Top Banner

of 30

23636365 Bio Metrics Seminar Report2

Apr 06, 2018

Download

Documents

Yadhu Sabu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    1/30

    SEMINAR REPORT

    ON

    BIOMETRICS

    SUBMITTED BY: ANANTHU.SVI BCA 2112

    JANUARY 2011

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    2/30

    ACKNOWLEDGEMENT

    I am greatly thankful to my Teachers and co-students of Information Technology

    Department, who inspired me to present my seminar on BIOMETRICS .

    They helped and encouraged me in every possible way. The knowledge acquired

    during the preparation of the seminar report would definitely help me in my future

    ventures.

    I would like to express my sincere gratitude thank all the teachers of our

    Department for their help in various aspects during the seminar.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    3/30

    BIOMETRICS

    What is Biometrics?Definition"Biometrics is the automated identification, or verification of humanidentity through the measurement of repeatable physiological, or

    behavioral characteristics

    Identification:

    The search of a biometric sample against a database of other samples in

    order to ascertain whether the donor is already contained in, or new to thedatabase.

    Verification:

    It refers to the 'one to one' comparison between a sample and another to ask the question, 'are you who you say you are.'

    The term "biometrics" is derived from the Greek words bio (life) andmetric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral

    characteristics, such as fingerprints, irises, voice patterns, facial patterns,and hand measurements, for identification and verification purposes.

    Figure 1 Explains the meaning of definition

    Identification and verification have long been accomplished by showing

    something you have , such as a license or a passport. Sometimes it alsorequired something you know , such as a password or a PIN. As we moveinto a time when we need more secure and accurate measures, we begin tolook at using something you are : biometrics.

    Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    4/30

    History of BIOMETRICS:

    Chinese Precursor:Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported byexplorer Joao de Barros. He wrote that the Chinese merchants werestamping children's palm prints and footprints on paper with ink todistinguish the young children from one another. This is one of the earliestknown cases of biometrics in use and is still being used today.

    European Origins:

    Until the late 1800s, identification largely relied upon "photographicmemory." In the 1890s, an anthropologist and police desk clerk in Parisnamed Alphonse Bertillon sought to fix the problem of identifyingconvicted criminals and turned biometrics into a distinct field of study. Hedeveloped a method of multiple body measurements which got named after him (Bertillonage). His system was used by police authorities throughoutthe world, until it quickly faded when it was discovered that some peopleshared the same measurements and based on the measurements alone, two

    people could get treated as one. After the failure of Bertillonage, the policestarted using finger printing, which was developed by Richard EdwardHenry of Scotland Yard, essentially reverting to the same methods used bythe Chinese for years.

    Modern Times:In the past three decades biometrics has moved from a single method(fingerprinting) to more than ten discreet methods. Companies involvedwith new methods number in the hundreds and continue to improve their methods as the technology available to them advances. Prices for theharware required continue to fall making systems more feasible for low and

    mid-level budgets. As the industry grows however, so does the publicconcern over privacy issues. Laws and regulations continue to be draftedand standards are beginning to be developed. While no other biometric hasyet reached the breadth of use of fingerprinting, some are beginning to beused in both legal and business areas .

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    5/30

    WORKING PRINCIPLE OF BIOMETRICSBiometric devices consist of a reader or scanning device, software that

    converts the gathered information into digital form, and a database thatstores the biometric data for comparison with previous records. Whenconverting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithminto a value that can be compared with biometric data in the database.

    All Biometric authentications require comparing a registered or enrolled biometric sample (biometric template or identifier) against a newlycaptured biometric sample (for example, a fingerprint captured during alogin).

    Figure 2 Enrollment and Verification Technique

    Enrollment Mode :A sample of the biometric trait is captured, processed by a computer, andstored for later comparison. Biometric recognition can be used inIdentification mode, where the biometric system identifies a person fromthe entire enrolled population by searching a database for a match basedsolely on the biometric. For example, an entire database can be searched to

    verify a person has not applied for entitlement benefits under two differentnames. This is sometimes called one-to-many matching.

