ZHENGZHOU UNIVERSITY
SL ID Name
1 Orin Akon Pinky
2 Noushin Limu
3 Shormily Shorker
4 Sonia Akter
2
BIOMETRICS
Orin Akon Pinky, Noushin Limu, Shormily Shorker, Sonia Akter
Department of Software Engineer
ZHENGZHOU UNIVERSITY
Abstract— Biometrics is the most secure and suitable
authentication tool. It is the automated method of recognizing
a person based on a physiological or behavioral characteristic.
Biometric authentication is used in computer Science for
verifying human identity. This research work has applied for
the Biometrics identification System. It is used for security
purposes. Biometrics system used for individual identification
to scan finger, hand recognition, face recognition, iris
scanning, DNA, Biometrics identification is used for biometric
attendance and it used to identify the criminals and decrease
the crime rates and terrorism.
Keywords- (Biometrics, Security, Benefits, Limitation)
I. INTRODUCTION
Biometric is used for unique Identification of a human.
Biometric recognition, or simply biometrics, is the science
of establishing the identity of a person based on physical
or behavioral attributes. It is a rapidly evolving field with
applications ranging from securely accessing one’s
computer to gaining entry into a country. While the
deployment of large-scale biometric systems in both
commercial and government applications has increased
the public awareness of this technology. It is an
interdisciplinary field of mathematics, statistics, computer
Science, molecular biology and genetics. It is automated
methods of recognizing a human. It is characterize as
physiological and behavioral Biometrics identification.
Nowadays, Biometrics identification used in Aadhar card,
apps lock, mobile security and bank account verification
and in future biometric identification used for pan card
and driving license.
What is Biometrics?
Biometrics is the technical term for body measurements and
calculation. It refers to metrics related to human
characteristics. Biometrics authentication is used in computer
science as a form of identification and access control. It is also
used to identify individuals in groups that are under
surveillance.
Biometrics are physical or behavioral human characteristics to
that can be used digitally identify a person to grant access to
systems, devices or data.
II. TYPES OF BIOMETRICS
2.1 Physical Biometrics-
Physical Biometrics is used for either identification or
verification of a person in the base of fingerprint, face
recognition, hand recognition, DNA pattern, retinal scanning
iris recognition,
2.2 Behavioral Biometrics-
Behavioral used for verification of a person in the base of
speech recognition, signature and keystroke and voice.
A. Face Recognition
A face recognition system is a technology capable of
identifying or verifying a person from a digital image or a
video frame from a video source. it compares the information
with a database of known faces to find a match. face
recognition can help verify personal identity, but also raises
privacy issues.
Facial recognition is a way of recognizing a human face
through technology. A facial recognition system uses
biometrics to map facial features from a photograph or video.
It compares the information with a database of known faces to
find a match.
B. Fingerprint Recognition
A fingerprint is entirely unique to a certain person. A
biometric fingerprint reader records the impressions left by the
patterns of the ridges of the finger pads of a human being.
Fingerprint recognition allows a person to be verified or
identified through the analysis and comparison of his or her
finger dermal ridges. Fingerprint recognition was one of the
first techniques used for automatically identifying people and
today is still one of the most popular and effective biometric
techniques. Fingerprint identification is based primarily on the
minutiae, or the location and direction of the ridge endings and
bifurcations (splits) along a ridge path. A variety of sensor
types — optical, capacitive, ultrasound, and thermal — are
used for collecting the digital image of a fingerprint surface.
C. Hand Scanning
This biometric approach uses the geometric form of the hand
for confirming an individual's identity. The attainment of the
hand-scan is a fast and simple process. This biometric
3
approach uses the geometric form of the hand for confirming
an individual's identity. ... The attainment of the hand-scan is a
fast and simple process. The hand-scan device can process the
3-D images in 5 seconds or less and the hand verification
usually takes less than 1 second.
D. Iris Scanning
Iris SCANNING is an automated method of biometric
identification that uses mathematical pattern-recognition
techniques on video images of one or both of the irises of an
individual's eyes, whose complex patterns are unique, stable,
and can be seen from some distance. Biometric iris recognition
scanners work by illuminating the iris with invisible infrared
light to pick up unique patterns that are not visible to the
naked eye. Next, the pattern of the eye's lines and colors are
analyzed to extract a bit pattern that encodes the information
in the iris. Eyes are the window to your soul and your identity.
