This document provides an overview of biometric security systems, including:
1. It defines biometrics as "life measurements" used for authentication and describes the components of biometric systems like enrollment, template generation, and matching.
2. It classifies biometric characteristics as physiological (fingerprint, hand geometry, etc.) or behavioral (signature, keystroke dynamics, etc.) and describes several mainstream biometric technologies.
3. It also discusses emerging biometric technologies like brainwave recognition, DNA identification, vascular patterns, gait recognition, and others that could provide very accurate identity verification in the future.
This document provides an overview of biometric security systems, including:
1. It defines biometrics as "life measurements" used for authentication and describes the components of biometric systems like enrollment, template generation, and matching.
2. It classifies biometric characteristics as physiological (fingerprint, hand geometry, etc.) or behavioral (signature, keystroke dynamics, etc.) and describes several mainstream biometric technologies.
3. It also discusses emerging biometric technologies like brainwave recognition, DNA identification, vascular patterns, gait recognition, and others that could provide very accurate identity verification in the future.
This document provides an overview of biometric security systems, including:
1. It defines biometrics as "life measurements" used for authentication and describes the components of biometric systems like enrollment, template generation, and matching.
2. It classifies biometric characteristics as physiological (fingerprint, hand geometry, etc.) or behavioral (signature, keystroke dynamics, etc.) and describes several mainstream biometric technologies.
3. It also discusses emerging biometric technologies like brainwave recognition, DNA identification, vascular patterns, gait recognition, and others that could provide very accurate identity verification in the future.
This document provides an overview of biometric security systems, including:
1. It defines biometrics as "life measurements" used for authentication and describes the components of biometric systems like enrollment, template generation, and matching.
2. It classifies biometric characteristics as physiological (fingerprint, hand geometry, etc.) or behavioral (signature, keystroke dynamics, etc.) and describes several mainstream biometric technologies.
3. It also discusses emerging biometric technologies like brainwave recognition, DNA identification, vascular patterns, gait recognition, and others that could provide very accurate identity verification in the future.
Download as DOC, PDF, TXT or read online from Scribd
Download as doc, pdf, or txt
You are on page 1of 6
Biometric Security Systems
Kislaya Srivastava1, Manish Kumar2 MIETE,
1- Final Year Department of E & C Engg. Northern India Engineering College Lucknow 2- Asst. Prof. & Head E & C Department Northern India Engineering College, Lucknow kislayji@rediffmail.com , hodec_nieclko@rediffmail.com Abstract- The word biometric can be defined as "Life - Measure". A well orchestrated biometric authentication solution not only prevents and detects an imposter but also keeps a secure log of transaction activities for prosecution of imposters. This paper provides an overview of the various types of biometric technologies present in Biometric Classification civilian and military domains, their applications, advantages and Biometric characteristics can be disadvantages. The paper also divided in two main categories describes the future prospects of physiological and behavioral. The biometric security systems. biometric systems consist of three basic elements: Keywords-Identification, Verification, False Accept Rate (FAR), False Reject Enrollment is the process of collecting Rate (FRR). biometric samples from an individual known as enrollee and subsequent Introduction- The present day world generation of his template. is obsessed with security. It is easy to Template is the data representing the understand the need for biometrics if enrollee’s biometric. you've ever forgot or left your network Matching is the process of comparing password on your computer. There is the live biometric sample against one an increasing need to find a way to or many templates in the system’s solve user identification issues and cut database. costs for password administration. There are many reasons to consider Characteristics for identification- this form of personal identification. For each reason, authenticating 1. The physical characteristic should ourselves by who we are and not what not change over the course of the we know, what we carry, or how we person's lifetime choose to identify ourselves (i.e. PINs, 2. The physical characteristics must passwords, smart card security token) identify the individual person solves and simplifies these issues. uniquely. Biometrics combined with other 3. The characteristic needs to be automation can eliminate our sole easily scanned with immediate reliance on a paper trail for a given results. transaction or event. 