    Verification Mode :In this mode biometric system authenticates a persons claimed identityfrom their previously enrolled pattern. This is also called one-to-one

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    6/30

    matching. In most computer access or network access environments,verification mode would be used. A user enters an account, user name, or

    inserts a token such as a smart card, but instead of entering a password, asimple glance at a camera is enough to authenticate the user.

    TYPES OF BIOMETRICS:There are two types of biometrics: behavioral and physical.

    Behavioral biometrics - Used for verification .

    Physical biometrics - Used for either identification or verification.

    Physical biometrics :

    Fingerprint - Analyzing fingertip patterns. Facial Recognition - Measuring facial characteristics.

    Hand Geometry - Measuring the shape of the hand.

    Iris recognition - Analyzing features of colored ring of the eye.

    Vascular Patterns - Analyzing vein patterns.

    Retinal Scan - Analyzing blood vessels in the eye.

    Bertillonage - Measuring body lengths (no longer used).

    Behavioral biometrics:Speaker Recognition - Analyzing vocal behavior.

    Signature - Analyzing signature dynamics.

    Keystroke - Measuring the time spacing of typed words.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    7/30

    CHARACTERISTICS OF BIOMETRICS:Biometric characteristics can be divided in two main classes, as representedin figure on the right :

    Physiological are related to the shape of the body. The oldest traits,that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition . Behavioral are related to the behavior of a person. The firstcharacteristic to be used, still widely used today, is the signature. More

    modern approaches are the study of keystroke dynamics and of voice.

    FUTURE OUTLOOK:

    According to most experts, the future of biometrics is dependant upon twocritical areas: standardization and the use of hybrid technologies .

    Standardization:

    Currently, the biometrics industry is very fragmented, with more than 150companies with their own proprietary systems and methodologies.Standards have only recently been established in order to provide directionfor the development of a common interface that will allow for shared

    biometric templates. The BioAPI standard created by the BioAPIConsortium, a group of more than 60 vendors and government agencies,defines a common structure for interfacing with biometrics. Yet,competitive forces remain as technology giants like Microsoft haveabandoned the consortium and the BioAPI standard in order to developtheir own proprietary software standards. The development and acceptance

    of a primary standard is critical for the growth and applicability of the biometrics industry. Only after the technological standard is moreestablished can systems integrate and interact efficiently .

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    8/30

    Hybrid Technologies:

    One of the critical concerns with the use of biometric technologies is that of privacy and security of stored personal biometric data. To have personal datastored in a centralized database leaves the information potentially open totheft or compromise. The concept of combining smart card or public keyinfrastructures with biometric readers where the biometric template is storedon an individually controlled key has been suggested as a solution for the

    privacy concern and is considered by some critical to the advancement of biometric applications.

    Biometrics is a powerful combination of science and technology that can be used to protect and secure our most valuable information and property.The future holds no limits for this industry as more applications are found.

    Further, the technology itself continues to improve in terms of applicationand accuracy. From the application of total body scanning for highestsecurity areas to speed and accuracy of identification when shopping on-line, the applications are boundless.

    Imagine a world where interstate air travel is allowed automatically via afull body scan that not only verifies identity but simultaneously searchesfor insecure or illegal paraphernalia. Where access to one is bank or creditaccounts is only granted after identification via iris or retina scan. Where ashopping trip is made possible by a vehicle that operates only with

    biometric verification of ownership and payment is made via a fingerprintscan that links directly to one is credit account.

