Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Introduction
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago.
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face. Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals. This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. The concept of human-to-human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Abstract— A biometric feature provides a high security access system. Traditional method uses PIN number, password, key, and etc to identify a person is unreliable and provide a low level security. It provides more reliable feature than the password based authentication system as biometric characteristic cannot be lost or forgotten, biometric feature are difficult to replicate, and require the person to be present for the authentication process. Many biometric such as face , finger print, iris and voice have been developed. But here verification using vein pattern is less developed. Biometric authentication is perform in insecure because of information leakage issue, so overcome this the implementation of biometric hand vein authentication Hand vein patterns are the vast network of blood vessels underneath a person’s skin.
Index Terms— Biometric, Hand vein structure, Authentication
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
The interest in Biometrics from both governments and industry has lead to the emergence of multiple Biometric technologies all with their own strengths and flaws. One currently at the forefront of Biometrics is iris scanning.
The process involved in the identification and verification of people using iris scanning is examined in this paper. The advantages and disadvantages associated with the utilisation of such a technology are also explored. A number of legal and ethical issues are highlighted. Iris scanning is looked at in comparison to other forms of Biometric technologies. Future work in the area of Biometrics is also considered in light of current developments.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Introduction
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago.
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face. Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals. This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. The concept of human-to-human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Abstract— A biometric feature provides a high security access system. Traditional method uses PIN number, password, key, and etc to identify a person is unreliable and provide a low level security. It provides more reliable feature than the password based authentication system as biometric characteristic cannot be lost or forgotten, biometric feature are difficult to replicate, and require the person to be present for the authentication process. Many biometric such as face , finger print, iris and voice have been developed. But here verification using vein pattern is less developed. Biometric authentication is perform in insecure because of information leakage issue, so overcome this the implementation of biometric hand vein authentication Hand vein patterns are the vast network of blood vessels underneath a person’s skin.
Index Terms— Biometric, Hand vein structure, Authentication
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significance of the implemented solution and the advantages the government has gained to-date. The UAE deployment of iris recognition technology is currently the largest in the world, both in terms of number of Iris records enrolled (more than 840,751) and number of iris comparisons performed daily 6,225,761,155 (6.2 billion) in ‘all-against-all’ search mode.
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and
investigated. In this system, features are extracted from the iris using various feature extraction algorithms,
namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated
that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy
improvement offered by the proposed approach also showed that using more than two feature extraction
algorithms in extracting the iris system might decrease the system performance. This is due to redundant
features. The paper presents a detailed description of the experiments and provides an analysis of the
performance of the proposed method.
Voting is the opportunity given to the people it is one of the political process, and the system is created to work best with everyone’s participation. Electronic Voting Machines (EVM) are being used by Indian election commission to conduct elections for the past decade. In Aadhar based electronic voting machine voters have to register their fingerprint. Based on the features of fingerprint it gets matched with the person who will cast the vote. Finger print matching will be done using the Aadhar card data base. The efficiency of a fingerprint is based on biometric system and is relatively high in comparison to other biometric based authentication systems like iris recognition, face readers, retina scanning, voice recognitions or hand geometry. With the help of keypad matrix voter can select the candidate to whom they wish to cast their vote and a message is displayed in LCD confirming the vote casted.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
GANNON UNIVERSITY
ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT
FALL2015
GECE 572: DIGITAL SIGNAL PROCESSING
FINGER PRINT RECOGNITION USING MINUTIAE BASED FEATURE
FINAL PROJECT
Prepared by
THADASINA PRUTHVIN REDDY
[email protected]
SALMAN SIDDIQUI
[email protected]
Instructor:
Dr. Ram Sundaram
Table of contents
1. Abstract
2. Introduction
3. Fingerprint matching
4. Pre-processing stage
5. Minutiae extraction stage
6. Post-processing stage
7. Merits & Demerits
8. Applications & future scope
9. Conclusions
10.References
1. Abstract
Nowadays, conventional identification methods such as driver's license, passport, ATM cards and PIN codes do not meet the demands of this wide scale connectivity. Automated biometrics in general, and automated fingerprint authentication in particular, provide efficient solutions to these modern identification problems. Fingerprints have been used for many centuries as a means of identifying people. The fingerprints of individual are unique and are stay unchanged during the life time. Fingerprint matching techniques can be placed into two categories, minutiae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality the correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation.
