Biometrics: A Seminar Report On

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

A

Seminar Report On
BIOMETRICS
Presented by
1. Aditi Rajesh Kashetwar

2. Rajlakshmi Rajesh Kancharlawar

3. Sanjana Santoshrao Dhade

SE

Information Technology 2021-2022

Guided By

S.P.Bandewar Sir

(Department Of Information Technology)

Submitted to

MGM’s College of Engineering ,Nanded


under

Dr. Babasaheb Ambedkar Technological University,Lonere

1
Certificate
This is to certify that the report entitled

“BIOMETRICS”
Submitted By
1. Aditi Rajesh Kashetwar
2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade

in satisfactory manner as a partial fulfillment of Third year in Information


Technology
To

MGM’s College of Engineering, Nanded


Under
DR.Babasaheb Ambedkar Technological University,Lonere
has been carried out under my guidance,

Mr. S. P. Bandewar Asst. Professor

Mr. S. A. Hashmi Dr.Mrs.G.S.


Lathkar
Head
Director
Department of I T MGM’s COE Nanded

2
We are greatly indebted to our seminar guide Mr. S. P. Bandewar for
their able guidance throughout the course of this work. It has been an altogether
different experience to work with their and we would like to thank you for their
help, suggestions and numerous discussions.

We gladly take this opportunity to thank Mr. S. A. Hashmi (Head of


Information Technology Engineering, MGM’s College of Engineering,
Nanded.)

We are heartly thankful to Dr. Mrs. G. S. Lathkar (Director, MGM’s


College of Engineering, Nanded.) for providing facility during progress of
seminar; also for their kindly help, guidance and inspiration.

Last but not least we are also thankful to all those who help directly or
indirectly to develop this seminar and complete it successfully.

With Deep Reverence,

1.Aditi Rajesh Kashetwar


2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade
SY-IT

3
ABSTRACT

The biometric is said to have many limitations. Due to its drawbacks the multimodal
biometric has emerged to provide a secure solution. The multimodal biometric
system is a much more secure system ensuring more than one check. This is mostly
used in cases of bank security. This system involves the finger scanning along with
voice scan and hand geometry scam and even image scan. The image scans by image
processing is a highly modified system. Secure ATM by image processing is adopted
by most of the bank ATMs both in the private and government sectors.
The image processing is a complex system involving a number of interwoven
processes. The process of image processing from receiving the visual information to
presentation of the screen involves two major processes. The major 3 process
involved in Secure ATM image processing are, 1Discretization and representation,
2.Processing, 3.Analysis. Discretization and representation is changing the visual
available into a discrete form which is compatible with the computer.
Processing is done to improve on the quality of the image by filtering it. Data
is also compresses to save space. Analysis of the image is also done by taking out
the image features, qualifying the shapes and also registering them along with
recognizing them. The various process makes the Bank ATMs secure thus is
widely being adopted leaving behind the old biometricsystem.

