SlideShare uma empresa Scribd logo
1 de 4
Research Paper on Biometrics: Use in Aadhar
Card, Pan Card and Finger Print App Lock
NAME: BHAWNA DOBRIYAL
Email Id: Bhawna.dobriyal@gmail.com
ABSTRACT
Biometric is basically used to identify individuals in groups
that are under surveillance. In this biometric identifiers are the
distinctive, measureable characteristics used to label and
describe individuals. In order to provide authentication to
every individual, biometric authentication has to look
everyone is unique and an individual can be identified by his
or intrinsic physical and behavioural traits. Previously,
biometric system were made to use in the identificatory
systems of criminal activity where application of
mathematical models to fingerprints, phrenology, and facial
characteristics as part of “absolute identification” and “a key
to both inclusion and exclusion" of populations but in recent
time or modern era biometric security is developed which
scans the entire body of prospects in order to have guarantee
of better identification on this prospect. Currently, this method
is not globally accepted because it is very complex and
prospects are concerned about their privacy.
INTRODUCTION
Biometrics refers to metrics related to human characteristics.
Biometrics authentication (or realistic authentication) is used
in computer science as a form of identification and access
control. Biometric identifiers are often categorized as
physiological versus behavioural characteristics.
Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint,
palm veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odour/scent.
Behavioural characteristics are related to the pattern of
behaviour of a person, including but not limited to typing
rhythm, gait, and voice.
More traditional means of access control include token-based
identification systems, such as a driver's license or passport,
and knowledge-based identification systems, such as
a password or personal identification number.
Since, biometric identifiers are unique to individuals, they are
more reliable in verifying identity than token and knowledge-
based methods; however, the collection of biometric
identifiers raises privacy concerns about the ultimate use of
this information.
Types of biometric are:
1. DNA Matching
a) Chemical Biometric: The identification of an
individual using the analysis of segments from
DNA.
b) Ear: Visual Biometric The identification of an
individual using the shape of the ear.
c) Eyes - Iris Recognition
Visual Biometric: The use of the features found
in the iris to identify an individual.
d) Eyes - Retina Recognition
Visual Biometric: The use of patterns of veins in
the back of the eye to accomplish recognition.
2. Face Recognition
Visual Biometric: The analysis of facial features or
patterns for the authentication or recognition of an
individual’s identity. Most face recognition systems
either use local feature analysis.
3. Fingerprint Recognition
Visual Biometric: The use of the ridges and valleys
(minutiae) found on the surface tips of a human
finger to identify an individual.
4. Finger Geometry Recognition
Visual/Spatial Biometric The use of 3D geometry of
the finger to determine identity.
5. Gait
Behavioral Biometric: The use of an individual’s
walking style or gait to determine identity.
6. Hand Geometry Recognition
Visual/Spatial Biometric The use of the geometric
features of the hand such as the lengths of fingers and
the width of the hand to identify an individual.
7. Odor
Olfactory Biometric: The use of an individual’s odor
to determine identity.
8. Signature Recognition
Visual/Behavioral Biometric The authentication of
an individual by the analysis of handwriting style, in
particular the signature. There are two key types of
digital handwritten signature authentication, Static
and Dynamic. Static is most often a visual
comparison between one scanned signature and
another scanned signature, or a scanned signature
against an ink signature. Technology is available to
check two scanned signatures using advances
algorithms. Dynamic is becoming more popular as
ceremony data is captured along with the X,Y,T and
P Coordinates of the signor from the signing device.
This data can be utilized in a court of law using
digital forensic examination tools, and to create a
biometric template from which dynamic signatures
can be authenticated either at time of signing or post
signing, and as triggers in workflow processes.
9. Typing Recognition
Behavioral Biometric: The use of the unique
characteristics of a person’s typing for establishing
identity.
10. Vein Recognition
Vein recognition is a type of biometrics that can be
used to identify individuals based on the vein
