SlideShare a Scribd company logo
1 of 51
Download to read offline
A Technical Seminar Report
Submitted to
Mewar University, Chittorgarh
Towards the partial fulfillment of the degree of
Bachelor of Technology
In
Computer Science
Session: - 2020-2021
Guided by: Submitted by:
Mr. Shiv Kumar Zaki Anwer
CSE Department MUR1800949
Department of Computer Science and Engineering
Faculty of Engineering & Technology
Mewar University
Chittorgarh (Raj.)
July - 2021
BIOMETRICS AND FINGERPRINT TECHNOLOGY
CERTIFICATE
This Seminar Report entailed "Biometrics and Fingerprint Payment Technology "
submitted by Zaki Anwer to towards the partial fulfillment of the degree of Bachelor
of Technology in Computer Science and Engineering, To Mewar University,
Chittorgarh is a satisfactory account of this Seminar work and is recommended for the
award of the degree.
Guided by: Submitted By:
Mr.Shiv Kumar Zaki Anwer
Assistant Professor MUR1800949
Department of Computer Science and Engineering
Faculty of Engineering & Technology
Mewar University
Chittorgarh (Raj.)
July - 2021
Ⅱ
ACKNOWLEDGEMENT
The success and final outcome of this Seminar required a lot of guidance and assistance
from many people and I am extremely privileged to have got this all along the completion
of my Seminar. All that I have done is only due to such supervision and assistance and I
would not forget to thank them.
I owe my deep gratitude to our Seminar guide Mr. Shiv Kumar, who took keen interest
on our Seminar work and guided us all along, till the completion of my Seminar work by
providing all the necessary information for developing a good Seminar.
I am thankful to and fortunate enough to get constant encouragement, support and
guidance from all Teaching staffs of CSE Department which helped us in successfully
completing our project work.
Date Signature
ⅲ
ABSTRACT
This article discuss biometrics authentication in relation to payment system. Biometrics
uses biological traits or behavioral characteristics to identify an individual. A Biometrics
system is effective pattern recognition system that utilizes different patterns similar to
retina patterns, iris pattern and biological qualities like fingerprints, voice recognition,
facial geometry and hand recognition etc. Biometrics payments system is protected and
sheltered and incredibly trouble-free to use and even without using password or top secret
codes to keep in mind as compare with previous system like credit card payment system,
and mobile banking etc. In daily life the usage of credit cards and debit card for shopping,
bill payments, travelling and so on.
So problem is that a person has to remember their password or secret code and to keep
secure to take with him all time. So biometrics system will solve this problem. Greater
implementation of biometric payment system is more reasonably priced to small business
owners. We actually require alternate payment systems.
ⅳ
TABLE OF CONTENTS
S. No PAGE
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT
1. INTRODUCTION
1.1 Definition
1.2 History
1.3 Biometrics Functionality
Describe Properties
Advantage & Disadvantage
Biometrics Benefits
1.4 Indicators of Biometrics system
2. BIOMETRICS TECHNOLOGY
2.1 Fingerprint
2.1.1 Matching Approach
2.1.2 Advantage & Disadvantage
2.2 Hand Geometry
2.3 Iris
Iris Segmentation
Iris Polar Mapping
Common Algorithm
Iris code
2.4 Signature
2.5 Voice Authentication
2.6 Fingerprint Sensing
2.7 Ultrasound
2.8 Palm Print
Category of Palm print
Category of Division Palm
2.9 Facial Recognition System
Peak of Side Lobe Ratio
Face Region
2.1.1 Three Dimensional Face Recognize
Advantage & Disadvantage
2.1.2 DNA Fingerprint
Iv
1
1
1
2
3
4
5
6
8
8
9
9
10
11
12
13
14
14
15
16
17
18
18
19
20
21
22
23
24
25
26
Ⅴ
Advantage & Disadvantage
3. BIOMETRICS SYSTEM COMPONENT
3.1 Compress
3.2 Process
3.2.1 Enrollment
3.2.2 Verification
3.3 Types of Biometrics System
3.4 Biometrics Accuracy
4. BIOMETRICS DEVICES
4.1 Iris Scanner
4.2 Fingerprint Scanner
4.3 Face Scanner
4.4 Hand Scanner
4.5 Retina Scanner
4.6 Multi-Biometrics
4.7 Retinal Scanner
5. APPLICATION
5.1 Forensic
5.2 Government
5.3 Commercial
5.4 Health Care
5.5 Track And Immigration
CONCLUSION
REFERENCE
27
28
28
28
29
29
29
30
32
32
33
33
34
35
35
36
37
37
38
39
40
41
Ⅵ
LIST OF FIGURES
S. No PAGE NO
Figure 1.0 Prehistoric handprints 2
Figure 1.1 Preferences of common people in choosing the methods of 4
Figure 1.2 Appreciations of 5
Figure 1.3 the critical disadvantages 6
Figure 1.4 fingerprints 9
Figure 1.5 Hand Geometry 10
Figure 1.6 Iris 11
Figure 1.7 Iris segmentation 12
Figure1.8 Boundary Detection 13
Figure 1.9 Iris polar mapping 13
Figure 2.0 Polar code 14
Figure 2.1 Signatures 15
Figure 2.2 Voice Authentications 16
Figure 2.3 Fingerprint sensing 17
Figure 2.4 Six categories of palm print 19
Figure 2.5 Division of the category 20
Figure 2.6 Facial Enroll and Recognition Stage 21
Figure 2.7 PSR 22
Figure 2.8 Selecting Face Region 23
Figure 2.9 Correlation output 24
Figure 3.0 3D Face Matching 24
Figure 3.1 DNA Fingerprinting 27
Figure 3.2 Enrollment Process 28
Figure 2.3 Verification Process 29
Figure 3.4 Error Rate 30
Figure 3.5 Iris Scanner 32
Figure 3.6 Fingerprint Scanner 33
Figure 3.7 Face Camera 34
Figure 3.8 Hand Scanner 34
Figure 3.9 Retina Scan 35
Figure 4.0 Multi Biometric 35
Ⅶ
Figure 4.1 Retinal scanner 36
Ⅷ
1
1. INTRODUCTION:
Biometrics is automated methods of recognizing a person based on a physiological or
behavioral attribute. Along with the quality considered are; face, fingerprint, hand geometry,
iris, retinal, signature, and voice. Biometric technologies are fetching the establishment of an
extensive array of extremely safe recognition and personal authentication solutions. As the level
of security breaches and transaction fraud increases, the need for highly secure identification
and personal verification technologies is becoming apparent. Biometric-based solutions are
proficient to offer for confidential financial transactions and personal data privacy. The need for
biometrics can be found in federal, state and local governments, in the military, and in
commercial applications.
Enterprise wide network security infrastructures, government IDs, secure electronic banking,
investing and other financial transactions, retail sales, law enforcement, and health and social
services are already benefiting from these technologies. Biometric-based authentication
applications include workstation, network, and domain access, single sign-on, application logon,
data protection, remote access to resources, transaction security and Web security. Trust in these
electronic transactions is essential to the healthy growth of the global economy.
Utilized alone or integrated with other technologies such as smart cards, encryption keys and
digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily
lives. Utilizing biometrics for personal authentication is becoming convenient and considerably
more accurate than current methods (such as the utilization of passwords or PINs). This is
because biometrics links the event to a particular individual (a password or token may be used
by someone other than the authorized user), is convenient (nothing to carry or remember),
accurate (it provides for positive authentication), can provide an audit trail and is becoming
socially acceptable and inexpensive.
1.1 Definition
To summarize, biometrics are unique physical identifiers that can be utilized in automated
recognition technology. Some examples of biometric characteristics include facial patterns,
fingerprints, irises, voice and vein palm. From an etymological point of view, when you break
down biometrics, you get two Greek words: bio (life) as well as metrics (to measure).
1.2 History
Biometrics has always been used as a method of facial recognition, even before it became
incorporated into technology. Since the start of civilization, human beings have used facial
features to identify both known and unknown people. However, as populations increased and
methods of travel became more convenient, recognizing faces based on looking at their features
was much more difficult. Thus, biometrics evolved over time to meet the needs of an ever
2
growing and evolving population. We have a few real examples of biometric usage throughout
the history of civilization.
 Prehistoric cave paintings that are estimated to be 31,000 years old are surrounded by
handprints. These prints are assumed to be a signature of sorts, done by the painter.
 There is evidence that ancient Babylonian business transactions were accompanied by
fingerprint recordings.
 A Spanish explorer and writer from the 1500s, Joao de Barros, reported that Chinese merchants
used fingerprints as part of their business transactions.
These are just a few examples – biometrics have been gathered and used in countless societies
for centuries. As technology became more advanced, so did the methods of biometric
acquisition and identification. In the mid-1800s, the industrial revolution was in full swing, and
cities were growing rapidly. Because of this, there was a need to efficiently identify people.
Authorities and merchants could no longer rely on local knowledge and their own experiences
to identify these more mobile and larger populations.
Let’s take a look at two methods that justice systems used to identify criminals via biometrics.
The first way was the Bertillon system, which was developed in France. With this system, body
dimensions (such as height and arm length) were measured and recorded on cards. The other
system was used in Asia, South America, and Europe and involved the formal use of indexing
fingerprints. In the 1960s, the first semi-automatic facial recognition system was created. This
system required the user to extract usable physical features, such as the eyes, ears, mouth, and
nose in photographs. The system would then calculate ratios and compare them to reference
data.
1.3 Biometric functionality
One of the most asked question: what biological mesuremts is biometrics? The answer is quite
simperandobvious:any.Anycharacteristiccanservebiometricsifithas
Figure 1.0 Prehistoric handprints
3
The following desirable properties:
 Universality- something that each person has
 Uniqueness-something that separates this veryperson fromothers. This means
that not all characters can be suitable forbiometrics.
 Permanence- biometric measurement should be constant over time for each
person.
 Measurability(collectability)-itshouldbeeasytomeasure,shouldnotdemand
too much time and costs
 Performance- speed, accuracy and robustness
 Acceptability- how well people accept biometrics
 Circumvention- how easy it is to fool the system. This becomes veryimportant as
the value of information grows rapidly. It gives an opportunity to be ready to two
kinds of attacks:
1) Privacy attack when the attacker access to the data to which he is not
authorized, and
2) Subversive attack when the attacker receives an opportunity to manipulate the
system.
The list of these factors was defined by A.K Joiner. Bole and S. Pankanti in their book ―Biometrics.
Personal Identification in Network Society‖ which was published in 1999. (A Century of
Biometrics, cited21.02.2012)
Students of the George Washington University questioned people about their attitude towards
biometric technologies and different methods of it. Noteworthy, that more than half of all people
that took part in questioning ( 77%) considered biometric to be rather useful tool for
authentication of identity.16%told that they liked some of the advantages that biometrics offers.
And only 7% were against of biometrics.
Concerning the methods of biometric, the favorite was fingerprint recognition, the second place-
iris recognition. The following picture shows the preferences of common people in choosing the
4
methods of biometrics.
Here is the table of advantages and disadvantages of biometrics
No Advantages Disadvantages
1 Increase security Security
2 Cannot be copied Adaptability to rate of change
3 Can not be shared Scalability
Picture 1.1 Preferences of common people in choosing the methods of
biometrics
5
4 Convenience Miss use
5 Auditable trial Regulation of use
6 Accuracy Accuracy
7 Cannot be lost Financial cost
8 Minimize paper work Privacy
9 Costs Time
Security is considered to be the greatest advantage of biometrics, on the second position is
accuracy. The greatest disadvantages of biometrics are invasion of privacy and costs of
implementation.
Thesecondtwopictures will showus whatpeoplereally appreciatein biometricsand
What disadvantages they consider to becritical.
Picture 1.2 Appreciations of
aanages
6
1.4 Indicators of biometric systems
Different biometric systems differ according to their indicators:
1) Through-put capacity: characterize bythe time that is necessaryto serve one user. It depends on
condition of work (whether we do authentication or identification). Identification will take more
timethanauthentication as the system needs to compare all examples from database. In condition
of authentication user should type personal code and the system will compare it with only one
example.
2) Price: one of the most important factors.
3) Reliability of identification: there are two probabilities: a) probability of ―False Reject Rate‖
when the system does not recognize its user and b) ―False Accept Rate ―when the system
recognizes the wrong person as its user. The mistake of ―false accept‖ is more dangerous from
the security point of view that the ―false reject‖ , but the mistake of ―false reject‖ makes the system
uncomfortable to use as it do not recognize the user from the first time. These two probabilities
are connected with each other, and the attempt to minimize one of them increases the second one.
That is why in practice the system should come to compromise. This field is the most difficult in
biometrics as the task of the system is to recognize less wrong people and to reject less right
users.
4) Simplicity and convenience in use: these indicators determine the consumer characteristic of
biometric system. The most popular questions: How easy is it to install this system? Does the
system require the active actions of the user or is the receiving of characteristics too difficult?
Picture 1.3 the critical disadvantages
7
Doesthesystemrequireadditional training?
5) Degree of psychological comfort: shows how different systems and methods can generate
negative reaction of the user, fear ordoubt.
6) Ability to play tricks with the system: ability to use different ―duplicates‖ such as casts, tape
recording, etc. The most vulnerable systems consider being: systems of voice recognition and
facerecognition
7) Method of collation: decide if the user needs to put his finger into the collation, or it will be
enough just to say a special phrase or to have a look to the camera. There are two ways of
collation: distant and contact. Technology of distant collation allows to increase the through-put
capacityandtoavoidregular cleaning of collation.
8) Accuracy of authentication: differs from the systems which use passwords.
9) Productivity:dependsonsuchfactorsasaccuracy,price,integrationand comfort of use.
10) Expenditures: for many applications,such as registration in personal computer or network, the
additional expenditures for realization of biometric technologies are very important. Some
applications do not allow large equipment, stimulating minimization of data units. Nowadays a
lot of powerful and cheap data units appear and we can use biometrics in new applications for
identification and this, in its turn, makes itcheaper.
11) Integration: integration of several biometric systems in to one device improves characteristics
of the systems.Authentication is not useful when the system cannot guarantee that the user gives
necessary characteristics.
12) Confidentiality: Raises the question: Where her biometric data will be used for spying and
integrationtoprivatelife. Thatiswhythereisanagreementbetween the produces that decide.
8
2. BIOMETRICS TECHNOLOGY
2.1Fingerprint
Fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to
fingerprint verification. Some emulate the traditional police method of matching minutiae;
others use straight pattern-matching devices; and still others are a bit more unique, including
things like patterns and ultrasonic. Some verification approaches can detect when a live finger is
presented; some cannot. A greater variety of fingerprint devices is available than for any other
biometric. As the prices of these devices and processing costs fall, using fingerprints for user
verification is gaining acceptance despite the common — criminal stigma. Fingerprint
verification may be a good choice for in-house systems, where you can give users adequate
explanation and training, and where the system operates in a controlled environment. It is not
surprising that the workstation access application area seems to be based almost exclusively on
fingerprints, due to the relatively low cost, small size, and ease of integration of fingerprint
authentication devices.
• "Fingerprint authentication" describes the process of obtaining a digital representation of a
fingerprint and comparing it to a stored digital version of a fingerprint.
• Fingerprints have long been recognized as a primary and accurate identification method.
• Electronic fingerprint scanners capture digital "pictures" of fingerprints, either based on light
reflections of the finger's ridges and valleys, or the electrical properties of the finger's ridges and
valleys.
• These pictures are then processed into digital templates that contain the unique extracted
features of a finger. Uses the ridge endings and bifurcation's on a person’s finger to plot points
known as Minutiae. The number and locations of the minutiae vary from finger to finger in any
particular person, and from person to person for any particular finger. These digital fingerprint
templates can be stored in databases and used in place of traditional passwords for secure
access.
• Instead of typing a password, users place a finger on an electronic scanner. The scanner, or
reader, compares the live fingerprint to the fingerprint template stored in a database to
determine the identity and validity of the person requesting access.
9
Despite the common — criminal stigma. Fingerprint verification may be a good choice for in-
house systems, where you can give users adequate explanation and training, and where the
system operates in a controlled environment. It is not surprising that the workstation access
application area seems to be based almost exclusively on fingerprints, due to the relatively low
cost, small size, and ease of integration of fingerprint authentication devices.
2.1.1 MATCHING APPROACH:
Two basic classes of matching techniques:
 Image techniques
Use both optical and numerical image correlation techniques
 Feature techniques
Extracts features and develop representations from these features
 Combining the above two techniques:
Hybrid techniques ,with improved accuracy
2.1.2 ADVANTAGES AND DISADVANTAGES:
Advantages:
 Very high accuracy.
 Is the most economical biometric PC user authentication technique.
 it is one of the most developed biometrics
 Easy to use.
 Small storage space required for the biometric template, reducing the size of the
database memory required
 It is standardized.
Disadvantages:
 For some people it is very intrusive, because is still related to criminal identification.
 It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the
Figure 1.4 fingerprint
10
age (is not appropriate with children, because the size of their fingerprint changes
quickly).
 Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi
fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes
approximately → Compression required.