    In the future, we will live in a faster paced, more secure world whereverification of one is identity is critical for daily activities. While somemight argue that privacy and personal "freedom" are sacrificed with thislevel of control, most believe that it is the necessary price for a secureworld environment.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    9/30

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    10/30

    BASIC MECHANISM:

    The diagram shows a simple block diagram of a biometric system. Whensuch a system is networked together with telecommunications technology,

    biometric systems become telebiometric systems. The main operations asystem can perform are enrollment and test . During the enrollment, biometric information from an individual is stored. During the test, biometric information is detected and compared with the storedinformation. Note that it is crucial that storage and retrieval of suchsystems themselves be secure if the biometric system is be robust. The first

    block (sensor) is the interface between the real world and our system; it hasto acquire all the necessary data. Most of the times it is an imageacquisition system, but it can change according to the characteristicsdesired. The second block performs all the necessary pre-processing: it hasto remove artifacts from the sensor, to enhance the input (e.g. removing

    background noise), to use some kind of normalization, etc. In the third block features needed are extracted. This step is an important step as thecorrect features need to be extracted and the optimal way. A vector of numbers or an image with particular properties is used to create a template .A template is a synthesis of all the characteristics extracted from thesource, in the optimal size to allow for adequate identifiability .

    BIOMETRICS COLLECTION

    Biometrics are typically collected using a device called a sensor. Thesesensors are used to acquire the data needed for recognition and to convertthe data to a digital form.The quality of the sensor used has a significant impact on the recognitionresults. Example sensors could be digital cameras (for face recognition)or a telephone (for voice recognition).

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    11/30

    BIOMETRIC TEMPLATES

    A biometric template is a digital representation of an individuals distinctcharacteristics, representing information extracted from a biometricsample. Biometric templates are what are actually compared in a biometricrecognition system. Templates can vary between biometric modalities aswell as vendors. Not all biometric devices are template based. For example,voice recognition is based on models. The difference between templatesand models is beyond the scope of this paper.

    BIOMETRICS IDENTIFICATION SCHEMES:

    There are several types of biometric identification schemes : Face : the analysis of facial characteristics Fingerprint : the analysis of an individuals unique fingerprints Hand geometry : the analysis of the shape of the hand and thelength of the fingers Retina : the analysis of the capillary vessels located at the back of the eye Iris : the analysis of the colored ring that surrounds the eyes pupil Signature : the analysis of the way a person signs his name. Vein : the analysis of pattern of veins in the back if the hand and thewrist Voice : the analysis of the tone, pitch, cadence and frequency of a

    persons voice.

    Comparison of various biometric technologies

    It is possible to understand if a human characteristic can be used for

    biometrics in terms of the following parameters: Uniqueness is how well the biometric separates individually from

    another. Permanence measures how well a biometric resists aging. Collectability eases of acquisition for measurement. Performance accuracy, speed, and robustness of technology used.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    12/30

    Acceptability degree of approval of a technology. Circumvention eases of use of a substitute .

    The following table shows a comparison of existing biometric systems interms of those parameters:

    Comparison of various biometric technologies, according to A. K. Jain(H =High, M=Medium, L =Low)

    Biometrics:

    Universality

    Uniqueness

    Permanence

    Collectability

    Performance

    Acceptability

    Circumvention*

    Face H L M H L H LFinger

    print M H H M H M H

    Handgeometry

    M M M H M M M

    Keystr okes L L L M L M M

    Handveins M M M M M M H

    Iris H H H M H L HRetinal

    scanH H M L H L H

    Signature L L L H L H L

    Voice M L L M L H LFacialthermograph

    H H L H M H H

    Odor H H H L L M LDNA H H H L H L L

    Gait M L L H L H MEar Canal M M H M M H M

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    13/30

    BIOMETRIC MODALITIES:Different applications and environments have different constraints. For instance, adequate fingerprint samples require user cooperation; whereas, aface image can be Captured by a surveillance camera. Furthermore,Fingerprints are not available for many of the suspects on Watch lists.There are also multiple biometric modalities for technical and financialreasons. Many scientists become interested in developing a system basedon their own research. Upon a successful implementation, venturecapitalist, interested in the implementation of such a system, commercializea product. Therefore, wide varieties of modalities are being researched andare available on the market.

