Biometrics: A Seminar Report On
Biometrics: A Seminar Report On
Biometrics: A Seminar Report On
Seminar Report On
BIOMETRICS
Presented by
1. Aditi Rajesh Kashetwar
SE
Guided By
S.P.Bandewar Sir
Submitted to
1
Certificate
This is to certify that the report entitled
“BIOMETRICS”
Submitted By
1. Aditi Rajesh Kashetwar
2. Rajlakshmi Rajesh Kancharlawar
3. Sanjana Santoshrao Dhade
2
We are greatly indebted to our seminar guide Mr. S. P. Bandewar for
their able guidance throughout the course of this work. It has been an altogether
different experience to work with their and we would like to thank you for their
help, suggestions and numerous discussions.
Last but not least we are also thankful to all those who help directly or
indirectly to develop this seminar and complete it successfully.
3
ABSTRACT
The biometric is said to have many limitations. Due to its drawbacks the multimodal
biometric has emerged to provide a secure solution. The multimodal biometric
system is a much more secure system ensuring more than one check. This is mostly
used in cases of bank security. This system involves the finger scanning along with
voice scan and hand geometry scam and even image scan. The image scans by image
processing is a highly modified system. Secure ATM by image processing is adopted
by most of the bank ATMs both in the private and government sectors.
The image processing is a complex system involving a number of interwoven
processes. The process of image processing from receiving the visual information to
presentation of the screen involves two major processes. The major 3 process
involved in Secure ATM image processing are, 1Discretization and representation,
2.Processing, 3.Analysis. Discretization and representation is changing the visual
available into a discrete form which is compatible with the computer.
Processing is done to improve on the quality of the image by filtering it. Data
is also compresses to save space. Analysis of the image is also done by taking out
the image features, qualifying the shapes and also registering them along with
recognizing them. The various process makes the Bank ATMs secure thus is
widely being adopted leaving behind the old biometricsystem.
4
CONTENTS
Chapter Title PageNo.
No.
1 Introduction 9
1.3 Classification 10
2 Biometric System 11
Components (BCS)
2.1 Components 11
2.2 Authentication 11
3 Biometric Technology 12
5
3.4 Hand Geometry 14 to15
4 Multimodal Biometric 18
System (MBS)
5 Applications 21 to 23
6 Biometric Devices 24 to 25
7 Conclusion 26
8 References 27
6
LIST OF ABBREVIATIONS
7
LIST OF FIGURES
Figure No. Title Page No.
3.1 Fingerprint Authentication 13
8
Chapter 1
Introduction
9
1.1 History and Development
The idea of using patterns for personal identification was originally proposed in 1936
By ophthalmologist Frank Burch. By the 1980 the idea had appeared in James Bond films,
but it still remained science fiction and conjecture. In 1987, two other ophthalmologists Aram
Safirand Leonard Flom patented this idea and in 1987 they asked John Daugman to try to
create actual algorithms for this iris recognition. These algorithms which daugman patented
in 1994 are the basis for all current iris recognition systems and products. daugman
algorithms are owned by technologies and the process is licensed to several other Companies
who serve as System integrators and developers of special platform for iris recognition in
recent years several products have been developed for acquiring its images over a range of
distances and in a variety of applications. One active imaging system developed in 1996 by
licensee Sensor deployed special cameras in bank ATM to capture IRISi mages at a distance
of up to 1 meter. This active imaging system was installed in cash machines both by NCR
Corps and by Diebold Corp in successful public trials in several countries during 1997 to
1999. a new and smaller imaging device is the low cost
“Panasonic Authentication digital camera for handheld, desktop, e
-commerce and other information security applications. Ticketless air travel, check-in and
security procedures based on iris recognition in airports have been developed by eye ticket.
1.2 What is biometrics
For a quick biometrics definition: Biometrics are biological measurements — or physical
characteristics — that can be used to identify individuals. For example, fingerprint mapping,
facial recognition, and retina scans are all forms of biometric technology, but these are just
the most recognized options.
Researchers claim the shape of an ear, the way someone sits and walks, unique body odours
the veins in one’s hands, and even facial contortions are other unique identifiers. These traits
further define biometrics.
10
Chapter 2
Biometric System Components
2.1 Components
A biometric system is essentially a pattern recognition system that recognizes a person based
on a feature vector derived from a specific characteristic that the person possesses.
3.1 Components of A simple biometric system:
1) Sensor module which acquires the biometric data; Web cam, Digitizing Table, Scanner.
2) Feature extraction module where the acquired data is processed to extract feature vectors;
Projection [offline], on Coordinates [online, offline]
3) Matching module where feature vectors are compared against those in the template ;(
Neural Networks, Algorithm)
4) Decision-making module in which the user's identity is established or a claimed identity is
accepted or rejected.
