Professional Documents
Culture Documents
SEMINAR REPORT
of the award of
BACHELOR OF TECHNOLOGY
in
ELECTRONICS ENGINEERING
of
By
1
1.0 INTRODUCTION
Biometrics refers to the automatic identification of a person based on
his/her physiological or behavioral characteristics such as finger scan, retina, iris, voice
scan, signature scan etc. This method of identification is preferred over traditional
methods involving passwords and PIN numbers for various reasons: the person to be
identified is required to be physically present at the point-of-identification; identification
based on biometric techniques obviates the need to remember a password or carry a
token. With the increased use of computers as vehicles of information technology, it is
necessary to restrict access to sensitive/personal data. By replacing PINs, biometric
techniques can potentially prevent unauthorized access to or fraudulent use of ATMs,
cellular phones, smart cards, desktop PCs, workstations, and computer networks.
A biometric system is essentially a pattern recognition system, which
makes a personal identification by determining the authenticity of a specific
physiological, or behavioral characteristics possessed by the user. An important issue in
designing a practical system is to determine how an individual is identified. Depending
on the context, a biometric system can be either a verification (authentication) system or
an identification system.
Biometrics is a rapidly evolving technology, which is being widely used
in forensics such as criminal identification and prison security, and has the potential to be
used in a large range of civilian application areas. Biometrics can be used to prevent
unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations,
and computer networks. It can be used during transactions conducted via telephone and
Internet (electronic commerce and electronic banking). In automobiles, biometrics can
replace keys with key-less entry devices
2
2. 0 IDENTIFICATION AND VERIFICATION SYSTEMS
3
• Indicate identification or verification upon the result of the previous comparison
Biometric devices have three primary components:
• One is an automated mechanism that scans and captures a digital of analog image
of a living personal characteristic
• The second handles compression of the image with the stored data.
• The third interfaces with application systems
These pieces may be configured to suit different situations. A common issue is where the
stored images reside: on a card presented by the person being verified or at host
computer. Recognition occurs when an individual’s is matched with one of a group of
stored images.
2.3 BIOMETRC ACCURACY
Biometric accuracy is the system’s ability of separating legitimate matches
from imposters. There are two important performance characteristics for biometric
systems
• False rejection is the situation when a biometric system is not able to verify the
legitimate claimed identity of an enrolled person.
• False acceptance is a situation when a biometric system wrongly verifies the
identity by comparing biometric features from not identical individuals.
• False Rejection Rate (FRR) refers to the statistical probability that the biometric
system is not able to verify the legitimate claimed identity of an enrolled person,
or fails to identify an enrolled person.
• False Acceptance Rate (FAR) refers to the statistical probability of False
Acceptance or incorrect verification. In the most common context, both False
Rejection and False Acceptance represent a security hazard.
4
3.0 IRIS RECOGNITION
Iris recognition leverages the unique features of the human iris to provide an
unmatched identification technology. So accurate are the algorithms used in iris
recognition that the entire planet could be enrolled in an iris database with only a small
chance of false acceptance or false rejection. The technology also addresses the FTE
(failure to enroll) problems, which lessen the effectiveness of other biometrics. The
tremendous accuracy of iris recognition allows it, in many ways, to stand apart from other
biometric technologies. All iris recognition technology is based on research and patents
held by Dr. John Daugman.
Iris recognition is based on visible (via regular and/or infrared light) qualities of
the iris. A primary visible characteristic is the trabecular meshwork (permanently formed
by the 8th month of gestation), a tissue that gives the appearance of dividing the iris in a
radial fashion. Other visible characteristics include rings, furrows, freckles, and the
corona, to cite only the more familiar. Expressed simply, iris recognition technology
converts these visible characteristics into a 512 byte IrisCode(tm), a template stored for
future verification attempts. 512 bytes is a fairly compact size for a biometric template,
but the quantity of information derived from the iris is massive. From the iris' 11mm
diameter, Dr. Daugman's algorithms provide 3.4 bits of data per square mm. This density
of information is such that each iris can be said to have 266 unique "spots", as opposed to
13-60 for traditional biometric technologies. This '266' measurement is cited in all iris
recognition literature; after allowing for the algorithm's correlative functions and for
characteristics inherent to most human eyes, Dr. Daugman concludes that 173
"independent binary degrees-of-freedom" can be extracted from his algorithm - an
exceptionally large number for a biometric.