    FingerprintThe patterns of friction ridges and valleys on an individual's fingertips areunique to that individual. For decades, law enforcement has been classifyingand determining identity by matching key points of ridge endings and

    bifurcations. Fingerprints are unique for each finger of a person includingidentical twins. One of the most commercially available biometrictechnologies, fingerprint recognition devices for desktop and laptop accessare now widely available from many different vendors at a low cost. Withthese devices, users no longer need to type passwords - instead, only a touch

    provides instant access. Fingerprint systems can also be used in identificationmode. Several states check fingerprints for new applicants to social services

    benefits to ensure recipients do not fraudulently obtain benefits under fakenames. New York State has over 900,000 people enrolled in such a system.

    Advantages: Subjects have multiple fingers. Easy to use, with some training Some systems require little space. Large amounts of existing data to allow background and/or watchlist

    checks. Has proven effective in many large scale systems over years of use. Fingerprints are unique to each finger of each individual and the ridge

    arrangement remains permanent during one's lifetime.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    14/30

    Disadvantages: Public Perceptions. Privacy concerns of criminal implications. Health or societal concerns with touching a sensor used by countless

    individuals.

    FaceThe identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visiblespectrum using an inexpensive camera or by using the infrared patterns of facial heat emission. Facial recognition in visible light typically model key

    features from the central portion of a facial image. Using a wide assortmentof cameras, the visible light systems extract features from the capturedimage(s) that do not change over time while avoiding superficial featuressuch as facial expressions or hair. Several approaches to modeling facialimages in the visible spectrum are Principal Component Analysis, LocalFeature Analysis, neural networks, elastic graph theory, and multi-resolutionanalysis.

    Some of the challenges of facial recognition in the visual spectrum includereducing the impact of variable lighting and detecting a mask or photograph.

    Some facial recognition systems may require a stationary or posed user inorder to capture the image, though many systems use a real-time process todetect a person's head and locate the face automatically. Major benefits of facial recognition are that it is non-intrusive, hands-free, continuous andaccepted by most users.

    Advantages: No contact required. Commonly available sensors (cameras). Large amounts of existing data to allow background and/or watchlist

    checks. Easy for humans to verify results.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    15/30

    Disadvantages: Face can be obstructed by hair, glasses, hats, scarves etc. Sensitive to changes in lighting, expression, and poses faces change

    over time. Propensity for users to provide poor-quality video images yet to

    expect accurate results.

    Hand GeometryThese methods of personal authentication are well established. Handrecognition has been available for over twenty years. To achieve personalauthentication, a system may measure either physical characteristics of the

    fingers or the hands. These include length, width, thickness and surface areaof the hand. One interesting characteristic is that some systems require asmall biometric sample (a few bytes). Hand geometry has gained acceptancein a range of applications. It can frequently be found in physical accesscontrol in commercial and residential applications, in time and attendancesystems and in general personal authentication applications

    Advantages Easy to capture. Believed to be a highly stable pattern over the adult lifespan.

    Disadvantages Use requires some training. Not sufficiently distinctive for identification over large

    Databases . Usually used for verification of a claimed

    enrollment identity. System requires a large amount of physical space.

    Speaker/voiceSpeaker recognition has a history dating back some four decades, where theoutput of several analog filters were averaged over time for matching.Speaker recognition uses the acoustic features of speech that have beenfound to differ between individuals. These acoustic patterns reflect bothanatomy (e.g., size and shape of the throat and mouth) and learned

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    16/30

    behavioral patterns (e.g., voice pitch, speaking style). This incorporation of learned patterns into the voice templates (the latter called "voiceprints") hasearned speaker recognition its classification as a "behavioral biometric."Speaker recognition systems employ three styles of spoken input: text-dependent, text-prompted and text independent. Most speaker verificationapplications use text-dependent input, which involves selection andenrollment of one or more voice passwords. Text-prompted input is usedwhenever there is concern of imposters. The various technologies used to

    process and store voiceprints includes hidden Markov models, patternmatching algorithms, neural networks, matrix representation and decisiontrees. Some systems also use "anti-speaker" techniques, such as cohortmodels, and world models.

