You are on page 1of 17

1

SEMINAR REPORT

BIOMETRICS

Department of Computer Science & Engineering


Madan Mohan Malaviya University of Technology, Gorakhpur

Submitted to: Submitted by:


Dr. A. K. Daniel Pratyaksha Srivastava
(Professor) B.tech, IIIrd Year
Dept. of Computer Science & Engineering Computer Science & Engineering
MMMUT - GORAKHPUR (2016021061)
2

CANDIDATE’S DECLARATION
I declare that this written submission represents my work and ideas in my own words and where
others' ideas or words have been included, I have adequately cited and referenced the original
sources. I also declare that I have adhered to all principles of academic honesty and integrity and
have not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I
understand that any violation of the above will be cause for disciplinary action by the University
and can also evoke penal action from the sources which have thus not been properly cited or
from whom proper permission has not been taken when needed.

_________________________________
(Signature)
________________________________
(Name of the student)
_________________________________
(Roll No.)
_________________________________
(Name of Department)
Date:
3

ACKNOWLEDGEMENT
It gives me a great sense of pleasure to present the report of the B. Tech Paper Presentation
undertaken during B. Tech. Third Year. I owe special debt of gratitude to Dr. A. K. Daniel,
Professor, Department of Computer Science & Engineering, MMMUT, Gorakhpur for his
constant support and guidance throughout the course of our work. His sincerity, thoroughness
and perseverance have been a constant source of inspiration for us. It is only his cognizant
efforts that our endeavours have seen light of the day.

I also do not like to miss the opportunity to acknowledge the contribution of all faculty members
of the department for their kind assistance and cooperation during the development of our
project. Last but not the least, we acknowledge my friends for their contribution in the
completion of the paper.

Signature:
Name:
Roll No:
Date:
4

ABSTRACT
Humans recognize each other according to their various characteristics for ages. We recognize
others by their face when we meet them and by their voice as we speak to them. Identity
verification (authentication) in computer systems has been traditionally based on something
that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or
cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To
achieve more reliable verification or identification we should use something that really
characterizes the given person. Biometrics offer automated methods of identity verification or
identification on the principle of measurable physiological or behavioural characteristics such as
a fingerprint or a voice sample. The characteristics are measurable and unique. These
characteristics should not be duplicable, but it is unfortunately often possible to create a copy
that is accepted by the biometric system as a true sample. In biometric-based authentication, a
legitimate user does not need to remember or carry anything and it is known to be more
reliable than traditional authentication schemes. However, the security of biometric systems
can be undermined in a number of ways. For instance, a biometric template can be replaced by
an impostor's template in a system database or it might be stolen and replayed. Consequently,
the impostor could gain unauthorized access to a place or a system. Moreover, it has been
shown that it is possible to create a physical spoof starting from standard biometric templates.
Hence, securing the biometric templates is vital to maintain security and integrity of biometric
systems. This report actually gives an overview of what is biometric system and a detail
overview of a particular system i.e. iris recognition system.
5

Content
1. INTRODUCTION

2. CATEGORIZATION OF BIOMETRICS

3. BIOMETRIC FUNCTIONALITY

4. MULTIMODAL BIOMETRIC SYSTEMS

5. TYPES OF BIOMETRICS

6. APPLICATIONS OF BIOMETRICS

7. RECENT ADVANCES IN EMERGING BIOMETRICS

8. ADVANTAGES OF BIOMETRIC SYSTEMS

9. DISADVANTAGES OF BIOMETRIC SYSTEMS

10. CONCLUSION

11. BIBLIOGRAPHY
6

INTRODUCTION

Biometrics are automated methods of recognizing a person based on a physiological or


behavioural characteristic. Among the features measured are face, fingerprints, hand
geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming
the foundation of an extensive array of highly secure identification and personal
verification solutions. As the level of security breaches and transaction fraud increases,
the need for highly secure identification and personal verification technologies is
becoming apparent.

Biometric-based solutions are able to provide for confidential financial transactions and
personal data privacy. The need for biometrics can be found in federal, state and local
governments, in the military, and in commercial applications. Enterprise-wide network
security infrastructures, government IDs, secure electronic banking, investing and other
financial transactions, retail sales, law enforcement, and health and social services are
already benefiting from these technologies.

Biometric-based authentication applications include workstation, network, and domain


access, single sign-on, application logon, data protection, remote access to resources,
transaction security and Web security. Trust in these electronic transactions is essential to
the healthy growth of the global economy. Utilized alone or integrated with other
technologies such as smart cards, encryption keys and digital signatures, biometrics are
set to pervade nearly all aspects of the economy and our daily lives.