4
CONTENTS
Chapter Title PageNo.
No.

1 Introduction 9

1.1 History & Development 10

1.2 What is biometric 10

1.3 Classification 10

2 Biometric System 11
Components (BCS)

2.1 Components 11

2.2 Authentication 11

2.3 Biometric Accuracy 11

3 Biometric Technology 12

3.1 Fingerprint Authentication 12 to 13

3.2 Retina Scan 13

3.3 Iris Recognition 14

5
3.4 Hand Geometry 14 to15

3.5 Voice recognition 15

3.6 Signature Pattern 15 to 16

3.7 Key Stroke 16

3.8 Facial Recognition 16 to 17

3.9 DNA Matching 17

4 Multimodal Biometric 18
System (MBS)

4.1 Fusion Of Face, Voice And 18


Fingerprint

4.2 Fusion Of Face And Lip 19

4.3 Vulnerable Points Of 19 to 20


Biometric System

5 Applications 21 to 23

6 Biometric Devices 24 to 25

7 Conclusion 26

8 References 27

6
LIST OF ABBREVIATIONS

1. MBS- Multimodal Biometric System

2. BCS- Biometric System Components

7
LIST OF FIGURES
Figure No. Title Page No.
3.1 Fingerprint Authentication 13

3.2 Retina Scan 13

3.3 Iris recognition 14

3.4 Hand Geometry 14

3.5 Voice Recognition 15

3.6 Signature Pattern 16

3.7 Key stroke 16

3.8 Facial Recognition 17

3.9 DNA Matching 17

4.1 Fusion Of Face, Voice And 18


Fingerprint

4.2 Fusion Of Face, And Lip 19

4.3 Vulnerable Points Of 20


Biometric System

6.1 Iris scanner 24

6.2 Face Camera 25

8
Chapter 1
Introduction

Reliable user authentication is becoming an increasingly important task in the Web-enabled


world. The consequences of an insecure authentication system in a corporate or enterprise
environment can be catastrophic, and may include loss of confidential information, denial of
service, and compromised data integrity. The value of reliable user authentication is not
limited to just computer enhanced security. The prevailing techniques of user authentication,
which involve the use of either passwords and user IDs (identifiers), or identification cards
and PINs (personal identification numbers), suffer from several limitations. Passwords and
PINs can be illicitly acquired by direct covert observation. Once an intruder acquires the user
ID or network access. Many other applications in everyday life also require user
authentication, such as banking, e- commerce, and physical access control to computer
resources, and could benefit from and the password,
the intruder has total access to the user’s resources. In addition, there is no way to positively
link the usage of the system or service to the actual user, that is, there is no protection against
repudiation by the user ID owner. For example, when a user ID and password is shared with a
colleague there is no way for the system to know who the actual user is. A similar situation
arises when a transaction involving a credit card number is conducted on the Web. Even
though the data are sent over the Web using secure encryption methods, current systems are
not capable of assuring that the rightful owner of the credit card initiated the transaction. In
the modern distributed systems environment, the traditional authentication policy based on a
simple combination of user ID and password has become inadequate. Fortunately, automated
biometrics in general, and fingerprint technology in particular, can provide a much more
accurate and reliable user authentication method. Biometrics is a rapidly advancing field that
is concerned with identifying a person based on his or her physiological or behavioural
characteristics. Biometrics is derived from the conjunction of the Greek words bios and
metrics that mean life and to measure respectively.

9
1.1 History and Development
The idea of using patterns for personal identification was originally proposed in 1936
By ophthalmologist Frank Burch. By the 1980 the idea had appeared in James Bond films,
but it still remained science fiction and conjecture. In 1987, two other ophthalmologists Aram
Safirand Leonard Flom patented this idea and in 1987 they asked John Daugman to try to
create actual algorithms for this iris recognition. These algorithms which daugman patented
in 1994 are the basis for all current iris recognition systems and products. daugman
algorithms are owned by technologies and the process is licensed to several other Companies
who serve as System integrators and developers of special platform for iris recognition in
recent years several products have been developed for acquiring its images over a range of
distances and in a variety of applications. One active imaging system developed in 1996 by
licensee Sensor deployed special cameras in bank ATM to capture IRISi mages at a distance
of up to 1 meter. This active imaging system was installed in cash machines both by NCR
Corps and by Diebold Corp in successful public trials in several countries during 1997 to
1999. a new and smaller imaging device is the low cost
“Panasonic Authentication digital camera for handheld, desktop, e
-commerce and other information security applications. Ticketless air travel, check-in and
security procedures based on iris recognition in airports have been developed by eye ticket.
1.2 What is biometrics
For a quick biometrics definition: Biometrics are biological measurements — or physical
characteristics — that can be used to identify individuals. For example, fingerprint mapping,
facial recognition, and retina scans are all forms of biometric technology, but these are just
the most recognized options.
Researchers claim the shape of an ear, the way someone sits and walks, unique body odours
the veins in one’s hands, and even facial contortions are other unique identifiers. These traits
further define biometrics.