2.2 Hand Geometry
Hand Geometry involves analyzing and measuring the shape of the hand. This biometric offer a
good balances of performance characteristics and is relatively easy to use. It might be suitable
where there are more users or where users access the system infrequently and are perhaps less
disciplined in their approach to the system. Accuracy can be very high if desired and flexible
performance tuning and configuration can accommodate a wide range of applications.
Organizations are using hand geometry readers in various scenarios, including time and
attendance recording, where they have proved extremely popular. Ease of integration into other
systems and processes, coupled with ease of use, and makes hand geometry an obvious first step
for many biometric projects.
ADVANTAGES AND DISADVANTAGES
Advantages:
 Though it requires special hardware to use, it can be easily integrated into other devices
or systems.
 It has no public attitude problems as it is associated most commonly with authorized
access.
 The amount of data required to uniquely identify a user in a system is the smallest by
far, allowing it to be used with Smartcards easily.
Figure 1.5 Hand Geometry
11
Disadvantages:
• Very expensive
• Considerable size.
• It is not valid for arthritic person, since they cannot put the hand on the scanner
properly.
2.3 Iris
Iris based biometric, on the other hand, involves analyzing features found in the colored ring of
tissue that surrounds the pupil. Iris scanning, undoubtedly the less intrusive of the eye related
biometrics, uses a fairly conventional camera element and requires no close contact between the
user and the reader. In addition, it has the potential for higher than average template matching
performance. Iris biometrics work with glasses in place and is one of the few devices that can
work well in identification mode. Ease of use and system integration have not traditionally been
strong points with iris scanning devices, but you can expect improvements in these areas as new
products emerge. 5. Retina based biometric involves analyzing the layer of blood vessels
situated at the back of the eye. An established technology, this technique involves using a low-
intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal
scanning can be quite accurate but does require the user to look into a receptacle and focus on a
given point. This is not particularly convenient if you wear glasses or are concerned about
having close contact with the reading device. For these reasons, retinal scanning is not warmly
Figure 1.6 Iris
12
accepted by all users, even though the technology itself can work well.
Figure 1.7 Iris segmentation
13
Figure 1.8 Boundary Detection
Figure 1.9 Iris polar mapping
14
Figure 2.0 Polar code
15
ADVANTAGES AND DISADVANTAGES
Advantages:
• Very high accuracy.
• Verification time is generally less than 5 seconds.
• The eye from a dead person would deteriorate too fast to be useful, so no extra
precautions have to been taken with retinal scans to be sure the user is a living
human being.
Disadvantages:
• Intrusive.
• A lot of memory for the data to be stored.
• Very expensive
2.4 Signature
Signature verification analyzes the way a user signs her name. Signing features such as speed,
velocity, and pressure are as important as the finished signature’s static shape. Signature
verification enjoys a synergy with existing processes that other biometrics do not. People are
used to signatures as a means of transaction-related identity verification, and most would see
nothing unusual in extending this to encompass biometrics. Signature verification devices are
reasonably accurate in operation and obviously lend themselves to applications where a
signature is an accepted identifier. Surprisingly, relatively few significant signature applications
have emerged compared with other biometric methodologies. But if your application fits, it is a
technology worth considering.
Figure 2.1 Signatures
16
ADVANTAGES AND DISADVANTAGES Advantages:
 Though it requires special hardware to use, it can be easily integrated into other
devices or systems.
 It has no public attitude problems as it is associated most commonly with authorized
access.
 The amount of data required to uniquely identify a user in a system is the smallest by
far, allowing it to be used with Smartcards easily.
Disadvantages:
• Very expensive
• Considerable size.
• It is not valid for arthritic person, since they cannot put the hand on the scanner
properly.
2.5 Voice Authentication
Voice authentication is not based on voice recognition but on voice to- print authentication,
where complex technology transforms voice into text. Voice biometrics has the most potential
for growth, because it requires no new hardware — most PCs already contain a microphone.
However, poor quality and ambient noise can affect verification. In addition, the enrollment
procedure has often been more complicated than with other biometrics, leading to the perception
that voice verification is not user friendly. Therefore, voice authentication software needs
improvement. One day, voice may become an additive technology to finger-scan technology.
Because many people see finger scanning as a higher authentication form, voice biometrics will
most likely be relegated to replacing or enhancing PINs, passwords, or account names.
ADVANTAGES AND DISADVANTAGES
Advantages:
Figure 2.2 Voice Authentications
17
• Non intrusive. High social acceptability.
• Verification time is about five seconds.
Disadvantages:
• A person’s voice can be easily recorded and used for unauthorized PC or network.
• Low accuracy.
• An illness such as a cold can change a person’s voice, making absolute identification
difficult or impossible.
2.6 Fingerprint Sensing
Voice authentication is not based on voice recognition but on voice to- print authentication,
where complex technology transforms voice into text. Voice biometrics has the most potential
for growth, because it requires no new hardware — most PCs already contain a microphone.
However, poor quality and ambient noise can affect verification. In addition, the enrollment
procedure has often been more complicated than with other biometrics, leading to the perception
that voice verification is not user friendly. Therefore, voice authentication software needs
improvement. One day, voice may become an additive technology to finger-scan technology.
Because many people see finger scanning as a higher authentication form, voice biometrics will
most likely be relegated to replacing or enhancing PINs, passwords, or account names.
There are three families of electronic fingerprint sensors based on the sensing technology
• Solid-state or optical sensors (left part of Fig.2.3):
These consist of an array of pixels, each pixel being a sensor itself. Users place the finger on the
surface of the silicon, and four techniques are typically used to convert the ridge/valley
information into an electrical signal: capacitive, thermal, electric field and piezoelectric. Since
solid-state sensors do not use optical components, their size is considerably smaller and can be
easily embedded. On the other hand, silicon sensors are expensive, so the sensing area of solid-
state sensors is typically small.
Figure 2.3 Fingerprint sensing
18
• Capacitive sensor (right part of Fig.2.3):
The finger touches a glass prism and the prism is illuminated with diffused light. The light is
reflected at the valleys and absorbed at the ridges. The reflected light is focused onto a CCD or
CMOS sensor. Optical fingerprint sensors provide good image quality and large sensing area
but they cannot be miniaturized because as the distance between the prism and the image sensor
is reduced, more optical distortion is introduced in the acquired image.
2.7 Ultrasound
Acoustic signals are sent, capturing the echo signals that are reflected at the fingerprint surface.
Acoustic signals are able to cross dirt and oil that may be present in the finger, thus giving good
quality images. On the other hand, ultrasound scanners are large and expensive, and take some
seconds to acquire an image. A new generation of touch less live scan devices that generate a
3D representation of fingerprints is appearing [22]. Several images of the finger are acquired
from different views using a multi camera system, and a contact-free 3D representation of the
fingerprint is constructed. This new sensing technology overcomes some of the problems that
intrinsically appear in contact-based sensors such as improper finger placement, skin
deformation, sensor noise or dirt.
2.8 Palm print
Palm print refers to an image required of the palm region of the hand.
As a method of biometrics palm print is often mentioned with such methods as fingerprints and
iris recognition. Palm print is also distinctive and can easily be captured with low resolution
devices. The devices are not expensive. They are similar to those which are used for taking
fingerprints but their size is bigger and this makes the limitation of use in mobile devices. Palm
print is suitable for everyone and besides it has one big plus: it does not require personal
information.
The palm of each person consists of principle lines, wrinkles secondary lines and ridges. Palm
also contains such information as texture, indents and marks which are used during the comparison
of one palm with another.
Classification of palm prints is based on the different principle lines and number of intersection.
ThisclassificationwasofferedbyX.Wu,D.Zhang,K.WanfgandB.Huang in their book ―Palm print
classification using principle lines‖.
According to this classification there are 6 categories of palm prints:
19
Category 1 Category 2
Category 3 Category 4
Category 5 Category 6
Figure 2.4 six categories of palm print
20
The category 5 is the most widespread. This category is further divided into 5
subcategories:
The process of taking palm print can be described in the following way:
1) The process starts when the palm print capture device captures the image of the palm
Thesystem classifies theimageusing thecategoryof6patterns.Heretherecan be 2 variants of the
Process. First, the palm print can belong to the categories 1, 2,3,4,6. In this case the system just
saves/compares theimage inthedatabase. If the image belongs to the category5,
2) The system continues the process of classification using subcategories. After the process ends
and the category and. subcategory is given the system saves/compares the image. (Palm print
Classification, cited 28.03.2012)
Palm printing has its own advantages comparing with other methods of biometrics.
Palm print is hardly affected by age (theproblem of age is the main problem for face recognition).
Palm prints contain more information and can use low resolution devices (in comparison with
Figure 2.5. Division of the category 5
21
fingerprinting). Palm printing cannot make harm to the health of people, and many people prefer
palm printingtoiris recognition based on this very reason.
Palm printing is a rapidly developed method of biometrics. One of the variants of palm printing
is the recognition based on the veins of palm. Infra-red camera makes the image of inner or
external side of the hand. Hemoglobin absorbs infra-red light and veins can be seen as black lines.
This method is contactless and reliable. The main minus of this method is that there should be no
light near the scanner.
2.9 Facial Recognition System:
A facial recognition system is a computer-driven application for automatically identifying a
person from a digital image. It does that by comparing selected facial features in the live image
and a facial database.
It is typically used for security systems and can be compared to other biometrics such as
fingerprint or eye iris recognition systems. Popular recognition algorithms include eigenface,
fisherface, the Hidden Markov model, and the neuronal motivated Dynamic Link Matching. A
newly emerging trend, claimed to achieve previously unseen accuracies, is three- dimensional
face recognition. Another emerging trend uses the visual details of the skin, as captured in
standard digital or scanned images.
Figure 2.6 Facial Enroll and Recognition Stage
22
Figure 2.7 PSR
23
Figure 2.8 Selecting Face Region
24
Figure 2.9 Correlation output
2.9.1 THREE-DIMENSIONAL FACE RECOGNITION
Figure 3.0 3D Face Matching
