You are on page 1of 6

Biometric Security Systems

Kislaya Srivastava1, Manish Kumar2 MIETE,


1- Final Year Department of E & C Engg. Northern India Engineering College Lucknow
2- Asst. Prof. & Head E & C Department Northern India Engineering College, Lucknow
kislayji@rediffmail.com , hodec_nieclko@rediffmail.com
Abstract- The word biometric can be
defined as "Life - Measure". A well
orchestrated biometric authentication
solution not only prevents and detects
an imposter but also keeps a secure log
of transaction activities for prosecution
of imposters. This paper provides an
overview of the various types of
biometric technologies present in Biometric Classification
civilian and military domains, their
applications, advantages and Biometric characteristics can be
disadvantages. The paper also divided in two main categories
describes the future prospects of physiological and behavioral. The
biometric security systems. biometric systems consist of three
basic elements:
Keywords-Identification, Verification,
False Accept Rate (FAR), False Reject Enrollment is the process of collecting
Rate (FRR). biometric samples from an individual
known as enrollee and subsequent
Introduction- The present day world generation of his template.
is obsessed with security. It is easy to Template is the data representing the
understand the need for biometrics if enrollee’s biometric.
you've ever forgot or left your network Matching is the process of comparing
password on your computer. There is the live biometric sample against one
an increasing need to find a way to or many templates in the system’s
solve user identification issues and cut database.
costs for password administration.
There are many reasons to consider Characteristics for identification-
this form of personal identification.
For each reason, authenticating 1. The physical characteristic should
ourselves by who we are and not what not change over the course of the
we know, what we carry, or how we person's lifetime
choose to identify ourselves (i.e. PINs, 2. The physical characteristics must
passwords, smart card security token) identify the individual person
solves and simplifies these issues. uniquely.
Biometrics combined with other 3. The characteristic needs to be
automation can eliminate our sole easily scanned with immediate
reliance on a paper trail for a given results.
transaction or event. 4. The data must be simply checked
The biometric authentication system in an automated way.
cannot fall prey to hackers; it can’t be 5. Ease of use by system operators
shared, lost or guessed. Therefore it is and individuals.
an efficient way to replace the
traditional password based While there are many possible
authentication system. biometrics, at least eight mainstream
biometric technologies have been
deployed which are classified into two
major categories Contact and non
Contact biometric. Contact Biometric
can be sub classified as Fingerprint,
hand/ finger geometry, Dynamic automatically identifying or verifying a
signature verification, Keystroke person from a digital still or video
dynamics. The non contact biometric images by comparing selected facial
technologies may be sub classified as features in the live image and a facial
Facial Recognition, Voice recognition, database.Voice recognition is the
Iris scan, Retinal Scan. process of determining which
registered speaker provides a given
Fingerprint biometric takes an image utterance or "voiceprint". Voice or
of a person's fingertips and records its speaker recognition uses vocal
characteristics. This information may characteristics to identify individuals
then be processed or stored as an using a pass phrase (password).Iris
image or as an encoded computer recognition combines computer vision,
algorithm to be compared with other pattern recognition, statistical
fingerprint records. This Technique inference, and optics. Its purpose is
finds applications in Law enforcement, real-time, high confidence recognition
fraud prevention and Computer access. of a person's identity by mathematical
Hand geometry involves the analysis of the random patterns that are
measurement and analysis of the shape visible within the iris of an eye from
of one's hand. It is a fairly simple some distance. Iris scans are extremely
procedure and is surprisingly accurate. accurate. Retinal scanning analyses the
Though it requires special hardware to layer of blood vessels at the back of
use, it can be easily integrated into the eye.
other devices or systems. Unlike
fingerprints, the human hand isn't
unique. Individual hand features are
not descriptive enough for
identification. However, it is possible
to devise a method by combining
various individual features and
measurements of fingers and hands for
verification purposes. Signature
verification is the process used to Retina Scan
recognize an individual’s hand-written
signature. It uses the behavioral It involves using a low-intensity light
biometrics of a hand written signature source and an optical coupler and can
to confirm the identity of a computer read the patterns at a great level of
user. This is done by analyzing the accuracy. It does require the user to
shape, speed, stroke, pen pressure and remove glasses, place their eye close to
timing information during the act of the device, and focus on a certain
signing. point. Retina scan devices are great
In Keystroke Dynamics the manner and long-term, high-security options.
rhythm in which an individual types
characters is analyzed to develop a Emerging Biometric Technologies-
unique biometric template of the users An emerging biometric is in infancy
typing pattern for future authentication. stage of technological maturation.
It is used to verify or even try to Once proven, an emerging biometric
determine the identity of the person will evolve into an established
who is producing those keystrokes. biometric. Some examples include
Facial recognition system is a Brainwave biometric, DNA
computer-driven application for identification, Vascular pattern
recognition, Body Odour recognition, recognition or gait signature as it is
Fingernail bed recognition, Gait sometime referred to; it uses a radar
recognition, Handgrip recognition, Ear system to capture the subject in
pattern recognition, Body salinity motion. Georgia Tech Research
identification, Infrared fingertip Institute are building a new radar
imaging and pattern recognition. system that can identify people from
up to 500 feet away during the day,
Brainwave biometric Brainwaves night, and all-weather conditions.
resolve into nothing more then Handgrip Recognition Advanced
recognizable patterns. If we could Biometrics Incorporated invented this
identify at least one pattern that was technology, with hope of it one day
unique, unchanging, and monotonous, being used to prevent unauthorized use
then we would have a security protocol of handguns. It is the hope of handgun
of peerless supremacy. Such a solution manufactures to create a smart
could not be stolen or easily duplicated handgun that will only recognize
and could theoretical be applied to all authorized users. Handgrip technology
people, to include mobility challenged focuses on the internal part of the hand
individuals. by analyzing the unique subcutaneous
tissues, blood vessel patterns, veins,
arteries and fatty tissues of a hand in a
gripped position.