... DNA determines the color and structure of the iris, but its
random pits, furrows, swirls, and rifts occur during fetal
development, which makes every iris unique (even your two
irises don't match each other).
E. DNA
DNA is an increasingly useful biometric, and is encountered
most often in forensics and healthcare. A feature of DNA
identification, unique among the biometrics, is the ability to
infer familial relationships via DNA testing. The biometrics
refers to technologies that measure and analyze human body
characteristics, such as DNA, fingerprints, eye retinas and
irises, voice patterns, facial patterns and hand measurements,
for authentication purposes. ... That's why DNA Biometric is
essential to make for best recognition.
F. Keystrokes
This keystroke behavior is used to recognize or verify the
identity of a person. It is the detailed timing information which
describes exactly when each key was pressed and when it was
released as a person is typing at a computer keyboard. An
authentication method that uses the rhythm of a person's
typing on the computer. The "dwell time" between pressing a
key down and letting it up, as well as the "flight times"
between one key down and the next key down and one key up
and the next key up, produce a rhythm unique to the
individual. Keystroke dynamics or typing dynamics refers to
the automated method of identifying or confirming the identity
of an individual based on the manner and the rhythm of typing
on a keyboard. Keystroke dynamics is a behavioral biometric,
this means that the biometric factor is 'something you do'.
G. Signature
An handwritten signature represents the name of a person
written by his/her own hand. Within the biometric framework,
signature is a behavioral characteristic which is used in
automatic user verification systems.
SIGNATURE BIOMETRIC It can be operated in two
different ways.
1.Static: In this mode, users write their signature on paper,
digitize it through an optical scanner or a camera, and the
biometric system recognizes the signature analyzing its shape.
2.Dynamic: In this mode, users write their signature in a
digitizing tablet, which acquires the signature in real time.
H. Voice Recognition
Voice Recognition applies analyzes of a person's voice to
verify their identity. It works by recording a voice sample
(“voiceprint”) of a customer. This is then paired with
customers' data. And so from then on, every time the customer
calls the business, they are authenticated by their voice alone,
and able to proceed with their request without the need for any
other security procedures. Common uses: Telephone and
internet transactions. IVR-based banking systems. Remote
access to websites, and networks.
III. BIOMETRIC APPLICATION
A. Biometric Security- Biometric security devices measure
unique characteristics of a person, such as voice pattern,
the iris or retina pattern of the eye, or fingerprint patterns.
With biometrics, it can be extremely difficult for someone
to break into a system. As with any data, biometric
information is only as secure as the system that protects it.
There is nothing inherent in raw biometric data that makes
it more secure. However, if it is stolen, it can be very
difficult to use. Biometrics are a way to measure a person's
physical characteristics to verify their identity. These can
include physiological traits, such as fingerprints and eyes,
or behavioral characteristics, such as the unique way you'd
complete a security-authentication puzzle.
4
B. Border ControlAirport- Border and port security
biometric systems are put in place to track and manage the
flow of humans. This includes national database
deployments, entrance and exit access control systems,
immigration technologies as well as e-Passports and smart
card systems.
C. Financial Biometrics- Financial service biometrics refers
to biometric systems used to aid in the flow of money. This
includes biometric payment cards, point-of-sale and
payments systems, transaction processing and other
payment technologies, as well as mobile wallet applications
and cash transfer systems. Banks and financial companies
have started adopting biometrics technology already,
ensuring customer transaction security and identification
verification. Many leading banks and financing companies
are testing methods like face recognition, iris scanning,
fingerprint scanning, and speech recognition.
D. Fingerprint & Biometric Lock- Fingerprint & biometric
lock solutions are stronger authentication methods than
keys, key cards and PINs for a simple reason. These locks
are perfect for keeping doors closed to all but those
authorized to use them. They’re what we are, not what we
have. While a key can be lost or stolen and used by an
unauthorized person, our fingerprint is something unique
that only we have. Fingerprint biometric locks are perfect
for keeping doors closed to all but those authorized to use
them.
