Professional Documents
Culture Documents
SEMINAR REPORT
BIOMETRICS
CANDIDATE’S DECLARATION
I declare that this written submission represents my work and ideas in my own words and where
others' ideas or words have been included, I have adequately cited and referenced the original
sources. I also declare that I have adhered to all principles of academic honesty and integrity and
have not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I
understand that any violation of the above will be cause for disciplinary action by the University
and can also evoke penal action from the sources which have thus not been properly cited or
from whom proper permission has not been taken when needed.
_________________________________
(Signature)
________________________________
(Name of the student)
_________________________________
(Roll No.)
_________________________________
(Name of Department)
Date:
3
ACKNOWLEDGEMENT
It gives me a great sense of pleasure to present the report of the B. Tech Paper Presentation
undertaken during B. Tech. Third Year. I owe special debt of gratitude to Dr. A. K. Daniel,
Professor, Department of Computer Science & Engineering, MMMUT, Gorakhpur for his
constant support and guidance throughout the course of our work. His sincerity, thoroughness
and perseverance have been a constant source of inspiration for us. It is only his cognizant
efforts that our endeavours have seen light of the day.
I also do not like to miss the opportunity to acknowledge the contribution of all faculty members
of the department for their kind assistance and cooperation during the development of our
project. Last but not the least, we acknowledge my friends for their contribution in the
completion of the paper.
Signature:
Name:
Roll No:
Date:
4
ABSTRACT
Humans recognize each other according to their various characteristics for ages. We recognize
others by their face when we meet them and by their voice as we speak to them. Identity
verification (authentication) in computer systems has been traditionally based on something
that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or
cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To
achieve more reliable verification or identification we should use something that really
characterizes the given person. Biometrics offer automated methods of identity verification or
identification on the principle of measurable physiological or behavioural characteristics such as
a fingerprint or a voice sample. The characteristics are measurable and unique. These
characteristics should not be duplicable, but it is unfortunately often possible to create a copy
that is accepted by the biometric system as a true sample. In biometric-based authentication, a
legitimate user does not need to remember or carry anything and it is known to be more
reliable than traditional authentication schemes. However, the security of biometric systems
can be undermined in a number of ways. For instance, a biometric template can be replaced by
an impostor's template in a system database or it might be stolen and replayed. Consequently,
the impostor could gain unauthorized access to a place or a system. Moreover, it has been
shown that it is possible to create a physical spoof starting from standard biometric templates.
Hence, securing the biometric templates is vital to maintain security and integrity of biometric
systems. This report actually gives an overview of what is biometric system and a detail
overview of a particular system i.e. iris recognition system.
5
Content
1. INTRODUCTION
2. CATEGORIZATION OF BIOMETRICS
3. BIOMETRIC FUNCTIONALITY
5. TYPES OF BIOMETRICS
6. APPLICATIONS OF BIOMETRICS
10. CONCLUSION
11. BIBLIOGRAPHY
6
INTRODUCTION
Biometric-based solutions are able to provide for confidential financial transactions and
personal data privacy. The need for biometrics can be found in federal, state and local
governments, in the military, and in commercial applications. Enterprise-wide network
security infrastructures, government IDs, secure electronic banking, investing and other
financial transactions, retail sales, law enforcement, and health and social services are
already benefiting from these technologies.
CATEGORIZATION OF BIOMETRICS
Biometric identifiers are the distinctive, measurable characteristics used to label and
describe individuals. Biometric identifiers are often categorized as physiological versus
behavioural characteristics. Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent.
Behavioural characteristics are related to the pattern of behaviour of a person, including
but not limited to typing rhythm, gait, and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems,
such as a driver's license or passport, and knowledge-based identification systems,
such as a password or personal identification number. Since biometric identifiers are
unique to individuals, they are more reliable in verifying identity than token and
knowledge-based methods; however, the collection of biometric identifiers
raises privacy concerns about the ultimate use of this information.
8
BIOMETRIC FUNCTIONALITY
Many different aspects of human physiology, chemistry or behaviour can be used for
biometric authentication. The selection of a particular biometric for use in a specific
application involves a weighting of several factors. Jain et al. (1999) identified seven
such factors to be used when assessing the suitability of any trait for use in biometric
authentication.
Universality means that every person using a system should possess the trait.
Uniqueness means the trait should be sufficiently different for individuals in the
relevant population such that they can be distinguished from one another.
Permanence relates to the manner in which a trait varies over time. More
specifically, a trait with 'good' permanence will be reasonably invariant over time
with respect to the specific matching algorithm.
