1. The technology of future.
Submitted by, Guided by,
Joshi Pathik V. Miss A. D. Bhople
2. Contents
Introduction
History
Present
Future
Procedure of Working
Features of different parameters
Application
Conclusion
References
3. Introduction
Information security is concerned with
the assurance of confidentially, integrity
and availability of information in all
forms.
This is the ancient Greek word: bios =
“life” and metron = “measure.”
Biometric systems based on single source
of information are called unicode system.
4. History
European Explorer Joao de Barros recorded the
first known example of fingerprinting in China
during the 14th century.
1980:- Alphonse Bertillon studied body
mechanics and measurements to help in
identifying criminals.
Karl Pearson, an applied mathematician studied
biometric research early in 20th century at
University college of London.
In the 1960 and 1970, signature
biometric, authentication procedures were
5. Present
Today, biometric lows and regulations are in
process and biometric industry standard are
being tested.
It divided in two parts,
Behavioural Parameters Behavioural Parameters
•Fingerprint •Gait
•Palmprint •Voice
•Hand Veins •Signature
•Face •Keystroke
•Iris
•Retina
•DNA
6. Future
A biometric system can provide two
functions. One of which is verification and
the other is Authentication.
In the near future, these biometric
techniques can be the solution for the
current threats in the world of information
security.
Due to dynamic modification of the
proposed metric, the rejection ration for a
some person reduces by a lot.
8. Features of Different
Parameters
Fingerprint
Iris Technology
Retina Geometry Technology
Face Recognition Technology
Hand Geometry Technology
Voice Recognition Techniques
Signature Verification Technique
9. Fingerprint
The size of fingerprint is around 10*10*15.
Arch Loop
Whorl
Ridge ending Bifurcation Short Ridge
10. In this way the total features and template of
Fingerprint is as following. The matcher
matches any two templates as following
image.
11. Iris Recognition
This can be a combination of specific
characteristics known as
corona, crypts, filaments, freckles, pits, furr
ows, striations and rings.
12. Retina Geometry Technology
A retinal scan involves the use of a low-intensity
coherent light source, which is projected onto
the retina to illuminate the blood vessels which
are then photographed and analyzed.
A retinal scan has an error rate of 1 in
10,000,000, compared to fingerprint
identification error being
sometimes as high as
1 in 500.
13. Face Recognition Technology
Facial metric technology on the manufacture
of the specific facial features.
Eigen Face
14. Hand Geometry Technology
There techniques include the estimation of
length, width, thickness and surface area of
the hand.
15. Voice Recognition Techniques
Voice verification focuses on the vocal
characteristics that produce speeches and not
on the sound or the pronunciation of speech
itself.
The vocal characteristics depend on the
dimensions of the vocal tract, mouth, nasal
cavities and the other speech processing
mechanism of the human body.
16. Signature Verification Technique
The dynamics is measured as a means of the
pressure, direction, acceleration and the
length of the strokes, dynamics number of
strokes and their duration.
These are either traditional tablets or special
purpose devices. Tablets capture 2D
coordinates and the pressure.
17. Application of Biometrics
Security
Authentication
E-commerce and E-governments
Secure Banking and Financial Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
18. Conclusion
While Biometric authentication can offer a
high degree of security, they are far from
perfect solution.
The influences of biometric technology on
society and the risks to privacy and threat to
identify will require meditation through
legislation.
19. References
[1] Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application
Glossary, http://www.smartcardalliances.org
[2] Langenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his or her parents in any discernable way?".
Scientific American. Retrieved 28 August 2010.
[3] Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual
Training Conference of the California State Division of IAI. Retrieved 30 August 2010.
[4] Wikipedia Image
http://en.wikipedia.org/wiki/File:Biometric_system_diagram.png
[5] Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometrics Technology”, In Proc. of The sixth WSEAS
International Conference on Single Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96
[6] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds, “Biometrics Systems: Technology, Design and Performance
Evolution”, New York: Spinger Verlag, 2005
[7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition”, In Proc. of IEEE Symposium on
computational Intelligence in Image and Signal Processing, April 2007, USA, pp. 121 – 126
[8] A. Kumar, D. C. Wong, H. C. Shen and A. K. Jain , “Personal Verification using Palmprinnt and Hand Geometry Biometrics”, In
Proc. of fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, U.K.
January 2003, pp 668-678
[9] S. Furui, “Recent Advances in Speaker Recognition”, In Proc. of first International Conference on Audio and video based
Biometric person Authentication, UK, March 1997, pp 859 – 872
[10] A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometrics Recognition,” IEEE Trans. Circuit Syst. Video
Technology, Special Issue Image and Video based Biometrics, Volume 14, Issue 1st January 2004, pp. 4 – 20