Biometrics As noted earlier refers to technologies that measure and analyse human body
characteristics, such as DNA, fingerprints and eye retina and irises and hand measurements,
for authentication purposes.
2.2 Authentication
Biometric authentication refers to security processes that verify a user’s identity through
unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints.
Biometric authentication systems store this biometric data in order to verify a user’s identity
when that user accesses their account. Because this data is unique to individual users,
biometric authentication is generally more secure than traditional forms of multi-factor
authentication.
Thanks to the dark web and account takeover fraud, authenticating the identity of users
presents an ever-evolving challenge.
On one side of the authentication challenge are users who demand speed and convenience
and don’t want to have to remember numerous passwords or make their way through a
complex login or verification process every time they access an app or site. But, on the other
hand, security requirements are quickly evolving to demand a rigorous approach to
authentication.
2.3 Biometric Accuracy
11
or reject an individual identity. In other words, accuracy is the criteria to assess the reliability
of a biometric modality. The accuracy of a biometric modality is usually measured in terms
of matching errors which consist of false acceptance rate (FAR) and false rejection rate.
Chapter 3
Biometric Technology
3.1 Fingerprint Authentication
Fingerprint recognition, which measures a finger’s unique ridges, is one of the oldest forms
of biometric identification. After capturing the print, sophisticated algorithms use the image
to produce a unique digital biometric template. The template is then compared to new or
existing scans to either confirm or deny a match. Capturing fingerprint biometric images may
be achieved using.
Optical sensors using CCD or CMOS image sensors.
Solid-state transducer sensors capturing features like the electric field, thermal, piezoelectric
or capacitive energy signals.
Ultrasound sensors capturing the transmitted acoustic signals in a receiver used for
fingerprint capture in echography.
When using fingerprinting matching, one can use any of the following 3 ways of types of
biometrics to match the fingerprint with the stored fingerprint.
Ridge pattern comparison and fingerprint matching use the ridges as a comparison feature
and scores over the fingerprint capturing of minutiae-based images, which suffer when using
prints captured in low quality.
Correlation fingerprint matching is done by overlaying the 2 images of fingerprints and
calculating the equivalent pixel association between them to match their association.
Minutiae based matching of fingerprints is done in biometrics examples by comparing the
input minutiae and the stored set of points on a plane stored in the system.
12
3.1 Fig. – Fingerprint Authentication
Retinal scans capture capillaries deep within the eye by using unique near-infrared cameras.
The raw image is first pre-processed to enhance the image then processed again as a
biometric template to use during both enrolment and verification.
13
3.3 Iris Recognition
The iris, or the colour part of the eye, consists of thick, thread-like muscles. These muscles
help shape the pupil to control the amount of light that enters the eye. By measuring the
unique folds of these muscles, biometric authentication tools can confirm identity with
incredible accuracy. Liveness detection (like requiring a user to blink for the scan) adds an
additional layer of accuracy and security.
Biometrics refer to the measurement of hand characteristics like the length and width of
fingers, their curvature, and their relative position to other features of the hand. Though once
a dominant method of biometric measurement, modern advances in fingerprint and facial
recognition software have replaced its relevance in most advanced applications.
14
3.4 Fig. – Hand Geometry
15
3.6 Fig. – Signature Pattern
16
3.8 Fig. – Recognition of face
Chapter 4
17
Multimodal Biometric System
18
The system acquires (records), pre-processes, and classifies each biometric feature separately.
During the training(enrolment) of the system, biometric templates are generated for each
feature. For classification, the system compares these templates with the newly recorded
pattern. Then, using a strategy that depends on the level of security required by the
application, it combines the classification results into one result by which it recognizes
persons.
19
4.3 Fig. – Vulnerable points of biometric system
20
Chapter 5
APPLICATIONS
In the last years has considerably increased the area of application of biometrics and it's
expected that in the near future, we will use biometry many times in our daily activities such
as getting in the car, opening the door of our house, accessing to our bank account by
internet, accessing to our PDA, mobile phone, laptops, etc. Depending of where the
biometrics is deployed, the applications can be categorized in the following five main groups:
forensic, government, commercial, health-care and traveling and immigration. However,
some applications are common to these groups such as physical access, PC/network access,
time and attendance, etc.
1. FORENSIC: The use of biometric in the law enforcement and forensic is more
known and from long date, it is used mainly for identification of criminals. In
particular, the AFIS (automatic fingerprint identification system) has been used
for this purpose. The facial-scan technology (mug shots) is being also used for
identification of suspects. Another possible application is the verification of persons
of home arrest, a voice-scan is an attractive solution for this problem. The typical
applications are:
Identification of criminals-
collecting the evidence in the scene of crime (like fingerprints) it is possible to compare with
data of suspects or make a search in the data base of criminals.