Measurability (collectability) relates to the ease of acquisition or measurement of
the trait. In addition, acquired data should be in a form that permits subsequent
processing and extraction of the relevant feature sets.
Performance relates to the accuracy, speed, and robustness of technology used
(see performance section for more details).
Acceptability relates to how well individuals in the relevant population accept the
technology such that they are willing to have their biometric trait captured and
assessed.
Circumvention relates to the ease with which a trait might be imitated using an
artifact or substitute.
Proper biometric use is very application dependent. Certain biometrics will be better
than others based on the required levels of convenience and security. No single
biometric will meet all the requirements of every possible application.
9
The block diagram illustrates the two basic modes of a biometric system. First,
in verification (or authentication) mode the system performs a one-to-one comparison of
a captured biometric with a specific template stored in a biometric database in order to
verify the individual is the person they claim to be. Three steps are involved in the
verification of a person. In the first step, reference models for all the users are
generated and stored in the model database. In the second step, some samples are
matched with reference models to generate the genuine and impostor scores and
calculate the threshold. Third step is the testing step. This process may use a smart
card, username or ID number (e.g. PIN) to indicate which template should be used for
comparison. 'Positive recognition' is a common use of the verification mode, "where the
aim is to prevent multiple people from using the same identity".
Second, in identification mode the system performs a one-to-many comparison against
a biometric database in an attempt to establish the identity of an unknown individual.
The system will succeed in identifying the individual if the comparison of the biometric
sample to a template in the database falls within a previously set threshold.
Identification mode can be used either for 'positive recognition' (so that the user does
not have to provide any information about the template to be used) or for 'negative
recognition' of the person "where the system establishes whether the person is who she
(implicitly or explicitly) denies to be". The latter function can only be achieved through
biometrics since other methods of personal recognition such as passwords, PINs or
keys are ineffective.
10
Multimodal biometric systems are those that utilize more than one physiological or behavioural
characteristic for enrolment, verification, or identification. In applications such as border
entry/exit, access control, civil identification, and network security, multi-modal biometric
systems are looked to as a means of
Abstract level: The output from each module is only a set of possible labels without any
confidence value associated with the labels; in this case a simple majority rule may be
used to reach a more reliable decision.
Rank level: The output from each module is a set of possible labels ranked by decreasing
confidence values, but the confidence values themselves are not specified.
Measurement level: the output from each module is a set of possible labels with
associated confidence values; in this case, more accurate decisions can be made by
integrating different confidence values.
11
TYPES OF BIOMETRICS
• DNA Matching - The identification of an individual using the analysis of segments from
DNA.
• Eyes - Iris Recognition - The use of the features found in the iris to identify an individual.
• Eyes - Retina Recognition - The use of patterns of veins in the back of the eye to
accomplish recognition.
• Face Recognition - The analysis of facial features or patterns for the authentication or
recognition of an individual’s identity.
• Fingerprint Recognition - The use of the ridges and valleys (minutiae) found on the
surface tips of a human finger to identify an individual.
• Hand Geometry Recognition - The use of the geometric features of the hand such as the
lengths of fingers and the width of the hand to identify an individual.
• Typing Recognition - The use of the unique characteristics of a person’s typing for
establishing identity.
• Vein Recognition - Vein recognition is a type of biometrics that can be used to identify
individuals based on the vein patterns in the human finger or palm.
APPLICATIONS OF BIOMETRICS
In the last years has considerably increased the area of application of biometrics and it's
expected that in the near future, we will use biometry many times in our daily activities such as
getting in the car, opening the door of our house, accessing to our bank account, shopping by
internet, accessing to our PDA, mobile phone, laptops, etc.
Depending of where the biometrics is deployed, the applications can be categorized in the
following five main groups: forensic, government, commercial, health-care and traveling and
immigration. However, some applications are common to these groups such as physical access,
PC/network access, time and attendance, etc.
Forensic
The typical applications are:
Identification of criminals- collecting the evidence in the scene of crime (e.g., fingerprints) it is
possible to compare with data of suspects or make a search in the database of criminals.
Surveillance --using cameras one can monitor the very busy places such as stadiums, airports,
meetings, etc. Looking in the crowds for suspect, based on the face recognition biometric, using
images (e.g., mug shots) database of wanted persons or criminals. Since the events of
September 11, 2001, the interest in biometric surveillance has increased dramatically,
especially for air travel applications. Currently there are many cameras monitoring crowds at
airports for detecting wanted terrorists.
Corrections -This refers to the treatment of offenders (criminals) through a system of penal
incarceration, rehabilitation, probation, and parole, or the administrative system by which
these are effectuated. Is this cases a biometric system can avoid the possibility of accidentally
releasing the wrong prisoner, or to ensure that people leaving the facilities are really visitors
and not inmates.