25
Three-dimensional face recognition (3D face recognition) is a modality of facial recognition
methods in which the three-dimensional geometry of the human face is used. It has been shown
that 3D face recognition methods can achieve significantly higher accuracy than their 2D
counterparts, rivaling fingerprint recognition.
3D face recognition achieves better accuracy than its 2D counterpart by measuring geometry of
rigid features on the face.[citation needed] This avoids such pitfalls of 2Dface recognition
algorithms as change in lighting, different facial expressions, upend orientation. Another
approach is to use the 3D model to improve accuracy of traditional image based recognition by
transforming the head into a known view.
The main technological limitation of 3D face recognition methods is the acquisition of3D
images, which usually requires a range camera. This is also a reason why 3D face recognition
methods have emerged significantly later (in the late 1980s) than 2Dmethods. Recently
commercial solutions have implemented depth perception by projecting a grid onto the face and
integrating video capture of it into a high resolution3D model. This allows for good recognition
accuracy with low cost off-the-shelf components.
Currently, 3D face recognition is still an open research field, vendors already offer commercial
solutions.
ADVANTAGES AND DISADVANTAGES
Advantages:
 Non intrusive
 Cheap technology.
Disadvantages
 2D recognition is affected by changes in lighting, the person’s hair, the age, and if the
person wear glasses.
 Requires camera equipment for user identification; thus, it is not likely to become
popular until most PCs include cameras as standard equipment.
26
2.1.1 DNA Fingerprint
The chemical structure of everyone's DNA is the same. The only difference between people (or
any animal) is the order of the base pairs. There are so many millions of base pairs in each
person's DNA that every person has a different sequence.
Using these sequences, every person could be identified solely by the sequence of their base
pairs. However, because there are so many millions of base pairs, the task would be very time-
consuming. Instead, scientists are able to use a shorter method, because of repeating patterns in
DNA.
These patterns do not, however, give an individual "fingerprint," but they are able to determine
whether two DNA samples are from the same person, related people, or non- related people.
Scientists use a small number of sequences of DNA that are known to vary among individuals a
great deal, and analyze those to get a certain probability of match
How is DNA fingerprint done?
Every strand of DNA has pieces that contain genetic information which informs an organism’s
development (axons) and pieces that, apparently, supply no relevant genetic informational
(intones). Although the intones may seem useless, it has been found that they contain repeated
sequences of base pairs. These sequences, called Variable Number Tandem Repeats (VNTRs),
can contain anywhere from twenty to one hundred base pairs.
Every human being has some VNTRs. To determine if a person has a particular VNTR,
southern is performed, and then the Southern Blot is probed, through a hybridization reaction,
with a radioactive version of the VNTR in question. The pattern which results from this process
is what is often referred to as a DNA fingerprint.
A given person's VNTRs come from the genetic information donated by her parents; he or she
could have VNTRs inherited from his or her mother or father, or combination, but never a
VNTR either of his or her parents do below are the VNTR patterns for Mrs. A [blue], Mr. A
[yellow], four children’s biological daughter), D2 (Mr. A's step-daughter, child of Mrs. A and
her former husband [red]), S1 (the A' biological son), and S2 (the A' adopted son, not
biologically related [his parents are light and dark green]).
27
Figure 3.1 DNA Fingerprinting
Because VNTR patterns are inherited genetically, a given person's VNTR pattern is more or less
unique. The more VNTR probes used to analyze a person's VNTR pattern, the more distinctive
and individualized that pattern, or DNA fingerprint, will be.
ADVANTAGES AND DISADVANTAGES
Advantages:
 Very high accuracy.
 It impossible that the system made mistakes.
 It is standardized.
Disadvantages:
 Extremely intrusive.
 Very expensive.
28
3. Biometric system components and process
3.1 Components:
Three major components are usually present in a biometric system:
 A mechanism to scan and capture a digital or analog image of a living person’s
biometric characteristic.
 Software for storing, processing and comparing the image.
 An interface with the applications system that will use the result to confirm an
individual’s identity.
3.2 Process:
Two different stages are involved in the biometric system process –
1) Enrollment,
2) Verification.
3.2.1 Enrollment:
As shown in Figure 2.1, the biometric image of the individual is captured during the enrollment
process (e.g., using a sensor for fingerprint, microphone for voice verification, camera for face
recognition, scanner for eye scan). The unique characteristics are then extracted from the
biometric image to create the user’s biometric template. This biometric template is stored in a
database or on a machine-readable ID card for later use during an
Identity verification process.
Figure 3.2 Enrollment Process
29
3.2.2 Verification:
Figure 2.2 illustrates the identity verification process. The biometric image is again captured.
The unique characteristics are extracted from the biometric image to create the users ―live‖
biometric template. This new template is then compared with the template previously stored and
a numeric matching score is generated, based on the percentage of duplication between the live
and stored template. System designers determine the threshold value for this identity
verification score based upon the security requirements of the system.
Figure 2.3 Verification Process
3.3 Types of Biometrics system
There are two kinds of Biometric System
 Recognition Systems
 Identifying a person among the whole group of users enrolled in the system.
 It must be an online system.
 Typical applications : Forensics
30
Authentication (1-to-1 comparison) confirms that the credential belongs to the individual
presenting it. In this case, the device that performs the authentication must have access only to
the individual’s enrolled biometric template, which may be stored locally or centrally.
3.4 Biometrics Accuracy
A key factor in the selection of the appropriate biometric technology is its accuracy. Biometric
accuracy is the system’s ability of separating legitimate matches from imposters. When the live
biometric template is compared to the stored biometric template, a matching score is used to
confirm or deny the identity of the user. System designers set this numeric score to
accommodate the desired level of accuracy for the system, as measured by the False Acceptance
Rate (FAR) and False Rejection Rate (FRR).
• False Rejection Rate (FRR) refers to the statistical probability that the biometric system is
not able to verify the legitimate claimed identity of an enrolled person, or fails to identify an
enrolled person.
• False Acceptance Rate (FAR) refers to the statistical probability of False Acceptance or
incorrect verification. In the most common context, both False Rejection and False Acceptance
represent a security hazard.
• Equal-Error Rate When the decision threshold is adjusted so that the false-acceptance
rate equal the false-rejection rate.
Figure 3.4 Error Rate
31
If a mismatching pair of fingerprints is accepted as a match, it is called a false accept. On the
other hand, if a matching pair of fingerprints is rejected by the system, it is called a false reject.
The error rates are a function of the threshold as shown in Figure 2.3. Often the interplay
between the two errors is presented by plotting FAR against FRR with the decision threshold as
the free variable. This plot is called the ROC (Receiver Operating Characteristic) curve. The
two errors are complementary in the sense that if one makes an effort to lower one of the errors
by varying the threshold, the other error rate automatically increases. In a biometric
authentication system, the relative false accept and false reject rates can be set by choosing a
particular operating point (i.e., a detection threshold). Very low (close to zero) error rates for
both errors (FAR and FRR) at the same time are not possible. By setting high threshold, the
FAR error can be close to zero, and similarly by setting a significantly low threshold, the FRR
rate can be close to zero. A meaningful operating point for the threshold is decided based on the
application requirements, and the FAR versus FRR error rates at that
Operating point may be quite different. To provide high security, biometric systems operate at a
low FAR instead of the commonly recommended equal error rate (EER) operating point where
FAR=FRR.
32
4. BIOMETRIC DEVICES
4.1 Iris Scanner
Iris cameras perform recognition detection of a person's identity by mathematical analysis of the
random patterns that are visible within the iris of an eye from some distance. It combines
computer vision, pattern recognition, statistical inference and optics.
Of all the biometric devices and scanners available today, it is generally conceded that iris recognition is
the most accurate. The automated method of iris recognition is relatively young, existing in patent since
only 1994
Figure 3.5 Iris Scanner
Iris cameras, in general, take a digital photo of the iris pattern and recreating an encrypted
digital template of that pattern. That encrypted template cannot be re-engineered or reproduced
in any sort of visual image. Iris recognition therefore affords the highest level defiance against
identity theft, the most rapidly growing crime.
The imaging process involves no lasers or bright lights and authentication is essentially non-
contact. Today's commercial iris cameras use infrared light to illuminate the iris without causing
harm or discomfort to the subject.
The iris is the colored ring around the pupil of every human being and like a snowflake, no two
33
are alike. Each is unique in their own way, exhibiting a distinctive pattern that forms
Randomly in uterus. The iris is a muscle that regulates the size of the pupil, controlling the
amount of light that enters the eye.
4.2 Fingerprint scanner
Figure 3.6 Fingerprint Scanner
A fingerprint scanner is an electronic device used to capture a digital image of the fingerprint
pattern. This scan is digitally processed to create a biometric template which is stored and used
for matching.
4.3 Face Camera
Face detection is used in biometrics, often as a part of (or together with) a facial recognition
system. It is also used in video surveillance, human computer interface and image database
management. A face camera is a webcam with 2 Mix or above which can take a clear crisp
photograph of the face.
34
Figure 3.7 Face Camera
Some recent digital cameras use face detection for autofocus. Also, face detection is useful for
selecting regions of interest in photo slideshows that use a pan-and-scale Ken Burns effect. That
is, the content of a given part of an image is transformed into features, after which a classifier
trained on example faces decides whether that particular region of the image is a face, or not.
A face model can contain the appearance, shape, and motion of faces. There are several shapes
of faces. Some common ones are oval, rectangle, round, square, heart, and triangle. Motions
include, but not limited to, blinking, raised eyebrows, flared nostrils, wrinkled forehead, and
opened mouth.
4.4 Hand Scanner
Figure 3.8 Hand Scanner
35
4.5 Retina Scanner
Figure 3.9 Retina Scan
4.6 Multi- Biometrics
Figure 4.0 Multi Biometrics
36
4.7 Retinal Scanner
The human retina is a thin tissue made up of neural cells that is located in the posterior portion of
the eye. Because of the complex structure of the capillaries that supply the retina with blood, each
person's retina is unique, making retinal scans an emerging authentication method.[1]
The network
of blood vessels in the retina is not entirely genetically determined and thus even identical twins do
not share a similar pattern.