2. Introduction
Biometric recognition refers to the use of distinctive physiological (e.g. fingerprint, palm print, iris, face) and behavioral (e.g. gait, signature) characteristics, called biometric identifiers for recognizing individuals.
Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint recognition has been used for over 100 years now and has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time-consuming and required skilled personnel.
Finger skin is made up of friction ridges and sweat pores all along these ridges. Friction ridges are created during fetal life and only the general shape is genetically defined. The distinguishing nature of physical characteristics of a person is due to both the inherent individual genetic diversity within the human population as well as the random processes affecting the development of the embryo. Friction ridges ...
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
In this modern era, a huge revolution in technology is the introduction of biometric recognition system. One of the most useful biometric recognition system is fingerprint recognition system. The fingerprint recognition system is considered to most important biometric system in addition to other biometrics recognition systems
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Similar to Comparison of various Biometric methods (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
1. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
24
COMPARISON OF VARIOUS BIOMETRIC METHODS
Rupinder Saini , Narinder Rana
Rayat Institute of Engineering and IT
errupindersaini27@gmail.com, narinderkrana@gmail.com
Abstract
This paper presents comparison concerning
various biometric systems simply by defining
their advantages and disadvantages. A brief
introduction is usually offered regarding
commonly used biometrics, including, Face,
Iris, Fingerprint, Finger Vein, Lips, Voice. The
comparison criteria list introduced is restricted
to accuracy, size of template, cost, security
level, and long term stability.
Keywords
Biometric systems, technique, face, Iris, finger,
lips, voice.
1. Introduction
"Biometrics" implies "life measurement"
however the term associated with the utilization
of unique physiological characteristics to
distinguish an individual. It’s a new way to
verify authenticity. Biometrics utilizes biological
characteristics or behavioral features to
recognize an individual. In real a Biometrics
system is a pattern identification system that
uses various patterns such as iris patterns, retina
design and biological characteristics like
fingerprints, facial geometry, voice recognition
and hand recognition and so forth. Biometric
recognition system provides possibility to verify
one’s identity simply by determining “who these
people are” instead of “what these people
possess or may be remembered” [4]. The very
fact that makes it really interesting is that the
various security codes like the security
passwords and the PIN number could be
interchanged among people but the physical
traits cannot be. The principle use of Biometric
security is to change the existing password
system. There are numerous pros and cons of
Biometric system that must be considered.
2. Biometric Techniques
Jain et al. describe four operations stages of a
uni-modal biometric recognition system [1]:
Biometric data acquisition.
Data evaluation and feature extraction.
Corresponding scores creation (analyzed
data is then compared with what is
actually saved in the database).
Enrollment (first scan of a feature by a
biometric reader, produce its digital
representation and create a template,
even a few in most of the systems).
2. Numerous Biometric Systems :
1. Facial recognition
2. Iris
3. Finger print
4. Finger vein
5. Lips
6. Voice
New and emerging biometric techniques are:
1. Human scent recognition
2. EEG biometrics
3. Skin spectroscopy
4. Knuckles texture
5. Finger nail recognition
2.1 Facial recognition
Face recognition involves an evaluation of facial
features. It is a computer system application for
automatically determining or verifying an
individual from a digital image or a video
framework from a video source. One of the
techniques to do this is simply by evaluating
selected facial features from the image as well as
from facial database.
2. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
25
Advantages
It does not require any co-operation of
the test subject to do any work.
Systems set up in airports, multiplexes,
and other open public areas can easily
identify an individual among the
massive crowd.
This performs massive identification
which usually other biometric system
can’t perform [2].
The systems don’t require any direct
contact of a person in order to verify
his/her identity. This could be
advantageous in clean environments, for
monitoring or tracking, and in
automation systems [2].
User-friendly design: Contactless
authentication.
