BIOMETRICS - A Seminar Report PDF

Title BIOMETRICS - A Seminar Report
Author Prof. Hena Vadi
Pages 62
File Size 1.7 MB
File Type PDF
Total Downloads 475
Total Views 618

Summary

BIOMETRICS A Seminar Report Submitted for Master of Engineering in Computer Engineering Submitted to GUJARAT TECHNOLOGICAL UNIVERSITY, GUJARAT Submitted by Ms. VADI HENA GHANSHYAMBHAI (Enrollment No: 140030702015) Department of Computer Engineering ATMIYA INSTITUTE OF TECHNOLOGY AND SCIENCE RAJKOT -...


Description

BIOMETRICS A Seminar Report

Submitted for

Master of Engineering in Computer Engineering

Submitted to

GUJARAT TECHNOLOGICAL UNIVERSITY, GUJARAT

Submitted by Ms. VADI HENA GHANSHYAMBHAI (Enrollment No: 140030702015)

Department of Computer Engineering ATMIYA INSTITUTE OF TECHNOLOGY AND SCIENCE RAJKOT - GUJARAT

ATMIYA INSTITUTE OF TECHNOLOGY & SCIENCE - RAJKOT

CERTIFICATE This is to certify that Ms. VADI HENA GHANSHYAMBHAI Enrolment No:

140030702015

Branch:

Master of Engineering [Computer]

Semester:

3rd

Has

satisfactorily

completed

the

Seminar

Report

for

“BIOMETRICS” under my guidance and is reached to a level required for being accepted for examination.

Faculty In-Charge

Head of the Department

Table of Content

Abstract

1

Acknowledgement

2

List of figure

3

Chapter 1

Introduction

4

1.1

History and Development of Biometrics

7

1.2

What is Biometric

7

1.3

Classification

10

1.4

Basic Structure

11

Biometric System Components and Process

12

2.1

Components

12

2.2

Process

12

2.3

Types of Biometric System

13

2.4

Biometric Accuracy

14

Biometric Technology

17

3.1

Fingerprint Authentication

17

3.2

Retina Scanning

19

3.3

Iris Recognitions

21

3.4

Hand Geometry

25

3.5

Voice Pattern

27

3.6

Signature Pattern

29

3.7

Key Stroke

31

3.8

Facial Recognition

33

3.9

DNA Fingerprint

40

Chapter 2

Chapter 3

3.10

Comparison

42

Multimodal Biometric System

44

4.1

Fusion of Face, Voice and Fingerprint

44

4.2

Fusion of Face and Lip Movement

45

Chapter 5

Vulnerable Points Of Biometric System

46

Chapter 6

Applications

49

Chapter 7

Biometric Devices

53

Chapter 8

Conclusion

57

Chapter 9

References

58

Chapter 4

ABSTRACT Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To achieve more reliable verification or identification we should use something that really characterizes the given person. Biometrics offer automated methods of identity verification or identification on the principle of measurable physiological or behavioral characteristics. The characteristics are measurable andunique. Biometrics is the development of statistical and mathematical

methods

applicable

to

data

analysis

problems

in

the

biological

sciences.Physical characteristics such as fingerprints, retinas and irises, palm prints, facial structure, and voice recognition are just some of the many methods of biometric encryption. Depending on the context, a biometric system can be either a verification (authentication) system or an identification system. Biometrics is a rapidly evolving technology which has been widely used in forensics such as criminal identification and prison security. Recent advancements in biometric sensors and matching algorithms have led to the deployment of biometric authentication in a large number of civilian applications. With the increased use of computers as vehicles of information technology, it is necessary to restrict access to sensitive/personal data. Real-time biometric systems can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, computer networks and electronic banking.

1

ACKNOWLEDGEMENT

It gives me a great pleasure and satisfaction in presenting this seminar report. I would like to take this opportunity to express my sincere gratitude to faculty members who have been great sense of support and inspiration thought the research work successful. This seminar work would not have been possible without the kind support of many people. There are lots of people who inspired me and helped, worked for me in every possible way to provide the details about various related topics thus making research and report work success.

I am very grateful to Prof. Tupti Kodinariya for all his diligence, guidance, encouragement and help throughout the period of research, which have enabled me to complete the research work in time. His constant inspiration and encouragement along with his valuable guidance has been instrumental in the successful completion of this project.

I would like to thank my parents for their valuable support and encouragement. I would like to thank my friends for their support.

Last, but not the least my special thanks goes to my institute, Atmiya Institute of Technology & Science, Rajkot for giving me this opportunity to work in the great environment.