patterns in the human finger or palm.
11. Voice / Speaker Recognition
There are two major applications of speaker
recognition:
A) Voice - Speaker Verification / Authentication
Auditory Biometric: The use of the voice as a
method of determining the identity of a speaker
for access control. If the speaker claims to be of
a certain identity and the voice is used to verify
this claim. Speaker verification is a 1:1 match
where one speaker's voice is matched to one
template (also called a "voice print" or "voice
model"). Speaker verification is usually
employed as a "gatekeeper" in order to provide
access to a secure system (e.g.: telephone
banking). These systems operate with the user's
knowledge and typically require their
cooperation.
For example, presenting a person’s passport at
border control is a verification process - the
agent compares the person’s face to the picture
in the document.
B) Voice - Speaker Identification
Auditory Biometric Identification is the task of
determining an unknown speaker's
identity. Speaker identification is a 1: N (many)
match where the voice is compared against N
templates. Speaker identification systems can
also be implemented covertly without the user's
knowledge to identify talkers in a discussion,
alert automated systems of speaker changes,
check if a user is already enrolled in a system,
etc.
For example, a police officer compares a sketch
of an assailant against a database of previously
documented criminals to find the closest
matches. In forensic applications, it is common
to first perform a speaker identification process
to create a list of "best matches" and then
perform a series of verification processes to
determine a conclusive match.
Note: There is a difference between speaker
recognition (recognizing who is speaking) and
speech recognition (recognizing what is being
said). These two terms are frequently confused,
as is voice recognition. Voice recognition is a
synonym for speaker, and thus not speech,
recognition. In addition, there is a difference
between the act of authentication (commonly
referred to as speaker verification or speaker
authentication) and identification.
What biometrics include?
1. Aadhar card
2. Pan card
3. Finger print screen lock
AADHAR CARD
What was the reason behind in interlinking in Aadhar
Card?
The reason behind of interlinking in Aadhar card was that
every individual has to give their finger & thumb prints, face
and iris recognition which give security & reliability unique
Aadhar ID Number.
.
What was the effect on biometric in Aadhar card?
Through biometric sensor increasingly implementing live
detection in preventing fake fingers/iris etc Biometric locking
feature allows Aadhaar holders to lock their biometrics and
unlock only when needed.
Due to this various people are finding aadhar card more
convenient than other cards.
How use of biometric in Aadhar card has changed its
outlook?
Through Aadhar number one can access useful services such
as mobile phone and cooking gas connections and banking.
Due to this effect, people can use their aadhar cards more
often than other and also their satisfaction level would
increase.
PAN CARD
What was the reason behind interlinking in PAN card?
The reason behind interlinking in Pan cards was PAN cards
would be biometric to taxpayers across the country in order to
erase delicacy and fake one and this decision was taken to
ensure that a single tax payer is not issued multiple cards
which could create them hurdles or problems at the time of
payment of their respective tax within or out of the due course
of time (allotted time period).
What was the effect of biometric in PAN card?
PAN cards validate the identity of a person by checking the
intrinsic physical or behavioural traits of that person which
include fingerprint impressions, or scans of the iris or retina of
a person, hand geometry, voice recognition and signature.
Due this type of effect many tax payers are finding more
convenient than the older one.
How biometrics is been used in PAN cards in opening
various paths in maintaining authenticity and security
measures?
Biometrics in PAN cards have opened various paths with the
help of biometric smart cards which reduce the chances of
duplication since the biometric identification parameter is
unique to each individual in getting forged, misplaced or lost.
FINGER PRINT LOCK APP
What was the reason behind the interlinking of biometrics
in Finger Print Lock App?
The reason behind the interlinking of biometrics in finger
print lock app as it shows your own wallpaper behind the lock
screen, even Live Wallpaper includes large, visible time and
date and Customizable Features, including Themes and Fonts