    Ambient noise levels can impede both collection of the initial and

    subsequent voice samples. Performance degradation can result from changesin behavioral attributes of the voice and from enrollment using onetelephone and verification on another telephone. Voice changes due to agingalso need to be addressed by recognition systems. Many companies marketspeaker recognition engines, often as part of large voice processing, controland switching systems. Capture of the biometric is seen as non-invasive. Thetechnology needs little additional hardware by using existing microphonesand voice-transmission technology allowing recognition over long distancesvia ordinary telephones (wire line or wireless).

    Advantages Public Acceptance. No Contact Required . Commonly Available Sensors(telephones & microphones).

    Disadvantages Difficult to control sensor and channel variances that significantlyimpact capabilities.

    Not sufficiently distinctive for identification over large databases.

    IrisThis recognition method uses the iris of the eye which is the colored area thatsurrounds the pupil. Iris patterns are thought unique. The iris patterns are

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    17/30

    obtained through a video-based image acquisition system. Iris scanningdevices have been used in personal authentication applications for severalyears. Systems based on iris recognition have substantially decreased in priceand this trend is expected to continue. The technology works well in bothverification and identification modes (in systems performing one-to-manysearches in a database). Current systems can be used even in the presence of eyeglasses and contact lenses. The technology is not intrusive. It does notrequire physical contact with a scanner. Iris recognition has beendemonstrated to work with individuals from different ethnic groups andnationalities

    Advantages No contact Required. Protected internal organ,less prone to injury. Believed to be highly stable over lifetime.

    Disadvantages Difficult to capture for some individuals. Easily obscured by eyelashes,eyelids,lens and reflections from thecornea. Public myths and fears related to scanning the eye with a lightsource. Acquisition of an iris image requires more training and attentivenessthan most biometrics. Lack of existing data deters ability to use for background or watchlist checks. Cannot be verified by a human.

    SIGNATURE VERIFICATIONThis technology uses the dynamic analysis of a signature to authenticate a

    person. The technology is based on measuring speed, pressure and angle used by the person when a signature is produced. One focus for this technology has been e-business applications and other applications where signature is anaccepted method of personal authentication.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    18/30

    IRIS Recognition Technology

    History of iris recognition technologyThe idea of using iris patterns for personal identification was originallydocumented in an ophthalmology textbook by James Doggarts in 1949, and

    may have been proposed as early as 1936 by ophthalmologist Frank Burch.By the 1980's the idea had appeared in James Bond films, but it stillremained science fiction and conjecture

    In 1987 two other ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and in 1989 they asked John Daugman (then teaching atHarvard University) to try to create actual algorithms for iris recognition.These algorithms, which Daugman patented in 1994, are the basis for allcurrent iris recognition systems and products

    The Daugman algorithms are owned by Iridian Technologies, and the process is licensed to several other companies who serve as systemsintegrators and developers of special platforms exploiting iris recognition.

    Iris structure

    Figure 3 Iris Structure

    The iris is a protected internal organ of the eye, located behind the corneaand the aqueous humour, but in front of the lens. The false acceptance ratefor iris recognition systems is in 1 in 1.2 million, that is every 1 in 1.2million iris is found to be unique in its features. It is seen in cross-sectionin the anatomical drawing above. It is the only internal organ of the body

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    19/30

    that is normally visible externally. Images of the iris adequate for personalidentification with very high confidence can be acquired from distances of up to about 3 feet (1 meter).

    Among the visible features of an iris are the trabecular mesh works of

    connective tissue (pectinate ligament), the collagenous tissue of the stroma,ciliarys processes, contraction furrows, crypts, rings, a corona and

    pupillary frill, colouration, and sometimes freckles. The striated anterior layer covering the trabecular meshwork creates the predominant textureseen with visible light

    The human iris begins to form during the third month of gestation. Thestructures creating its distinctive pattern are complete by the eighth monthof gestation, but pigmentation continues into the first years after birth. Thelayers of the iris have both ectodermal and mesodermal embryological

    origin, consisting of (from back to front): a darkly pigmented epithelium; pupillary dilator and sphincter muscles; heavily vascularized stroma(connective tissue of interlacing ligaments containing melanocytes); and ananterior layer of chromataphores and melanocytes with a geneticallydetermined density of melanin pigment granules .