E. Health Care Biometric- Healthcare biometrics refers to
biometric applications in doctors' offices, hospitals, or for
use in monitoring patients. This can include access control,
identification, workforce management or patient record
storage. Iris scans, fingerprint readers and facial
recognition are growing in use across healthcare settings
— and they're poised to offer even greater possibilities.
With just a touch or a glance, these biometric tools can
identify and authenticate patients and employees by
detecting unique biological information. Healthcare
biometrics, potentially, could reduce patient fraud in the
future. Biometric authentication - including facial and
fingerprint recognition - could shape the industry and
eliminate any possibilities of individuals attempting to
pose as other patients for access to treatments and
particular medication.
IV. BIOMETRIC BENEFITS
A. Accuracy- A general term used to describe how accurate a
biometric system performs. Biometric accuracy is based on
several verifying criteria including the identification rate,
error rate, false acceptance rate, false alarm rate, and
additional biometric system standards.
Biometrics validated systems are also more accurate since
they only have to match an individual's data against his or
her stored data in the database and do not need hundreds,
thousands or even if there are millions of comparisons like
the identifying systems.
B. Identification- Biometrics are a way to measure a person's
physical characteristics to verify their identity. The
advantages that biometrics provides are that the
information is distinctive for every person and it can
utilized as a technique for individual identification. The
top benefits of Biometric technology are authentication,
privacy or data discretion, authorization or access control,
data veracity, and non-repudiation.
C. Less processing time- Biometrics validated systems are
usually referred to as a one-to-one process and generally
takes less processing time compared to the other
identifying systems. This is because, in other recognizing
systems, the information is compared to all data already
stored in the database.
5
V. BIOMETRIC LIMITATION
A. Biometric spoofing- Biometrics is the technical term for
body measurements and calculations. It refers to metrics
Spoof attacks consist in submitting fake biometric traits to
biometric systems. it can be attacks at the user interface.
presentation of a fake biometric trait.
B. High cost- In every path biometrics has highly cost.
Border control/airport, Banking system, Face recognition,
Fingerprint and so on we have to bear a lot of cost in using
these. Significant investment needed in biometrics for
security. t’s no surprise that a more advanced security
system would require significant investments and costs to
implement. In a 2018 survey by Spiceworks, 67 percent of
IT professionals cite cost as” the biggest reason for not
adopting biometric authentication.” Transitioning to a
biometrics authentication wouldn’t be the only thing a
company would have to pay for, with 47% of the surveyed
stating a need to upgrade current systems in order to
support a shift to biometric authentication on their devices.
C. Machine error- There are several types of error rates to
consider in the practical selection of a biometric device.
Security professionals typically concentrate on preventing
an unauthorized individual from entering. However, if a
biometric device (or any other access control method) does
not consistently recognize and allow entry to authorized
people, it won’t remain on the door for very long. The real
job of security is as much to let only authorized people into
specific places as it is to keep the unauthorized people out.
Therefore, it is important to ensure that the biometric
device does a good job of recognizing the authorized users.
The reality is that biometric devices aren’t perfect, and all will
make some errors.
Biometric devices can make two kinds of errors; the false
accept, in which the device accepts an unauthorized person;
and the false reject, in which the device falsely rejects an
authorized person. Picking the right biometric device requires
careful analysis of which type of error will have the greater
impact on both security and everyday operations.
VI. RESULT
The Future with Biometrics Technology – Faster, Easier and
more Secure. With biometric technologies like fingerprint
scanning, facial and voice recognition, and even iris
recognition becoming popular in smartphones, authentication
can be made more secure and convenient.
VII. DISCUSSION
Biometric systems are used increasingly to recognize
individuals and regulate access to physical spaces,
information, services, and to other rights or benefits, including
the ability to cross international borders. The motivations for
using biometrics are diverse and often overlap. They include
improving the convenience and efficiency of routine access
transactions, reducing fraud, and enhancing public safety and
national security. Questions persist, however, about the
effectiveness of biometric systems as security or surveillance
mechanisms, their usability and manageability,
appropriateness in widely varying contexts, social impacts,
effects on privacy, and legal and policy implications.
VIII. ACKNOWLEDGEMENT
The authors are thankful to Yibo faculty of Department of
Software Engineering, Zhengzhou University for moral
encouragement and providing necessary facilities.