with adjustable positions for everything.
What was the effect of biometrics in Finger Print Lock
App?
The effect of biometrics in finger print lock app as it locks
your phone by preventing button presses, no notification bar
and all button presses are disabled (including Home and Back
buttons) and themes with options to customize your own
personal lock screen and set positions and sizes of the Time,
Date, and everything else.
How use of biometrics in Finger Print Lock App has
opened different areas in measuring security and safety
measures?
The use of biometric in Finger Print lock App has opened
different areas in measuring security and safety measures as
it change scanner images, including the scan area, and the
scan line colour, shows your own personal wallpaper,
including Live Wallpapers and includes home screen Widget
to run the app. Due to this app, women can secure their
personal details and also can provide safeguard to those
informations which could be easily misused by others.
CONCLUSION
Biometric verification is any means by which a person can be
uniquely identified by evaluating one or more distinguishing
biological traits. Unique identifiers include fingerprints, hand
geometry, earlobe geometry, retina and iris patterns, voice
waves, DNA, and signatures.
The oldest form of biometric verification is fingerprinting.
Historians have found examples of thumbprints being used as
a means of unique identification on clay seals in ancient
China. Biometric verification has advanced considerably with
the advent of computerized databases and the digitization
of analog data, allowing for almost instantaneous personal
identification. Iris-pattern and retina-pattern authentication
methods are already employed in some bank automatic teller
machines. Voice waveform recognition, a method of
verification that has been used for many years with tape
recordings in telephone wiretaps, is now being used for access
to proprietary databanks in research facilities. Facial-
recognition technology has been used by law enforcement to
pick out individuals in large crowds with considerable
reliability. Hand geometry is being used in industry to provide
physical access to buildings. Earlobe geometry has been used
to disprove the identity of individuals who claim to be
someone they are not (identity theft). Signature comparison is
not as reliable, all by itself, as the other biometric verification
methods but offers an extra layer of verification when used in
conjunction with one or more other methods. No matter what
biometric methodology is used, the identification verification
process remains the same.
A record of a person's unique characteristic is captured and
kept in a database. Later on, when identification verification is
required, a new record is captured and compared with the
previous record in the database. If the data in the new record
matches that in the database record, the person's identity is
confirmed. As, authentication through biometric verification is
increasingly becoming common in corporate and public
security systems, consumer electronics, and point-of-sale
applications the driving force behind biometric verification
has been convenience, as there are no passwords to remember
or security tokens to carry.
In India, Aadhar is the largest biometric database in the world
which is a biometrics-based digital identity assigned for a
person's lifetime, verifiable online instantly in the public
domain, at any time, from anywhere, in a paperless way which
enable government agencies to deliver a retail public service
securely based on biometric data (fingerprint, iris scan and
face photo), along with demographic data (name, age, gender,
address, parent/spouse name, mobile phone number) of a
person.
Moreover, due to security point of view and for minimizing
the threat of fraudulation in PAN card it has recently got
linked with the Aadhar. Along with this, in finger print screen
lock maximum individuals place the finger on the lock and
then on the scan place and it works through this it develop
ability to individual fingerprint assign to each app.
BIBLIOGRAPHY
1. HTTPS://EN.WIKIPEDIA.ORG/WIKI/BIOMETRICS
2. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITI
ON/BIOMETRICS
3. HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID=
COM.YCDROID.FINGERLOCK&HL=EN
4. HTTP://UIDAI.GOV.IN/WHAT-IS-AADHAAR.HTML
5. HTTPS://WWW.YOUTUBE.COM/WATCH?V=YC8WJGSK
PCO
6. HTTP://WWW.MAPSOFINDIA.COM/MY-
INDIA/GOVERNMENT/AADHAAR-CARD-USES-
OBJECTIVES-AND-BENEFITS
7. HTTP://WWW.BUSINESSTODAY.IN/MAGAZINE/TRENDS/
GET-A-BIOMETRIC-PAN-CARD/STORY/93.HTML
8. HTTP://WWW.GEEKOMAD.COM/2013/08/5-BEST-
FINGERPRINT-LOCK-SCREEN-FREE-APPS.HTML

