Chapter 1: Introduction: 1.1 Biometrics
Chapter 1: Introduction: 1.1 Biometrics
Chapter 1: Introduction: 1.1 Biometrics
Introduction
Chapter 1:
1.1 Biometrics
Introduction
History of identification of humans is as old as human beings. With the development in science and technology in the todays modern world, human activities and transactions have been growing tremendously. Authenticity of users has become an inseparable part of all transactions involving human computer interaction. Most conventional modes of authentication are based on knowledge based systems i.e. what we know (e.g. passwords, PIN code etc) and / or token based systems i.e. what we have (e.g. ID cards, passports, driving license etc.)[1]. Biometrics bring in stronger authentication capabilities by adding a third factor, who we are based on our inherent physiological or behavioral characteristics. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). In other words, bio means living creature and metrics means the ability to measure an object quantitatively [2]. The use of biometrics has been traced back as far as the Egyptians, who measured people to identify them. Biometric technologies are hence becoming the foundation of an extensive array of highly protected identification and personal verification systems. Biometrics is the branch of science which deals in automated methods of recognizing a person based on a physiological or behavioral characteristic. This technology involves in capturing and processing an image of a unique feature of an individual and comparing it with a processed image captured previously from the database. The behavioral characteristics are voice, odor, signature, gait, and voice whereas physiological characteristics are face, fingerprint, hand geometry, ear, retina, palm prints and iris. All biometric identification systems rely on forms of random variation among persons based on these characteristics. More complex is the randomness, the more unique features for identification; because more dimensions of independent variation produce code having greater uniqueness. Every biometric system has the following layout. First, it captures a sample of the feature, such as recording a digital sound signal for voice recognition, or taking a digital color image for face recognition or iris recognition, or retina scan for retina recognition.
-1-
Chapter 1
Introduction
The sample is then transformed using some sort of mathematical function into a biometric template. The biometric template will provide a normalized, efficient and highly discriminating representation of the features, which then can be compared with other templates in order to determine identity. Most biometric systems allow two modes of operation. An enrolment mode for adding templates to a database, and matching mode, where a template is created for an individual and then a match is searched for in the database of pre-enrolled templates in two ways. One is called verification in which one-to-one comparison is carried out and other is identification in which one template is compared throughout the database. If any physiological part has the following properties then it would be considered as a biometric [3].
-2-
Chapter 1
Introduction
However, in a biometric system these should be practically implemented [4]. In addition to that, there are number of other issues that should be considered, such as: Performance: It refers to the achievable recognition accuracy and speed, the resources required to achieve the desired recognition accuracy and speed, as well as the operational and environmental factors that affect the accuracy and speed. Acceptability: It indicates the extent to which people are willing to accept the use of a particular biometric identifier (characteristic) in their daily lives. Circumvention: It reflects how easily the system can be fooled using fraudulent methods. Cost: It is always a concern. In this case, the life-cycle cost of system maintenance must also be taken into account.
1.2.2 Fingerprint
Fingerprint imaging technology has been in existence for centuries. The use of fingerprints as a unique human identifier starts back in second century B.C. in China,
-3-
Chapter 1
Introduction
where the identity of the sender of an important document could be verified by his fingerprint impression in the wax seal. Fingerprint imaging technology looks to capture or read the unique pattern of lines on the tip of one's finger. These unique patterns of lines can either be in a loop, whorl or arch pattern. The most common method involves recording and comparing the fingerprint's minutiae points. Minutiae points can be considered the uniqueness of an individual's fingerprint [23]. In a typical fingerprint [24] that has been scanned by a fingerprint identification system, there are generally between 30 and 40 minutiae. The research in fingerprint identification technology has improved the identification rate to greater than 98 percent and a false positive (false reject) rate to smaller than one percent within the Automated Fingerprint Identification System (AFIS) criminal justice program.
1.2.4 Retina
Retinal biometric involves analyzing the layer of blood vessels situated at the back of the eye. Retinal scans involve a low-intensity infrared light that is projected through the back
-4-
Chapter 1
Introduction
of the eye and onto the retina. Infrared light is used based on the fact that the blood vessels on the retina absorb the infrared light faster than surrounding eye tissues. The infrared light with the retinal pattern is reflected back to a video camera. The video camera captures the retinal pattern and converts it into data that is 35 elements in size [27]. This is not particularly convenient if you are wearing glasses or concerned about having close contact with the reading device. For these reasons, retinal scanning is not warmly accepted by all users, although the technology itself can work well. The current hurdle for retinal identification is the acceptance by the users. Retinal identification has several disadvantages including susceptible to disease damage (i.e. cataracts), viewed as intrusive and not very user friendly, high amount of both user and operator skill required.
-5-
Chapter 1
Introduction
user-friendly. Speaker recognition systems [32] fall into two basic types: text-dependent and text-independent. In text-dependent recognition, the speaker says a predetermined phrase. This technique inherently enhances recognition performance, but requires a cooperative user. In text independent recognition, the speaker neither says a predetermined phrase nor cooperates or even not to be aware of the recognition system. Speaker recognition suffers from several limitations. Different people can have similar voices [33-35], and anybodys voice can vary over time because of changes in health, emotional state and age. Furthermore, variation in handsets or in the quality of a telephone connection complicates the recognition process.
-6-
Chapter 1
Introduction
recognition uses camera technology and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich intricate structures of the iris. These unique structures are converted into digital templates. They provide mathematical representations of the iris that yield unambiguous positive identification of an individual. Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology has been designed for use in a one-to-many search environment. A key advantage of iris recognition is its stability or template longevity as barring trauma and a single enrollment can last a lifetime [65]. Among the physiological characteristics, iris is the best biometric. It has all the capabilities of a good biometric.
Chapter 1
Introduction
-8-
Chapter 1
Introduction
muscular tissue that controls the size of the pupil. It regulates how much light enters the eye - the pupil grows larger in dim light and shrinks to a smaller hole in bright light. The light passes through the lens that helps focus the light from the pupil onto the retina. Light from the lens passes through the vitreous body which is a clear jelly-like substance that fills the back part of the eyeball. It is focused onto the retina that is a layer of lightsensitive tissue at the back of the eye. The retina contains light-sensitive cells called photoreceptors. It translates the light energy into electrical signals. These electrical signals travel to the brain via the optic nerve. The retina is nourished by the choroids (a highly vascularized membrane that exists just behind the retina). Aside from the transparent cornea at the front of the eye, the eyeball is encased by a tough, white and opaque membrane called the sclera [68].
Chapter 1
Introduction
definition. The most frontal chamber of the eye, immediately behind the cornea and in front of the iris, contains a clear watery fluid that facilitates good vision. It helps to maintain eye shape, regulates the intra-ocular pressure, provides support for the internal structures, supplies nutrients to the lens and cornea and disposes off the eye's metabolic waste. The rear chamber of the front cavity lies behind the iris and in front of the lens. It helps provide optical correction for the image on the retina. Some recent optical designs also use coupling fluids for increased efficiency and better correction.
-10-