VADI HENA

2

LIST OF FIGURES

Figure 1.1 Single Biometric Figure 1.2 Multimode Biometric Figure 1.3 Basic Structure of Biometric Figure 2.1 Enrollment Process Figure 2.1 Verification Process Figure 2.3 Error Rate Figure 3.1 Fingerprint Authentication Process Figure 3.2 Retina Scan Figure 3.3 Iris Scan Figure 3.4 Iris Segmentation Figure 3.5 Boundary Detection Figure 3.7 Polar Code Figure 3.8 Hand Geometry Figure 3.9 Voice Pattern Figure 3.10 Raw Data in Signature writing Figure 3.11 Feature Extraction Figure 3.11 Feature Comparison Figure 3.12 Key Stroke Figure 3.13 Facial Enroll and Recognition Stage Figure 3.14 PSR Figure 3.14 Selecting Face Region Figure 3.15 Test Image Figure 3.16 Filtering on Face Region Figure 3.17 Correlation Output Figure 3.18 3D Face Matching Figure 3.19 DNA Fingerprinting Figure 4.1 Multimode Biometric Using Fingerprint, Face and Voice Figure 4.2 Multimode Biometric Using Face and Lip Movement Figure 5.1 Vulnerable Points Of Biometric System Figure 7.1 Iris Scanner Figure 7.2 Face Camera Figure 7.3 Hand Scanner Figure 7.4 Retina Scan Figure 7.5 Multi Biometrics

8 9 11 12 13 15 17 19 21 22 23 23 25 27 30 30 31 32 33 34 35 36 37 38 39 40 44 45 46 53 54 55 56 56

LIST OF TABLES

Table: 1.1 User Authentication Methods

5

Table: 3.1 Comparison of Biometric Technology

42

3

1. INTRODUCTION Reliable user authentication is becoming an increasingly important task in the Webenabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic, and may include loss of confidential information, denial of service, and compromised data integrity. The value of reliable user authentication is not limited to just computer enhanced security. The prevailing techniques of user authentication, which involve the use of either passwords and user IDs (identifiers), or identification cards and PINs (personal identification numbers), suffer from several limitations. Passwords and PINs can be illicitly acquired by direct covert observation. Once an intruder acquires the user ID or network access. Many other applications in everyday life also require user authentication, such as banking, e- commerce, and physical access control to computer resources, and could benefit from and the password, the intruder has total access to the user’s resources. In addition, there is no way to positively link the usage of the system or service to the actual user, that is, there is no protection against repudiation by the user ID owner. For example, when a user ID and password is shared with a colleague there is no way for the system to know who the actual user is. A similar situation arises when a transaction involving a credit card number is conducted on the Web. Even though the data are sent over the Web using secure encryption methods, current systems are not capable of assuring that the rightful owner of the credit card initiated the transaction. In the modern distributed systems environment, the traditional authentication policy based on a simple combination of user ID and password has become inadequate. Fortunately, automated biometrics in general, and fingerprint technology in particular, can provide a much more accurate and reliable user authentication method. Biometrics is a rapidly advancing field that is concerned with identifying a person based on his or her physiological or behavioural characteristics. Biometrics is derived from the conjunction of the Greek words bios and metrics that mean life and to measure respectively. Examples of automated biometrics include fingerprint, face, iris, and speech recognition. Since biometrics is extremely difficult to forge and cannot be forgotten or stolen, Biometric authentication offers a convenient, accurate,irreplaceable and high secure alternative for an individual, which makes it has advantages over traditional cryptography-based authentication schemes. It has become a hot interdisciplinary topic involving biometric and Cryptography. Biometric data is personal 4

privacy information, which uniquely and permanently associated with a person and cannot be replaced like passwords or keys. Once an adversary compromises the biometric data of a user, the data is lost forever, which may lead to a huge financial loss. Hence, one major concern is how a person’s biometric data, once collected, can be protected. User authentication methods can be broadly classified into three categories as shown in Table 1.1. Because a biometric property is an intrinsic property of an individual, it is difficult to surreptitiously duplicate and nearly impossible to share. Additionally, a biometric property of an individual can be lost only in case of serious accident.

Method

Examples

What you know?

Properties

User ID

Shared

Password

Many passwords easy to

PIN

guess Forgotten

What you have?

Cards

Shared

Badges

Can be duplicated

Keys

Lost or stolen

What you know and what you ATM card + PIN

Shared

have?

PIN a weak link (Writing the PIN on the card)

Something unique about the user

Fingerprint

Not possible to share

Face

Repudiation unlikely

Iris

Forging difficult

Voice print

Cannot be lost or stolen

Table: 1.1 User Authentication Methods Biometric readings, which range from several hundred bytes to over a megabyte, have the advantage that their information content is usually higher than that of a password or a pass phrase. Simply extending the length of passwords to get equivalent bit strength presents significant usability problems. It is nearly impossible to remember a 2K phrase, and it would 5