Mais conteúdo relacionado

Mais procurados

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 

Mais procurados (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 

Destaque

(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
International Center for Biometric Research
 
Research Paper
Research PaperResearch Paper
Research Paper
c_tyner
 
Research Paper - Singapore
Research Paper - SingaporeResearch Paper - Singapore
Research Paper - Singapore
'Tayo Cruz
 
How the web destroys the quality of students research paper
How the web destroys the quality of students research paperHow the web destroys the quality of students research paper
How the web destroys the quality of students research paper
Dammar Singh Saud
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paper
Chirine Hamdan
 
Harvard style term paper e-business start-up plan complete
Harvard style term paper   e-business start-up plan completeHarvard style term paper   e-business start-up plan complete
Harvard style term paper e-business start-up plan complete
CustomEssayOrder
 

Destaque (20)

Reflective report
Reflective reportReflective report
Reflective report
 
(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
(2009) APPLICATION OF BIOMETRIC TECHNOLOGIES: INTEGRATING APPLIED RESEARCH IN...
 
EEE3122
EEE3122EEE3122
EEE3122
 
Prof. Anil K. Jain: Keynote Lecture at ICB 2013
Prof. Anil K. Jain: Keynote Lecture at ICB 2013Prof. Anil K. Jain: Keynote Lecture at ICB 2013
Prof. Anil K. Jain: Keynote Lecture at ICB 2013
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
A STUDY ON CHALLENGES & OPPORTUNITIES FOR FREIGHT FORWARDERS IN INDIA AND EXI...
A STUDY ON CHALLENGES & OPPORTUNITIES FOR FREIGHT FORWARDERS IN INDIA AND EXI...A STUDY ON CHALLENGES & OPPORTUNITIES FOR FREIGHT FORWARDERS IN INDIA AND EXI...
A STUDY ON CHALLENGES & OPPORTUNITIES FOR FREIGHT FORWARDERS IN INDIA AND EXI...
 
Proposal 12 - Visual Analytics
Proposal 12 - Visual AnalyticsProposal 12 - Visual Analytics
Proposal 12 - Visual Analytics
 
Academic research paper on sweden
Academic research paper on swedenAcademic research paper on sweden
Academic research paper on sweden
 
Infant mortality paper
Infant mortality paperInfant mortality paper
Infant mortality paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
CEO Research paper
CEO Research paperCEO Research paper
CEO Research paper
 
Mla style research paper much ado about nothing
Mla style research paper   much ado about nothingMla style research paper   much ado about nothing
Mla style research paper much ado about nothing
 
Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )
 
Research Paper - Singapore
Research Paper - SingaporeResearch Paper - Singapore
Research Paper - Singapore
 
How the web destroys the quality of students research paper
How the web destroys the quality of students research paperHow the web destroys the quality of students research paper
How the web destroys the quality of students research paper
 
Research Paper on the Benefits of Publicity
Research Paper on the Benefits of PublicityResearch Paper on the Benefits of Publicity
Research Paper on the Benefits of Publicity
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paper
 
Basic newspaper terms
Basic newspaper termsBasic newspaper terms
Basic newspaper terms
 
Pre research
Pre research Pre research
Pre research
 
Harvard style term paper e-business start-up plan complete
Harvard style term paper   e-business start-up plan completeHarvard style term paper   e-business start-up plan complete
Harvard style term paper e-business start-up plan complete
 

Semelhante a Biometrics research paper

Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
Mumbai Academisc
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 

Semelhante a Biometrics research paper (20)

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 

Mais de desire120

The role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovationThe role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovation
desire120
 

Mais de desire120 (18)

Recruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnaireRecruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnaire
 
Rights and duties of agents
Rights and duties of agentsRights and duties of agents
Rights and duties of agents
 
Culture,political and legal environment
Culture,political and legal environmentCulture,political and legal environment
Culture,political and legal environment
 
The role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovationThe role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovation
 
Technology export
Technology exportTechnology export
Technology export
 
Technology acquisition & absorption
Technology acquisition & absorptionTechnology acquisition & absorption
Technology acquisition & absorption
 
Mtic
MticMtic
Mtic
 
Fund flow statement
Fund flow statementFund flow statement
Fund flow statement
 
Cryptography
CryptographyCryptography
Cryptography
 
Assignments mba ii_ird_semester
Assignments mba ii_ird_semesterAssignments mba ii_ird_semester
Assignments mba ii_ird_semester
 