    The combined effect is a visible pattern displaying various distinctivefeatures such as arching ligaments, crypts, furrows, ridges, and a zigzagcollarette. Iris colour is determined mainly by the density of the stroma andits melanin content, with blue irises resulting from an absence of pigment:

    longer wavelengths differentially penetrate while shorter wavelengths arereflected and scattered, a phenomenon resembling that which makes thesky blue .

    Physiological Properties of IrisFurther properties of the iris that enhance its suitability for use in highconfidence identification systems include:

    Its inherent isolation and protection from the external environment. The impossibility of surgically modifying iris without unacceptable

    risk to vision. Its physiological response to light, which provides one of several natural tests against artifice. A property the iris shares with fingerprints is the randommorphogenesis of its minutiae. Because there is no genetic penetrance in theexpression of this organ beyond its anatomical form, physiology, colour andgeneral appearance, the iris texture itself is stochastic or possibly chaotic .

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    20/30

    Its detailed morphogenesis depends on initial conditions in theembryonic mesoderm from which it develops, the phenotypic expression evenof two irises with the same genetic genotype (as in identical twins, or the pair

    possessed by one individual) have uncorrelated minutiae .

    The ease of registering iris image at some distance from a Subjectwithout physical contact, unintrusively and perhaps inconspicuously Its intrinsic polar geometry, which imparts a natural coordinatesystem and an origin of coordinates. The high level of randomness in iris pattern, creating inter-Subjectvariability spanning about 250 degrees-of-freedom, and an entropy(information density) of about 3.2 bits per square-millimeter of iris tissue.

    Working Principle Of Iris Recognition TechnologyThe iris-scan process begins with a photograph. A specialized camera,typically very close to the subject, no more than three feet, uses an infraredimager to illuminate the eye and capture a very high-resolution photograph.

    Figure 4 Iris Image After Image Acquisition Process

    This process takes only one to two seconds and provides the details of theiris that are mapped, recorded and stored for future matching/verification .

    The inner edge of the iris is located by an iris-scan algorithm, which mapsthe iris distinct patterns and characteristics. An algorithm is a series of directives that tell a biometric system how to interpret a specific problem.Algorithms have a number of steps and are used by the biometric system todetermine if a biometric sample and record is a match

    A general iris recognition system for personal identification is composed of four steps

    i) Iris Image Acquisition- an image containing the users eye is captured by the high resolution Iris Camera.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    21/30

    ii) Image Preprocessing - the image is then preprocessed to normalize thescale and illumination of the iris and localize the iris from the acquiredimage.

    iii) Feature Extraction- features representing the iris patterns are extracted .

    iv)Pattern Matching - decision is made by means of matching.

    i) Iris Image Acquisition .

    An important and difficult step of an iris recognition system is imageacquisition. Since iris is small in size and dark in color, using somespecialized camera iris image can be easily acquired for analysis

    ii) Image Preprocessing

    The acquired image always contains not only the useful parts (iris) butalso some irrelevant parts (e.g. eyelid, pupil etc.). Under some conditions,the brightness is not uniformly distributed. In addition, different eye-tocamera distance may result in different image sizes of the same eye. For the

    purpose of analysis, the original image needs to be preprocessed. The preprocessing is composed of three steps

    Iris Localization.

    Iris Normalization.

    Image Enhancement.

    PERFORMANCE MANAGEMENT

    F alse accept rate (FAR) or false match rate (FMR ): The probability that the system incorrectly declares a successful match between the input pattern and a non-matching pattern in the database.It measures the percent of invalid matches. These systems are criticalsince they are commonly used to forbid certain actions by disallowed

    people. F alse reject rate (FRR) or false non-match rate (FNMR ):

    The probability that the system incorrectly declares failure of match between the input pattern and the matching template in the database. Itmeasures the percent of valid inputs being rejected.