Surveillance -
-using cameras one can monitor the very busy places such as stadiums, airports, meetings,
etc. Looking in the crowds for suspect, based on the face recognition biometric, using the
image (e.g., mug shots) database of wanted persons or criminals. Since the events of
September 11, 2001, the interest in biometric surveillance has increased dramatically,
especially for air travel applications. Currently there are many cameras monitoring crowds at
airports for detecting wanted terrorists.
Corrections -
This refers to the treatment of offenders (criminals) through a system of penal incarceration,
rehabilitation, probation, and parole, or the administrative system by which these are
effectuated. Is these cases a biometric system can avoid the possibility of accidentally
releasing the wrong prisoner, or to ensure that people leaving the facilities are really visitors
and not inmates.
2. GOVERNMENT:-
Here are many application of the biometry in the government sector. An AFIS is the primary
system used for locating duplicates in benefits systems, electronic voting for local or national
elections, driver's license emission, etc. The typical application are:
National Identification Cards -
the idea is to include digital biometric information in the national identification card. This is
the most ambitious biometric program, since the identification must be performed in a large-
scale database, containing millions of samples, corresponding to the whole population of one
country. This kind of cards can be used for multiple purposes such as controlling the
collection of benefits, avoiding duplicates of voter registration and driver license emission.
All this applications are primarily based on finger-scan and AFIS technology, however it is
21
possible that facial-scan and iris-scan technology could be used in the future.
Voter ID and Elections -
while the biometric national ID card is still in project, in many countries are already used the
biometry for the control of voting and voter registration for the national or regional elections.
During the registration of voter, the biometric data is captured and stored in the card and in
the database for the later use during the voting. The purpose is to prevent the duplicate
registration and voting.
Driver's licenses -
In many countries the driver license is also used as identification document, therefore it is
important to prevent the duplicate emission of the driver license under different name. With
the use of biometric this problem can be eliminated.
However it is important that the data must be shared between state, because in some country
such as United States, the license are controlled at the states as opposed to the federal level.
Benefits Distribution (social service) -
the use of biometry in benefits distribution prevents fraud and abuse of the government
benefits programs. Ensuring that the legitimate recipients have a quick and convenient access
to the benefits such as unemployment, healthcare and social security benefits.
Employee authentication -
The government use of biometric for PC, network, and data access is also important for
security of building and protection of information. Below are more detailed this kind of
applications also used in commercial sector.
Military programs -
the military has long been interested in biometrics and the technology has enjoyed extensive
support from the national security community
3. COMMERCIAL
Banking and financial services represent enormous growth areas for biometric technology,
with many deployments currently functioning and pilot project announced frequently. Some
applications in this sector are:
Account access -
The use of biometric for the access to the account in the bank allows to keep definitive and
auditable records of account access by employees and customers. Using this the customers
can access accounts and employees can log into their workstations.
ATMs -
the use of biometric in the ATM transaction allows more security.
Expanded Service Kiosks -
A more receptive market for biometrics may be special purpose kiosks, using biometric
verification to allow a greater variety of financial transaction than are currently available
through standard ATMs.
Online banking -
Internet based account access is already widely used in many places, the inclusion of
biometric will make more secure this type of transactions from home. Currently, there are
many pilot programs using biometric in home banking.
Telephony transaction -
Voice-scan biometric can be used to make more secure the telephone -based transactions. In
this type of application, when the costumer calls to make atransaction, a biometric system
will authenticate the customer's identity based on his or hervoice with no need of any
additional device.
PC/Network access -
The use of biometric log-in to local PCs or remotely through network increase the security of
22
the overall system keeping more protected the valuable information.
Physical access -
the biometric is widely used for controlling the access to building or restricted areas.
E-commerce -
biometric e-commerce is the use of biometrics to verify of identity of the individual
conduction remote transaction for goods or services
Time and attendance monitoring -
In this sector the biometrics is used for controlling the presence of the individuals in a
determine area. Like controlling the time sheet of the employees or the presence of students
at the classroom.
23
Chapter 6
BIOMETRIC DEVICES
1. IRIS SCANNER
24
mouth.
6.2 Fig. – Face camera
25
CONCLUSION
26
REFERENCES
1. Y.Donis, L. Reyzin and A.Smith, “Fuzzy Extractors”In security with Noisy Data:
PrivateBiometrics, Secure key Storage and Anti-Counterfeiting, P.Tuyls, B.Skoric
and T. kevenaar, Eds., chpt5, pp.79-77, Springer-Verlag, 20012.
27