Utilizing biometrics for personal authentication is becoming convenient and considerably


more accurate than current methods (such as the utilization of passwords or PINs). This is
because biometrics links the event to a particular individual (a password or token may be
used by someone other than the authorized user), is convenient (nothing to carry or
remember), accurate (it provides for positive authentication), can provide an audit trail
and is becoming socially acceptable and cost effective.
7

CATEGORIZATION OF BIOMETRICS

Biometric identifiers are the distinctive, measurable characteristics used to label and
describe individuals. Biometric identifiers are often categorized as physiological versus
behavioural characteristics. Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent.
Behavioural characteristics are related to the pattern of behaviour of a person, including
but not limited to typing rhythm, gait, and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems,
such as a driver's license or passport, and knowledge-based identification systems,
such as a password or personal identification number. Since biometric identifiers are
unique to individuals, they are more reliable in verifying identity than token and
knowledge-based methods; however, the collection of biometric identifiers
raises privacy concerns about the ultimate use of this information.
8

BIOMETRIC FUNCTIONALITY

Many different aspects of human physiology, chemistry or behaviour can be used for
biometric authentication. The selection of a particular biometric for use in a specific
application involves a weighting of several factors. Jain et al. (1999) identified seven
such factors to be used when assessing the suitability of any trait for use in biometric
authentication.

 Universality means that every person using a system should possess the trait.
 Uniqueness means the trait should be sufficiently different for individuals in the
relevant population such that they can be distinguished from one another.
 Permanence relates to the manner in which a trait varies over time. More
specifically, a trait with 'good' permanence will be reasonably invariant over time
with respect to the specific matching algorithm.
 Measurability (collectability) relates to the ease of acquisition or measurement of
the trait. In addition, acquired data should be in a form that permits subsequent
processing and extraction of the relevant feature sets.
 Performance relates to the accuracy, speed, and robustness of technology used
(see performance section for more details).
 Acceptability relates to how well individuals in the relevant population accept the
technology such that they are willing to have their biometric trait captured and
assessed.
 Circumvention relates to the ease with which a trait might be imitated using an
artifact or substitute.
Proper biometric use is very application dependent. Certain biometrics will be better
than others based on the required levels of convenience and security. No single
biometric will meet all the requirements of every possible application.
9

The block diagram illustrates the two basic modes of a biometric system. First,
in verification (or authentication) mode the system performs a one-to-one comparison of
a captured biometric with a specific template stored in a biometric database in order to
verify the individual is the person they claim to be. Three steps are involved in the
verification of a person. In the first step, reference models for all the users are
generated and stored in the model database. In the second step, some samples are
matched with reference models to generate the genuine and impostor scores and
calculate the threshold. Third step is the testing step. This process may use a smart
card, username or ID number (e.g. PIN) to indicate which template should be used for
comparison. 'Positive recognition' is a common use of the verification mode, "where the
aim is to prevent multiple people from using the same identity".
Second, in identification mode the system performs a one-to-many comparison against
a biometric database in an attempt to establish the identity of an unknown individual.
The system will succeed in identifying the individual if the comparison of the biometric
sample to a template in the database falls within a previously set threshold.
Identification mode can be used either for 'positive recognition' (so that the user does
not have to provide any information about the template to be used) or for 'negative
recognition' of the person "where the system establishes whether the person is who she
(implicitly or explicitly) denies to be". The latter function can only be achieved through
biometrics since other methods of personal recognition such as passwords, PINs or
keys are ineffective.
10

MULTIMODAL BIOMETRIC SYSTEMS

Multimodal biometric systems are those that utilize more than one physiological or behavioural
characteristic for enrolment, verification, or identification. In applications such as border
entry/exit, access control, civil identification, and network security, multi-modal biometric
systems are looked to as a means of

1. Reducing false non-match and false match rates,


2. Providing a secondary means of enrolment, verification, and identification if sufficient
data cannot be acquired from a given biometric sample, and
3. Combating attempts to fool biometric systems through fraudulent data sources such as
fake fingers.

A multimodal biometric verification system can be considered as a classical information fusion


problem i.e. can be thought to combine evidence provided by different biometrics to improve the
overall decision accuracy. Generally, multiple evidences can be integrated at one of the
following three levels.