Hrm unit i ii-iii_iv
Hrm unit i ii-iii_ivHrm unit i ii-iii_iv
Hrm unit i ii-iii_iv
 
Unit 1
Unit 1Unit 1
Unit 1
 
Training
TrainingTraining
Training
 
T&d chap001
T&d chap001T&d chap001
T&d chap001
 
Training techneiques
Training techneiquesTraining techneiques
Training techneiques
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to training
 
Training and development
Training and developmentTraining and development
Training and development
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to training
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Biometrics research paper

  • 1. Research Paper on Biometrics: Use in Aadhar Card, Pan Card and Finger Print App Lock NAME: BHAWNA DOBRIYAL Email Id: Bhawna.dobriyal@gmail.com ABSTRACT Biometric is basically used to identify individuals in groups that are under surveillance. In this biometric identifiers are the distinctive, measureable characteristics used to label and describe individuals. In order to provide authentication to every individual, biometric authentication has to look everyone is unique and an individual can be identified by his or intrinsic physical and behavioural traits. Previously, biometric system were made to use in the identificatory systems of criminal activity where application of mathematical models to fingerprints, phrenology, and facial characteristics as part of “absolute identification” and “a key to both inclusion and exclusion" of populations but in recent time or modern era biometric security is developed which scans the entire body of prospects in order to have guarantee of better identification on this prospect. Currently, this method is not globally accepted because it is very complex and prospects are concerned about their privacy. INTRODUCTION Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. Biometric identifiers are often categorized as physiological versus behavioural characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioural characteristics are related to the pattern of behaviour of a person, including but not limited to typing rhythm, gait, and voice. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since, biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge- based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. Types of biometric are: 1. DNA Matching a) Chemical Biometric: The identification of an individual using the analysis of segments from DNA. b) Ear: Visual Biometric The identification of an individual using the shape of the ear. c) Eyes - Iris Recognition Visual Biometric: The use of the features found in the iris to identify an individual. d) Eyes - Retina Recognition Visual Biometric: The use of patterns of veins in the back of the eye to accomplish recognition. 2. Face Recognition Visual Biometric: The analysis of facial features or patterns for the authentication or recognition of an individual’s identity. Most face recognition systems either use local feature analysis. 3. Fingerprint Recognition Visual Biometric: The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual. 4. Finger Geometry Recognition Visual/Spatial Biometric The use of 3D geometry of the finger to determine identity. 5. Gait Behavioral Biometric: The use of an individual’s walking style or gait to determine identity. 6. Hand Geometry Recognition Visual/Spatial Biometric The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual. 7. Odor Olfactory Biometric: The use of an individual’s odor to determine identity.
  • 2. 8. Signature Recognition Visual/Behavioral Biometric The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilized in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes. 9. Typing Recognition Behavioral Biometric: The use of the unique characteristics of a person’s typing for establishing identity. 10. Vein Recognition Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm. 11. Voice / Speaker Recognition There are two major applications of speaker recognition: A) Voice - Speaker Verification / Authentication Auditory Biometric: The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print" or "voice model"). Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user's knowledge and typically require their cooperation. For example, presenting a person’s passport at border control is a verification process - the agent compares the person’s face to the picture in the document. B) Voice - Speaker Identification Auditory Biometric Identification is the task of determining an unknown speaker's identity. Speaker identification is a 1: N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user's knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc. For example, a police officer compares a sketch of an assailant against a database of previously documented criminals to find the closest matches. In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match. Note: There is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification. What biometrics include? 1. Aadhar card 2. Pan card 3. Finger print screen lock AADHAR CARD What was the reason behind in interlinking in Aadhar Card? The reason behind of interlinking in Aadhar card was that every individual has to give their finger & thumb prints, face and iris recognition which give security & reliability unique Aadhar ID Number. . What was the effect on biometric in Aadhar card? Through biometric sensor increasingly implementing live detection in preventing fake fingers/iris etc Biometric locking feature allows Aadhaar holders to lock their biometrics and unlock only when needed. Due to this various people are finding aadhar card more convenient than other cards. How use of biometric in Aadhar card has changed its outlook? Through Aadhar number one can access useful services such as mobile phone and cooking gas connections and banking. Due to this effect, people can use their aadhar cards more often than other and also their satisfaction level would increase.