Although retinal patterns may be altered in cases of diabetes, glaucoma or retinal degenerative
disorders, the retina typically remains unchanged from birth until death. Due to its unique and
unchanging nature, the retina appears to be the most precise and reliable biometric, aside from
DNA.[2]
The National Center for State Courts estimate that retinal scanning has an error rate of one in
ten million.[3]
A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a
person’s eye as they look through the scanner's eyepiece. This beam of light traces a standardized path
on the retina. Because retinal blood vessels absorb light more readily than the surrounding tissue, the
amount of reflection varies during the scan. The pattern of variations is digitized and stored in
a database
Figur4.1 Retinal scanner
37
5. APPLICATIONS
In the last years has considerably increased the area of application of biometrics and it's
expected that in the near future, we will use biometry many times in our daily activities
such as getting in the car, opening the door of our house, accessing to our bank account,
shopping by internet, accessing to our PDA, mobile phone, laptops, etc.
Depending on where the biometrics is deployed, the applications can be categorized in
the following five main groups: forensic, government, commercial, health-care and
traveling and immigration. However, some applications are common to these groups such
as physical access, PC/network access, time and attendance, etc.
5.1 Forensic
The use of biometric in the law enforcement and forensic is more known and from long
date, it is used mainly for identification of criminals. In particular, the AFIS (automatic
fingerprint identification system) has been used for this purpose.
Lately the facial-scan technology (mug shots) is being also used for identification of
suspects. Another possible application is the verification of persons of home arrest; a
voice-scan is an attractive solution for this problem. The typical application is:
Identification of criminals- collecting the evidence in the scene of crime (e.g.,
fingerprints) it is possible to compare with data of suspects or make a search in the
database of criminals.
Surveillance --using cameras one can monitor the very busy places such as stadiums,
airports, meetings, etc. Looking in the crowds for suspect, based on the face recognition
biometric, using a images (e.g., mug shots) database of wanted persons or criminals.
Since the events of September 11, 2001, the interest in biometric surveillance has
increased dramatically, especially for air travel applications. Currently there are many
cameras monitoring crowds at airports for detecting wanted terrorists.
Corrections -This refers to the treatment of offenders (criminals) through a system of
38
penal incarceration, rehabilitation, probation, and parole, or the administrative system by
which these are effectuated. Is this cases a biometric system can avoid the possibility of
accidentally releasing the wrong prisoner, or to ensure that people leaving the facilities
are really visitors and not inmates.
Probation and home arrest - biometric can also be used for post-release
programs (conditional released) to ensure the fulfillment of the probation, parole and
home detention terms.
5.2 Government
There are many application of the biometry in the government sector. An AFIS is the
primary system used for locating duplicates enrolls in benefits systems, electronic voting
for local or national elections, driver's license emission, etc. The typical application is:
National Identification Cards - the idea is to include digital biometric information in
the national identification card. This is the most ambitious biometric program, since the
identification must be performed in a large-scale database, containing hundreds of
millions samples, corresponding to the whole population of one country.
This kind of cards can be used for multiple purposes such as controlling the collection of
benefits, avoiding duplicates of voter registration and drivers license emission. All this
applications are primarily based on finger-scan and AFIS technology; however it is
possible that facial-scan and iris-scan technology could be used in the future.
Voter ID and Elections - while the biometric national ID card is still in project, in
many countries are already used the biometry for the control of voting and voter
registration for the national or regional elections. During the registration of voter, the
biometric data is captured and stored in the card and in the database for the later use
during the voting. The purpose is to prevent the duplicate registration and voting.
Driver's licenses - In many countries the driver license is also used as identification
document, therefore it is important to prevent the duplicate emission of the driver license
under different name. With the use of biometric this problem can be eliminated. However
39
it is important that the data must be shared between states, because in some country such
as United States, the license is controlled at the states as opposed to the federal level.
Benefits Distribution (social service) - the use of biometry in benefits distribution
prevents fraud and abuse of the government benefits programs. Ensuring that the
legitimate recipients have a quick and convenient access to the benefits such as
unemployment, health care and social security benefits.
Employee authentication - The government use of biometric for PC, network, and
data access is also important for security of building and protection of information.
Below are more detailed this kind of applications also used in commercial sector.
Military programs - the military has long been interested in biometrics and the
technology has enjoyed extensive support from the national security community.
5.3 Commercial
Banking and financial services represent enormous growth areas for biometric
technology, with many deployments currently functioning and pilot project announced
frequently. Some applications in this sector are:
Account access - The use of biometric for the access to the account in the bank allows
keeping definitive and auditable records of account access by employees and customers.
Using biometry the the customers can access accounts and employees can log into their
workstations.
o ATMs - the use of biometric in the ATM transaction allows more security,
o Expanded Service Kiosks - A more receptive market for biometrics may be special
purpose kiosks, using biometric verification to allow a greater variety of financial
transaction than are currently available though standard ATMs.
o Online banking - Internet based account access is already widely used in many places,
the inclusion of biometric will make more secure this type of transactions from home.
Currently, there are many pilot programs using biometric in home banking.
o Telephony transaction - Voice-scan biometric can be used to make more secure the
telephone-based transactions. In this type of application, when the costumer calls to make
40
a transaction, a biometric system will authenticate the customer's identity based on his or
her voice with no need of any additional device.
o PC/Network access - The use of biometric log-in to local PCs or remotely through
network increase the security of the overall system keeping more protected the valuable
information.
o Physical access - the biometric is widely used for controlling the access to building or
restricted areas.
o E-commerce - biometric e-commerce is the use of biometrics to verify of identity of
the individual conduction remote transaction for goods or services
o Time and attendance monitoring - In this sector the biometrics is used for controlling
the presence of the individuals in a determine area. For example for controlling the time
sheet of the employees or the presence of students at the classroom
5.4 Health Care
The applications in this sector include the use of biometrics to identify or verify the
identity of individuals interacting with a health-care entity or acting in the capacity of
health-care employee or professional. The main aim of biometrics is to prevent fraud,
protect the patient information and control the smell of pharmaceutical products. Some
typical application is:
o PC/Network Access - the biometrics are used to control a secure access of the
employees to the hospital network, primarily, in order to protect the patient information,
o Access to personal information - Using biometrics, the medical patient information
may be stored on smart card or secure networks; this will enable the access of the
patients to their personal information.
Patient identification - In case of emergency, when a patient does not have
identification document and is unable to communicate, biometric identification may be a
good alternative to identify.
41
5.5 Travel and Immigration
The application in this sector includes the use of biometrics to identify or verify the
identity of individual interacting during the course of travel, with a travel or immigration
entity or acting in the capacity of travel or immigration employee. Typical application is:
o Air travel - In many airport are already used a biometric system in order to reduce the
inspection processing time for authorized travelers.
o Border crossing - The use of biometrics to control the travelers crossing the national
or state border is increasing, especially in regions with high volume of travelers or illegal
immigrants.
o Employee access - Several airport use biometric to control the physical access of
employees to secure areas.
o Passports - Some country already issues passports with biometric information on a
barcode or smart chips. The use of biometrics prevents the emission of multiple passports
for the same person and also facilitates the identification at the airports and border
controls.
42
CONCLUSION:
Biometrics is a means of verifying personal identity by measuring and analyzing unique physical
or behavioral characteristics like fingerprints or voice patterns. The conclusion of this whole
paper is that the card-less payment system should be replaced and there must be more easier,
reliable, secure, cash free and tension free payment system, i-e biometric payment system in
which no body have to take with dozens of cards for shopping, travelling, pass in office,
university or bank as door lock. And the International Journal of Advanced Science and
Technology Vol. 4, March, 2009 36 must have some secure codes to access as authorization and
there is also one another disadvantage is that there may be stolen of cards or it can be losses at
any time without any care.
So to consider all these kinds of problems and disadvantages of card payment system the
fingerprints payment system is suggested to be implemented because it is easier, reliable,
feasible, secure and easily authorized to everyone. And there is no any worry that anyone can
stolen my finger are can be loosed anywhere so other body can use it. In fingerprint payment
system customer has to place his fingers on the finger scanner and then scanner will recognize
the account which belongs to that person and charge the bill. So it is easy for both customer and
seller because there is no need to scratch the credit card and then enter code if code is forgot or if
some time card cannot read and many more problems can occur in card payment system.
And in biometric payment system no need to carry cash with them. Biometric payment system
may be like fingerprints, IRIS, face recognition and blood reading or skin reading and it may be
installed at any store, university, library, hostel, bank, office, home door lock, internet online
shopping and many kinds where card system is installed. So in this paper we explain the
biometrics with detailed term, how fingerprint system works, fingerprints’ types and fingerprint
recognition through circular sampling.
43
Reference:-
[1]https://www.seminarsonly.com/computer%20science/biometrics-and-fingerprint-payment-
technology.php
[2] https://recfaces.com/articles/what-is-biometrics
[3] www.theseus.fi
[4] www.academia.edu
[5] Cybercrime: protecting against the growing threat Global Economic Crime Survey – PWC
Global Economic. [ONLINE]. Available at: http://www.pwc.com/en_GX/gx/ economic-crime-
survey/assets /GECS_GLOBAL_REPORT. Pdf.
[6] Biometric Digest -http://biometrics.cse.msu.edu.

