advertisement

biometric technology

50 %
50 %
advertisement
Information about biometric technology
Education

Published on December 14, 2008

Author: anmolbagga

Source: slideshare.net

Description

Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
advertisement

Anmol Bagga Migmar Dolma BSc. Hons Electronics III Acharya Narendra Dev College, University of Delhi Govindpuri, Kalkaji, New Delhi, India

Contents Of The Presentation What is BIOMETRICS ? Its Working Contribution In Various Fields Comparison Of Biometric Techniques Success Rate Of The Applications Future Of Biometric Techniques Bibliography

What is BIOMETRICS ?

Its Working

Contribution In Various Fields

Comparison Of Biometric Techniques

Success Rate Of The Applications

Future Of Biometric Techniques

Bibliography

Biometrics Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.

Introduction Challenges in computing environments Computing devices are numerous and ubiquitous Traditional authentication including login schemes aren’t reliable any more Proposed Solutions Use biometrics for authentication At the same time, ensure security of biometric templates in an open environment Benefits Cannot be misused as it authenticates on the basis of who you are but not what you carry (like the password, smartcard or be some keys ) and hence more reliable.

Challenges in computing environments

Computing devices are numerous and ubiquitous

Traditional authentication including login schemes aren’t reliable any more

Proposed Solutions

Use biometrics for authentication

At the same time, ensure security of biometric templates in an open environment

Benefits

Cannot be misused as it authenticates on the basis of who you are but not what you carry (like the password, smartcard or be some keys ) and hence more reliable.

A Biometric system uses the three components: 1. Sensor It detects the characteristic being used for identification 2. Computer It reads and stores the information 3. Software It analyzes the characteristic, translates it into a graph or code and performs the actual comparisons

VERIFICATION ENROLLMENT RECORDING AND SCANNING REPRESENTATION TEMPLATE EXTRACTION & STORAGE COMPARISON WITH STORED TEMPLATE

How Biometrics Works? Enrollment The data to be verified is recorded and scanning is done. Representation The recorded data is converted into a digital representation and stored as a numerical template. Matching The questioned data is compared to the stored numerical template. Verification /Identification In verification, an image is matched to only one image in the database (1:1). For example, an image taken may be matched to an image in the database to verify. In identification, the image is compared to all images in the database (1:N). For example, the image taken is compared to a database of mug shots to identify who the subject is.

Enrollment

The data to be verified is recorded and scanning is done.

Representation

The recorded data is converted into a digital representation and stored as a numerical template.

Matching

The questioned data is compared to the stored numerical template.

Verification /Identification

In verification, an image is matched to only one image in the database (1:1). For example, an image taken may be matched to an image in the database to verify.

In identification, the image is compared to all images in the database (1:N). For example, the image taken is compared to a database of mug shots to identify who the subject is.

Contributions of Biometrics Finger Print and Hand Geometry Recognition Voice Recognition Handwriting Recognition Iris Scanning Vein Geometry Recognition Facial Geometry Recognition

Finger Print and Hand Geometry Recognition

Voice Recognition

Handwriting Recognition

Iris Scanning

Vein Geometry Recognition

Facial Geometry Recognition

 

Finger Print And Hand Geometry Recognition When the hand is aligned on the scanning screen and applied to the sensor window of the reader, the hand is scanned and a gray-scale image is captured. A special computer software then identifies the key minutiae points from the image. The points are then converted into a digital representation, called “the numerical template “. The numerical template is then compared with the questioned sample and if the match is found, the person’s authentication is proved.

When the hand is aligned on the scanning screen and applied to the sensor window of the reader, the hand is scanned and a gray-scale image is captured.

A special computer software then identifies the key minutiae points from the image.

The points are then converted into a digital representation, called “the numerical template “.

The numerical template is then compared with the questioned sample and if the match is found, the person’s authentication is proved.