1.3 CLASSIFICATION OF BIOMETRICS


BIOMETRICS is the science of analysing the characteristics specific to each individual in
order to be able to authenticate their identity. In the literal and most simple sense, biometrics
means the “measurement of the human body”.
If you have a relatively new smartphone, you may well be familiar with using your
fingerprint to unlock your phone, access online banking services or even authenticate a
mobile payment. A fingerprint is an example of physiological biometric data – something
that’s related to the specific measurements, dimensions and characteristics of your body.
This biometrics is the field of study related to the measure of uniquely identifying
and measurable patterns in human activities. The term contrasts with physical biometrics,
which involves innate human characteristics such as fingerprints or iris patterns.

10
Chapter 2
Biometric System Components
2.1 Components
A biometric system is essentially a pattern recognition system that recognizes a person based
on a feature vector derived from a specific characteristic that the person possesses.
3.1 Components of A simple biometric system:
1) Sensor module which acquires the biometric data; Web cam, Digitizing Table, Scanner.
2) Feature extraction module where the acquired data is processed to extract feature vectors;
Projection [offline], on Coordinates [online, offline]
3) Matching module where feature vectors are compared against those in the template ;(
Neural Networks, Algorithm)
4) Decision-making module in which the user's identity is established or a claimed identity is
accepted or rejected.
Biometrics As noted earlier refers to technologies that measure and analyse human body
characteristics, such as DNA, fingerprints and eye retina and irises and hand measurements,
for authentication purposes.

2.2 Authentication
Biometric authentication refers to security processes that verify a user’s identity through
unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints.
Biometric authentication systems store this biometric data in order to verify a user’s identity
when that user accesses their account. Because this data is unique to individual users,
biometric authentication is generally more secure than traditional forms of multi-factor
authentication.
Thanks to the dark web and account takeover fraud, authenticating the identity of users
presents an ever-evolving challenge.
On one side of the authentication challenge are users who demand speed and convenience
and don’t want to have to remember numerous passwords or make their way through a
complex login or verification process every time they access an app or site. But, on the other
hand, security requirements are quickly evolving to demand a rigorous approach to
authentication.
2.3 Biometric Accuracy

Biometrics is a means of identifying and verifying people identity based on physiological


characteristics. The core value of a biometric system depends on its ability to correctly accept

11
or reject an individual identity. In other words, accuracy is the criteria to assess the reliability
of a biometric modality. The accuracy of a biometric modality is usually measured in terms
of matching errors which consist of false acceptance rate (FAR) and false rejection rate.

Chapter 3
Biometric Technology
3.1 Fingerprint Authentication

Fingerprint recognition, which measures a finger’s unique ridges, is one of the oldest forms
of biometric identification. After capturing the print, sophisticated algorithms use the image
to produce a unique digital biometric template. The template is then compared to new or
existing scans to either confirm or deny a match. Capturing fingerprint biometric images may
be achieved using.
Optical sensors using CCD or CMOS image sensors.
Solid-state transducer sensors capturing features like the electric field, thermal, piezoelectric
or capacitive energy signals.
Ultrasound sensors capturing the transmitted acoustic signals in a receiver used for
fingerprint capture in echography.
When using fingerprinting matching, one can use any of the following 3 ways of types of
biometrics to match the fingerprint with the stored fingerprint.
Ridge pattern comparison and fingerprint matching use the ridges as a comparison feature
and scores over the fingerprint capturing of minutiae-based images, which suffer when using
prints captured in low quality.
Correlation fingerprint matching is done by overlaying the 2 images of fingerprints and
calculating the equivalent pixel association between them to match their association.
Minutiae based matching of fingerprints is done in biometrics examples by comparing the
input minutiae and the stored set of points on a plane stored in the system.

12
3.1 Fig. – Fingerprint Authentication

3.2 Retina Scan

Retinal scans capture capillaries deep within the eye by using unique near-infrared cameras.
The raw image is first pre-processed to enhance the image then processed again as a
biometric template to use during both enrolment and verification.

3.2 Fig. – scanning of retina

13
3.3 Iris Recognition

The iris, or the colour part of the eye, consists of thick, thread-like muscles. These muscles
help shape the pupil to control the amount of light that enters the eye. By measuring the
unique folds of these muscles, biometric authentication tools can confirm identity with
incredible accuracy. Liveness detection (like requiring a user to blink for the scan) adds an
additional layer of accuracy and security.