Probation and home arrest - biometric can also be used for post-release programs
(conditional released) to ensure the fulfilment of the probation, parole and home detention
terms.
13
Government
The typical applications are:
National Identification Cards - the idea is to include digital biometric information in the
national identification card. This is the most ambitious biometric program, since the
identification must be performed in a large-scale database, containing hundreds of millions
samples, corresponding to the whole population of one country. This kind of cards can be used
for multiple purposes such as controlling the collection of benefits, avoiding duplicates of voter
registration and driver’s license emission. All these applications are primarily based on finger-
scan and AFIS technology, however it is possible that facial-scan and iris-scan technology could
be used in the future.
Voter ID and Elections - while the biometric national ID card is still in project, in many
countries are already used the biometry for the control of voting and voter registration for the
national or regional elections. During the registration of voter, the biometric data is captured
and stored in the card and in the database for the later use during the voting. The purpose is to
prevent the duplicate registration and voting.
Driver's licenses - In many countries the driver license is also used as identification document,
therefore it is important to prevent the duplicate emission of the driver license under different
name. With the use of biometric this problem can be eliminated. However, it is important that
the data must be shared between state, because in some country such as United States, the
license are controlled at the states as opposed to the federal level.
Benefits Distribution (social service) - the use of biometry in benefits distribution prevents
fraud and abuse of the government benefits programs. Ensuring that the legitimate recipients
have a quick and convenient access to the benefits such as unemployment, health care and
social security benefits.
Employee authentication - The government use of biometric for PC, network, and data access
is also important for security of building and protection of information. Below are more
detailed this kind of applications also used in commercial sector.
Military programs - the military has long been interested in biometrics and the technology has
enjoyed extensive support from the national security community.
Commercial
Some applications in this sector are:
14
Account access - The use of biometric for the access to the account in the bank allows to
keep definitive and auditable records of account access by employees and customers.
Using biometry, the customers can access accounts and employees can log into their
workstations.
ATMs - the use of biometric in the ATM transaction allows more security,
Expanded Service Kiosks - A more receptive market for biometrics may be special
purpose kiosks, using biometric verification to allow a greater variety of financial
transaction than are currently available through standard ATMs.
Online banking - Internet based account access is already widely used in many places,
the inclusion of biometric will make more secure this type of transactions from home.
Currently, there are many pilot programs using biometric in home banking.
Telephony transaction - Voice-scan biometric can be used to make more secure the
telephone-based transactions. In this type of application, when the costumer calls to
make a transaction, a biometric system will authenticate the customer's identity based
on his or her voice with no need of any additional device.
PC/Network access - The use of biometric log-in to local PCs or remotely through
network increase the security of the overall system keeping more protected the
valuable information.
Physical access - the biometric is widely used for controlling the access to building or
restricted areas. o E-commerce - biometric e-commerce is the use of biometrics to verify
of identity of the individual conduction remote transaction for goods or services
Time and attendance monitoring - In this sector the biometrics is used for controlling
the presence of the individuals in a determine area. For example, for controlling the
time sheet of the employees or the presence of students at the classroom
Health Care
Some typical applications are:
PC/Network Access - the biometrics are used to control a secure access of the
employees to the hospital network, primarily, in order to protect the patient
information,
Access to personal information - Using biometrics, the medical patient information may
be stored on smart card or secure networks, this will enable the access of the patients
to their personal information.
Patient identification - In case of emergency, when a patient does not have
identification document and is unable to communicate, biometric identification may be
a good alternative to identify.
15
ADVANTAGES OF BIOMETRICS
DISADVANTAGES OF BIOMETRICS
• The finger print of those people working in Chemical industries are often affected.
Therefore, these companies should not use the finger print mode of authentication.
• It is found that with age, the voice of a person differs. Also when the person has flu
or throat infection the voice changes or if there are too much noise in the environment
this method may not authenticate correctly. Therefore this method of verification is not
workable all the time
• For people affected with diabetes, the eyes get affected resulting in differences.
• Biometrics is an expensive security solution.
17
CONCLUSION
With the introduction of the technology of Biometrics, we no more have to take the pain of
typing the whole password into our locked phones, instead our face scan unlocks the phone in
fraction of a second; in short we are our own keys.
The technology of biometrics is growing at a fast pace and there are still many milestones to
achieve, definitely biometrics will bring great ease to human efforts.
BIBLIOGRAPHY
https://www.google.com/
https://en.wikipedia.org/wiki/Biometrics
https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/
https://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
https://www.schneier.com/essays/archives/1999/08/biometrics_uses_and.html