You are on page 1of 39

Presented by: Veena.T.

Inchagre guides: Gopala.k


H.D.Hikkaliah.
TEAM MEMBERS

Veena.t.s
Shruthi.e
Pallavi.k.s
Rekha.r
Some biometric
systems

How it
workz
Whatz
biometric
s
Topics
A glance at Biometrics
History of biometrics
How biometric systems work?
Facial recognition
Finger print indentification
Hand geometry
Retinal pattern recognition
Iris based recognition
Voice recognition
Choice of techniques
Applications and privacy issues
Biometrics,
The word biometrics comes from the Greek bios (life)
and metrikos (measure), is automatic methods for
identifying a person on the basis of some biological or
behavioral characteristic of the person. Many biological
characteristics, such as fingerprints,face, fingerprints,
hand geometry, handwriting, iris, retinal, vein, and
behavioral characteristics, such as voice patterns, are
distinctive to each person.
Biometric technologies are becoming the foundation of
an extensive array of highly secure identification and
personal verification solutions
A receptionist scanning customer for loading customer information into the
system
History
 In 1882 Alphonse Bertillon, chief of the criminal
identification division of the police department in Paris,
France, developed a detailed method of identification
based on certain bodily measurements, physical
descriptions, and photographs. The Bertillon System of
Anthropometric Identification gained wide acceptance
before fingerprint identification superseded it.
 scientists know from a number of archaeological
artifacts that ancient civilizations, such as those of
Babylonia and China, recognized the individuality of
fingerprint impressions
.
Biometrics vs. Forensics
Biometrics and forensics have a lot in common,
but they're not exactly the same. Biometrics uses
your physical or behavioral characteristics to
determine your identity or to confirm that you are
who you claim to be. Forensics uses the same
kind of information to establish facts in civil or
criminal investigations.
Biometrics uses unique features,like the iris of eye, to
identify person.
How biometrics work
Biometric systems can seem complicated, but they all use the same
three steps:
•Enrollment: The first time you use a biometric system, it records basic
information about you, like your name or an identification number. It
then captures an image or recording of your specific trait.
•Storage: Contrary to what you may see in movies, most systems don't
store the complete image or recording. They instead analyze your trait
and translate it into a code or graph. Some systems also record this data
onto a smart card that you carry with you.
•Comparison: The next time you use the system, it compares the trait
you present to the information on file. Then, it either accepts or rejects
that you are who you claim to be.
Vein scanning is one form of biometric identification
Handwriting
 At first glance, using handwriting to identify people might not
seem like a good idea. After all, many people can learn to
copy other people's handwriting with a little time and practice.
It seems like it would be easy to get a copy of someone's
signature or the required password and learn to forge it.
 But biometric systems don't just look at how you shape each
letter; they analyze the act of writing. They examine the
pressure you use and the speed and rhythm with which you
write. They also record the sequence in which you form letters,
like whether you add dots and crosses as you go or after you
finish the word.
 A handwriting recognition system's sensors can include a
touch-sensitive writing surface or a pen that contains sensors
that detect angle, pressure and direction. The software
translates the handwriting into a graph
This Tablet PC has a signature verification system.
Hand and Finger Geometry
People's hands and fingers are unique -- but not as unique as
other traits, like fingerprints or irises. That's why businesses and
schools, rather than high-security facilities, typically use hand
and finger geometry readers to authenticate users, not to identify
them
Systems that measure hand and finger geometry use a digital
camera and light. To use person simply place his hand on a flat
surface, aligning his fingers against several pegs to ensure an
accurate reading. Then, a camera takes one or more pictures of
his hand and the shadow it casts. It uses this information to
determine the length, width, thickness and curvature of his hand
or fingers. It translates that information into a numerical
template.
Authenticate vs. Identify
A biometric system can either authenticate that you are
who you say you are, or it can identify you by
comparing your information to all of the information on
file. Authentication is a one-to-one comparison; it
compares your characteristic with your stored
information. Identification, on the other hand, is a one-to-
many comparison.
A hand geometry scanner
Voiceprints
Every person voice is unique because of the shape of
vocal cavities and the way they move their mouth when they
speak. To enroll in a voiceprint system, they either say the
exact words or phrases that it requires, or give an extended
sample of their speech so that the computer can identify
person no matter which words they say.
. But the data used in a voiceprint is a sound spectrogram,
not a wave form. A spectrogram is basically a graph that
shows a sound's frequency on the vertical axis and time on
the horizontal axis. Different speech sounds create different
shapes within the graph
Speaker recognition systems use spectrograms to
represent human voices
Spectrogram Reading

Spectrogram of the word "compute." The vertical axis represents


frequencies up to 8000 Hz , the horizontal axis shows positive time
toward the right, and the colors represent the most important
acoustic peaks for a given time frame, with red representing the
highest energies, then in decreasing order of importance, orange,
yellow, green, cyan, blue, and magenta, with gray areas having even
less energy and white areas below a threshold decibel level.
Iris Scanning

