Bachelor of Technology IN Electronics & Instrumentation Engineering
Bachelor of Technology IN Electronics & Instrumentation Engineering
Submitted to Submitted By
Mr.UMESK KUMAR RAHUL KUMAR
Seminar Guide & Coordinator) E.I. Final Year
Roll No. 0721632039
ACKNOWLEDGEMENT
First and foremost I would like to thank the almighty, who bestowed upon me the
patience, strength and ability to embark upon this work and carry it to its completion. It is
a matter of great pride and privilege for me to have the esteemed supervision of Ms.
Taslima Ahmed as the seminar coordinator.
I would render this acknowledgement as incomplete if I don’t mention the able guidance
of Mr. Umesh Kumar (seminar guide &HOD).I would always be thankful to him for the
critical analysis of my seminar. I am indebt to him for his suggestions that made me
thinking.
I am also thankful to him for providing the internet facility in college premises which
served as a boon in material collection .A special thanks to all the faculty members and
the non teaching staff for their invaluable support.
Rahul Kumar
E.I-Final Year
IIMT College Of Engineering
CERTIFICATE
ABSTRACT 1
1) INTRODUCTION 2
3) FINGERPRINTS 4
4) FACE RECOGNITION 5
5) SPEAKER VERIFICATION 6
6) IRIS SCAN 7
8) HAND GEOMETRY 8
9) RETINAL SCANNING 8
15) SUMMARY 14
ABSTRACT
Biometrics is seen by many as a solution to a lot of the user identification and
security problems in today’s networks. Password abuse and misuse, intentional and
inadvertent is a gaping hole in network security. This results mainly from human
error, carelessness and in some cases maliciousness. Biometrics removes human
error from the security equation.
Our paper will examine all the technological and feasibility aspects. We will look
at many different biometric methods of identifying the user.
6 | Page
INTRODUCTION
Biometrics - it’s a word you will hear more and more in the future. It is the technology
that is available today to identify a person by a fingerprint, eye scan, face or handprint, or
voice pattern. The increased emphasis on security in the wake of terrorist attacks, identity
thefts, and computer hackers should be fueling huge growth in the sales of biometric
technology.
Examples of biometrics:
Fingerprints
Hand Geometry
Voice Recognition
Iris Scan
Facial Recognition
Key stroke dynamic
Vein patterning
Signature
Palm Print
DNA
7 | Page
HISTORY BEHIND BIOMETRIC SECURITY
In fact, the basic principles of biometric verification were understood and practiced
somewhat earlier. Thousands of years earlier to be precise, as our friends in the Nile
valley routinely employed biometric verification in a number of everyday business
situations. There are many references to individuals being formally identified via unique
physiological parameters such as scars, measured physical criteria or a combination of
features such as complexion, eye colour, height and so on. It is well known that some
personnel traits are distinct to each individual and so people can be identified on the basis
of their physical characteristics. Of course, they didn’t have automated electronic
biometric readers and computer networks (as far as we know), and they certainly were
not dealing with the numbers of individuals that we have to accommodate today, but the
basic principles were similar.
Alphonse Bertillon, Chief of the criminal identification division, police department in
France, Paris developed a detail method of identification based on the number of bodily
measurements and physical descriptions. The Bertillon method of anthropometric
identification gained wide acceptance before finger print identification superseded it
.However such recognition is not limited to faces. For example friends or relatives talking
on telephone recognizes one another’s voices.
The most popular Biometrics Characteristics is the finger print. Scientists know form the
number of archeological artifacts that ancient civilization such as those of Babylon and
Later, in the nineteenth century there was a peak of interest as researchers into
criminology attempted to relate physical features and characteristics with criminal
tendencies. This resulted in a variety of measuring devices being produced and much data
being collected.
9|Page
The results were not conclusive but the idea of measuring individual physical
characteristics seemed to stick and the parallel development of fingerprinting became the
international methodology among police forces for identity verification.
FINGERPRINTS
The patterns of friction ridges and valleys on an individual's fingertips are unique to that
individual. For decades, law enforcement has been classifying and determining identity
by matching key points of ridge endings and bifurcations. Fingerprints are unique for
each finger of a person including identical twins. One of the most commercially available
biometric technologies, fingerprint recognition devices for desktop and laptop access are
now widely available from many different vendors at a low cost. With these devices,
users no longer need to type passwords – instead, only a touch provides instant access.
Fingerprint systems can also be used in identification mode.
Fingerprint matching
FACE RECOGNITION
Biometric face recognition works by using a computer to analyze a subject's facial
structure. Face recognition software takes a number of points and measurements,
including the distances between key characteristics such as eyes, nose and mouth, angles
of key features such as the jaw and forehead, and lengths of various portions of the face.
Using all of this information, the program creates a unique template incorporating all of
the numerical data. This template may then be compared to enormous databases of facial
images to identify the subject.
..........
11 | P a g e
SPEAKER VERIFICATION
Speaker recognition has a history dating back some four decades, where the outputs of
several analog filters were averaged over time for matching. Speaker recognition uses the
acoustic features of speech that have been found to differ between individuals. These
acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and
learned behavioral patterns (e.g., voice pitch, speaking style). This incorporation of
learned patterns into the voice templates (the latter called "voiceprints") has earned
speaker recognition its classification as a "behavioral biometric." Speaker recognition
systems employ three styles of spoken input: text-dependent, text-prompted and text
independent. Most speaker verification applications use text-dependent input, which
involves selection and enrollment of one or more voice passwords.
