Professional Documents
Culture Documents
verification
Presented By
Deepali P. Chaudhari
Guided By
Nareshkumar D. Harale
(HOD of Comp. Engg. Dept.)
Biometric
Biometrics is the science and technology of measuring
and analyzing biological data.
By using biometrics, the authentication of the person is
related to that person itself rather than persons tokens
or passwords.
Biometrics are used for identification and verification.
Identification is determining who a person is.
Verification is determining if a person is who they say
they are.
Why Biometric?
Securing personal privacy
prevent identity fraud
There is no way to positively link the usage of the system
or service to the actual user.
1.
2.
3.
4.
Image Acquisition
Image processing
Feature Extraction
Iris Identification
Types of Biometric
Finger Scanning
Fingerprints are the graphical flow-like ridges present on human
fingers.
Fingerprints are used in the areas of financial transactions, network
security, and controlling the movement of individuals.
The main technologies used to capture the fingerprint image with
sufficient detail are optical, silicon, and ultrasound.
Issues with fingerprint systems
The tip of the finger is a small area from which to take
measurements, and ridge patterns is complicated task.
Even to take measurements, and ridge patterns where cuts & dirt is
there is complicated task.
People with no or few minutia points (surgeons as they often wash
their hands with strong detergents, builders, people with special
skin conditions) cannot enroll or use the system.
* Easy to use
* Cheap
* Small size
* Low power
* Large database already available
Iris Scanning
The iris is the elastic, pigmented, connective tissue that controls the
pupil.
Glasses, contact lenses, and even eye surgery does not change the
characteristics of the iris.
Benefits of iris biometric systems
* Highly accurate
Weaknesses of iris biometric systems
* The user must hold still while the scan is taking place
Retina Scanning
The blood vessels at the back of the eye have a unique pattern, from
eye to eye and person to person.
How does retina biometrics work
Retina scans require that the person removes their glasses, place
their eye close to the scanner, stare at a specific point, and remain
still, and focus on a specified location for approximately 10 to 15
seconds while the scan is completed.
Retina scans use infrared light to survey the unique pattern of
blood vessels of the retina
Issues with retina systems
Enrollment and scanning are slow.
Facial Recognition
The dimensions, proportions and physical attributes of a person's face
are unique.
How does face biometrics work
Biometric facial recognition systems will measure and analyze the
overall structure, shape and proportions of the face.
Distance between the eyes, nose, mouth, and jaw edges.
Upper outlines of the eye sockets, the sides of the mouth, the
location of the nose and eyes, the area surrounding the cheekbones.
Voice Recognition
Our voices are unique to each person (including twins), and cannot be
exactly replicated.
How does voice biometrics work
Speech includes two components
physiological component (the voice tract)
behavioural component (the accent)
METHODS OF BIOMETRICS
Gabor Filtering
Gabor elementary functions are Gaussians modulated by sinusoidal
functions.
A two dimensional (2D) even Gabor filter can be represented by the
following equation in the spatial domain:
Fig. 3.2 (a) Original Image. (b) Gabor Filter. (c) Gabor filtered Image.
Wavelet Transform
The wavelet transform divides the original image into four sub-bands
and they are denoted by LL(low-low), LH(low-high), HL(high-low)
and HH(high-high) frequency sub-bands.
Neural Network
Fig. Outline of Face Recognition System by using Back-propagation
Neural Network
Advantage
There is no extra learning process included here, only by saving the
face information of the person and appending the persons name in the
learned database completes the learning process.
Extracted features are fed into the input of the multilayer Neural
Network and the network is trained to create a knowledge base for
recognition which is then used for recognition.
Permanence
Performance
Uniqueness
Acceptability
Applications
Prison visitor systems.
Drivers licenses.
Canteen administration
Benefit payment systems.
Border control.
Voting systems.
Advantages
Authenticate the user.
Users cannot pass biometric characteristics to other users as easily
as they do cards or passwords.
Biometric objects cannot be stolen.
Most biometric techniques are based on features that cannot be lost
or forgotten.
Biometric authentication systems requires less speed.
Drawbacks of biometrics
That the system will enhance the power over individuals of particular
organizations and the State
That high-integrity identification embodies an inversion of the
appropriate relationship between the citizen and the State
That society is becoming driven by technology-assisted bureaucracy,
rather than by elected government
That exemptions and exceptions will exist for powerful individuals
and organizations, and that the system will entrench fraud and
criminality
That such identification schemes are the mechanism foretold in
religious prophecy (e.g. 'the Mark of the Beast').