Professional Documents
Culture Documents
Abdul Jameel
III B.tech IT III B.tech IT
Irah_09@yahoo.co.in visit_jameel@yahoo.co.in
ABSTRACT
Now-a-days we are facing majority of crimes related to security
issues and these arise due to the leakage of passwords or illegal
authentication. At one end, there is a continuous and tremendous
improvement in the lifestyle of Humans while at the other end; the
technological crimes are increasing rapidly. As there is a problem, there
must be a solution. The need for a compromising technology which can be
adopted is highly imperative. Technologies capable of identifying each person
uniquely need to be developed. The only powerful solution for the problem of
illegal authentication is Biometrics.
Nature has made human beings with different characteristics which
may vary from one person to another. This property is made use of by
Biometric technology to distinctly identify each person. Biometrics is a
means of using the physiological or behavioral characteristics of a person as
a kind of permanent password.
This paper provides an overall idea of Biometrics , the typical
Biometric Model, an overview of the Biometric techniques and focuses mainly
on Keystroke Biometrics which is easy to implement and can provide fool
proof security based on the effectiveness of the algorithm.
“It is better to light up a candle rather than to curse the
darkness”
CONTENTS
INTRODUCTION
WHY MOVE TO BIOMETRICS?
BIOMETRIC TECHNIQUES
IMPLEMENTATION DETAILS
PERFORMANCE MEASURES
ALGORITHM
MULTIMODAL BIOMETRICS
APPLICATIONS
CONCLUSION
INTRODUCTION
array of highly secure identification and and the other deals with the behavioural
transaction fraud increases, the need for Utilized alone or integrated with
highly secure identification and personal other technologies such as smart cards,
verification technologies is becoming encryption keys and digital
apparent. signatures, biometrics is set to pervade
nearly all aspects of the economy and
Biometric-based solutions
our daily lives.
are able to provide for confidential
The recent incidents of
cyber crimes and credit card thefts
due to leakage of passwords create a
WHY MOVE TO BIOMETRICS?
hue and cry for the development of a
new type of system which fetches THE BIOMETRIC MODEL
more foolproof security than the The biometric authentication system
password based systems. Biometrics consists of the following parts
is preferred over traditional methods • User interface or the
involving passwords and PIN biometric reader
numbers for various reasons: • Communication
Subsystem
• The Controlling software
The person to be identified
• Data storage
is required to be physically
Biometric system works by taking a
present at the point-of-
number of samples of physiological or
identification. behavioural characteristics to produce a
Biometric trait cannot be reliable template of the user information.
easily stolen or lost. The user is verified against a template in
the memory, which he claims to be
Identifies the person, not
the machine. himself and the user is authenticated if
the biometric pattern of the user matches
By replacing Passwords, with the template. The biometric sample
PINs, biometric techniques can of the person is not stored in the host
potentially prevent unauthorized computer or the controller. So there is no
95%
Data Collection
Decision
Making Template
Biometric Capture
Extraction
Verification
Signal
Processin
g Enrollment
Storage
Main()
{
If (User==New)
{ read (User); // Getting User name, User_id, Password
read (Inter-stroke gap); // Time interval between consecutive characters
Add user (database); // Add the User to the database
User count =1; }
else if (User==Training)
{ read (User);
read (Inter-stroke gap);
if (Check (User, Password))
{ if (User count<15)
{ update ( User count); // User count = User count +1
add (Inter-stroke gap); }
else if (User count ==15)
{ update (User count);
add (Inter-stroke gap);
Calculate Mean (M), Standard deviation (S.D); }
}
}
else if (User==Existing)
{ read (User);
read (deviation);
if (Check (User, Password, deviation))
Login;
else
exit(0); }
}
-R -R db c db -R (L1)
db db db
db c db
c (L2)
db db +R
c +R c +R +R
+R +R
+R +R (L4)
+R c
c c (L3)
ACCESS DENIED
ENROLLMENT MODULE
Face Extractor
IMAGE
Databas
ACQUISITION
e
MODULE
Browse Minutiae Extractor
r
Ceptral Analysis
FACIAL
SCANNING
Template
Database Eigenspace Projection
and HMM training
FINGERPRINT
Face Eigenspace
Locator Comparison
information. When a user inserts his card based ID allows for the verification
for verification, the biometric sample of of “who you claim to be”
the person can be verified precisely and (information about the card holder
if it is identical the person is stored in the card) based on “who
authenticated. The advantage of this you are” (the biometric information
system is that the user can enjoy the stored in the smart card), instead of,
facilities offered by the Bank along with or possibly in addition to, checking
utmost security.
“what you know” (such as
password).
INTERNET SECURITY
CONCLUSION
Keystroke Biometrics offers
a valuable approach to current
security technologies that make it far
harder for fraud to take place by
preventing ready impersonation of
the authorized user. Even if the
unauthorized user discovers the
access code, he cannot get access to
the system until and unless he also
knows the rhythm. Also, the typing
rhythm can be self-tuned by the user
to suit his needs. As the keyboard
has duplicate keys, the typing rhythm
also depends whether the user is a
left-handed person or a right-handed
person. Positively Keystroke
Biometrics will replace the entire