3.3 Fig. – scanning of iris

3.4 Hand geometry

Biometrics refer to the measurement of hand characteristics like the length and width of
fingers, their curvature, and their relative position to other features of the hand. Though once
a dominant method of biometric measurement, modern advances in fingerprint and facial
recognition software have replaced its relevance in most advanced applications.

14
3.4 Fig. – Hand Geometry

3.5 Voice Recognition


Voice recognition technology falls under both the physiological and biometric umbrellas.
Physically speaking, the shape of a person’s vocal tract, including the nose, mouth, and
larynx determines the sound produced. The way a person says something – movement
variations, tone, pace, accent, and so on – is also unique to each individual.

3.5 Fig. – Voice Recognition

3.6 Signature Pattern


Signature recognition is a biometric that measures spatial coordinates, pen pressure,
inclination, and pen stroke in both “off-line” and “on-line” applications. A digital tablet
records measurements then uses the information to automatically creates a biometric profile
for future authentication.

15
3.6 Fig. – Signature Pattern

3.7 Key Stroke


Keystroke dynamics take standard passwords to the next level by tracking the rhythm used to
enter a password. Measurements might include the time it takes to press each key, delays
between keys, characters typed per minute, and so on. Keystroke patterns work in
conjunction with passwords and PINs to improve security efforts.

3.7 Fig. – Key Stroke

3.8 Facial Recognition


Facial recognition is, by far the oldest form of biometric authentication. Even infants use
facial recognition to identify the people closest to them. Biometric facial recognition software
works much the same way, albeit with more precise measurements. Specifically, facial
recognition software measures the geometry of the face, including the distance between the
eyes and the distance from the chin to the forehead (just to name a few). After collecting the
data, an advanced algorithm transforms it into an encrypted facial signature.

16
3.8 Fig. – Recognition of face

3.9 DNA Matching


DNA has long been used for identification purposes. Additionally, is the only form of
biometrics that can trace familial ties. DNA matching is especially valuable when dealing
with missing persons, disaster victim identification, and potential human trafficking.
Furthermore, other than fingerprints, DNA is the only biometric that can be “left behind”
unintentionally. DNA gathered from hair, saliva, semen, and so on contains Short Tandem
Repeat sequences (STRs). DNA STRs can confirm identity by comparing them to other STRs
in a database.

3.9 Fig. – DNA Matching

Chapter 4

17
Multimodal Biometric System

4.1 Fusion of Face, Voice & Fingerprint


A biometric system which relies only on a single biometric identifier in making a personal
identification is often not able to meet the desired performance requirements. Identification
based on multiple biometrics represents an emerging trend. We introduce a multimodal
biometric system, which integrates face recognition, fingerprint verification, and speaker
verification in making a personal identification. This system takes advantage of the
capabilities of each individual biometric. It can be used to overcome some of the limitations
of a single biometrics. Preliminary experimental results demonstrate that the identity
established by such an integrated system is more reliable than the identity established by a
face recognition system, a fingerprint verification system and a speaker verification system.

4.1 Fig. – Fusion of face, fingerprint & voice

4.2 Fusion of Face and Lip Movement

18
The system acquires (records), pre-processes, and classifies each biometric feature separately.
During the training(enrolment) of the system, biometric templates are generated for each
feature. For classification, the system compares these templates with the newly recorded
pattern. Then, using a strategy that depends on the level of security required by the
application, it combines the classification results into one result by which it recognizes
persons.

4.2 Fig. – Fusion of face and lip movement

4.3 Vulnerable Points of Biometric System


A generic biometric system can be cast in the framework of a pattern recognition system.
The first stage involves biometric signal acquisition from the user (e.g., the inkless fingerprint
scan). The acquired signal typically varies significantly from presentation to presentation;
hence, pure pixel-based matching techniques do not work reliably. For this reason, the second
signal processing stage attempts to construct a more invariant representation of this basic
input signal (e.g., in terms of fingerprint minutiae). The invariant representation is often
aspatial domain characteristic or a transform (frequency) domain characteristic, depending on
the particular biometric. During the enrolment of a subject in a biometric authentication
system, an invariant template is stored in a database that represents the particular individual.
To authenticate the user against a given ID, the corresponding template is retrieved from the
database and matched against the template derived from a newly acquired input signal. The
matcher arrives at a decision based on the closeness of these two templates while taking into
account geometry, lighting, and other signal acquisition variables. Note that password-based
authentication systems can also be set in this framework.