5
3.2 The Algorithms
The first step is location of the iris by a dedicated camera no more than 3 feet
from the eye. After the camera situates the eye, the algorithm narrows in from the right
and left of the iris to locate its outer edge. This horizontal approach accounts for
obstruction caused by the eyelids. It simultaneously locates the inner edge of the iris (at
the pupil), excluding the lower 90 degrees because of inherent moisture and lighting
issues.
The monochrome camera uses both visible and infrared light, the latter
of which is located in the 700-900 nm range (this is in the lower range of IR; the
American Academy of Ophthalmology uses similar ranges in their studies of macular
cysts). Upon location of the iris, as seen above, an algorithm uses 2-D Gabor wavelets to
filter and map segments of the iris into hundreds of vectors (known here as phasors).
Understanding in detail the 2-D Gabor phasor encoders requires a degree in advanced
mathematics, but they can be summarized as follows. The wavelets of various sizes
assign values drawn from the orientation and spatial frequency of select areas, bluntly
referred to as the "what" of the sub-image, along with the position of these areas, bluntly
referred to as the "where." The "what" and "where" are used to form the IrisCode. Not
all of the iris is used: a portion of the top, as well as 45 degree of the bottom, is unused to
account for eyelids and camera-light reflections (see below). Essential to the
understanding of the technology is that it provides exceptional detail, well beyond what
any pictorial or point-based representation could provide (some filters actually span as
much as 70degree of the iris). Remember also that for future identification, the database
will not be comparing images of irises, but rather hexadecimal representations of data
returned by wavelet filtering and mapping.
6
3.3 Accuracy
• The odds of two different irises returning a 75% match (i.e. having a Hamming
Distance of 0.25): 1 in 1016
• Equal Error Rate (the point at which the likelihood of a false accept and false
reject are the same): 1 in 1.2 million
• The odds of 2 different irises returning identical Iris Codes: 1 in 1052
Iris recognition can also account for those ongoing changes to the eye and iris,
which are defining aspects of living tissue. The pupil's expansion and contraction, a
constant process separate from its response to light, skews and stretches the iris. The
algorithm accounts for such alteration after having located the boundaries of the iris. Dr.
Daugman draws the analogy to a "homogenous rubber sheet" which, despite its
distortion, retains certain consistent qualities. Regardless of the size of the iris at any
given time, the algorithm draws on the same amount of data, and its resultant IrisCode is
stored as a 512-byte template. A question asked of all biometrics is their ability to
determine fraudulent samples. Iris recognition can account for this in several ways: the
detection of papillary (pupil) changes; reflections from the cornea; detection of contact
7
lenses atop the cornea; and use of infrared illumination to determine the state of the
sample eye tissue.
The entire process is very brief. The iris is normally located within 1/4 second,
the IrisCode generated within 1 second. Database search times are very swift, with
hundreds of thousands of records analyzed per second, notwithstanding some debate as to
whether a search on a truly large number of irises (tens of millions) could be conducted
as quickly as is generally claimed. At this and other points, use of the algorithm actually
runs into the limits of available technology. Processor speed is one bottleneck on
massive searches, in addition to whatever network or hardware issues may arise. Also,
the iris captures process runs into limitations of gray-scale (monochrome) imaging
technology, where the darkest shades of iris coloration are difficult to distinguish from
the pupil. The algorithm's robustness actually allows for significant variations in image
quality. The same iris may, at different times, produce IrisCodes which vary by as much
as 25% (0.25 Hamming distance from zero); this may sound like a fatal flaw, but the odds
of a randomly selected IrisCode coming within even 10% of this number are
exceptionally small.