 Abstract level: The output from each module is only a set of possible labels without any
confidence value associated with the labels; in this case a simple majority rule may be
used to reach a more reliable decision.
 Rank level: The output from each module is a set of possible labels ranked by decreasing
confidence values, but the confidence values themselves are not specified.
 Measurement level: the output from each module is a set of possible labels with
associated confidence values; in this case, more accurate decisions can be made by
integrating different confidence values. 
11

TYPES OF BIOMETRICS
• DNA Matching - The identification of an individual using the analysis of segments from
DNA.

• Ear - The identification of an individual using the shape of the ear.

• Eyes - Iris Recognition - The use of the features found in the iris to identify an individual.

• Eyes - Retina Recognition - The use of patterns of veins in the back of the eye to
accomplish recognition.

• Face Recognition - The analysis of facial features or patterns for the authentication or
recognition of an individual’s identity.

• Fingerprint Recognition - The use of the ridges and valleys (minutiae) found on the
surface tips of a human finger to identify an individual.

• Finger Geometry Recognition - The use of 3D geometry of the finger to determine


identity.

• Gait - The use of an individual’s walking style or gait to determine identity.

• Hand Geometry Recognition - The use of the geometric features of the hand such as the
lengths of fingers and the width of the hand to identify an individual.

• Typing Recognition - The use of the unique characteristics of a person’s typing for
establishing identity.

• Vein Recognition - Vein recognition is a type of biometrics that can be used to identify
individuals based on the vein patterns in the human finger or palm.

• Voice - Speaker Verification/Authentication- The use of the voice as a method of


determining the identity of a speaker for access control. 

• Signature Recognition - The authentication of an individual by the analysis of


handwriting style, in particular the signature.
12

APPLICATIONS OF BIOMETRICS

In the last years has considerably increased the area of application of biometrics and it's
expected that in the near future, we will use biometry many times in our daily activities such as
getting in the car, opening the door of our house, accessing to our bank account, shopping by
internet, accessing to our PDA, mobile phone, laptops, etc.

Depending of where the biometrics is deployed, the applications can be categorized in the
following five main groups: forensic, government, commercial, health-care and traveling and
immigration. However, some applications are common to these groups such as physical access,
PC/network access, time and attendance, etc.

Forensic
The typical applications are:

 Identification of criminals- collecting the evidence in the scene of crime (e.g., fingerprints) it is
possible to compare with data of suspects or make a search in the database of criminals.

 Surveillance --using cameras one can monitor the very busy places such as stadiums, airports,
meetings, etc. Looking in the crowds for suspect, based on the face recognition biometric, using
images (e.g., mug shots) database of wanted persons or criminals. Since the events of
September 11, 2001, the interest in biometric surveillance has increased dramatically,
especially for air travel applications. Currently there are many cameras monitoring crowds at
airports for detecting wanted terrorists.

 Corrections -This refers to the treatment of offenders (criminals) through a system of penal
incarceration, rehabilitation, probation, and parole, or the administrative system by which
these are effectuated. Is this cases a biometric system can avoid the possibility of accidentally
releasing the wrong prisoner, or to ensure that people leaving the facilities are really visitors
and not inmates.

 Probation and home arrest - biometric can also be used for post-release programs
(conditional released) to ensure the fulfilment of the probation, parole and home detention
terms.
13

Government
The typical applications are:

 National Identification Cards - the idea is to include digital biometric information in the
national identification card. This is the most ambitious biometric program, since the
identification must be performed in a large-scale database, containing hundreds of millions
samples, corresponding to the whole population of one country. This kind of cards can be used
for multiple purposes such as controlling the collection of benefits, avoiding duplicates of voter
registration and driver’s license emission. All these applications are primarily based on finger-
scan and AFIS technology, however it is possible that facial-scan and iris-scan technology could
be used in the future.

 Voter ID and Elections - while the biometric national ID card is still in project, in many
countries are already used the biometry for the control of voting and voter registration for the
national or regional elections. During the registration of voter, the biometric data is captured
and stored in the card and in the database for the later use during the voting. The purpose is to
prevent the duplicate registration and voting.

 Driver's licenses - In many countries the driver license is also used as identification document,
therefore it is important to prevent the duplicate emission of the driver license under different
name. With the use of biometric this problem can be eliminated. However, it is important that
the data must be shared between state, because in some country such as United States, the
license are controlled at the states as opposed to the federal level.

 Benefits Distribution (social service) - the use of biometry in benefits distribution prevents
fraud and abuse of the government benefits programs. Ensuring that the legitimate recipients
have a quick and convenient access to the benefits such as unemployment, health care and
social security benefits.