19
4.3 Fig. – Vulnerable points of biometric system

20
Chapter 5
APPLICATIONS
In the last years has considerably increased the area of application of biometrics and it's
expected that in the near future, we will use biometry many times in our daily activities such
as getting in the car, opening the door of our house, accessing to our bank account by
internet, accessing to our PDA, mobile phone, laptops, etc. Depending of where the
biometrics is deployed, the applications can be categorized in the following five main groups:
forensic, government, commercial, health-care and traveling and immigration. However,
some applications are common to these groups such as physical access, PC/network access,
time and attendance, etc.

1. FORENSIC: The use of biometric in the law enforcement and forensic is more
known and from long date, it is used mainly for identification of criminals. In
particular, the AFIS (automatic fingerprint identification system) has been used
for this purpose. The facial-scan technology (mug shots) is being also used for
identification of suspects. Another possible application is the verification of persons
of home arrest, a voice-scan is an attractive solution for this problem. The typical
applications are:
Identification of criminals-
collecting the evidence in the scene of crime (like fingerprints) it is possible to compare with
data of suspects or make a search in the data base of criminals.
Surveillance -
-using cameras one can monitor the very busy places such as stadiums, airports, meetings,
etc. Looking in the crowds for suspect, based on the face recognition biometric, using the
image (e.g., mug shots) database of wanted persons or criminals. Since the events of
September 11, 2001, the interest in biometric surveillance has increased dramatically,
especially for air travel applications. Currently there are many cameras monitoring crowds at
airports for detecting wanted terrorists.
Corrections -
This refers to the treatment of offenders (criminals) through a system of penal incarceration,
rehabilitation, probation, and parole, or the administrative system by which these are
effectuated. Is these cases a biometric system can avoid the possibility of accidentally
releasing the wrong prisoner, or to ensure that people leaving the facilities are really visitors
and not inmates.

2. GOVERNMENT:-
Here are many application of the biometry in the government sector. An AFIS is the primary
system used for locating duplicates in benefits systems, electronic voting for local or national
elections, driver's license emission, etc. The typical application are:
National Identification Cards -
the idea is to include digital biometric information in the national identification card. This is
the most ambitious biometric program, since the identification must be performed in a large-
scale database, containing millions of samples, corresponding to the whole population of one
country. This kind of cards can be used for multiple purposes such as controlling the
collection of benefits, avoiding duplicates of voter registration and driver license emission.
All this applications are primarily based on finger-scan and AFIS technology, however it is

21
possible that facial-scan and iris-scan technology could be used in the future.
Voter ID and Elections -
while the biometric national ID card is still in project, in many countries are already used the
biometry for the control of voting and voter registration for the national or regional elections.
During the registration of voter, the biometric data is captured and stored in the card and in
the database for the later use during the voting. The purpose is to prevent the duplicate
registration and voting.
Driver's licenses -
In many countries the driver license is also used as identification document, therefore it is
important to prevent the duplicate emission of the driver license under different name. With
the use of biometric this problem can be eliminated.
However it is important that the data must be shared between state, because in some country
such as United States, the license are controlled at the states as opposed to the federal level.
Benefits Distribution (social service) -
the use of biometry in benefits distribution prevents fraud and abuse of the government
benefits programs. Ensuring that the legitimate recipients have a quick and convenient access
to the benefits such as unemployment, healthcare and social security benefits.
Employee authentication -
The government use of biometric for PC, network, and data access is also important for
security of building and protection of information. Below are more detailed this kind of
applications also used in commercial sector.
Military programs -
the military has long been interested in biometrics and the technology has enjoyed extensive
support from the national security community
3. COMMERCIAL
Banking and financial services represent enormous growth areas for biometric technology,
with many deployments currently functioning and pilot project announced frequently. Some
applications in this sector are:
Account access -
The use of biometric for the access to the account in the bank allows to keep definitive and
auditable records of account access by employees and customers. Using this the customers
can access accounts and employees can log into their workstations.
ATMs -
the use of biometric in the ATM transaction allows more security.
Expanded Service Kiosks -
A more receptive market for biometrics may be special purpose kiosks, using biometric
verification to allow a greater variety of financial transaction than are currently available
through standard ATMs.
Online banking -
Internet based account access is already widely used in many places, the inclusion of
biometric will make more secure this type of transactions from home. Currently, there are
many pilot programs using biometric in home banking.
Telephony transaction -
Voice-scan biometric can be used to make more secure the telephone -based transactions. In
this type of application, when the costumer calls to make atransaction, a biometric system
will authenticate the customer's identity based on his or hervoice with no need of any
additional device.
PC/Network access -
The use of biometric log-in to local PCs or remotely through network increase the security of