IX. CONCLUSION
Biometric is a very interesting and exciting field that has be
an emerging area with many opportunities for growth.
possibly in the near future, we will not have to remember
PIN’S and Password and keys in our bags or pockets will be
things of the past. Fingerprint biometrics provide a very robust
and mature choice for a biometric technology. As such, there
are many solutions on the market. This familiarity has allowed
attackers to study and try different types of attacks on
fingerprint readers.
X. REFERENCES
[1] http://wikipedia.org/wiki/Biometrics
[2] http://javatpoint.com/types-of-biometrics
[3] http://fingercheck.com/the-science-of-biometrics-a-timeline-of-
biometric-authentication
[4] http://javatpoint.com/history-of-biometrics
[5] http://usa.kaspersky.com/resource-center/definitions/biometrics
[6] http://csoonline.com/article/3339565/what-is-biometrics-and-
why-collecting-biometric-data-is-risky.html
[7] http://thalesgroup.com/en/markets/digital-identity-and-
security/government/inspired/biometrics

Biometrics Research/Thesis Paper

  • 1.
    ZHENGZHOU UNIVERSITY SL IDName 1 Orin Akon Pinky 2 Noushin Limu 3 Shormily Shorker 4 Sonia Akter
  • 2.
    2 BIOMETRICS Orin Akon Pinky,Noushin Limu, Shormily Shorker, Sonia Akter Department of Software Engineer ZHENGZHOU UNIVERSITY Abstract— Biometrics is the most secure and suitable authentication tool. It is the automated method of recognizing a person based on a physiological or behavioral characteristic. Biometric authentication is used in computer Science for verifying human identity. This research work has applied for the Biometrics identification System. It is used for security purposes. Biometrics system used for individual identification to scan finger, hand recognition, face recognition, iris scanning, DNA, Biometrics identification is used for biometric attendance and it used to identify the criminals and decrease the crime rates and terrorism. Keywords- (Biometrics, Security, Benefits, Limitation) I. INTRODUCTION Biometric is used for unique Identification of a human. Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one’s computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology. It is an interdisciplinary field of mathematics, statistics, computer Science, molecular biology and genetics. It is automated methods of recognizing a human. It is characterize as physiological and behavioral Biometrics identification. Nowadays, Biometrics identification used in Aadhar card, apps lock, mobile security and bank account verification and in future biometric identification used for pan card and driving license. What is Biometrics? Biometrics is the technical term for body measurements and calculation. It refers to metrics related to human characteristics. Biometrics authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometrics are physical or behavioral human characteristics to that can be used digitally identify a person to grant access to systems, devices or data. II. TYPES OF BIOMETRICS 2.1 Physical Biometrics- Physical Biometrics is used for either identification or verification of a person in the base of fingerprint, face recognition, hand recognition, DNA pattern, retinal scanning iris recognition, 2.2 Behavioral Biometrics- Behavioral used for verification of a person in the base of speech recognition, signature and keystroke and voice. A. Face Recognition A face recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source. it compares the information with a database of known faces to find a match. face recognition can help verify personal identity, but also raises privacy issues. Facial recognition is a way of recognizing a human face through technology. A facial recognition system uses biometrics to map facial features from a photograph or video. It compares the information with a database of known faces to find a match. B. Fingerprint Recognition A fingerprint is entirely unique to a certain person. A biometric fingerprint reader records the impressions left by the patterns of the ridges of the finger pads of a human being. Fingerprint recognition allows a person to be verified or identified through the analysis and comparison of his or her finger dermal ridges. Fingerprint recognition was one of the first techniques used for automatically identifying people and today is still one of the most popular and effective biometric techniques. Fingerprint identification is based primarily on the minutiae, or the location and direction of the ridge endings and bifurcations (splits) along a ridge path. A variety of sensor types — optical, capacitive, ultrasound, and thermal — are used for collecting the digital image of a fingerprint surface. C. Hand Scanning This biometric approach uses the geometric form of the hand for confirming an individual's identity. The attainment of the hand-scan is a fast and simple process. This biometric
  • 3.