    R eceiver (or relative) operating characteristic (ROC ): Ingeneral, the matching algorithm performs a decision using some

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    22/30

    parameters (e.g. a threshold). In biometric systems the FAR and FRR can typically be traded off against each other by changing those

    parameters. The ROC plot is obtained by graphing the values of FAR and FRR, changing the variables implicitly. A common variation isthe Detection error trade-off (DET), which is obtained using normaldeviate scales on both axes. This more linear graph illuminates thedifferences for higher performances (rarer errors).

    E qual error rate (EER ): The rate at which both accept and rejecterrors are equal. ROC or DET plotting is used because how FAR andFRR can be changed, is shown clearly. When quick comparison of two systems is required, the ERR is commonly used. Obtained fromthe ROC plot by taking the point where FAR and FRR have the samevalue. The lower the EER, the more accurate the system is considered

    F ailure to enroll rate (FTE or FER) : The percentage of datainput is considered invalid and fails to input into the system. Failure toenroll happens when the data obtained by the sensor are consideredinvalid or of poor quality .

    F ailure to capture rate (FTC) : Within automatic systems, the probability that the system fails to detect a biometric characteristicwhen presented correctly .

    T emplate capacity : The maximum number of sets of data whichcan be input in to the system.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    23/30

    BIOMETRIC SECURITY

    A concern is how a person's biometric, once collected, can be protected.Australia has therefore introduced a Biometrics Institute Privacy CodeBiometrics Institute in order to protect consumer personal data beyond thecurrent protections offered by the Australian Privacy Act .

    Sociological concerns

    As technology advances, and time goes on, more private companies and public utilities may use biometrics for safe, accurate identification. Theseadvances are likely to raise concerns such as:

    Physical - Some believe this technology can cause physical harm toan individual using the methods, or that instruments used areunsanitary. For example, there are concerns that retina scanners mightnot always be clean.

    Personal Information - There are concerns whether our personal

    information taken through biometric methods can be misused,tampered with, or sold, e.g. by criminals stealing, rearranging or copying the biometric data. Also, the data obtained using biometricscan be used in unauthorized ways without the individual's consent.

    Danger to owners of secured items

    When thieves cannot get access to secure properties, there is a chance tha ersof secured itemst the thieves will stalk and assault the property owner togain access. If the item is secured with a biometric device, the damage to theowner could be irreversible, and potentially cost more than the secured

    property. In 2005, Malaysian car thieves cut off the finger of a Mercedes-Benz S-Class owner when attempting to steal the car .

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    24/30

    Cancelable Biometrics

    Physical features, such as face, fingerprint, iris, retina, hand, or behavioralfeatures, such as signature, voice, gait, must fulfill a certain criteria to

    qualify for use in recognition. They must be unique, universal, acceptable,collectable and convenient to the person, in addition, to reliability atrecognition, performance and circumvention. However, most importantly,

    permanence is a key feature for biometrics. They must retain all the abovefeatures in particular the uniqueness unchanged, or acceptably changed, over the lifetime of the individual. On the other hand, this fundamental featurehas brought biometrics to challenge a new risk. If biometric data is obtained,for example compromised from a database, by unauthorized users, thegenuine owner will lose control over them forever and lose his/her identity .

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    25/30

    BIOMETRIC APPLICATIONS Biometric Time Clocks -Which are being increasingly used in

    various organisations to control employee timekeeping. Biometric safes and biometric locks- Provides security to the

    homeowners. Biometric access control systems Providing strong security at

    entrances . Biometric systems are also developed for securing access to pc's and providing single logon facilities .

    Wireless biometrics for high end security and providing safer transactions from wireless devices like PDA's, etc.

    Identifying DNA Patterns of biometrics technology in identifyingDNA patterns for identifying criminals, etc .

    Biometrics airport security devices are also deployed at some of theworld's famous airports to enhance the security standards.