More Related Content

Similar to Biometrics & Finger print Technology

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxTusharKataria22
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 

Similar to Biometrics & Finger print Technology (20)

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Ai
AiAi
Ai
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 

More from Mewar University

Ekramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdfEkramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdfMewar University
 
CNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptxCNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptxMewar University
 
coating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptxcoating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptxMewar University
 
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptxASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptxMewar University
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxMewar University
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxMewar University
 

More from Mewar University (8)

Ekramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdfEkramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdf
 
CNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptxCNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptx
 
13Jaundice.pptx
13Jaundice.pptx13Jaundice.pptx
13Jaundice.pptx
 
Chest Physiotherapy.pptx
Chest Physiotherapy.pptxChest Physiotherapy.pptx
Chest Physiotherapy.pptx
 
coating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptxcoating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptx
 
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptxASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Biometrics & Finger print Technology

  • 1. A Technical Seminar Report Submitted to Mewar University, Chittorgarh Towards the partial fulfillment of the degree of Bachelor of Technology In Computer Science Session: - 2020-2021 Guided by: Submitted by: Mr. Shiv Kumar Zaki Anwer CSE Department MUR1800949 Department of Computer Science and Engineering Faculty of Engineering & Technology Mewar University Chittorgarh (Raj.) July - 2021 BIOMETRICS AND FINGERPRINT TECHNOLOGY
  • 2. CERTIFICATE This Seminar Report entailed "Biometrics and Fingerprint Payment Technology " submitted by Zaki Anwer to towards the partial fulfillment of the degree of Bachelor of Technology in Computer Science and Engineering, To Mewar University, Chittorgarh is a satisfactory account of this Seminar work and is recommended for the award of the degree. Guided by: Submitted By: Mr.Shiv Kumar Zaki Anwer Assistant Professor MUR1800949 Department of Computer Science and Engineering Faculty of Engineering & Technology Mewar University Chittorgarh (Raj.) July - 2021 Ⅱ
  • 3. ACKNOWLEDGEMENT The success and final outcome of this Seminar required a lot of guidance and assistance from many people and I am extremely privileged to have got this all along the completion of my Seminar. All that I have done is only due to such supervision and assistance and I would not forget to thank them. I owe my deep gratitude to our Seminar guide Mr. Shiv Kumar, who took keen interest on our Seminar work and guided us all along, till the completion of my Seminar work by providing all the necessary information for developing a good Seminar. I am thankful to and fortunate enough to get constant encouragement, support and guidance from all Teaching staffs of CSE Department which helped us in successfully completing our project work. Date Signature ⅲ
  • 4. ABSTRACT This article discuss biometrics authentication in relation to payment system. Biometrics uses biological traits or behavioral characteristics to identify an individual. A Biometrics system is effective pattern recognition system that utilizes different patterns similar to retina patterns, iris pattern and biological qualities like fingerprints, voice recognition, facial geometry and hand recognition etc. Biometrics payments system is protected and sheltered and incredibly trouble-free to use and even without using password or top secret codes to keep in mind as compare with previous system like credit card payment system, and mobile banking etc. In daily life the usage of credit cards and debit card for shopping, bill payments, travelling and so on. So problem is that a person has to remember their password or secret code and to keep secure to take with him all time. So biometrics system will solve this problem. Greater implementation of biometric payment system is more reasonably priced to small business owners. We actually require alternate payment systems. ⅳ
  • 5. TABLE OF CONTENTS S. No PAGE CERTIFICATE ii ACKNOWLEDGEMENT iii ABSTRACT 1. INTRODUCTION 1.1 Definition 1.2 History 1.3 Biometrics Functionality Describe Properties Advantage & Disadvantage Biometrics Benefits 1.4 Indicators of Biometrics system 2. BIOMETRICS TECHNOLOGY 2.1 Fingerprint 2.1.1 Matching Approach 2.1.2 Advantage & Disadvantage 2.2 Hand Geometry 2.3 Iris Iris Segmentation Iris Polar Mapping Common Algorithm Iris code 2.4 Signature 2.5 Voice Authentication 2.6 Fingerprint Sensing 2.7 Ultrasound 2.8 Palm Print Category of Palm print Category of Division Palm 2.9 Facial Recognition System Peak of Side Lobe Ratio Face Region 2.1.1 Three Dimensional Face Recognize Advantage & Disadvantage 2.1.2 DNA Fingerprint Iv 1 1 1 2 3 4 5 6 8 8 9 9 10 11 12 13 14 14 15 16 17 18 18 19 20 21 22 23 24 25 26 Ⅴ
  • 6. Advantage & Disadvantage 3. BIOMETRICS SYSTEM COMPONENT 3.1 Compress 3.2 Process 3.2.1 Enrollment 3.2.2 Verification 3.3 Types of Biometrics System 3.4 Biometrics Accuracy 4. BIOMETRICS DEVICES 4.1 Iris Scanner 4.2 Fingerprint Scanner 4.3 Face Scanner 4.4 Hand Scanner 4.5 Retina Scanner 4.6 Multi-Biometrics 4.7 Retinal Scanner 5. APPLICATION 5.1 Forensic 5.2 Government 5.3 Commercial 5.4 Health Care 5.5 Track And Immigration CONCLUSION REFERENCE 27 28 28 28 29 29 29 30 32 32 33 33 34 35 35 36 37 37 38 39 40 41 Ⅵ
  • 7. LIST OF FIGURES S. No PAGE NO Figure 1.0 Prehistoric handprints 2 Figure 1.1 Preferences of common people in choosing the methods of 4 Figure 1.2 Appreciations of 5 Figure 1.3 the critical disadvantages 6 Figure 1.4 fingerprints 9 Figure 1.5 Hand Geometry 10 Figure 1.6 Iris 11 Figure 1.7 Iris segmentation 12 Figure1.8 Boundary Detection 13 Figure 1.9 Iris polar mapping 13 Figure 2.0 Polar code 14 Figure 2.1 Signatures 15 Figure 2.2 Voice Authentications 16 Figure 2.3 Fingerprint sensing 17 Figure 2.4 Six categories of palm print 19 Figure 2.5 Division of the category 20 Figure 2.6 Facial Enroll and Recognition Stage 21 Figure 2.7 PSR 22 Figure 2.8 Selecting Face Region 23 Figure 2.9 Correlation output 24 Figure 3.0 3D Face Matching 24 Figure 3.1 DNA Fingerprinting 27 Figure 3.2 Enrollment Process 28 Figure 2.3 Verification Process 29 Figure 3.4 Error Rate 30 Figure 3.5 Iris Scanner 32 Figure 3.6 Fingerprint Scanner 33 Figure 3.7 Face Camera 34 Figure 3.8 Hand Scanner 34 Figure 3.9 Retina Scan 35 Figure 4.0 Multi Biometric 35 Ⅶ
  • 8. Figure 4.1 Retinal scanner 36 Ⅷ
  • 9. 1 1. INTRODUCTION: Biometrics is automated methods of recognizing a person based on a physiological or behavioral attribute. Along with the quality considered are; face, fingerprint, hand geometry, iris, retinal, signature, and voice. Biometric technologies are fetching the establishment of an extensive array of extremely safe recognition and personal authentication solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are proficient to offer for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive. 1.1 Definition To summarize, biometrics are unique physical identifiers that can be utilized in automated recognition technology. Some examples of biometric characteristics include facial patterns, fingerprints, irises, voice and vein palm. From an etymological point of view, when you break down biometrics, you get two Greek words: bio (life) as well as metrics (to measure). 1.2 History Biometrics has always been used as a method of facial recognition, even before it became incorporated into technology. Since the start of civilization, human beings have used facial features to identify both known and unknown people. However, as populations increased and methods of travel became more convenient, recognizing faces based on looking at their features was much more difficult. Thus, biometrics evolved over time to meet the needs of an ever
  • 10. 2 growing and evolving population. We have a few real examples of biometric usage throughout the history of civilization.  Prehistoric cave paintings that are estimated to be 31,000 years old are surrounded by handprints. These prints are assumed to be a signature of sorts, done by the painter.  There is evidence that ancient Babylonian business transactions were accompanied by fingerprint recordings.  A Spanish explorer and writer from the 1500s, Joao de Barros, reported that Chinese merchants used fingerprints as part of their business transactions. These are just a few examples – biometrics have been gathered and used in countless societies for centuries. As technology became more advanced, so did the methods of biometric acquisition and identification. In the mid-1800s, the industrial revolution was in full swing, and cities were growing rapidly. Because of this, there was a need to efficiently identify people. Authorities and merchants could no longer rely on local knowledge and their own experiences to identify these more mobile and larger populations. Let’s take a look at two methods that justice systems used to identify criminals via biometrics. The first way was the Bertillon system, which was developed in France. With this system, body dimensions (such as height and arm length) were measured and recorded on cards. The other system was used in Asia, South America, and Europe and involved the formal use of indexing fingerprints. In the 1960s, the first semi-automatic facial recognition system was created. This system required the user to extract usable physical features, such as the eyes, ears, mouth, and nose in photographs. The system would then calculate ratios and compare them to reference data. 1.3 Biometric functionality One of the most asked question: what biological mesuremts is biometrics? The answer is quite simperandobvious:any.Anycharacteristiccanservebiometricsifithas Figure 1.0 Prehistoric handprints
  • 11. 3 The following desirable properties:  Universality- something that each person has  Uniqueness-something that separates this veryperson fromothers. This means that not all characters can be suitable forbiometrics.  Permanence- biometric measurement should be constant over time for each person.  Measurability(collectability)-itshouldbeeasytomeasure,shouldnotdemand too much time and costs  Performance- speed, accuracy and robustness  Acceptability- how well people accept biometrics  Circumvention- how easy it is to fool the system. This becomes veryimportant as the value of information grows rapidly. It gives an opportunity to be ready to two kinds of attacks: 1) Privacy attack when the attacker access to the data to which he is not authorized, and 2) Subversive attack when the attacker receives an opportunity to manipulate the system. The list of these factors was defined by A.K Joiner. Bole and S. Pankanti in their book ―Biometrics. Personal Identification in Network Society‖ which was published in 1999. (A Century of Biometrics, cited21.02.2012) Students of the George Washington University questioned people about their attitude towards biometric technologies and different methods of it. Noteworthy, that more than half of all people that took part in questioning ( 77%) considered biometric to be rather useful tool for authentication of identity.16%told that they liked some of the advantages that biometrics offers. And only 7% were against of biometrics. Concerning the methods of biometric, the favorite was fingerprint recognition, the second place- iris recognition. The following picture shows the preferences of common people in choosing the
  • 12. 4 methods of biometrics. Here is the table of advantages and disadvantages of biometrics No Advantages Disadvantages 1 Increase security Security 2 Cannot be copied Adaptability to rate of change 3 Can not be shared Scalability Picture 1.1 Preferences of common people in choosing the methods of biometrics
  • 13. 5 4 Convenience Miss use 5 Auditable trial Regulation of use 6 Accuracy Accuracy 7 Cannot be lost Financial cost 8 Minimize paper work Privacy 9 Costs Time Security is considered to be the greatest advantage of biometrics, on the second position is accuracy. The greatest disadvantages of biometrics are invasion of privacy and costs of implementation. Thesecondtwopictures will showus whatpeoplereally appreciatein biometricsand What disadvantages they consider to becritical. Picture 1.2 Appreciations of aanages
  • 14. 6 1.4 Indicators of biometric systems Different biometric systems differ according to their indicators: 1) Through-put capacity: characterize bythe time that is necessaryto serve one user. It depends on condition of work (whether we do authentication or identification). Identification will take more timethanauthentication as the system needs to compare all examples from database. In condition of authentication user should type personal code and the system will compare it with only one example. 2) Price: one of the most important factors. 3) Reliability of identification: there are two probabilities: a) probability of ―False Reject Rate‖ when the system does not recognize its user and b) ―False Accept Rate ―when the system recognizes the wrong person as its user. The mistake of ―false accept‖ is more dangerous from the security point of view that the ―false reject‖ , but the mistake of ―false reject‖ makes the system uncomfortable to use as it do not recognize the user from the first time. These two probabilities are connected with each other, and the attempt to minimize one of them increases the second one. That is why in practice the system should come to compromise. This field is the most difficult in biometrics as the task of the system is to recognize less wrong people and to reject less right users. 4) Simplicity and convenience in use: these indicators determine the consumer characteristic of biometric system. The most popular questions: How easy is it to install this system? Does the system require the active actions of the user or is the receiving of characteristics too difficult? Picture 1.3 the critical disadvantages