Vascular patterns: are best described


as a picture of the veins in a person's
hand or face. The thickness and
location of these veins are believed to
Depiction of EEG Brain waveforms
be unique enough to an individual to
be used to verify a person's identity.
DNA Identification DNA is a unique
and measurable human characteristic
that is accepted by society as absolute
evidence of one’s identity with a near
probability of 99.999% accuracy.
Scientists use a small number of
sequences of DNA that are known to
greatly vary among individuals in
order to ascertain the probability of a
match.
Vein scanners use near-infrared light
Body odor recognition is a contact less to reveal the patterns in a person’s
physical biometric that attempts too veins.
confirm a person’s identity by
analyzing the olfactory properties of Ear Pattern Recognition The shape of
the human body scent. Each chemical the outer ear, lobes, bone structure and
of the human scent is extracted by the the size are unique to each person. Ear
biometric system and converted into a pattern recognition is employed as a
unique data string which is analyzed physical Contactless biometric and
by sensors. Gait Recognition Is a uses an Optophone to verify the shape
behavior biometric that attempts to of the ear. A French company, ART
recognize people by the manner in Techniques, developed the Optophone
which they walk and/or run. Gait
and the process. It is a telephone type 1. Financial services ( ATM)
handset, which is comprised of two 2. Immigration and border control
components (lighting source and (passport and visa issuance)
cameras).Body salinity biometric an 3. Social services(fraud detection)
individual’s salinity level of salt in the 4. Health care
body is believed to be unique. This 5. Physical access control
technology passing a tiny electrical 6. Time and attendance
current through the body in order to 7. Computer security (e-commerce)
analysis the salt content. The more salt 8. Telecommunications (mobile)
in the body, the more conductive the 9. Law enforcement (national ID)
body becomes to electricity. As the
electrical current passes through the Performance Parameters
body it can also carry data at a transfer False accept rate (FAR) or false match
rates equivalent to a 2400-baud rate (FMR): the probability that the
modem. This technology could be system incorrectly declares a
used to facilitate communication successful match between the input
between cell phones, watches. pattern and a non-matching pattern in
Fingernail bed recognition The system the database. It measures the percent of
scans the dermal structure under the invalid matches.
fingernails. The human nail bed is a
unique longitudinal structure that is False reject rate (FRR) or false non-
made up of nearly parallel rows of match rate (FNMR): the probability
vascular rich skin with parallel dermal that the system incorrectly declares
structures in between narrow channel failure of match between the input
pattern and the matching template in
the database. It measures the percent of
valid inputs being rejected.

Equal error rate (EER): The rates at


which both accept and reject errors are
equal.
Failure to capture rate (FTC): Within
Magnification of Human Nail Bed automatic systems, the probability that
the system fails to detect a biometric
Disadvantages of Biometric Systems: characteristic when presented
People with disability may have correctly.
problems with contact biometrics.
The truth is that the security codes and Verification: does the template match
the passwords used in the ATMs, the input sample? (A 1:1 match) A pre-
Phone lock and credit and debit cards stored template is matched against a
are a supplement to the biometric sample directly, e.g. a card or known
security systems. The biometric database entry.
solutions are going to play a very big
role in near future. So it is best that one Identification: what is the input
puts in a bit of an effort to field test the sample? (A 1: N match) where N is the
various biometric solutions. total number of entries in the database.
It is a process of identifying from all
Biometric Applications: Most the templates which one is the closest
biometric applications fall into one of match to the input sample.
the nine general categories:
Conclusion- mediums (i.e. CD-R/RW, DVD-R/RW,
Biometrics can do a lot more than just flash memory). The end result would
determine whether someone has access be that only the legitimate owner of
to walk through a particular door. might access the work of art.
Some hospitals use biometric systems Think of biometrics as a key! Yes… A
to make sure mothers take home the key, it can open doors for you and
right newborns. Experts have also provides security to keep others out. It
advised people to scan their vital is a key that can be customized to an
documents, like birth certificates and individual’s access needs. You can use
social security cards, and store them in a biometric to access your home, your
biometrically-secured flash memory in account, or to invoke a customized
the event of a national emergency. setting for any secure area /application.
Here are some biometric technologies
you might see in the future: References-
New methods that use DNA, nail bed www.biometrics.org
structure, teeth, ear shapes, body odor, http://www.dodcounterdrug.com/
skin patterns and blood pulses, More facialrecognition/
accurate home-use systems, Opt-in http://www.ins.gov/graphics/
club memberships, frequent buyer lawenfor/bmgmt/inspect/inspass.htm.
programs and rapid checkout systems
with biometric security, More
prevalent biometric systems in place of
passports at border crossings and
airports.
Nowadays Banks are contemplating
putting Biometric Systems on the
ATM cards to ensure no imposters are
able to withdraw money even after
knowing the password.

A biometric security smart Card

The United Kingdom has already


started the Distribution of Biometric
Passports to prevent forgery and check
imposters.
A major use of biometrics can be in
protecting the copyright privileges of
music, movies, and software creators.
A biometric algorithm could be
employed to encrypt and decrypt
media stored on a multitude of

You might also like