Iris Scanning Iris scanning can seem very futuristic but it uses a simple Digital CCD camera It uses both visible and near infrared light to take a clear, high-contrast picture of the iris. In the scanner, the camera focuses to make sure that the position is correct and the eye is kept 3 to 10 inches from the camera. When the camera takes a picture, the computer locates: The center and edge of the pupil. The edge of the iris The eyelids and eyelashes An iris scanner

Iris scanning can seem very futuristic but it uses a simple Digital CCD camera

It uses both visible and near infrared light to take a clear, high-contrast picture of the iris.

In the scanner, the camera focuses to make sure that the position is correct and the eye is kept 3 to 10 inches from the camera.

When the camera takes a picture, the computer locates:

The center and edge of the pupil.

The edge of the iris

The eyelids and eyelashes

 

The pattern is then analyzed and translated into a code. These are more common in high-security applications because people's eyes are so unique and the chance of overlapping is near to impossible. They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints. The iris is a visible but protected structure, and it does not usually change over time, making it ideal for biometric identification.

The pattern is then analyzed and translated into a code.

These are more common in high-security applications because people's eyes are so unique and the chance of overlapping is near to impossible.

They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints.

The iris is a visible but protected structure, and it does not usually change over time, making it ideal for biometric identification.

Voice Recognition It utilizes the fact that everybody has a unique voice because of the unique shape of vocal cavities and movements of the mouth while speaking. Speaker recognition systems use spectrograms to represent human voices.

It utilizes the fact that everybody has a unique voice because of the unique shape of vocal cavities and movements of the mouth while speaking.

To enroll in a voiceprint system, either the exact words or phrases is required, or an extended sample of speech for the computer to identify no matter what is said. The data used in a voiceprint is a sound spectrogram. It is basically a graph that shows sound's frequency and time on the vertical and horizontal axis respectively. Different speech sounds create different shapes within the graph . Disadvantage It has been disadvantageous as any one can access it by simply recording authorized person’s voice and hence less reliable. This is a fact due to which it has remained less popular than other techniques To overcome these disadvantages, technologies have been introduced that detects the artifacts created in recording and playback.

To enroll in a voiceprint system, either the exact words or phrases is required, or an extended sample of speech for the computer to identify no matter what is said.

The data used in a voiceprint is a sound spectrogram. It is basically a graph that shows sound's frequency and time on the vertical and horizontal axis respectively.

Different speech sounds create different shapes within the graph .

Disadvantage

It has been disadvantageous as any one can access it by simply recording authorized person’s voice and hence less reliable. This is a fact due to which it has remained less popular than other techniques

To overcome these disadvantages, technologies have been introduced that detects the artifacts created in recording and playback.

Handwriting Recognition Biometric systems analyze the act of writing by examining the pressure used and the speed and rhythm of writing and not just by observing the way in which the words are formed. They also record the sequence in which the letters are formed. A handwriting recognition system's sensors include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time. This Tablet PC has a signature verification system

Biometric systems analyze the act of writing by examining the pressure used and the speed and rhythm of writing and not just by observing the way in which the words are formed.

They also record the sequence in which the letters are formed.

A handwriting recognition system's sensors include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction.

The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.

This is a unique feature and extremely difficult to tamper with. To use the system, your finger, wrist, palm is simply placed on or near the scanner and a digital picture is taken using near-infrared light. The hemoglobin in blood absorbs the light, and the veins appear black in the picture and a reference template based on the shape and location of the vein structure is created by the software. Vein Geometry Recognition Vein scanners use near-infrared light to reveal the veins’ pattern.

This is a unique feature and extremely difficult to tamper with.

To use the system, your finger, wrist, palm is simply placed on or near the scanner and a digital picture is taken using near-infrared light.

The hemoglobin in blood absorbs the light, and the veins appear black in the picture and a reference template based on the shape and location of the vein structure is created by the software.