  • 15. 7 Doesthesystemrequireadditional training? 5) Degree of psychological comfort: shows how different systems and methods can generate negative reaction of the user, fear ordoubt. 6) Ability to play tricks with the system: ability to use different ―duplicates‖ such as casts, tape recording, etc. The most vulnerable systems consider being: systems of voice recognition and facerecognition 7) Method of collation: decide if the user needs to put his finger into the collation, or it will be enough just to say a special phrase or to have a look to the camera. There are two ways of collation: distant and contact. Technology of distant collation allows to increase the through-put capacityandtoavoidregular cleaning of collation. 8) Accuracy of authentication: differs from the systems which use passwords. 9) Productivity:dependsonsuchfactorsasaccuracy,price,integrationand comfort of use. 10) Expenditures: for many applications,such as registration in personal computer or network, the additional expenditures for realization of biometric technologies are very important. Some applications do not allow large equipment, stimulating minimization of data units. Nowadays a lot of powerful and cheap data units appear and we can use biometrics in new applications for identification and this, in its turn, makes itcheaper. 11) Integration: integration of several biometric systems in to one device improves characteristics of the systems.Authentication is not useful when the system cannot guarantee that the user gives necessary characteristics. 12) Confidentiality: Raises the question: Where her biometric data will be used for spying and integrationtoprivatelife. Thatiswhythereisanagreementbetween the produces that decide.
  • 16. 8 2. BIOMETRICS TECHNOLOGY 2.1Fingerprint Fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint verification. Some emulate the traditional police method of matching minutiae; others use straight pattern-matching devices; and still others are a bit more unique, including things like patterns and ultrasonic. Some verification approaches can detect when a live finger is presented; some cannot. A greater variety of fingerprint devices is available than for any other biometric. As the prices of these devices and processing costs fall, using fingerprints for user verification is gaining acceptance despite the common — criminal stigma. Fingerprint verification may be a good choice for in-house systems, where you can give users adequate explanation and training, and where the system operates in a controlled environment. It is not surprising that the workstation access application area seems to be based almost exclusively on fingerprints, due to the relatively low cost, small size, and ease of integration of fingerprint authentication devices. • "Fingerprint authentication" describes the process of obtaining a digital representation of a fingerprint and comparing it to a stored digital version of a fingerprint. • Fingerprints have long been recognized as a primary and accurate identification method. • Electronic fingerprint scanners capture digital "pictures" of fingerprints, either based on light reflections of the finger's ridges and valleys, or the electrical properties of the finger's ridges and valleys. • These pictures are then processed into digital templates that contain the unique extracted features of a finger. Uses the ridge endings and bifurcation's on a person’s finger to plot points known as Minutiae. The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger. These digital fingerprint templates can be stored in databases and used in place of traditional passwords for secure access. • Instead of typing a password, users place a finger on an electronic scanner. The scanner, or reader, compares the live fingerprint to the fingerprint template stored in a database to determine the identity and validity of the person requesting access.
  • 17. 9 Despite the common — criminal stigma. Fingerprint verification may be a good choice for in- house systems, where you can give users adequate explanation and training, and where the system operates in a controlled environment. It is not surprising that the workstation access application area seems to be based almost exclusively on fingerprints, due to the relatively low cost, small size, and ease of integration of fingerprint authentication devices. 2.1.1 MATCHING APPROACH: Two basic classes of matching techniques:  Image techniques Use both optical and numerical image correlation techniques  Feature techniques Extracts features and develop representations from these features  Combining the above two techniques: Hybrid techniques ,with improved accuracy 2.1.2 ADVANTAGES AND DISADVANTAGES: Advantages:  Very high accuracy.  Is the most economical biometric PC user authentication technique.  it is one of the most developed biometrics  Easy to use.  Small storage space required for the biometric template, reducing the size of the database memory required  It is standardized. Disadvantages:  For some people it is very intrusive, because is still related to criminal identification.  It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the Figure 1.4 fingerprint
  • 18. 10 age (is not appropriate with children, because the size of their fingerprint changes quickly).  Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required.  2.2 Hand Geometry Hand Geometry involves analyzing and measuring the shape of the hand. This biometric offer a good balances of performance characteristics and is relatively easy to use. It might be suitable where there are more users or where users access the system infrequently and are perhaps less disciplined in their approach to the system. Accuracy can be very high if desired and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording, where they have proved extremely popular. Ease of integration into other systems and processes, coupled with ease of use, and makes hand geometry an obvious first step for many biometric projects. ADVANTAGES AND DISADVANTAGES Advantages:  Though it requires special hardware to use, it can be easily integrated into other devices or systems.  It has no public attitude problems as it is associated most commonly with authorized access.  The amount of data required to uniquely identify a user in a system is the smallest by far, allowing it to be used with Smartcards easily. Figure 1.5 Hand Geometry
  • 19. 11 Disadvantages: • Very expensive • Considerable size. • It is not valid for arthritic person, since they cannot put the hand on the scanner properly. 2.3 Iris Iris based biometric, on the other hand, involves analyzing features found in the colored ring of tissue that surrounds the pupil. Iris scanning, undoubtedly the less intrusive of the eye related biometrics, uses a fairly conventional camera element and requires no close contact between the user and the reader. In addition, it has the potential for higher than average template matching performance. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode. Ease of use and system integration have not traditionally been strong points with iris scanning devices, but you can expect improvements in these areas as new products emerge. 5. Retina based biometric involves analyzing the layer of blood vessels situated at the back of the eye. An established technology, this technique involves using a low- intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient if you wear glasses or are concerned about having close contact with the reading device. For these reasons, retinal scanning is not warmly Figure 1.6 Iris
  • 20. 12 accepted by all users, even though the technology itself can work well. Figure 1.7 Iris segmentation
  • 21. 13 Figure 1.8 Boundary Detection Figure 1.9 Iris polar mapping
  • 23. 15 ADVANTAGES AND DISADVANTAGES Advantages: • Very high accuracy. • Verification time is generally less than 5 seconds. • The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being. Disadvantages: • Intrusive. • A lot of memory for the data to be stored. • Very expensive 2.4 Signature Signature verification analyzes the way a user signs her name. Signing features such as speed, velocity, and pressure are as important as the finished signature’s static shape. Signature verification enjoys a synergy with existing processes that other biometrics do not. People are used to signatures as a means of transaction-related identity verification, and most would see nothing unusual in extending this to encompass biometrics. Signature verification devices are reasonably accurate in operation and obviously lend themselves to applications where a signature is an accepted identifier. Surprisingly, relatively few significant signature applications have emerged compared with other biometric methodologies. But if your application fits, it is a technology worth considering. Figure 2.1 Signatures
  • 24. 16 ADVANTAGES AND DISADVANTAGES Advantages:  Though it requires special hardware to use, it can be easily integrated into other devices or systems.  It has no public attitude problems as it is associated most commonly with authorized access.  The amount of data required to uniquely identify a user in a system is the smallest by far, allowing it to be used with Smartcards easily. Disadvantages: • Very expensive • Considerable size. • It is not valid for arthritic person, since they cannot put the hand on the scanner properly. 2.5 Voice Authentication Voice authentication is not based on voice recognition but on voice to- print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth, because it requires no new hardware — most PCs already contain a microphone. However, poor quality and ambient noise can affect verification. In addition, the enrollment procedure has often been more complicated than with other biometrics, leading to the perception that voice verification is not user friendly. Therefore, voice authentication software needs improvement. One day, voice may become an additive technology to finger-scan technology. Because many people see finger scanning as a higher authentication form, voice biometrics will most likely be relegated to replacing or enhancing PINs, passwords, or account names. ADVANTAGES AND DISADVANTAGES Advantages: Figure 2.2 Voice Authentications
  • 25. 17 • Non intrusive. High social acceptability. • Verification time is about five seconds. Disadvantages: • A person’s voice can be easily recorded and used for unauthorized PC or network. • Low accuracy. • An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible. 2.6 Fingerprint Sensing Voice authentication is not based on voice recognition but on voice to- print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth, because it requires no new hardware — most PCs already contain a microphone. However, poor quality and ambient noise can affect verification. In addition, the enrollment procedure has often been more complicated than with other biometrics, leading to the perception that voice verification is not user friendly. Therefore, voice authentication software needs improvement. One day, voice may become an additive technology to finger-scan technology. Because many people see finger scanning as a higher authentication form, voice biometrics will most likely be relegated to replacing or enhancing PINs, passwords, or account names. There are three families of electronic fingerprint sensors based on the sensing technology • Solid-state or optical sensors (left part of Fig.2.3): These consist of an array of pixels, each pixel being a sensor itself. Users place the finger on the surface of the silicon, and four techniques are typically used to convert the ridge/valley information into an electrical signal: capacitive, thermal, electric field and piezoelectric. Since solid-state sensors do not use optical components, their size is considerably smaller and can be easily embedded. On the other hand, silicon sensors are expensive, so the sensing area of solid- state sensors is typically small. Figure 2.3 Fingerprint sensing
  • 26. 18 • Capacitive sensor (right part of Fig.2.3): The finger touches a glass prism and the prism is illuminated with diffused light. The light is reflected at the valleys and absorbed at the ridges. The reflected light is focused onto a CCD or CMOS sensor. Optical fingerprint sensors provide good image quality and large sensing area but they cannot be miniaturized because as the distance between the prism and the image sensor is reduced, more optical distortion is introduced in the acquired image. 2.7 Ultrasound Acoustic signals are sent, capturing the echo signals that are reflected at the fingerprint surface. Acoustic signals are able to cross dirt and oil that may be present in the finger, thus giving good quality images. On the other hand, ultrasound scanners are large and expensive, and take some seconds to acquire an image. A new generation of touch less live scan devices that generate a 3D representation of fingerprints is appearing [22]. Several images of the finger are acquired from different views using a multi camera system, and a contact-free 3D representation of the fingerprint is constructed. This new sensing technology overcomes some of the problems that intrinsically appear in contact-based sensors such as improper finger placement, skin deformation, sensor noise or dirt. 2.8 Palm print Palm print refers to an image required of the palm region of the hand. As a method of biometrics palm print is often mentioned with such methods as fingerprints and iris recognition. Palm print is also distinctive and can easily be captured with low resolution devices. The devices are not expensive. They are similar to those which are used for taking fingerprints but their size is bigger and this makes the limitation of use in mobile devices. Palm print is suitable for everyone and besides it has one big plus: it does not require personal information. The palm of each person consists of principle lines, wrinkles secondary lines and ridges. Palm also contains such information as texture, indents and marks which are used during the comparison of one palm with another. Classification of palm prints is based on the different principle lines and number of intersection. ThisclassificationwasofferedbyX.Wu,D.Zhang,K.WanfgandB.Huang in their book ―Palm print classification using principle lines‖. According to this classification there are 6 categories of palm prints:
  • 27. 19 Category 1 Category 2 Category 3 Category 4 Category 5 Category 6 Figure 2.4 six categories of palm print
  • 28. 20 The category 5 is the most widespread. This category is further divided into 5 subcategories: The process of taking palm print can be described in the following way: 1) The process starts when the palm print capture device captures the image of the palm Thesystem classifies theimageusing thecategoryof6patterns.Heretherecan be 2 variants of the Process. First, the palm print can belong to the categories 1, 2,3,4,6. In this case the system just saves/compares theimage inthedatabase. If the image belongs to the category5, 2) The system continues the process of classification using subcategories. After the process ends and the category and. subcategory is given the system saves/compares the image. (Palm print Classification, cited 28.03.2012) Palm printing has its own advantages comparing with other methods of biometrics. Palm print is hardly affected by age (theproblem of age is the main problem for face recognition). Palm prints contain more information and can use low resolution devices (in comparison with Figure 2.5. Division of the category 5
  • 29. 21 fingerprinting). Palm printing cannot make harm to the health of people, and many people prefer palm printingtoiris recognition based on this very reason. Palm printing is a rapidly developed method of biometrics. One of the variants of palm printing is the recognition based on the veins of palm. Infra-red camera makes the image of inner or external side of the hand. Hemoglobin absorbs infra-red light and veins can be seen as black lines. This method is contactless and reliable. The main minus of this method is that there should be no light near the scanner. 2.9 Facial Recognition System: A facial recognition system is a computer-driven application for automatically identifying a person from a digital image. It does that by comparing selected facial features in the live image and a facial database. It is typically used for security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Popular recognition algorithms include eigenface, fisherface, the Hidden Markov model, and the neuronal motivated Dynamic Link Matching. A newly emerging trend, claimed to achieve previously unseen accuracies, is three- dimensional face recognition. Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. Figure 2.6 Facial Enroll and Recognition Stage
  • 31. 23 Figure 2.8 Selecting Face Region
  • 32. 24 Figure 2.9 Correlation output 2.9.1 THREE-DIMENSIONAL FACE RECOGNITION Figure 3.0 3D Face Matching
  • 33. 25 Three-dimensional face recognition (3D face recognition) is a modality of facial recognition methods in which the three-dimensional geometry of the human face is used. It has been shown that 3D face recognition methods can achieve significantly higher accuracy than their 2D counterparts, rivaling fingerprint recognition. 3D face recognition achieves better accuracy than its 2D counterpart by measuring geometry of rigid features on the face.[citation needed] This avoids such pitfalls of 2Dface recognition algorithms as change in lighting, different facial expressions, upend orientation. Another approach is to use the 3D model to improve accuracy of traditional image based recognition by transforming the head into a known view. The main technological limitation of 3D face recognition methods is the acquisition of3D images, which usually requires a range camera. This is also a reason why 3D face recognition methods have emerged significantly later (in the late 1980s) than 2Dmethods. Recently commercial solutions have implemented depth perception by projecting a grid onto the face and integrating video capture of it into a high resolution3D model. This allows for good recognition accuracy with low cost off-the-shelf components. Currently, 3D face recognition is still an open research field, vendors already offer commercial solutions. ADVANTAGES AND DISADVANTAGES Advantages:  Non intrusive  Cheap technology. Disadvantages  2D recognition is affected by changes in lighting, the person’s hair, the age, and if the person wear glasses.  Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include cameras as standard equipment.
  • 34. 26 2.1.1 DNA Fingerprint The chemical structure of everyone's DNA is the same. The only difference between people (or any animal) is the order of the base pairs. There are so many millions of base pairs in each person's DNA that every person has a different sequence. Using these sequences, every person could be identified solely by the sequence of their base pairs. However, because there are so many millions of base pairs, the task would be very time- consuming. Instead, scientists are able to use a shorter method, because of repeating patterns in DNA. These patterns do not, however, give an individual "fingerprint," but they are able to determine whether two DNA samples are from the same person, related people, or non- related people. Scientists use a small number of sequences of DNA that are known to vary among individuals a great deal, and analyze those to get a certain probability of match How is DNA fingerprint done? Every strand of DNA has pieces that contain genetic information which informs an organism’s development (axons) and pieces that, apparently, supply no relevant genetic informational (intones). Although the intones may seem useless, it has been found that they contain repeated sequences of base pairs. These sequences, called Variable Number Tandem Repeats (VNTRs), can contain anywhere from twenty to one hundred base pairs. Every human being has some VNTRs. To determine if a person has a particular VNTR, southern is performed, and then the Southern Blot is probed, through a hybridization reaction, with a radioactive version of the VNTR in question. The pattern which results from this process is what is often referred to as a DNA fingerprint. A given person's VNTRs come from the genetic information donated by her parents; he or she could have VNTRs inherited from his or her mother or father, or combination, but never a VNTR either of his or her parents do below are the VNTR patterns for Mrs. A [blue], Mr. A [yellow], four children’s biological daughter), D2 (Mr. A's step-daughter, child of Mrs. A and her former husband [red]), S1 (the A' biological son), and S2 (the A' adopted son, not biologically related [his parents are light and dark green]).
  • 35. 27 Figure 3.1 DNA Fingerprinting Because VNTR patterns are inherited genetically, a given person's VNTR pattern is more or less unique. The more VNTR probes used to analyze a person's VNTR pattern, the more distinctive and individualized that pattern, or DNA fingerprint, will be. ADVANTAGES AND DISADVANTAGES Advantages:  Very high accuracy.  It impossible that the system made mistakes.  It is standardized. Disadvantages:  Extremely intrusive.  Very expensive.
  • 36. 28 3. Biometric system components and process 3.1 Components: Three major components are usually present in a biometric system:  A mechanism to scan and capture a digital or analog image of a living person’s biometric characteristic.  Software for storing, processing and comparing the image.  An interface with the applications system that will use the result to confirm an individual’s identity. 3.2 Process: Two different stages are involved in the biometric system process – 1) Enrollment, 2) Verification. 3.2.1 Enrollment: As shown in Figure 2.1, the biometric image of the individual is captured during the enrollment process (e.g., using a sensor for fingerprint, microphone for voice verification, camera for face recognition, scanner for eye scan). The unique characteristics are then extracted from the biometric image to create the user’s biometric template. This biometric template is stored in a database or on a machine-readable ID card for later use during an Identity verification process. Figure 3.2 Enrollment Process
  • 37. 29 3.2.2 Verification: Figure 2.2 illustrates the identity verification process. The biometric image is again captured. The unique characteristics are extracted from the biometric image to create the users ―live‖ biometric template. This new template is then compared with the template previously stored and a numeric matching score is generated, based on the percentage of duplication between the live and stored template. System designers determine the threshold value for this identity verification score based upon the security requirements of the system. Figure 2.3 Verification Process 3.3 Types of Biometrics system There are two kinds of Biometric System  Recognition Systems  Identifying a person among the whole group of users enrolled in the system.  It must be an online system.  Typical applications : Forensics
  • 38. 30 Authentication (1-to-1 comparison) confirms that the credential belongs to the individual presenting it. In this case, the device that performs the authentication must have access only to the individual’s enrolled biometric template, which may be stored locally or centrally. 3.4 Biometrics Accuracy A key factor in the selection of the appropriate biometric technology is its accuracy. Biometric accuracy is the system’s ability of separating legitimate matches from imposters. When the live biometric template is compared to the stored biometric template, a matching score is used to confirm or deny the identity of the user. System designers set this numeric score to accommodate the desired level of accuracy for the system, as measured by the False Acceptance Rate (FAR) and False Rejection Rate (FRR). • False Rejection Rate (FRR) refers to the statistical probability that the biometric system is not able to verify the legitimate claimed identity of an enrolled person, or fails to identify an enrolled person. • False Acceptance Rate (FAR) refers to the statistical probability of False Acceptance or incorrect verification. In the most common context, both False Rejection and False Acceptance represent a security hazard. • Equal-Error Rate When the decision threshold is adjusted so that the false-acceptance rate equal the false-rejection rate. Figure 3.4 Error Rate
  • 39. 31 If a mismatching pair of fingerprints is accepted as a match, it is called a false accept. On the other hand, if a matching pair of fingerprints is rejected by the system, it is called a false reject. The error rates are a function of the threshold as shown in Figure 2.3. Often the interplay between the two errors is presented by plotting FAR against FRR with the decision threshold as the free variable. This plot is called the ROC (Receiver Operating Characteristic) curve. The two errors are complementary in the sense that if one makes an effort to lower one of the errors by varying the threshold, the other error rate automatically increases. In a biometric authentication system, the relative false accept and false reject rates can be set by choosing a particular operating point (i.e., a detection threshold). Very low (close to zero) error rates for both errors (FAR and FRR) at the same time are not possible. By setting high threshold, the FAR error can be close to zero, and similarly by setting a significantly low threshold, the FRR rate can be close to zero. A meaningful operating point for the threshold is decided based on the application requirements, and the FAR versus FRR error rates at that Operating point may be quite different. To provide high security, biometric systems operate at a low FAR instead of the commonly recommended equal error rate (EER) operating point where FAR=FRR.
  • 40. 32 4. BIOMETRIC DEVICES 4.1 Iris Scanner Iris cameras perform recognition detection of a person's identity by mathematical analysis of the random patterns that are visible within the iris of an eye from some distance. It combines computer vision, pattern recognition, statistical inference and optics. Of all the biometric devices and scanners available today, it is generally conceded that iris recognition is the most accurate. The automated method of iris recognition is relatively young, existing in patent since only 1994 Figure 3.5 Iris Scanner Iris cameras, in general, take a digital photo of the iris pattern and recreating an encrypted digital template of that pattern. That encrypted template cannot be re-engineered or reproduced in any sort of visual image. Iris recognition therefore affords the highest level defiance against identity theft, the most rapidly growing crime. The imaging process involves no lasers or bright lights and authentication is essentially non- contact. Today's commercial iris cameras use infrared light to illuminate the iris without causing harm or discomfort to the subject. The iris is the colored ring around the pupil of every human being and like a snowflake, no two