4. The data must be simply checked The biometric authentication system in an automated way. cannot fall prey to hackers; it can’t be 5. Ease of use by system operators shared, lost or guessed. Therefore it is and individuals. an efficient way to replace the traditional password based While there are many possible authentication system. biometrics, at least eight mainstream biometric technologies have been deployed which are classified into two major categories Contact and non Contact biometric. Contact Biometric can be sub classified as Fingerprint, hand/ finger geometry, Dynamic automatically identifying or verifying a signature verification, Keystroke person from a digital still or video dynamics. The non contact biometric images by comparing selected facial technologies may be sub classified as features in the live image and a facial Facial Recognition, Voice recognition, database.Voice recognition is the Iris scan, Retinal Scan. process of determining which registered speaker provides a given Fingerprint biometric takes an image utterance or "voiceprint". Voice or of a person's fingertips and records its speaker recognition uses vocal characteristics. This information may characteristics to identify individuals then be processed or stored as an using a pass phrase (password).Iris image or as an encoded computer recognition combines computer vision, algorithm to be compared with other pattern recognition, statistical fingerprint records. This Technique inference, and optics. Its purpose is finds applications in Law enforcement, real-time, high confidence recognition fraud prevention and Computer access. of a person's identity by mathematical Hand geometry involves the analysis of the random patterns that are measurement and analysis of the shape visible within the iris of an eye from of one's hand. It is a fairly simple some distance. Iris scans are extremely procedure and is surprisingly accurate. accurate. Retinal scanning analyses the Though it requires special hardware to layer of blood vessels at the back of use, it can be easily integrated into the eye. other devices or systems. Unlike fingerprints, the human hand isn't unique. Individual hand features are not descriptive enough for identification. However, it is possible to devise a method by combining various individual features and measurements of fingers and hands for verification purposes. Signature verification is the process used to Retina Scan recognize an individual’s hand-written signature. It uses the behavioral It involves using a low-intensity light biometrics of a hand written signature source and an optical coupler and can to confirm the identity of a computer read the patterns at a great level of user. This is done by analyzing the accuracy. It does require the user to shape, speed, stroke, pen pressure and remove glasses, place their eye close to timing information during the act of the device, and focus on a certain signing. point. Retina scan devices are great In Keystroke Dynamics the manner and long-term, high-security options. rhythm in which an individual types characters is analyzed to develop a Emerging Biometric Technologies- unique biometric template of the users An emerging biometric is in infancy typing pattern for future authentication. stage of technological maturation. It is used to verify or even try to Once proven, an emerging biometric determine the identity of the person will evolve into an established who is producing those keystrokes. biometric. Some examples include Facial recognition system is a Brainwave biometric, DNA computer-driven application for identification, Vascular pattern recognition, Body Odour recognition, recognition or gait signature as it is Fingernail bed recognition, Gait sometime referred to; it uses a radar recognition, Handgrip recognition, Ear system to capture the subject in pattern recognition, Body salinity motion. Georgia Tech Research identification, Infrared fingertip Institute are building a new radar imaging and pattern recognition. system that can identify people from up to 500 feet away during the day, Brainwave biometric Brainwaves night, and all-weather conditions. resolve into nothing more then Handgrip Recognition Advanced recognizable patterns. If we could Biometrics Incorporated invented this identify at least one pattern that was technology, with hope of it one day unique, unchanging, and monotonous, being used to prevent unauthorized use then we would have a security protocol of handguns. It is the hope of handgun of peerless supremacy. Such a solution manufactures to create a smart could not be stolen or easily duplicated handgun that will only recognize and could theoretical be applied to all authorized users. Handgrip technology people, to include mobility challenged focuses on the internal part of the hand individuals. by analyzing the unique subcutaneous tissues, blood vessel patterns, veins, arteries and fatty tissues of a hand in a gripped position.