3.5 An example-Verieye
Neurotechnologija, Ltd. offers VeriEye, the system for person identification using the eye
iris image taken by a video camera. VeryEye implements new eye iris recognition
technology and are based on our original method of feature set definition. VeriEye is
8
available in the form of software development kit (SDK), and can be easily
integrated into a customer's access control or identification/verification system.
1. The size of iris in the scanned image must be between 200x200 and 640x480 pixels,
image resolution 200 dpi.
2. The image should be free of the bulb reflections in the iris area. However, it may
contain small reflections in the pupil area.
3. The scanned slip must contain at least 30 % of the iris area not damaged by reflections,
shadows or eyelashes.
4. The eye center must be in the slip.
5. During the eye scanning head tilt must be less than 14 degrees with respect to vertical
axis.
9
4.0 Fingerprint verification
4.1 Introduction
The pattern is not a fingerprint and a fingerprint cannot in any way be created
from the template.
10
A template can only be compared with a newly presented live finger image and
not with other templates. One reason for this is that the data capture process used to
create a template is random. If two templates were created one after another for the same
finger, each template would be different. This eliminates the possibility of database
matching and enhances users privacy.
Enrolment
Verification
Time zones
Door access
Template management
Enrolment
Each user enrolled is allocated a unique id number, which they use to call up their
template before scanning their finger. No id number is required where the template is
stored on a smart card.
11
Up to three fingers can be enrolled against the same id number to provide users with
more than one verification option. Ideally, one finger on each hand should be enrolled so
that if the user injures the finger they usually use for verification an alternate image is
available.
This feature also provides for multi-person control, for example, if verification
from two users is required to open a safe. In this situation FINGERSCAN can be
programmed to require up to four fingers with different id numbers to be verified before
access is granted.
Verification
Verification is carried out when a user either enters their id number, or inserts
their smart card in a smart card reader, and then immediately places their finger on the
reader platen. Verification takes about .5 of a second.
Verification for individual users can be set at various threshold levels to account
for users who may have very fine, worn, or damaged fingers. In this event reducing their
verification threshold can enhance the ease of use.
The overall system verification threshold can be lowered in situations where little
or no security is required, for example, time and attendance applications. In this situation
it may be more acceptable to give a false acceptance than a false rejection.
Time Zones
12
Door Access
A door access list defines which users have access to the facilities controlled by the
FINGERSCAN unit. The list can be used in conjunction with time zones to restrict access
at certain times.
The host computer system can control and manage the door access list and the
distribution of templates to each FINGERSCAN unit.
Template Management
Templates can be stored in the FINGERSCAN unit, and/or a host computer, and/or a
smart card. Each FINGERSCAN unit has 512Kbytes of non-volatile memory, which
stores up to 300 templates. The memory can be expanded to 1.5Mbytes, which will store
more than 1100 templates.
Templates are stored with a last used date status. If the memory becomes full, the last
used templates will be held locally in the FINGERSCAN unit and the main template
database will be held in the host computer. The host will transmit templates to individual
units if the requested template is not found locally.
Templates can be deleted by a user with Manager or Supervisor status either from the
host computer or locally at each FINGERSCAN unit. Templates can be exchanged
between a FINGERSCAN unit and the host computer over fixed communications or
modem links, or locally to and from a laptop. A template created by the FINGERSCAN
unit can be used on any other unit when loaded.
User
13
Enroller
An enroller has user status and can also enroll users onto the system
Supervisor
A supervisor has enroller status and can also perform initial system set up procedures, set
time zones, set alarm codes, and add and delete templates
Manager
A manager has supervisor status and can also perform a total system reset, and disable the
supervisor’s ability to change the setup
Transaction Log
A transaction log records every use of a FINGERSCAN unit, the time it was used, and the
result. The log will hold at least the last 1000 transactions and will wrap around when it
becomes full.