Incident monitoring for security with
photo which in turn taken by a camera,
but there is no such evidence with the
fingerprint technology to track these
incidents.
Disadvantages
Face recognition isn’t perfect and faces
challenges to perform under certain
conditions.
One obstacle associated with the
viewing position of face.
Face recognition doesn’t work
effectively in bad/weak lighting,
sunglasses/sunshades, lengthy hair, or
other objects partly covering the
subject’s face.
Not much effective for low resolution
images [2].
A serious drawback is that many
systems are usually less efficient if
facial expressions vary. Even a big
grin/laugh can render the system’s
performance less effectively. (so
significantly North america now permits
only neutral facial expressions on
passport photos )
Additionally, when used for security
purposes, it is more costly and complex
as compared to some other
techniques.
Fig.1 Image sample for Facial recognition
2.2 IRIS
Iris recognition offers one of the most secure
strategies of authentication and recognition.
Once the impression of an iris has been taken
using a standard digicam, the authentication
process involves, evaluating the present subject's
iris with stored version. It is one of the most
accurate technique with very low false
acceptance as well as rejection rates. This is how
the technology becomes very useful.
Advantages
Iris possesses unique structure shaped
by 10 months of age, and is always
stable throughout life.
The iris incorporates fine texture. Even
genetically similar people have entirely
independent iris textures [2].
An iris scan can be carried out through
10 cm to a few meters apart.
Non-intrusive data collection (no actual
contact with a scanner is required)[2] .
Data capturing can be carried out even
though a user is putting contact lenses or
glasses [2].
High accuracy and High recognition
process speed [2].
Easy recognition of fake irises (e.g.
when somebody wear color contacts).
Scalability along with the speed is
significantly advantageous [4].
Minimal false acceptance rate.
Two seconds processing time.
3. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
26
Iris recognition security systems are
viewed as one of the most appropriate
security system nowadays. It is truly a
distinctive and easy way to identify a
user.
Disadvantages
Iris scanners might be very easily fooled
through a superior quality image of an
iris or face instead of the real thing.
The scanning devices are often hard to
adjust and may annoy multiple people of
various heights.
The accuracy of scanning devices may
impacted by unusual lighting effects and
illumination from reflective types of
surfaces.
Iris scanners tend to be more expensive
in comparison with additional
biometrics [1].
Because iris is a tiny organ to scan from
a long distance, Iris recognition
becomes challenging to perform well at
a distance larger than a few meters.
Iris recognition is vulnerable to
inadequate image quality.
People suffer from diabetes or some
other serious disease cause alterations in
ir
is.
Fig.2 Image sample for Iris Recognition
2.3 Finger print
Our fingerprint is constructed of numerous
ridges and valley on the surface of finger which
are unique to each and every human [1]. "Ridges
are the top skin layer portions of the finger and
valleys are the lower portions". The particular
individuality of a fingerprint could be
determined by the several patterns of ridges and
furrows plus the minutiae points. Fingerprint
authentication in actual an automated method of
verifying a match among different human
fingerprints.
Advantages
These systems usually are simple to use
and install.
It requires inexpensive equipment which
usually have low power intake.
A fingerprint pattern has individually
distinctive composition and
characteristic remains the same with
time [2].
Finger prints are largely universal. Only,
of the 2% of human population cannot
use finger prints due to skin damage or
hereditary factors [10].
Fingerprints are the most preferred
biometric.
One should not have to remember
passwords, you simply swipe your
finger on scanner and done it.
Biometric fingerprint scanner presents a
method to record an identity point which
is very hard to be fake, making the
technology incredibly secure.
It is easy to use along with the high
verification process speed and accuracy
[1].
Disadvantages
Because fingerprint scanner only scans
one section of a person's finger, it may
susceptible to error.
Many scanning system could be cheat
employing artificial fingers or perhaps
showing another person’s finger [2].
Sometimes it may take many swipe of
fingerprint to register.
Fingerprints of people working in
chemical sectors often affected.
Cuts, marks transform fingerprints
which often has negatively effect on
performance [2].
4. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
27
Finger prints aren’t private. We all leave
fingerprints almost everywhere. Once
the finger prints are stolen, they are
stolen for life time! You possibly in no
way get back to a secure situation [10].
Fig.3 Image sample for Finger Print Recognition
2.4 Finger Vein
Finger vein authentication is often a biometric
technology which specifies an individual when
using the vein pattern inside of the fingers.
Veins are usually the blood vessels which carry
blood towards the heart. Every single person's
veins are having unique physical and behavioral
features. It provides a greater degree of security
that protects information and access control
much better. As deoxyhemoglobin in the blood
absorbs infrared lights, vein patterns appear as
several dark outlines. The infrared lights
combine with special camera capturing an image
of the finger vein pattern. This image is then
transformed into pattern data along with saved
as a template of any person's biometric
authentication data. While authentication, the
particular finger vein image is taken and is
compared against the saved template of the
person.
Advantages
Finger vein patterns are generally
distinctive to every person; even among
identical twins, so the actual false
acceptance rate is quite low (near to
zero).
Placing a hand or finger is actually
less invasive in comparison to other
biometric technologies.
Because blood vessels/veins are
located inside the human body, it is
quite hard to read or steal. There is
minor risk of forgery or thieves.
As finger veins do not depart any
trace during the authentication process
and thus can’t be duplicated.
Finger vein patterns stay continuous
throughout the adult years and so re-
enrollment of the vein pattern does not
required once singed up.
Finger veins are less likely to be
affected by changes in the weather
conditions or health conditions of the
specific.
Rashes, cracks and rough epidermis
do not have an impact on the result of
authentication.
The level of accuracy from vein
recognition systems is quite outstanding.
Time which delivered to validate
each individual is smaller as compared
to other methods (average is 1/2
second).
Vein patterns need only low image
resolution.
Finger vein authentication
technology is inexpensive and having
smaller size of templates.
Disadvantages
In case an accident causes a user to lose
his/her finger then it can be a problem
during the verification process.
Expensive: The actual technologies
seriously aren’t cheap enough for bulk
deployment.
Larger Size: The existence of CC
camera makes the system larger than a
fingerprint scanner.
This technology is still untested mainly
because only vendor companies affirm
the accuracy levels. Governments and
standards companies have not proven its
capability yet.
Not for bulk recognition.
5. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
28
Fig.4 Image sample for Finger vein Recognition
2.5 Voice recognition
Voice recognition is a technology through which
sounds, phrases and words voiced by human
beings are transformed into electrical signals,
and then these signals are converted into code
design [9]. Here we emphasize on the human
voice because we generally and most often use
voices to communicate our thoughts, our ideas
with others in surrounding environment [9].
Advantages
Speech can be recommended as a
natural input as it does not demand any
training and it is considerably quicker as
compared to some other input.
Voice is usually a quite natural strategy
to communicate, and in fact it is not
necessary for you to sit at keyboard set
or even work with handheld remote
control.
This technique helps those people who
have difficulty of using their hands.
It does not require any training for users.
It offers a big advantage to those who
suffer from problems that may impact
their writing capability but they can use
their voice to produce words/text on
desktop computers or may be other
equipments.
One of the major advantages of voice
recognition technique is to cut back
misspelled texts of which many typists
may perhaps suffers a problem during
typing.
The particular support significantly
eliminates the amount of time period to
edit and fix spelling corrections. And so
the general advantages could be the time
management.
The majority of people can speak more
rapidly in comparison with they can
type with fewer errors.
Disadvantages
Even the most efficient voice
recognition systems very often may
make mistakes, when there is
disturbance or some noise in the
surrounding.
Voice Recognition systems works well
only if the microphone is actually close
to the end user. Much more far-away
microphones are likely to boost the
number of errors.
May hacked with prerecorded voice
messages.
Possesses primary amount of time for
adjustment with each user's voice.
Different persons might speak various
languages.
Several words sound very similarly.
Case: two, to, too.
Largely expensive.