 Employee authentication - The government use of biometric for PC, network, and data access
is also important for security of building and protection of information. Below are more
detailed this kind of applications also used in commercial sector.

 Military programs - the military has long been interested in biometrics and the technology has
enjoyed extensive support from the national security community.

Commercial
Some applications in this sector are:
14

 Account access - The use of biometric for the access to the account in the bank allows to
keep definitive and auditable records of account access by employees and customers.
Using biometry, the customers can access accounts and employees can log into their
workstations.
 ATMs - the use of biometric in the ATM transaction allows more security,
 Expanded Service Kiosks - A more receptive market for biometrics may be special
purpose kiosks, using biometric verification to allow a greater variety of financial
transaction than are currently available through standard ATMs.
 Online banking - Internet based account access is already widely used in many places,
the inclusion of biometric will make more secure this type of transactions from home.
Currently, there are many pilot programs using biometric in home banking.
 Telephony transaction - Voice-scan biometric can be used to make more secure the
telephone-based transactions. In this type of application, when the costumer calls to
make a transaction, a biometric system will authenticate the customer's identity based
on his or her voice with no need of any additional device.
 PC/Network access - The use of biometric log-in to local PCs or remotely through
network increase the security of the overall system keeping more protected the
valuable information.
 Physical access - the biometric is widely used for controlling the access to building or
restricted areas. o E-commerce - biometric e-commerce is the use of biometrics to verify
of identity of the individual conduction remote transaction for goods or services
 Time and attendance monitoring - In this sector the biometrics is used for controlling
the presence of the individuals in a determine area. For example, for controlling the
time sheet of the employees or the presence of students at the classroom

Health Care
Some typical applications are:

 PC/Network Access - the biometrics are used to control a secure access of the
employees to the hospital network, primarily, in order to protect the patient
information,
 Access to personal information - Using biometrics, the medical patient information may
be stored on smart card or secure networks, this will enable the access of the patients
to their personal information.
 Patient identification - In case of emergency, when a patient does not have
identification document and is unable to communicate, biometric identification may be
a good alternative to identify.
15

RECENT ADVANCES IN EMERGING BIOMETRICS

In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram)


signals have emerged. The research group at University of Kent led by Ramaswamy
Palaniappam has shown that people have certain distinct brain and heart patterns that are specific
for each individual. Another example is finger vein recognition, using pattern-recognition
techniques, based on images of human vascular patterns.  The advantage of such 'futuristic'
technology is that it is more fraud resistant compared to conventional biometrics like
fingerprints. However, such technology is generally more cumbersome and still has issues such
as lower accuracy and poor reproducibility over time. This new generation of biometrical
systems is called biometrics of intent and it aims to scan intent. The technology will analyse
physiological features such as eye movement, body temperature, breathing etc. and predict
dangerous behaviour or hostile intent before it materializes into action.
On the portability side of biometric products, more and more vendors are embracing significantly
miniaturized biometric authentication systems (BAS) thereby driving elaborate cost savings,
especially for large-scale deployments.
16

ADVANTAGES OF BIOMETRICS

• Biometric identification can provide extremely accurate, secured access to information;


fingerprints, retinal and iris scans produce absolutely unique datasets when done
properly.
• Current methods like password verification have many problems (people write them
down, they forget them, they make up easy-to-hack passwords).
•  Automated biometric identification can be done very rapidly and uniformly, with a
minimum of training.
•  Your identity can be verified without resort to documents that may be stolen, lost
or altered.

DISADVANTAGES OF BIOMETRICS

• The finger print of those people working in Chemical industries are often affected.
Therefore, these companies should not use the finger print mode of authentication.
• It is found that with age, the voice of a person differs. Also when the person has flu
or throat infection the voice changes or if there are too much noise in the environment
this method may not authenticate correctly. Therefore this method of verification is not
workable all the time
• For people affected with diabetes, the eyes get affected resulting in differences.
• Biometrics is an expensive security solution.
17

CONCLUSION

With the introduction of the technology of Biometrics, we no more have to take the pain of
typing the whole password into our locked phones, instead our face scan unlocks the phone in
fraction of a second; in short we are our own keys.

The technology of biometrics is growing at a fast pace and there are still many milestones to
achieve, definitely biometrics will bring great ease to human efforts.

BIBLIOGRAPHY

https://www.google.com/
https://en.wikipedia.org/wiki/Biometrics
https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/
https://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
https://www.schneier.com/essays/archives/1999/08/biometrics_uses_and.html

You might also like