    3 approach uses thegeometric form of the hand for confirming an individual's identity. ... The attainment of the hand-scan is a fast and simple process. The hand-scan device can process the 3-D images in 5 seconds or less and the hand verification usually takes less than 1 second. D. Iris Scanning Iris SCANNING is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. Biometric iris recognition scanners work by illuminating the iris with invisible infrared light to pick up unique patterns that are not visible to the naked eye. Next, the pattern of the eye's lines and colors are analyzed to extract a bit pattern that encodes the information in the iris. Eyes are the window to your soul and your identity. ... DNA determines the color and structure of the iris, but its random pits, furrows, swirls, and rifts occur during fetal development, which makes every iris unique (even your two irises don't match each other). E. DNA DNA is an increasingly useful biometric, and is encountered most often in forensics and healthcare. A feature of DNA identification, unique among the biometrics, is the ability to infer familial relationships via DNA testing. The biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. ... That's why DNA Biometric is essential to make for best recognition. F. Keystrokes This keystroke behavior is used to recognize or verify the identity of a person. It is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard. An authentication method that uses the rhythm of a person's typing on the computer. The "dwell time" between pressing a key down and letting it up, as well as the "flight times" between one key down and the next key down and one key up and the next key up, produce a rhythm unique to the individual. Keystroke dynamics or typing dynamics refers to the automated method of identifying or confirming the identity of an individual based on the manner and the rhythm of typing on a keyboard. Keystroke dynamics is a behavioral biometric, this means that the biometric factor is 'something you do'. G. Signature An handwritten signature represents the name of a person written by his/her own hand. Within the biometric framework, signature is a behavioral characteristic which is used in automatic user verification systems. SIGNATURE BIOMETRIC It can be operated in two different ways. 1.Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. 2.Dynamic: In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. H. Voice Recognition Voice Recognition applies analyzes of a person's voice to verify their identity. It works by recording a voice sample (“voiceprint”) of a customer. This is then paired with customers' data. And so from then on, every time the customer calls the business, they are authenticated by their voice alone, and able to proceed with their request without the need for any other security procedures. Common uses: Telephone and internet transactions. IVR-based banking systems. Remote access to websites, and networks. III. BIOMETRIC APPLICATION A. Biometric Security- Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system. As with any data, biometric information is only as secure as the system that protects it. There is nothing inherent in raw biometric data that makes it more secure. However, if it is stolen, it can be very difficult to use. Biometrics are a way to measure a person's physical characteristics to verify their identity. These can include physiological traits, such as fingerprints and eyes, or behavioral characteristics, such as the unique way you'd complete a security-authentication puzzle.
  • 4.
    4 B. Border ControlAirport-Border and port security biometric systems are put in place to track and manage the flow of humans. This includes national database deployments, entrance and exit access control systems, immigration technologies as well as e-Passports and smart card systems. C. Financial Biometrics- Financial service biometrics refers to biometric systems used to aid in the flow of money. This includes biometric payment cards, point-of-sale and payments systems, transaction processing and other payment technologies, as well as mobile wallet applications and cash transfer systems. Banks and financial companies have started adopting biometrics technology already, ensuring customer transaction security and identification verification. Many leading banks and financing companies are testing methods like face recognition, iris scanning, fingerprint scanning, and speech recognition. D. Fingerprint & Biometric Lock- Fingerprint & biometric lock solutions are stronger authentication methods than keys, key cards and PINs for a simple reason. These locks are perfect for keeping doors closed to all but those authorized to use them. They’re what we are, not what we have. While a key can be lost or stolen and used by an unauthorized person, our fingerprint is something unique that only we have. Fingerprint biometric locks are perfect for keeping doors closed to all but those authorized to use them. E. Health Care Biometric- Healthcare biometrics refers to biometric applications in doctors' offices, hospitals, or for use in monitoring patients. This can include access control, identification, workforce management or patient record storage. Iris scans, fingerprint readers and facial recognition are growing in use across healthcare settings — and they're poised to offer even greater possibilities. With just a touch or a glance, these biometric tools can identify and authenticate patients and employees by detecting unique biological information. Healthcare biometrics, potentially, could reduce patient fraud in the future. Biometric authentication - including facial and fingerprint recognition - could shape the industry and eliminate any possibilities of individuals attempting to pose as other patients for access to treatments and particular medication. IV. BIOMETRIC BENEFITS A. Accuracy- A general term used to describe how accurate a biometric system performs. Biometric accuracy is based on several verifying criteria including the identification rate, error rate, false acceptance rate, false alarm rate, and additional biometric system standards. Biometrics validated systems are also more accurate since they only have to match an individual's data against his or her stored data in the database and do not need hundreds, thousands or even if there are millions of comparisons like the identifying systems. B. Identification- Biometrics are a way to measure a person's physical characteristics to verify their identity. The advantages that biometrics provides are that the information is distinctive for every person and it can utilized as a technique for individual identification. The top benefits of Biometric technology are authentication, privacy or data discretion, authorization or access control, data veracity, and non-repudiation. C. Less processing time- Biometrics validated systems are usually referred to as a one-to-one process and generally takes less processing time compared to the other identifying systems. This is because, in other recognizing systems, the information is compared to all data already stored in the database.