Fig.5 Image sample for Voice Recognition
2.6 Lip identification
Essentially the most growing technique of
human recognition, which originates from
felony and forensic process, is usually human
lips identification [8]. This biometric accumulate
6. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
29
significant focus recently because it deals with
many difficulties of traditional identification. So
as to recognize human identity, lips form and
color characteristics are taken into consideration
[8]. Lip biometric may be used to improve the
potency of biometrics such as facial and voice
recognition.
Advantages
Study proves that lips attributes are
usually distinctive and also
unchangeable for every single examined
person.
Lips prints used by forensics
professionals and criminal police
training [8].
Size of template is small.
Lips based human recognition
dependent on static mouth/face photos.
Lips biometric certainly are passive
biometrics – person’s interaction is just
not necessary [8].
Photos might be obtained from the
distance without having analyzed
person’s knowledge.
Lips usually are visible – not
hidden/overcast by anything [8].
Lips biometric can be hybrid to use as
lips-voice or lips-face biometric systems
[8].
Disadvantages
The concept of developing hybrid
(multimodal) biometric system needs a
lot of attention.
Main drawback of this method is that
the particular facial attributes chosen
may not acquire relevant details. E.g.
visibility of teeth may present additional
details that can’t be utilized by a lip
shape model alone.
A big smile might cause difficulty in
recognition of a person with respect to
same person with neutral appearance as
before.
Fig.6 Image sample for Iris Recognition
3. Comparison table of all biometrics
Biometrics Accuracy Cost Size of
template
Long term
stability
Security level
Facial
recognition
Low High Large Low Low
Iris scan High High Small Medium Medium
Finger print Medium Low small Low Low
Finger vein High Medium Medium High High
Voice
recognition
Low Medium Small Low Low
Lip
recognition
Medium medium Small Medium High
7. ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue I (March 2014)
www.sciencepublication.org
30
4. Conclusion
This paper presents a shorter introduction on
numerous biometric techniques undertaking the
comparison examination regarding widely used
biometric identifiers and also the identification
strategies. As this is a new technology for most
of the peoples since it has simply been
implemented in public areas for short time
period. There are numerous apps along with
alternative solutions used in security techniques.
It provides benefits that may improve our lives
in such a way by increasing security and
efficiency, decreasing scams and reducing
password administrator cost. Despite the fact the
biometrics security systems still have many
issues like data privacy, physical privacy, and
spiritual arguments etc.
5. Future work
Biometrics technology is used in a number of
ways and in different fields of our daily lives. In
future we mainly focus on facial expression
recognition technology. Using this technology,
we can easily identify a person in a crowd and
by so we can verify their identity. We can
furthermore make use of this technology to
detect previously identified terrorists, criminals
or scammers in society. It may help us to reduce
the criminal offense in the world. But as we can
see from the above given comparison between
different biometrics, it is clear that face
recognition faces a challenging problem in the
field of accuracy, effeiciency, speed cost and
security. So we need to work upon it to make it
more effective.
References
[1] Anil K. Jain, Arun Ross and Salil Prabhakar (2004),
“An Introduction to Biometric Recognition.”
[2] Alina Klokova, “Comparison of Various Biometric
Methods”.
[3] Rabia Jarfi and Hamid R. Arabina, “A Survey of
Face Recognition Techniques”, Journal of Information
Processing Systems, Vol.5, No.2, June 2009.
[4] Joseph N. Pato and Lynette I. Millett, Editors;
Whither Biometrics Committee; National Research
Council (2010), “Biometric Recognition: Challenges
and Opportunities”.
[5] National Science & Technology Council’s (NSTC)
Subcommittee on Biometrics (September 2006),
“Biometrics Frequently Asked Questions”.
[6] Michelle C. Frye, B.A. (April 27, 2001),
University Thesis, “The Body as A Password:
Considerations, Uses, and Concerns of Biometric
Technologies”.
[7] Penny Khaw ; SANS Security Essentials (GSEC)
Practical Assignment Version 1.3,” Iris Recognition
Technology for Improved Authentication”.
[8] Michal Choras (2009) ,” The lip as a biometric”.
[9] Jim Baumann, “VoiceRecognition”.
[10] David Weiss (2009), “Fingerprint Biome