The transaction log cannot be erased except on a total system reset by a user with
Manager authority. Each transaction is allocated a consecutive audit number that does not
wrap around. The number will only be reset to 1 on a total system reset.
4.5 Security
FINGERSCAN provides an audit trail of the date and time a user accessed the unit, the
reason for access, and the result. With a 0.0001% probability of a false acceptance
FINGERSCAN provides a level of security, which cannot be achieved by any knowledge
or token, based system.
Template Security
Before a user can do any action on a template such as enroll, delete, or transfer, they must
first have their identity verified by FINGERSCAN in the usual way. In doing this, a
14
record is added to the transaction log. Only users with Supervisor or Manager authority
levels can access the template database.
A password option in the communications setup secures the data flow to a host computer.
When the remote host initializes each FINGERSCAN unit, the host will generate and
download to the unit a unique Computer Generated Access Code (CGAC) of at least six
digits. For all subsequent communications the host will check the CGAC before starting
the session and then change the CGAC immediately prior to logging off.
The processor board in the processor unit is located inside a metal box which
can be fitted with a tamper alarm if required. The processor unit should always be located
inside the secure area in locations where FINGERSCAN is providing access or other
security control.
FINGERSCAN controls the activation of electric locks or strikes from the processor board
so the unit cannot be hot-wired from outside.
Alarms Control
Send an alarm directly to a monitoring company, dialer, modem, siren, and so on, and
allow authenticated users to cancel and reset zone alarms and activate and deactivate
building services such as air conditioning and lighting.
15
Record alarms in the FINGERSCAN transaction log.
Support a request to exit (REX) verification, which allows users to open a door from the
inside. This can be used to monitor door-forced alarms.
FINGERSCAN can directly control a door lock strike after verification of a user.
FINGERSCANs real time clock is protected by a lithium battery, and features a day-of-
week register and leap year correction
1. VeriFinger dynamic link library ( DLL file ) for Windows 9x/2000/NT, or library
file for Linux.
2. C source code of the example program using the library provided functions.
3. Visual Basic source code of the example program using the library provided
functions (not available in Linux version).
4. Delphi source code of the example program using the library provided functions
(not available in Linux version).
16
5. Software description.
Access tools (DLLs) for Compaq and U.are.U fingerprint scanners and source code of the
sample programs, where VeriFinger 3.3 engine is used with these scanners, are optionally
available.
VeriFinger was tested with 2400 fingerprints, captured with four different scanners. Each
fingerprint was compared with all other fingerprints (5,760,000 comparisons). The
average test results as well as other specifications are presented below:
17
5.0 Voice Scan
5.1 Introduction
The pattern matching process involves the comparison of a given set of input
feature vectors against the speaker model for the claimed identity and computing a
matching score. For the Hidden Markov models discussed above, the matching score is
the probability that the model generated a given set of feature vectors.
5.3 A Speaker Verification System:
18
6.0 Retina scanning
An established technology where the unique patterns of the retina are scanned by
a low intensity light source via an optical coupler. Retinal scanning has proved to be quite
accurate in use but does require user to look in to a receptacle and focus on a given point.
This is not particularly convenient if you are a spectacle wearer or have some intimate
contact with the reading device. For these reasons retinal scanning has a few user
acceptance problems although the technology itself can work well.
19
7.0 FACE RbECOGNITION
Facial scan Process Flow-Sample capture, Feature extraction, template comparison, and
matching –define the process flow of facial scan technology. The following applies to
one to one verification. The sample capture will generally consist of a 20-30 second
enrollment process whereby several pictures are taken of one’s face. Ideally the series of
pictures incorporate slightly different angles and facial expressions, to allow for more
accurate searches. After enrollment distinctive features are extracted, resulting in the
creation of a template. The templates are much smaller than the image from which it is
drawn.