Facial Recognition System Facial recognition uses a software known as Facelt that is based on the ability to recognize a face and then measure the various features of the face. Every face has numerous, distinguishable landmarks, peaks and valleys that make up facial features. Facelt defines these landmarks as nodal points. Each human face has approximately 80 nodal points These nodal points are measured creating a numerical code, called a Face Print , representing the face in the database. FaceIt software measures nodal points on the human face to create a face print and find a match

Facial recognition uses a software known as Facelt that is based on the ability to recognize a face and then measure the various features of the face.

Every face has numerous, distinguishable landmarks, peaks and valleys that make up facial features. Facelt defines these landmarks as nodal points. Each human face has approximately 80 nodal points

These nodal points are measured creating a numerical code, called a Face Print , representing the face in the database.

2D FACIAL RECOGNITION For it to be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light and expressions from image in the data base. Even the smallest changes in light or orientation could reduce the effectiveness of the system, so they couldn't be matched to any face in the database, leading to a high rate of failure. Hence, we’ve switched over to 3D Facial recognition. Facelt software compares the face print with other images in the database.

2D FACIAL RECOGNITION

For it to be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light and expressions from image in the data base.

Even the smallest changes in light or orientation could reduce the effectiveness of the system, so they couldn't be matched to any face in the database, leading to a high rate of failure.

Hence, we’ve switched over to 3D Facial recognition.

Facelt software compares the face print with other images in the database.

3D Face Recognition A newly-emerging trend in facial recognition software uses a 3D model, which claims to provide more accuracy. 3D facial recognition uses distinctive features of the face - where rigid tissue and bone is most apparent, such as the curves of the eye socket, nose and chin - for identification. Using depth and an axis of measurement that is not affected by lighting, 3D facial recognition can even be used in darkness and has the ability to recognize a subject at different view angles with a potential to recognize up to 90 degrees. The Vision 3D + 2D ICAO camera is used to perform enrollment, verification and identification of 3D and 2D face images.

A newly-emerging trend in facial recognition software uses a 3D model, which claims to provide more accuracy.

3D facial recognition uses distinctive features of the face - where rigid tissue and bone is most apparent, such as the curves of the eye socket, nose and chin - for identification.

Using depth and an axis of measurement that is not affected by lighting, 3D facial recognition can even be used in darkness and has the ability to recognize a subject at different view angles with a potential to recognize up to 90 degrees.

 

The 3D software system involves a series of steps to verify the identity of an individual 1) Detection Acquiring an image can be accomplished by digitally scanning an existing photograph (2D) or by using a video image to acquire a live picture of a subject (3D). 2) Alignment Once it detects a face, the system determines the head's position, size and pose. Since the subject has the potential to be recognized up to 90 degrees, while with 2D, the head must be turned at least 35 degrees toward the camera . 3) Measurement The system then measures the curves of the face on a sub-millimeter scale and creates a template .

1) Detection Acquiring an image can be accomplished by digitally scanning an existing photograph (2D) or by using a video image to acquire a live picture of a subject (3D).

2) Alignment Once it detects a face, the system determines the head's position, size and pose. Since the subject has the potential to be recognized up to 90 degrees, while with 2D, the head must be turned at least 35 degrees toward the camera .

3) Measurement The system then measures the curves of the face on a sub-millimeter scale and creates a template .

4) Representation The system translates the template into a unique code. This coding gives each template a set of numbers to represent the features on a subject’s face 5) Matching For a 3D image, different points are identified and measured. (For example, the outside of the eye , the inside of the eye and the tip of the nose ).After these measurements, an algorithm will be applied to the image to convert it to a 2D image. After conversion, the software will then compare the image with the 2D images in the database to find a potential match. 6) Verification or Identification In verification, an image is matched to only one image in the database (1:1). If identification is the goal, then the image is compared to all images in the database resulting in a score for each potential match (1:N).