  • 41. 33 are alike. Each is unique in their own way, exhibiting a distinctive pattern that forms Randomly in uterus. The iris is a muscle that regulates the size of the pupil, controlling the amount of light that enters the eye. 4.2 Fingerprint scanner Figure 3.6 Fingerprint Scanner A fingerprint scanner is an electronic device used to capture a digital image of the fingerprint pattern. This scan is digitally processed to create a biometric template which is stored and used for matching. 4.3 Face Camera Face detection is used in biometrics, often as a part of (or together with) a facial recognition system. It is also used in video surveillance, human computer interface and image database management. A face camera is a webcam with 2 Mix or above which can take a clear crisp photograph of the face.
  • 42. 34 Figure 3.7 Face Camera Some recent digital cameras use face detection for autofocus. Also, face detection is useful for selecting regions of interest in photo slideshows that use a pan-and-scale Ken Burns effect. That is, the content of a given part of an image is transformed into features, after which a classifier trained on example faces decides whether that particular region of the image is a face, or not. A face model can contain the appearance, shape, and motion of faces. There are several shapes of faces. Some common ones are oval, rectangle, round, square, heart, and triangle. Motions include, but not limited to, blinking, raised eyebrows, flared nostrils, wrinkled forehead, and opened mouth. 4.4 Hand Scanner Figure 3.8 Hand Scanner
  • 43. 35 4.5 Retina Scanner Figure 3.9 Retina Scan 4.6 Multi- Biometrics Figure 4.0 Multi Biometrics
  • 44. 36 4.7 Retinal Scanner The human retina is a thin tissue made up of neural cells that is located in the posterior portion of the eye. Because of the complex structure of the capillaries that supply the retina with blood, each person's retina is unique, making retinal scans an emerging authentication method.[1] The network of blood vessels in the retina is not entirely genetically determined and thus even identical twins do not share a similar pattern. Although retinal patterns may be altered in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. Due to its unique and unchanging nature, the retina appears to be the most precise and reliable biometric, aside from DNA.[2] The National Center for State Courts estimate that retinal scanning has an error rate of one in ten million.[3] A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels absorb light more readily than the surrounding tissue, the amount of reflection varies during the scan. The pattern of variations is digitized and stored in a database Figur4.1 Retinal scanner
  • 45. 37 5. APPLICATIONS In the last years has considerably increased the area of application of biometrics and it's expected that in the near future, we will use biometry many times in our daily activities such as getting in the car, opening the door of our house, accessing to our bank account, shopping by internet, accessing to our PDA, mobile phone, laptops, etc. Depending on where the biometrics is deployed, the applications can be categorized in the following five main groups: forensic, government, commercial, health-care and traveling and immigration. However, some applications are common to these groups such as physical access, PC/network access, time and attendance, etc. 5.1 Forensic The use of biometric in the law enforcement and forensic is more known and from long date, it is used mainly for identification of criminals. In particular, the AFIS (automatic fingerprint identification system) has been used for this purpose. Lately the facial-scan technology (mug shots) is being also used for identification of suspects. Another possible application is the verification of persons of home arrest; a voice-scan is an attractive solution for this problem. The typical application is: Identification of criminals- collecting the evidence in the scene of crime (e.g., fingerprints) it is possible to compare with data of suspects or make a search in the database of criminals. Surveillance --using cameras one can monitor the very busy places such as stadiums, airports, meetings, etc. Looking in the crowds for suspect, based on the face recognition biometric, using a images (e.g., mug shots) database of wanted persons or criminals. Since the events of September 11, 2001, the interest in biometric surveillance has increased dramatically, especially for air travel applications. Currently there are many cameras monitoring crowds at airports for detecting wanted terrorists. Corrections -This refers to the treatment of offenders (criminals) through a system of
  • 46. 38 penal incarceration, rehabilitation, probation, and parole, or the administrative system by which these are effectuated. Is this cases a biometric system can avoid the possibility of accidentally releasing the wrong prisoner, or to ensure that people leaving the facilities are really visitors and not inmates. Probation and home arrest - biometric can also be used for post-release programs (conditional released) to ensure the fulfillment of the probation, parole and home detention terms. 5.2 Government There are many application of the biometry in the government sector. An AFIS is the primary system used for locating duplicates enrolls in benefits systems, electronic voting for local or national elections, driver's license emission, etc. The typical application is: National Identification Cards - the idea is to include digital biometric information in the national identification card. This is the most ambitious biometric program, since the identification must be performed in a large-scale database, containing hundreds of millions samples, corresponding to the whole population of one country. This kind of cards can be used for multiple purposes such as controlling the collection of benefits, avoiding duplicates of voter registration and drivers license emission. All this applications are primarily based on finger-scan and AFIS technology; however it is possible that facial-scan and iris-scan technology could be used in the future. Voter ID and Elections - while the biometric national ID card is still in project, in many countries are already used the biometry for the control of voting and voter registration for the national or regional elections. During the registration of voter, the biometric data is captured and stored in the card and in the database for the later use during the voting. The purpose is to prevent the duplicate registration and voting. Driver's licenses - In many countries the driver license is also used as identification document, therefore it is important to prevent the duplicate emission of the driver license under different name. With the use of biometric this problem can be eliminated. However
  • 47. 39 it is important that the data must be shared between states, because in some country such as United States, the license is controlled at the states as opposed to the federal level. Benefits Distribution (social service) - the use of biometry in benefits distribution prevents fraud and abuse of the government benefits programs. Ensuring that the legitimate recipients have a quick and convenient access to the benefits such as unemployment, health care and social security benefits. Employee authentication - The government use of biometric for PC, network, and data access is also important for security of building and protection of information. Below are more detailed this kind of applications also used in commercial sector. Military programs - the military has long been interested in biometrics and the technology has enjoyed extensive support from the national security community. 5.3 Commercial Banking and financial services represent enormous growth areas for biometric technology, with many deployments currently functioning and pilot project announced frequently. Some applications in this sector are: Account access - The use of biometric for the access to the account in the bank allows keeping definitive and auditable records of account access by employees and customers. Using biometry the the customers can access accounts and employees can log into their workstations. o ATMs - the use of biometric in the ATM transaction allows more security, o Expanded Service Kiosks - A more receptive market for biometrics may be special purpose kiosks, using biometric verification to allow a greater variety of financial transaction than are currently available though standard ATMs. o Online banking - Internet based account access is already widely used in many places, the inclusion of biometric will make more secure this type of transactions from home. Currently, there are many pilot programs using biometric in home banking. o Telephony transaction - Voice-scan biometric can be used to make more secure the telephone-based transactions. In this type of application, when the costumer calls to make
  • 48. 40 a transaction, a biometric system will authenticate the customer's identity based on his or her voice with no need of any additional device. o PC/Network access - The use of biometric log-in to local PCs or remotely through network increase the security of the overall system keeping more protected the valuable information. o Physical access - the biometric is widely used for controlling the access to building or restricted areas. o E-commerce - biometric e-commerce is the use of biometrics to verify of identity of the individual conduction remote transaction for goods or services o Time and attendance monitoring - In this sector the biometrics is used for controlling the presence of the individuals in a determine area. For example for controlling the time sheet of the employees or the presence of students at the classroom 5.4 Health Care The applications in this sector include the use of biometrics to identify or verify the identity of individuals interacting with a health-care entity or acting in the capacity of health-care employee or professional. The main aim of biometrics is to prevent fraud, protect the patient information and control the smell of pharmaceutical products. Some typical application is: o PC/Network Access - the biometrics are used to control a secure access of the employees to the hospital network, primarily, in order to protect the patient information, o Access to personal information - Using biometrics, the medical patient information may be stored on smart card or secure networks; this will enable the access of the patients to their personal information. Patient identification - In case of emergency, when a patient does not have identification document and is unable to communicate, biometric identification may be a good alternative to identify.
  • 49. 41 5.5 Travel and Immigration The application in this sector includes the use of biometrics to identify or verify the identity of individual interacting during the course of travel, with a travel or immigration entity or acting in the capacity of travel or immigration employee. Typical application is: o Air travel - In many airport are already used a biometric system in order to reduce the inspection processing time for authorized travelers. o Border crossing - The use of biometrics to control the travelers crossing the national or state border is increasing, especially in regions with high volume of travelers or illegal immigrants. o Employee access - Several airport use biometric to control the physical access of employees to secure areas. o Passports - Some country already issues passports with biometric information on a barcode or smart chips. The use of biometrics prevents the emission of multiple passports for the same person and also facilitates the identification at the airports and border controls.
  • 50. 42 CONCLUSION: Biometrics is a means of verifying personal identity by measuring and analyzing unique physical or behavioral characteristics like fingerprints or voice patterns. The conclusion of this whole paper is that the card-less payment system should be replaced and there must be more easier, reliable, secure, cash free and tension free payment system, i-e biometric payment system in which no body have to take with dozens of cards for shopping, travelling, pass in office, university or bank as door lock. And the International Journal of Advanced Science and Technology Vol. 4, March, 2009 36 must have some secure codes to access as authorization and there is also one another disadvantage is that there may be stolen of cards or it can be losses at any time without any care. So to consider all these kinds of problems and disadvantages of card payment system the fingerprints payment system is suggested to be implemented because it is easier, reliable, feasible, secure and easily authorized to everyone. And there is no any worry that anyone can stolen my finger are can be loosed anywhere so other body can use it. In fingerprint payment system customer has to place his fingers on the finger scanner and then scanner will recognize the account which belongs to that person and charge the bill. So it is easy for both customer and seller because there is no need to scratch the credit card and then enter code if code is forgot or if some time card cannot read and many more problems can occur in card payment system. And in biometric payment system no need to carry cash with them. Biometric payment system may be like fingerprints, IRIS, face recognition and blood reading or skin reading and it may be installed at any store, university, library, hostel, bank, office, home door lock, internet online shopping and many kinds where card system is installed. So in this paper we explain the biometrics with detailed term, how fingerprint system works, fingerprints’ types and fingerprint recognition through circular sampling.
  • 51. 43 Reference:- [1]https://www.seminarsonly.com/computer%20science/biometrics-and-fingerprint-payment- technology.php [2] https://recfaces.com/articles/what-is-biometrics [3] www.theseus.fi [4] www.academia.edu [5] Cybercrime: protecting against the growing threat Global Economic Crime Survey – PWC Global Economic. [ONLINE]. Available at: http://www.pwc.com/en_GX/gx/ economic-crime- survey/assets /GECS_GLOBAL_REPORT. Pdf. [6] Biometric Digest -http://biometrics.cse.msu.edu.