Biometric_authentication
Biometric_authentication
Saleem Ahmad1
Ordonez Bonilla Juan Esteban2
1 Óbudai Egyetem, Bánki Donát Gépész és Biztonságtechnikai Mérnöki Kar, MSc V. évfolyam. Budapest, Hungary,
ahmada.saleem@hotmail.com
1 Óbudai Egyetem, Bánki Donát Gépész és Biztonságtechnikai Mérnöki Kar, MSc V. évfolyam. Budapest, Hungary
juesteordonez@stud.uni-obuda.hu
Abstract
Biometrics is defined as the science of identifying individuals supported by physical or behavioural attributes of the indi-
vidual like fingerprints, palmprint, face, voice, iris & gait. The continuously growing necessity for robust human recogni-
tion techniques in sensitive applications such as secure access control, international border crossing, and enforcement,
biometrics emerged itself as a crucial feasible technology that can be integrated into a huge-scale identity management
system. Biometric systems can operate under the premise that many of the physical or behavioural characteristics of the
human being which are always distinctive from one individual to another, and that they can be reliably acquired via appro-
priately designed sensors and even represented in a numerical format that lends to automated procedure within the context
of identity management. Hence, these systems could also be viewed as pattern recognition engines which will be incorpo-
rated in diverse markets. Every part of the human body is exclusive and if we will steadily capture the required area or
trait, the efficient biometric validation system can be built. With the advancement in technology sensors for a variety of
biometrics are obtainable. For instance, the fingerprint, handwritten signatures, palmprint, face, voice as conventional bi-
ometric traits, mainly due to advanced sensors where we can have a 3D face and hand geometry, finger-knuckle print, ear
geometry, facial thermogram, gait, DNA, retinal scan as emerging traits and so on.
Biometrics was employed as a billboard, modern A greater variety of fingerprint scanning devices are
technology has been around since the earlies 1970s, available than for any other biometric. Nowadays
when the primary commercially available device was can be easily reached almost everyone and its cur-
delivered to the market. one among the primary rently added on mobile phones as a standard feature.
commercial applications was used in 1972 when a [3]
Wall Street company, Shearson Hamil, installed
Identimat, a finger-measurement device that served 2.1.2. Hand Geometry
as a timekeeping and monitoring application. Since
this 1972 deployment, bio-metrics has improved Hand geometry involves measuring and analyzing
tremendously in ease of use and diversity of the hand’s shape. This biometric mechanism offers a
applications. The advancement of biometrics has good balance of performance characteristics and is
been driven by the increased computing power at relatively easy to apply. It is useful where there are
lower costs, better algorithms, and cheaper storage several users or where users shall access the system
mechanisms available today. [2] infrequently and even perhaps less strict in their ap-
proach to the system. Hand scanners use this infor-
2. Biometric traits mation to determine the length, width, thickness, and
curvature itself of your hand and fingers. It digitalizes
The biometric traits are defined as actual character- that information into a data template, which is used
istics or entities which are commonly used to iden- for matching/recognition. Since hands and fingers are
tify and classify humans. These characteristics are less distinctive than fingerprints or irises, some peo-
referred to as traits, indicators, identifiers, or mo- ple are less likely to be part of this system. However,
dalities. As quoted earlier there are two classes of many people's hands change over time and are vul-
biometric traits as physiological and behavioral, nerable to aging, injuries, changes in weight, or some
they are explained as follows. exceptional cases as arthritis. Leading on the trend to
combine different systems, this might be a good ex-
2.1. Physiological Biometric Traits ample since is possible to combine and share features
within the hand shape.
Based on the physical characteristics of the human
body. Every physical feature that can be measured 2.1.3. Hand Vein Geometry
can be included in this category. [2]
A person's veins are a completely unique feature.
2.1.1. Fingerprints Even twins do not have identical veins, and for in-
stance, an individual's veins differ between their left
A fingerprint looks at the patterns found on a finger- and right sides. Veins are not normally visible
tip. There are a variety of approaches to fingerprint through the skin, making them hard to counterfeit or
verification. Some emulate the traditional police tamper with. The shape also changes as little as indi-
method of matching minutiae; others use straight vidual ages.
pattern-matching devices; and still, others are a bit
more unique, including things like moiré fringe pat-
terns and ultrasonic. Some verification approaches
can detect when a live finger is pre-scented; some
can not. Figure 1. shows features of fingerprints on
a human’s hand and a typical fingerprint captured
through an optical fingerprint scanner.
cluster a digital picture using near-infrared light. The the proposed system, the inherent finger knuckle
hemoglobin in your blood absorbs the sunlight, so print patterns can be captured and hence the unique
veins appear black within the picture. The system features of FKP can be better exploited.
creates a reference template that supported the shape,
form, and spot of the vein structure. [3] 2.1.6. Face
Keystroke dynamics can be used for single authenti- [3] D. Bhattacharyya, R. Ranjan, F. A. a, and
cation events or continuous monitoring. Continuous M. Choi, “Biometric Authentication : A
monitoring is not normally done in commercial bio- Review,” Int. J. Serv. Sci. Technol., vol. 2,
metrics products; however, it has been proposed as a no. 3, pp. 13–28, 2009.
legitimate and reasonable means to help prevent un-
authorized use of unattended terminals. Keystroke
[4] A. K. Jain, K. Nandakumar, and A. Ross,
monitoring is the unsophisticated, yet surprisingly
“50 years of biometric research: Accom-
easy way to achieve logging of every key pressed by
plishments, challenges, and opportunities,”
a user. While many have argued the potential for
Pattern Recognit. Lett., vol. 79, pp. 80–
abuse far outweighs any legitimate use of the process,
105, 2016, doi:
keystroke monitoring is sometimes used to provide
10.1016/j.patrec.2015.12.013.
auditing and security information that may be re-
quired in certain sensitive environments. Such sys-
tems should be marked with banners and notices to [5] R. H. C. Work, “(12) United States Patent,”
inform users that their use is monitored. The most vol. 1, no. 12, 2001.
natural application for keystroke dynamics is to
“harden” passwords. The keystroke dynamics of each [6] K. Kang, J. Park, S. Hyoung, and J. Y. Oh,
user are used to augment existing passwords by re- “( 12 ) United States Patent,” vol. 2, no. 12,
quiring that the password be entered in a manner con- 2014.
sistent with the intended user. A related use of key-
stroke dynamics is for human typing detection. That
is, keystroke patterns can be used to help determine [7] W. Luckhardt and S. Diego, “( 12 ) United
the difference between man and machine (live human States Patent ( 76 ) Inventor : CA George,” vol. 2,
typing vs. scripted programs). Other biometric traits no. 12, 2012.
based on human behavior are Gait, Voice, and Facial
Expressions, etc. Table 1.1 shows a comparison be-
tween key biometric traits. [7]
Table 1.Biometrics mechanisms comparison
4. References