Biometrics Technology
May 06, 2015
Biometrics Technology
• something you know, like a password, PIN, or code.
• something you have, like a swipe card, smart card, token, or key.
• something you are, which is biometrics.
three main types of authentication available today are:
What is a biometric?
Biometrics • Is the term given to the use of
biological traits
OR
behavioral characteristics
to identify an individual.
Characteristics
The common Physical characteristics are: Fingerprint Face Retina Iris Vein pattern, and Hand and finger geometry
Characteristics
Behavioral characteristics are:
Keystroke dynamics Voice Gait, and Signature dynamics
The Biometric importance
The security is needed in every place.
Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.
The Biometric importance (Cont.)
Improves convenience, security, and privacy.
The first and most critical link in the security chain.
presented to counteract security threats.
Biometrics History
The term "biometrics" is derived from the Greek words
(life) and metric means (to measure).
bio which means
Biometrics History (Cont.)
the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.
Biometrics History (Cont.) In the 1890s, 'Bertillonage', created a method of bodily
measurement with the criminals who repeated the crimes with different names and looks.
Biometrics History (Cont.)
After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.
Biometrics Process
No
Yes
BiometricData Collection
TransmissionQuality
Sufficient?
Yes
Template Match
Signal Processing, Feature Extraction,
Representation
Database
Generate Template
DecisionConfidence?
new biometric sample is requested. No
Physical Characteristics
Fingerprint Recognition:
Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
Database
Fingerprint Recognition steps:
Face Recognition: Face recognition uses the visible physical
structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.
Face recognition process:
Database
Input face image
Extraction of face image
Extraction of face features
Positive
negative
Iris Identification: The iris is the colored ring of textured tissue
that surrounds the pupil of the eye.
Iris Identification Steps:
Database
Input of face image
Detection of eye regions
Put iris in focusRecognition of
iris pattern
accept
reject
Veins Recognition:
Venial Recognition: A system for Identification using a person’s unique vein patterns.
Veins as a biometrics tool involve the measurement of the blood vessels on the back of your hand.
Vein Recognition System:
Database
Input of palm picture
The output picture
Generate veins structure
match
Not match
Behavioral Characteristics
Voice Recognition:
Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.
Voice Identification System
Database
Construct voice reference template
Signature Identification:
Signature identification: is the analyses of the way a user signs his or her name.
The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).
• the angle at which the pen is held,
• the number of times the pen is lifted,
• the time it takes to write the entire signature,
the pressure exerted by the person while signing,
the variations in the speed with which different parts of the signature are written.
Signature Verification Process (Cont.)
Biometric trait
Signature Verification Process
Database
Profile
Movies to Real World
Applications of Biometric
Applications of Biometric
Access control :• Disney World (fingerprint scanner).
• Child day care centers ( hand geometry systems )
Applications of Biometric (Cont.)
Time and attendance management:• Hospitals (hand geometry systems)
Other Applications
Airports:• Heathrow airport (iris recognition)
ATMs:• (face recognition)
Other Applications (Cont.)
Pc access: • GM and Hertz (voice identification technology)
to protect their computer facilities.
• Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.
Other Applications (Cont.)
Prisons: Fujitsu has developed a mouse that can verify a
person's identity by recognizing his pattern of blood veins.
Advantages of biometrics
1. Uniqueness
2. Universality
3. Permanence
4. Measurability
5. User friendliness
6. Accuracy
7. Comfort
Disadvantages of Biometrics
1. costly.
2. Facial imaging can also hinder accurate identifications.
3. Missing body part problem.
Disadvantages of Biometrics (Cont.)
4. False acceptances and rejections.
5. The amount of comfort.6. The scanning of eye is fearful.
7. The nervousness that people feel about the scanners identification.
Future Prospects
Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:
1. Ear shape identification.
2. Body odor identification.
3. Body salinity identification.
4. EEG Fingerprint
5. DNA matching
Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing
convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
References:
•The Biometric Consortium - http://www.biometrics.org/ •National Institute of Standards and Technology - http://www.nist.gov/ •The Biometric Catalog - http://www.biometricscatalog.org/ •ITPro - http://www.computer.org/ •Georgia Institute of Technology - http://www.gatech.edu/•http://www.biometricgroup.com/abio1/technology/researchtechnology.htm•http://www.conspiracyarchive.com/images/biometrics.jpg•http://www.information-security-topics.org/information_security_index/Vhttp://www.bromba.com/faq/fpfaqe.htm