that
change over a period of time and are influenced by
physical and emotional conditions of a subject. In
addition to the general shape of the signed name, a
signature recognition system can also measure pressure
and velocity of the point of the stylus across the sensor
pad.
Voice:
The features of an individual's voice are based on physical
characteristics such as vocal tracts, mouth, nasal cavities
and lips that are used in creating a sound. These
characteristics of human speech are invariant for an
individual, but the behavioral part changes over time due
to age, medical conditions and emotional state. Voice
recognition techniques are generally categorized
according to two approaches: 1) Automatic Speaker
Verification (ASV) and 2) Automatic Speaker
11. Identification (ASI). Speaker verification uses voice as
the authenticating attribute in a two-factor scenario.
Methodology:
It is a multi-volume publication highlighting critical topics
related to access control, user identification, and
surveillance technologies. Featuring emergent research
on the issues and challenges in security and privacy,
various forms of user authentication, biometric
applications to image processing and computer vision,
and security applications within the field, this publication
is an ideal reference source for researchers, engineers,
technology developers, students, and security specialists.
Recently, biometrics is used in many security systems
and these systems can be located in different
environments. As many experts claim and previous works
have demonstrated, environmental conditions influence
12. biometric performance. Nevertheless, there is not a
specific methodology for testing this influence at the
moment. Due to it is essential to carry out this kind of
evaluations, a new ISO standard was proposed for
regularizing them. Such standard was accepted and it has
to be specified now. In this work, authors have analyzed
the first proposal of this project and other standards
about environmental testing. According to this new ISO
proposal and current ISO standards and considering
aspects of these related standards focused in biometric
evaluations, a detailed methodology has been defined.
This methodology consists of two parts: on the one hand,
the definition of the environmental factors to analyse,
including how to generate, control and measure them,
and on the other hand, the specification about how to
perform the biometric evaluation.
13. Application:
Airport Security:
Making the journey through airport terminals more
seamless for passengers is a goal shared by airports
around the world. Biometric technology to verify
passenger identities has been used in several large
international airports for a number of years and the
technology is quickly spreading to other locations across
the globe.
In many airports, the top biometric modality choice for
immigration control is iris recognition. In order to use iris
recognition, travelers are first enrolled by having a photo
of their iris and face captured by a camera. Then, their
unique details are stored in an international database for
fast, accurate identification at ports of entry and exit that
use iris recognition for traveler identity verification.
When travelling, instead of waiting in long queues to be
processed, passengers simply walk into a booth and look
into an iris camera. The camera then photographs the iris
and a software program then matches the details with
the information stored on the database.
14. Biometrics simplifies the airport experience for millions
of passengers travelling every day. Use of the technology
also ensures the highest level of security and safety.
Time and Attendance:
Workforce management is another field where the use of
biometrics is on the rise. Fraudulent employee time and
attendance activities are a common phenomenon in
organizations throughout the world. According to
an American Payroll Association study, the average
employee reportedly steals approximately 4 and a half
hours per week, which is equivalent to 6 weeks’ vacation
if extrapolated over a year. To solve this issue, companies
are implementing biometric time clocks on their work
sites.
A biometric time and attendance system is the
automated method of recognizing an employee based on
a physiological or behavioral characteristic. The most
common biometric features used for employee
15. identification are faces, fingerprints, finger veins, palm
veins, irises, and voice patterns. When an employee
attempts identification by their biological traits, a
biometric hardware device compares the new scan to all
available templates in order to find an exact match.
Even government organizations now rely on biometrics
for ensuring timely attendance of staff and accurate
payroll calculations.
Law Enforcement:
Organizations like the Federal Bureau of Investigations
(FBI) and Interpol have been using biometrics in criminal
investigations for years. Today, biometrics is widely used
by law enforcement agencies across the world for the
identification of criminals. In 2008, the Chinese Police
adopted an ABIS solution to allow forensic fingerprint
examiners the ability to cross check inmate identities for
possible matches within the database.
Biometrics is also widely used for jail and prison
management. Biometrics provides a modern solution by
which the Jail Authority, Public Safety Departments, and
Governments can safely and securely manage prisoner
identities.
Access Control & Single Sign On (SSO):
16. The primary reason behind more and more organizations
and personnel across the globe adopting biometric
technology for access control and Single Sign On (SSO) is
because traditional authentication tactics like passwords
are insufficient for personal identification. Passwords
only provide evidence or proof of knowledge whereas
biometrics provides unique advantages because it relies
on identifying someone by “who they are” compared to
“what you know “or “what you have.”
Today, biometrics is widely used around the world
for home access control, mobile phone access, vehicle
access authentication and Single Sign On (SSO).
Banking – Transaction Authentication:
Biometrics in banking has increased a great deal in the
last few years and is being implemented by banks
throughout the world. As global financial entities become
more digitally-based, banks are implementing biometric
technology to improve customer and employee identity
management in an effort to combat fraud, increase
transaction security, and enhance customer
convenience. Customers are also fed-up with identity
theft and the inconveniences associated with constantly
having to prove their identities. As a result, more and
more customers are looking for banks that have
17. biometric authentication in place prompting banks to
more closely research the technology for
implementation.
Conclusion:
Biometric identification management systems offer
higher security, convenience, accountability, and
accurate audit trails – all attributes that motivate
businesses to research and implement the technology for
their own use. We believe that as time moves forward,
we will see implementation of biometric technology
continue to grow and be used in even more areas that
touch our lives.