4) Representation The system translates the template into a unique code. This coding gives each template a set of numbers to represent the features on a subject’s face

5) Matching

For a 3D image, different points are identified and measured. (For example, the outside of the eye , the inside of the eye and the tip of the nose ).After these measurements, an algorithm will be applied to the image to convert it to a 2D image. After conversion, the software will then compare the image with the 2D images in the database to find a potential match.

6) Verification or Identification In verification, an image is matched to only one image in the database (1:1). If identification is the goal, then the image is compared to all images in the database resulting in a score for each potential match (1:N).

Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: Universality each person should have the characteristic Uniqueness is how well the biometric separates individually from another. Permanence measures how well a biometric resists aging. Performance accuracy, speed, and robustness of technology used.

It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters:

Universality

each person should have the characteristic

Uniqueness

is how well the biometric separates individually from another.

Permanence

measures how well a biometric resists aging.

Performance

accuracy, speed, and robustness of technology used.

Comparison of various Biometric Technologies ( H =High, M = Medium, L = Low)

How Successful Are These Biometric Techniques

 

The Future of Biometrics New methods that use DNA, nail bed structure, teeth, ear shapes, body odor, skin patterns and blood pulses More accurate home-use systems Opt-in club memberships, frequent buyer programs and rapid checkout systems with biometric security A creator of facial recognition software, is currently marketing a system that will keep track of employees' time and attendance. Their Web site states that it will prohibit "buddy punching," which will cut down on security risks and decreased productivity.

New methods that use DNA, nail bed structure, teeth, ear shapes, body odor, skin patterns and blood pulses

More accurate home-use systems

Opt-in club memberships, frequent buyer programs and rapid checkout systems with biometric security

Biometric Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Applications of biometrics technology in identifying DNA patterns for identifying criminals, etc. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards. More prevalent biometric systems in place of passports at border crossings and airports

Biometric Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping.

Biometric safes and biometric locks, provides security to the homeowners.

Biometric access control systems, providing strong security at entrances.

Biometric systems are also developed for securing access to pc's and providing single logon facilities.

Applications of biometrics technology in identifying DNA patterns for identifying criminals, etc.

Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.

More prevalent biometric systems in place of passports at border crossings and airports

 

Bibliography www.google.com www.howstuffsworks.com e library of NUS Biometric Consortium, biometrics.org www.cnn.com

www.google.com

www.howstuffsworks.com

e library of NUS

Biometric Consortium, biometrics.org

www.cnn.com

Questions?

Thank You

Add a comment

Related presentations

Related pages

Biometrics - Wikipedia

By turning the human subject into a collection of biometric parameters, biometrics ... the BTAM is a comprehensive reference manual on biometric technology ...
Read more

10 things you need to know about biometrics technology ...

1 India’s big biometric database. India houses the most ambitious biometrics database in the world, Aadhaar, which has so far gathered fingerprints, iris ...
Read more

Biometrics: The future of digital security - CNBC

Biometric technology has swiftly emerged as a go-to solution for improving digital security and how fast you type could soon be stopping hackers.
Read more

Biometric Technology Pros And Cons, The Latest News, Tips ...

Biometric technology pros and cons. This technology is used by the military, at airports, by financial institutions, in homes and by many companies that ...
Read more

How Biometrics Works | HowStuffWorks

Biometrics technology identifies people based on physical or behavioral traits. Learn about biometrics and how this technology provides top-level security.
Read more

Iris recognition - Wikipedia

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of ...
Read more

What is biometrics? - Definition from WhatIs.com

Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for ...
Read more

Biometrics Technology Introduction

Biometric Term Used in the description of biometric systems (e.g. face recognition or iris recognition) relating to their fundamental function
Read more

Zvetco Biometrics. Award-Winning Fingerprint Readers and ...

Zvetco Biometrics industry leading Fingerprint Reader, Biometric Software, and SDK's combine to increase your companies security, accountability, and ...
Read more

Biometrics.gov - Home

Biometrics.gov is the central source of information on biometrics-related activities of the Federal government. This site and its sister site, www ...
Read more