22
the overall system keeping more protected the valuable information.
Physical access -
the biometric is widely used for controlling the access to building or restricted areas.
E-commerce -
biometric e-commerce is the use of biometrics to verify of identity of the individual
conduction remote transaction for goods or services
Time and attendance monitoring -
In this sector the biometrics is used for controlling the presence of the individuals in a
determine area. Like controlling the time sheet of the employees or the presence of students
at the classroom.

23
Chapter 6
BIOMETRIC DEVICES
1. IRIS SCANNER

6.1 Fig. – Iris scanner


2. FACE CAMERA
Face detection is used in biometrics, often as a part of (or together with) a facial recognition
system. It is also used in video surveillance, human computer interface and image database
management. A face camera is a webcam with 2 Mega pixel or above which can take a clear
crisp photograph of the face.
Some recent digital cameras use face detection for autofocus. Also, face detection is useful
for selecting regions of interest in photo slideshows that use a pan-and-scale Ken Burns
effect. That is, the content of a given part of an image is transformed into features, after
which a classifier trained on example faces decides whether that particular region of the
image is a face, or not. A face model can contain the appearance, shape, and motion of faces.
There are several shapes of faces. Some common ones are oval, rectangle, round, square,
heart, and triangle. Motions include, but not limited to, blinking, raised eyebrows, flared
nostrils, wrinkled forehead, and opened

24
mouth.
6.2 Fig. – Face camera

25
CONCLUSION

Biometrics can only be limited by limiting one's imagination. Biometric


technology is now being used in almost every area. Not only that, but various
types of biometric systems are being used to achieve various functionalities.
There are many mature biometric systems available now. Proper design and
implementation of the biometric system can indeed increase the overall security.
There are numerous conditions that must be taken in account when
designing a secure biometric system. First, it is necessary to realize that
biometrics is not secrets. This implies that care should be taken and itis not
secure to generate any cryptographic keys from them. Second, it is necessary to
trust the input device and make the communication link secure. Third, the
input device needs to be verified.
The ultimate form of electronic verification of a person’s identity is biometrics;
using a physical attribute of the person to make a positive identification. People
have always used the brain’s innate ability to recognize a familiar face and it
has long been known that a person’s fingerprints can be used for identification.
The challenge has been to turn these into electronic processes that are
inexpensive and easy to use. Banks and others who have tested biometric-based
security on their clientele, however, say consumers overwhelmingly have a
pragmatic response to the technology. Anything that saves the information-
overloaded citizen from having to remember another password or personal
identification number comes as a welcome respite.

26
REFERENCES

1. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
PrivateBiometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric
and T. kevenaar, Eds., chpt5, pp.79-77, Springer-Verlag, 20012.

2. Direct Indirect Human Computer Interaction Based Biometrics International Journal


Of Emerging Engineering Research and Technology Volume 3, Issue 3, March 2015.

3. A.A.E. Ahmed, I. Traore, “A new biometric technology based on mouse dynamics,


IEEE Transactions on depend able and Secure Computing” 4 (3) (2007) 165– 179

27

You might also like