take an annoyingly long time to type such a phrase (especially without errors). Fortunately, automated biometrics can provide the security advantages of long passwords while retaining the speed and characteristic simplicity of short passwords. Even though automated biometrics can help alleviate the problems associated with the existing methods of user authentication, hackers will still find there are weak points in the system, vulnerable to attack. Password systems are prone to brute force dictionary attacks. Biometric systems, on the other hand, require substantially more effort for mounting such an attack. Yet there are several new types of attacks possible in the biometrics domain. This may not apply if biometrics is used as a supervised authentication tool. But in remote, unattended applications, such as Web-based e-commerce applications, hackers may have the opportunity and enough time to make several attempts, or even physically violate the integrity of a remote client, before detection. A problem with biometric authentication systems arises when the data associated with a biometric feature has been compromised. For authentication systems based on physical tokens such as keys and badges, a compromised token can be easily cancelled and the user can be assigned a new token. Similarly, user IDs and passwords can be changed as often as required. Yet, the user only has a limited number of biometric features (one face, ten fingers, two eyes). If the biometric data are compromised, the user may quickly run out of biometric features to be used for authentication. Only the biometric authentication is based on an intrinsic part of a human being. So unlike a password or PIN or Smart Card, it can't be forgotten, misplaced, lost or stolen. We are having our identification with ourselves and therefore there is no need to carry any card or remember passwords for our identification.A biometric template is unique for an individual for whom it is created.Biometrics ensures that the person trying to access your network and applications is actually a sanctioned user, and not in a possession of a stolen smartcard or someone who found, hacked or cracked password. It is not only the initial cost that of the sensor or the matching hardware that is involved. Often the life cycle support cost can overtake the initial cost of the hardware. Most of the biometric systems like finger print recognition, iris recognition etc. areaccurate. But some others like facial recognition etc. are not that accurate.

6

1.1

HISTORY AND DEVELOPMENT OF BIOMETRICS

The idea of using patterns for personal identification was originally proposed in 1936 byophthalmologist Frank Burch. By the 1980’s the idea had appeared in James Bond films, but itstill remained science fiction and conjecture. In 1987, two other ophthalmologists Aram Safirand Leonard Flom patented this idea and in 1987 they asked John Daugman to try to createactual algorithms for this iris recognition. These algorithms which Daugman patented in 1994 arethe basis for all current iris recognition systems and products.

Daugman algorithms are owned by Iridian technologies and the process is licensed toseveral other Companies who serve as System integrators and developers of special platformsexploiting iris recognition in recent years several products have been developed for acquiring itsimages over a range of distances and in a variety of applications. One active imaging systemdeveloped in 1996 by licensee Sensar deployed special cameras in bank ATM to capture IRISimages at a distance of up to 1 meter. This active imaging system was installed in cash machinesboth by NCR Corps and by Diebold Corp in successful public trials in several countries during 1997to 1999. a new and smaller imaging device is the low cost “Panasonic Authenticam” digitalcamera for handheld, desktop, e-commerce and other information security applications. Ticketless air travel, check-in and security procedures based on iris recognition kiosks in airports havebeen developed by eye ticket. Companies in several, countries are now using Daughman’salgorithms in a variety of products.

1.2 WHAT IS BIOMETRIC? 1.2.1

SINGLE BIOMETRIC:

Biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on unique physiological or behavioural characteristics. Biometrics can provide very secure and convenient authentication for an individual since they cannot be stolen or forgotten and are very difficult to forge.

7

Figure 1.1 Single Biometric The term “biometrics” is derived from two Greek words ‘bios’ for life and ‘metron’ for measure. A biometric can be described as a measurable physical and/or behavioral trait that can be captured and used to verify the identity of a person by comparing the metric to a previously stored template. The area of biometrics can therefore be defined as the task of automatically recognizing a person using his/her distinguishing traits. Examples of these “distinguishing traits” are fingerprints, voice patterns, facial characteristics etc. The idea of biometric identification is not new, it have been around for centuries. Example of a biometric is the photo on identification cards and passports, which still is the most important way of verifying the identity of a person. As early as the 14th century, the Chinese were reportedly using fingerprints as form of signature. During the late 1890’s, a method of bodily measurement called “Bertillonage” (after its founder Alphonse Bertillone) was used by Police Department in Paris & France and this identification based on the number of bodily measurement and physical description. The difference today, is that we now have access to technologies enabling us to do these verifications automatically and almost in real-time. Practically all biometrics system work in the same manner, first a person is enrolled into a database using The specified method, information about a certain characteristics of the human being is captured, this information is usually placed through an algorithm that turns the information into a code that the database stores. When the person need to be identified, the system will take the information about the person, again this new information is placed through the algorithm and then compares the new code with the ones in the database to discover a match and hence, identification.

8

1.2.2MULTIMODAL BIOMETRIC

Figure 1.2 Multimode Biometric

A multimodal biometric system uses multiple applications to capture different type biometric. This allows the integration of two or more types of biometric recognition and verification system in order to meet stringent performance requirements. A multimodal system could be a combination of finger print verification, face recognition, voice verification and smart card or any other combination of biometrics. For instance it is estimated that 5% of the population does not have legible fingerprints, a voice could be altered by a cold and face recognition systems are susceptible to changes in ambient light and the pose of the subject. This enhanced structure takes advantages of the proficiency of each individual biometric and can be used to overcome some of the limitations of a single biometric.

9

1.3

CLASSIFICATION OF BIOMETRICS



A physiological characteristic is a relatively stable physical characteristic, such as an individual’s fingerprint, hand geometry, iris pattern, or blood vessel pattern on the back of the eye. This type of biometric measurement is usually unchanging and unalterable without significant duress to the individual. Physical biometrics:

Fingerprint- Analyzing finger...


Similar Free PDFs