Eye anatomy
Iris scanning can seem very futuristic, but at the heart of the
system is a simple CCD digital camera. It uses both visible
and near-infrared light to take a clear, high-contrast picture of
a person's iris.
When person look into an iris scanner Usually, eye is 3 to 10
inches from the camera. When the camera takes a picture,
the computer locates:
The center of the pupil
The edge of the pupil
The edge of the iris
It then analyzes the patterns in the iris and translates them into
a code.
Iris scanners are becoming more common in high-security
applications because people's eyes are so unique (the
chance of mistaking one iris code for another is 1 in 10 to the
78th power
An iris scanner
Vein Geometry
As with irises and fingerprints, a person's veins are
completely unique. Twins don't have identical veins, and a
person's veins differ between their left and right sides. Many
veins are not visible through the skin, making them
extremely difficult to counterfeit or tamper with. Their shape
also changes very little as a person ages
To use a vein recognition system, you simply place your
finger, wrist, palm or the back of your hand on or near the
scanner. A camera takes a digital picture using near-infrared
light. The hemoglobin in your blood absorbs the light, so
veins appear black in the picture. As with all the other
biometric types, the software creates a reference template
based on the shape and location of the vein structure.
Vein scanners use near-infrared light to reveal the patterns in a
person’s veins
Facial Recognition Technology
 Human beings use facial recognition all the time to identify
other people. As a result, in the field of biometrics, facial
recognition is one of the most active areas of research.
This includes identify people from still-photograph images of
their faces to the design of systems that recognize active and
changing facial images against a cluttered background. More
advanced systems can recognize a particular individual in a
videotape or a movie.
 Researchers base the patterns used for facial recognition on
both specific and general features. The specific features such
as the eyes, eyebrows, nose, lips, and chin. they employ an
overall analysis of the facial image and a breakdown of the
image into a number of component images. is sufficient for
the accurate recognition of one person in a large group of
overall analysis of the facial image and a breakdown
of the image into a number of component images
3D Facial Recognition
The Vision 3D + 2D ICAO
camera is used to perform
enrollment, verification and
identification of 3D and 2D
face images

FaceIt software compares the


faceprint with other images in the
Fingerprint Identification
 A fingerprint is the pattern of ridges and furrows on the
surface of a fingertip. No two persons have exactly the same
arrangement of patterns, and the patterns of any one
individual remain unchanged throughout life.
 Fingerprints are so distinct that even the prints of identical
twins are different. The prints on each finger of the same
person are also different
 The level of detail in fingerprint images scanned into a
biometric system depends on several factors. They include
the amount of pressure applied to the fingertip during image
scanning, the presence of any cuts or other deformities on the
fingertip, and the dryness of the skin
This system may use optical scanner or capacitive scanner
The Attendance register systems use fingerprint
identification
Television shows and movies can make it look spectacularly easy or
spectacularly difficult to get past biometric security Here are some of the more
common tricks and whether they're likely to work
The heart of an optical scanner is a charge coupled device
(CCD), the same light sensor system used in digital camera
and camcoders
Like optical scanners, capacitive fingerprint scanners
generate an image of the ridges and valleys that make up a
fingerprint. But instead of sensing the print using light, the
capacitors use electrical current
Determining Accuracy
All biometric systems use human traits that are, to some degree,
unique. Which system is best depends on the necessary level of
security, the population who will use the system and the system's
accuracy. Most manufacturers use measurements like these to
describe accuracy:
•False Accept Rate (FAR): How many imposters the system
accepts
•False Reject Rate (FRR): How many authorized users the
system rejects
•Failure to Enroll Rate (FTE): How many people's traits are of
insufficient quality for the system to use
•Failure to Acquire Rate (FTA): How many times a user must
present the trait before the system correctly accepts or rejects
them
Choice of techniques

All the biometric techniques discussed above have


advantages and disadvantages. The choice of a particular
technique depends heavily on the application. For example,
access to a nuclear power plant may require a biometric
system with an FAR of 0.001 percent (one impostor
admitted in 100,000 attempts) and an FRR of 0.1 percent
(one valid user rejected in 1,000 attempts)
APPLICATIONS
 Applications include electronic fund transfers, ATM security,
check cashing, credit card security, smart-card security, and
online transactions
 Security for information systems and computer networks is
another important area for biometric applications
 Several leading automobile manufacturers are exploring the
use of biometrics to enable an authorized driver to enter and
start a car without using a key
 Various government agencies have considered using
biometrics. In benefits distribution programs such as welfare
disbursement, biometrics could bring about substantial
savings by deterring the same person from filing multiple
claims
 Personal identification based on hand geometry could permit
faster processing of passengers at immigration checkpoints.
Biometric-based voter registration and driver licensing could
The Future of Biometrics
Biometrics can do a lot more than just determine whether
someone has access to walk through a particular door.
 Some hospitals use biometric systems to make sure
mothers take home the right newborns.
Experts have also advised people to scan their vital
documents, like birth certificates and social security cards,
and store them in biometrically-secured flash memory in the
event of a national emergency.
 Here are some biometric technologies you might see in the
future:
•New methods that use DNA, nail bed structure, teeth, ear
shapes, body odor, skin patterns and blood pulses
•Opt-in club memberships, frequent buyer programs and
rapid checkout systems with biometric security
More prevalent biometric systems in place of passports at
border crossings and airports
Bibilography

www.google.com
www.Howstuffworks.com

You might also like