    BIOMETRICS DEVICESOptical Fingerprint Scanner

    Our biometric hamster is the next generation model of popular and versatile biometric fingerprint readers. Packaged in a comfortable, ergonomic design,this biometric scanner features the industry's most rugged and advancedoptical sensor using patented SEIR fingerprint biometric technology .

    http://www.questbiometrics.com/biometrics-scanner-hamster.html
  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    26/30

    OptiMouse

    OptiMouse is an innovative optical tracking mouse that can operate onalmost any surface with exceptional response, it features the industry's mostrugged and advanced optical sensor using patented SEIR fingerprint

    biometric technology .

    iGuard - Integrated Access Control and Time Attendance

    System

    iGuard is a complete solution combining a access control system and timeattendance system. It utilizes patented embedded web server technologycombined with biometrics and smart card authentication. This is the world'sonly available system that has achieved advanced operability using world-renowned TCP/IP networking protocol without having to compromise onsecurity.

    Personal Fingerprint Safes

    Biometric personal safes are revolutionary locking storage cases that openwith just the touch of your finger. These products are designed as "accessdenial" secure storage for medications, jewelry, weapons, documents, and

    other valuable or potentially harmful items.

    http://www.questbiometrics.com/biometrics-fingerprint-safes.htmlhttp://www.questbiometrics.com/biometrics-access-control-iguard.htmlhttp://www.questbiometrics.com/biometric-mouse.html
  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    27/30

    Biometric Fingerprint Door Locks Your fingerprint is the key with our revolutionary fingerprint door lock. Thisamazing new product replaces keyed locking mechanisms with a fingerprintsensor that actually recognizes who is and who is not authorized to enter.

    BIOMETRICS VERSUS FORENSIC While both biometrics ad forensic involves human recognition biometrics istypically applied using automated techniques to prevent situation application

    such as gaining access to sensitive information or to a secured facility .Forensic applications typically occur after a crime has occurred,and may notuse fully automated methods.Forensic methods are often used to assist in thelegal process.Forensic usually requires days of processing and are held to much higher accuracy requirements.

    Where to use BIOMETRICS?

    Biometric use involve controlling access to physical locations(laboratories,buildings etc.Biometrics can be used to determine whether or not a peson isalready in database such as for social service or national id applications.Biometrics can be used in environments where recognition of an individualis required.Applications vary and range from logical access to a personalcomputer to physical access of a secured laboratory.They can be used in avariety of collection environments as identification systems.Biometrics are also used for accountability applications such as recordingthe biometric identities of individuals.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    28/30

    WIRELESS BIOMETRICSAs biometrics systems improve, become smaller and require less power for operation, the potential to integrate into new application grows. The abilityto operate the biometrics verification solution from battery supply isunprecedented. Previously, biometrics have been used in combination with

    personal computers and based on a stringent platform to maintain reasonable performance.

    However, as the technology for fingerprint recognition is being miniaturizedand streamlined for performance, new avenues of application can be foundwhen technologies are integrated together in small, simple and stand-alone

    packaging.

    Wireless biometrics will consists of both the hardware and software for thefingerprint scanning devices that will be embedded in wireless handhelddevices. The solution will come as a bundle of a range of validation,transaction management and content protection services based on thedevices.

  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    29/30

    TELEBIOMETRICS

    Telebiometrics applies biometrics to telecommunications andtelecommunications to remote biometric sensing. With the emergence of multimodal biometrics systems gathering data from different sensors andcontexts, International Standards that support systems performing biometricenrollment and verification or identification have begun to focus on human

    physiological thresholds as constraints and frameworks for "plug and play"telebiometric networks.

    Attending to these wetware protocols has become particularly urgent in thecontext of a recent study suggesting possible pathological effects from RFIDtransponders implanted in dogs. Dogs are frequently used as modelorganisms in the study of human disease

    http://www.globalsecurity.org/security/systems/images/biometric_matrix.jpghttp://www.globalsecurity.org/security/systems/images/introtable.jpg
  • 8/3/2019 23636365 Bio Metrics Seminar Report2

    30/30