Authentification follows the same protocol. The user claims an identity such as a
login name or a PIN, stands or sits in front of the camera for a few seconds, and is either
verified or rejected. This comparison is based on the similarity of the newly created
“live” template against the template or templates on file. The degree of similarity
required for verification also known as the threshold can be adjusted for different
personnel, PC’s, time of day and other factors One variant of this process is the use of
facial scan technology in forensics. Biometric templates taken from static photographs of
known criminals are stored in large databases. These records are searched, 1-to-many, to
determine if the detainee is using an alias when being booked.
20
8.0 A Multimode Biometric System
21
9.0 Future Applications
There are many concerning potential biometric applications, some popular examples
being;
Most of the leading banks have been experimenting with biometrics of ATM
machines use and as general means of combining card fraud. Surprisingly, these
experiments have rarely consisted of carefully integrated devices into a common process,
as could be achieved with certain biometric devices. Previous comments in this paper
concerning user psychology come to mind here one wonder why we have not seen a more
professional and carefully considered implementation from this sector. The banks will of
course have a view concerning the level of fraud and cost of combating it via technology
solutions such as biometrics. They will also express concern about potentially alienating
customers with such as approach. However, it still surprises many in the biometric
industry that the banks and financial institutions have so far failed to embrace this
technology with any enthusiasm.
22
9.3 TRAVELS AND TOURISM
There are many in this industry who have the vision of a multi application card
for travelers which, incorporating a biometric, would enable them to participate in
various frequent flyer and border controls systems as well as paying for their air ticket,
hotel rooms, hire care etc, all with one convenient token.
Technically this is eminently possible, but from a political and commercial point of view
there are many issues to resolve, not the least being who would own the card, be
responsible for administration and so on. These may not be insurmountable problems and
perhaps we may see something along these lines emerge. A notable challenge in this
respect would be packaging such an initiative in a way that would be truly attractive for
users.
No doubt many telesales and call center managers have pondered the use of
biometrics. It is an attractive possibility to consider, especially for automated processes.
However, voice verification is a difficult area of biometrics, especially if one does not
23
have direct control over the tranducers, as indeed you wouldn’t when dealing with the
general public. The variability of telephone handsets coupled to the variability of line
quality and the variability of user environments presents a significant challenge to voice
verification technology, and that is before you even consider the variability in
understanding among users.
The technology can work well in controlled closed loop conditions but is extraordinarily
difficult to implement on anything approaching a large scale. Designing in the necessary
error correction and fallback procedures to automated systems in a user-friendly manner
is also not a job for the faint hearted.
Perhaps we shall see further developments, which will largely overcome these problems.
Certainly there is a commercial incentive to do so and I have no doubt that much research
is under way in this respect.
24
10.0 Conclusion
Banks and others who have tested biometric-based security on their clientele,
however, say consumers overwhelmingly have a pragmatic response to the technology.
Anything that saves the information-overloaded citizen from having to remember another
password or personal identification number comes as a welcome respite
Biometrics can address most of the security needs, but at what cost? Surprisingly,
the benefits quickly outweigh the costs. Like so many technological developments,
innovative people have found new ways to implement biometric systems, so prices have
come down dramatically in the last year or two. As prices have come down, the interest
level and the knowledge about how to effectively utilize these systems have increased. So
the investment is decreasing and the recognizable benefits are increasing. Biometrics,
when properly implemented, not only increase security but also often are easier to use
and less costly to administer than the less secure alternatives. Biometrics can’t be
forgotten or left at home and they don’t have to be changed periodically like passwords.
25
REFERENCES
1. http://www.biometricgroup.com
2. http://www.neurotechnologija.com
3. http://biometrics.cse.msu.edu
4. http://www.biometricpartners.com
26