Ambient noise levels can impede both collections of the initial and subsequent voice
samples. Performance degradation can result from changes in behavioral attributes of the
voice and from enrollment using one telephone and verification on another telephone.
Voice changes due to aging also need to be addressed by recognition systems. Many
companies market speaker recognition engines, often as part of large voice processing,
control and switching systems. Capture of the biometric is seen as non-invasive. The
technology needs little additional hardware by using existing microphones and voice-
transmission technology allowing recognition over long distances via ordinary telephones
(wire line or wireless)
.Compares live speech with previously created speech model of person’s voice
This recognition method uses the iris of the eye which is the colored area that surrounds
the pupil. Iris patterns are thought unique. The iris patterns are obtained through a video-
based image acquisition system. Iris scanning devices have been used in personal
authentication applications for several years. Systems based on iris recognition have
substantially decreased in price and this trend is expected to continue. The technology
works well in both verification and identification modes (in systems performing one-to-
many searches in a database). Current systems can be used even in the presence of
eyeglasses and contact lenses. The technology is not intrusive. It does not require physical
contact with a scanner. Iris recognition has been demonstrated to work with individuals
from different ethnic groups and nationalities.
Eye pattern recognition system provides a barrier to and virtually eliminates fraudulent
authentication and identity privacy and safety controls privileged access or authorized
entry to sensitive sites, data or material. In addition to privacy protection there are myriad
of applications were iris recognition technology can provide protection and security. This
technology offers the potential to unlock major business opportunities by providing high
confidence customer validation.
Unlike other measurable human features in the face, hand, voice or finger print, the
patterns in the iris do not change overtime and research show the matching accuracy of iris
recognition systems is greater than that of DNA testing. Positive identifications can be
made through glasses, contact lenses and most sunglasses. Automated recognition of
people by the pattern of their eyes offers major advantages over conventional identification
techniques. Iris recognition system also require very little co-operation from the subject,
operate at a comfortable distance and are virtually impossible to deceive. Iris recognition
combines research in computer vision, pattern recognition and the man-machine interface.
The purpose is real-time, high confidence recognition of a person’s identity by
mathematical analysis of the random patterns that are visible with in the iris. Since the iris
is a protected internal organ whose random texture is stable throughout life, it can serve as
a ‘living password’ that one need not remember but one always carries.
Measures features associated with the random texture of the colored part of
the eye to generate an “Iris code”
Each eye averages 266 unique features
Claims no reported false accepts
Patent held by Iridium, with many licensees
Sample devices:
13 | P a g e
DYNAMIC SIGNATURE VERIFICATION
HAND GEOMETRY
RETINAL SCANNING
KEYSTROKE DYNAMICS
IMPLEMENTATION
EVALUATION
NIST's Wilson says that to reach the security goals put forth by Congress, the government
will need to launch the combination biometric system to ensure that of the some five
million people that cross the U.S. border, only those with legal permission to enter do so.
Blending biometric capabilities will simply bolster security, especially given the fact that
no system is 100 percent.
The Bio API Consortium created the open industry standard to enable software
applications to communicate with a wide variety of biometric technologies.
16 | P a g e
Healthcare
Financial
– Check Cashing
– ATMs
Enterprise Security
– Network authentication
– Single Sign-on
Casinos
Banking
Government
– Border Crossing
– Prison visitor control
– Welfare programs
Time & Attendance
Physical Security
APPLICATION
Embedded applications
– Automobiles : doors, ignition
– Handguns
– Cell phones
Computer manufacturers
Integrated smart cards
Access Privileges
Biometrics can be used to identify you as you. Tokens, such as smart cards,
magnetic stripe cards, photo ID cards, physical keys and so forth, can be lost,
stolen, duplicated, or left at home. Passwords can be forgotten, shared, or
observed. Moreover, today's fast-paced electronic world means people are asked to
remember a multitude of passwords and personal identification numbers (PINs) for
computer accounts, bank ATMs, e-mail accounts, wireless phones, web sites and
so forth. Biometrics holds the promise of fast, easy-to-use, accurate, reliable, and
less expensive authentication for a variety of applications.
There is no one “perfect” biometric that fits all needs. All biometric systems have
their own advantages and disadvantages. There are, however, some common
characteristics needed to make a biometric system usable. First, the biometric must
be based upon a distinguishable trait. For example, for nearly a century, law
enforcement has used fingerprints to identify people. There is a great deal of
scientific data supporting the idea that “no two fingerprints are alike.”
Technologies such as hand geometry have been used for many years and
technologies such as face or iris recognition have come into widespread use. Some
newer biometric methods may be just as accurate, but may require more research
to establish their uniqueness.
Another key aspect is how “user-friendly” a system is. The process should be quick
and easy, such as having a picture taken by a video camera, speaking into a
microphone, or touching a fingerprint scanner. Low cost is important, but most
implementers understand that it is not only the initial cost of the sensor or the
matching software that is involved. Often, the life-cycle support cost of providing
system administration and an enrollment operator can overtake the initial cost of
the biometric hardware.
19 | P a g e
SUMMARY :
20 | P a g e
BIBLIOGRAPHY AND REFRENCES:
21 | P a g e