  • 5.
    5 V. BIOMETRIC LIMITATION A.Biometric spoofing- Biometrics is the technical term for body measurements and calculations. It refers to metrics Spoof attacks consist in submitting fake biometric traits to biometric systems. it can be attacks at the user interface. presentation of a fake biometric trait. B. High cost- In every path biometrics has highly cost. Border control/airport, Banking system, Face recognition, Fingerprint and so on we have to bear a lot of cost in using these. Significant investment needed in biometrics for security. t’s no surprise that a more advanced security system would require significant investments and costs to implement. In a 2018 survey by Spiceworks, 67 percent of IT professionals cite cost as” the biggest reason for not adopting biometric authentication.” Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay for, with 47% of the surveyed stating a need to upgrade current systems in order to support a shift to biometric authentication on their devices. C. Machine error- There are several types of error rates to consider in the practical selection of a biometric device. Security professionals typically concentrate on preventing an unauthorized individual from entering. However, if a biometric device (or any other access control method) does not consistently recognize and allow entry to authorized people, it won’t remain on the door for very long. The real job of security is as much to let only authorized people into specific places as it is to keep the unauthorized people out. Therefore, it is important to ensure that the biometric device does a good job of recognizing the authorized users. The reality is that biometric devices aren’t perfect, and all will make some errors. Biometric devices can make two kinds of errors; the false accept, in which the device accepts an unauthorized person; and the false reject, in which the device falsely rejects an authorized person. Picking the right biometric device requires careful analysis of which type of error will have the greater impact on both security and everyday operations. VI. RESULT The Future with Biometrics Technology – Faster, Easier and more Secure. With biometric technologies like fingerprint scanning, facial and voice recognition, and even iris recognition becoming popular in smartphones, authentication can be made more secure and convenient. VII. DISCUSSION Biometric systems are used increasingly to recognize individuals and regulate access to physical spaces, information, services, and to other rights or benefits, including the ability to cross international borders. The motivations for using biometrics are diverse and often overlap. They include improving the convenience and efficiency of routine access transactions, reducing fraud, and enhancing public safety and national security. Questions persist, however, about the effectiveness of biometric systems as security or surveillance mechanisms, their usability and manageability, appropriateness in widely varying contexts, social impacts, effects on privacy, and legal and policy implications. VIII. ACKNOWLEDGEMENT The authors are thankful to Yibo faculty of Department of Software Engineering, Zhengzhou University for moral encouragement and providing necessary facilities. IX. CONCLUSION Biometric is a very interesting and exciting field that has be an emerging area with many opportunities for growth. possibly in the near future, we will not have to remember PIN’S and Password and keys in our bags or pockets will be things of the past. Fingerprint biometrics provide a very robust and mature choice for a biometric technology. As such, there are many solutions on the market. This familiarity has allowed attackers to study and try different types of attacks on fingerprint readers. X. REFERENCES [1] http://wikipedia.org/wiki/Biometrics [2] http://javatpoint.com/types-of-biometrics [3] http://fingercheck.com/the-science-of-biometrics-a-timeline-of- biometric-authentication [4] http://javatpoint.com/history-of-biometrics [5] http://usa.kaspersky.com/resource-center/definitions/biometrics [6] http://csoonline.com/article/3339565/what-is-biometrics-and- why-collecting-biometric-data-is-risky.html [7] http://thalesgroup.com/en/markets/digital-identity-and- security/government/inspired/biometrics