Vascular patterns: are best described
as a picture of the veins in a person's hand or face. The thickness and location of these veins are believed to Depiction of EEG Brain waveforms be unique enough to an individual to be used to verify a person's identity. DNA Identification DNA is a unique and measurable human characteristic that is accepted by society as absolute evidence of one’s identity with a near probability of 99.999% accuracy. Scientists use a small number of sequences of DNA that are known to greatly vary among individuals in order to ascertain the probability of a match. Vein scanners use near-infrared light Body odor recognition is a contact less to reveal the patterns in a person’s physical biometric that attempts too veins. confirm a person’s identity by analyzing the olfactory properties of Ear Pattern Recognition The shape of the human body scent. Each chemical the outer ear, lobes, bone structure and of the human scent is extracted by the the size are unique to each person. Ear biometric system and converted into a pattern recognition is employed as a unique data string which is analyzed physical Contactless biometric and by sensors. Gait Recognition Is a uses an Optophone to verify the shape behavior biometric that attempts to of the ear. A French company, ART recognize people by the manner in Techniques, developed the Optophone which they walk and/or run. Gait and the process. It is a telephone type 1. Financial services ( ATM) handset, which is comprised of two 2. Immigration and border control components (lighting source and (passport and visa issuance) cameras).Body salinity biometric an 3. Social services(fraud detection) individual’s salinity level of salt in the 4. Health care body is believed to be unique. This 5. Physical access control technology passing a tiny electrical 6. Time and attendance current through the body in order to 7. Computer security (e-commerce) analysis the salt content. The more salt 8. Telecommunications (mobile) in the body, the more conductive the 9. Law enforcement (national ID) body becomes to electricity. As the electrical current passes through the Performance Parameters body it can also carry data at a transfer False accept rate (FAR) or false match rates equivalent to a 2400-baud rate (FMR): the probability that the modem. This technology could be system incorrectly declares a used to facilitate communication successful match between the input between cell phones, watches. pattern and a non-matching pattern in Fingernail bed recognition The system the database. It measures the percent of scans the dermal structure under the invalid matches. fingernails. The human nail bed is a unique longitudinal structure that is False reject rate (FRR) or false non- made up of nearly parallel rows of match rate (FNMR): the probability vascular rich skin with parallel dermal that the system incorrectly declares structures in between narrow channel failure of match between the input pattern and the matching template in the database. It measures the percent of valid inputs being rejected.
Equal error rate (EER): The rates at
which both accept and reject errors are equal. Failure to capture rate (FTC): Within Magnification of Human Nail Bed automatic systems, the probability that the system fails to detect a biometric Disadvantages of Biometric Systems: characteristic when presented People with disability may have correctly. problems with contact biometrics. The truth is that the security codes and Verification: does the template match the passwords used in the ATMs, the input sample? (A 1:1 match) A pre- Phone lock and credit and debit cards stored template is matched against a are a supplement to the biometric sample directly, e.g. a card or known security systems. The biometric database entry. solutions are going to play a very big role in near future. So it is best that one Identification: what is the input puts in a bit of an effort to field test the sample? (A 1: N match) where N is the various biometric solutions. total number of entries in the database. It is a process of identifying from all Biometric Applications: Most the templates which one is the closest biometric applications fall into one of match to the input sample. the nine general categories: Conclusion- mediums (i.e. CD-R/RW, DVD-R/RW, Biometrics can do a lot more than just flash memory). The end result would determine whether someone has access be that only the legitimate owner of to walk through a particular door. might access the work of art. Some hospitals use biometric systems Think of biometrics as a key! Yes… A to make sure mothers take home the key, it can open doors for you and right newborns. Experts have also provides security to keep others out. It advised people to scan their vital is a key that can be customized to an documents, like birth certificates and individual’s access needs. You can use social security cards, and store them in a biometric to access your home, your biometrically-secured flash memory in account, or to invoke a customized the event of a national emergency. setting for any secure area /application. Here are some biometric technologies you might see in the future: References- New methods that use DNA, nail bed www.biometrics.org structure, teeth, ear shapes, body odor, http://www.dodcounterdrug.com/ skin patterns and blood pulses, More facialrecognition/ accurate home-use systems, Opt-in http://www.ins.gov/graphics/ club memberships, frequent buyer lawenfor/bmgmt/inspect/inspass.htm. programs and rapid checkout systems with biometric security, More prevalent biometric systems in place of passports at border crossings and airports. Nowadays Banks are contemplating putting Biometric Systems on the ATM cards to ensure no imposters are able to withdraw money even after knowing the password.
A biometric security smart Card
The United Kingdom has already
started the Distribution of Biometric Passports to prevent forgery and check imposters. A major use of biometrics can be in protecting the copyright privileges of music, movies, and software creators. A biometric algorithm could be employed to encrypt and decrypt media stored on a multitude of