  • 3. PAN CARD What was the reason behind interlinking in PAN card? The reason behind interlinking in Pan cards was PAN cards would be biometric to taxpayers across the country in order to erase delicacy and fake one and this decision was taken to ensure that a single tax payer is not issued multiple cards which could create them hurdles or problems at the time of payment of their respective tax within or out of the due course of time (allotted time period). What was the effect of biometric in PAN card? PAN cards validate the identity of a person by checking the intrinsic physical or behavioural traits of that person which include fingerprint impressions, or scans of the iris or retina of a person, hand geometry, voice recognition and signature. Due this type of effect many tax payers are finding more convenient than the older one. How biometrics is been used in PAN cards in opening various paths in maintaining authenticity and security measures? Biometrics in PAN cards have opened various paths with the help of biometric smart cards which reduce the chances of duplication since the biometric identification parameter is unique to each individual in getting forged, misplaced or lost. FINGER PRINT LOCK APP What was the reason behind the interlinking of biometrics in Finger Print Lock App? The reason behind the interlinking of biometrics in finger print lock app as it shows your own wallpaper behind the lock screen, even Live Wallpaper includes large, visible time and date and Customizable Features, including Themes and Fonts with adjustable positions for everything. What was the effect of biometrics in Finger Print Lock App? The effect of biometrics in finger print lock app as it locks your phone by preventing button presses, no notification bar and all button presses are disabled (including Home and Back buttons) and themes with options to customize your own personal lock screen and set positions and sizes of the Time, Date, and everything else. How use of biometrics in Finger Print Lock App has opened different areas in measuring security and safety measures? The use of biometric in Finger Print lock App has opened different areas in measuring security and safety measures as it change scanner images, including the scan area, and the scan line colour, shows your own personal wallpaper, including Live Wallpapers and includes home screen Widget to run the app. Due to this app, women can secure their personal details and also can provide safeguard to those informations which could be easily misused by others. CONCLUSION Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures. The oldest form of biometric verification is fingerprinting. Historians have found examples of thumbprints being used as a means of unique identification on clay seals in ancient China. Biometric verification has advanced considerably with the advent of computerized databases and the digitization of analog data, allowing for almost instantaneous personal identification. Iris-pattern and retina-pattern authentication methods are already employed in some bank automatic teller machines. Voice waveform recognition, a method of verification that has been used for many years with tape recordings in telephone wiretaps, is now being used for access to proprietary databanks in research facilities. Facial- recognition technology has been used by law enforcement to pick out individuals in large crowds with considerable reliability. Hand geometry is being used in industry to provide physical access to buildings. Earlobe geometry has been used to disprove the identity of individuals who claim to be someone they are not (identity theft). Signature comparison is not as reliable, all by itself, as the other biometric verification methods but offers an extra layer of verification when used in conjunction with one or more other methods. No matter what biometric methodology is used, the identification verification process remains the same. A record of a person's unique characteristic is captured and kept in a database. Later on, when identification verification is required, a new record is captured and compared with the previous record in the database. If the data in the new record matches that in the database record, the person's identity is confirmed. As, authentication through biometric verification is increasingly becoming common in corporate and public security systems, consumer electronics, and point-of-sale applications the driving force behind biometric verification has been convenience, as there are no passwords to remember or security tokens to carry. In India, Aadhar is the largest biometric database in the world which is a biometrics-based digital identity assigned for a person's lifetime, verifiable online instantly in the public
  • 4. domain, at any time, from anywhere, in a paperless way which enable government agencies to deliver a retail public service securely based on biometric data (fingerprint, iris scan and face photo), along with demographic data (name, age, gender, address, parent/spouse name, mobile phone number) of a person. Moreover, due to security point of view and for minimizing the threat of fraudulation in PAN card it has recently got linked with the Aadhar. Along with this, in finger print screen lock maximum individuals place the finger on the lock and then on the scan place and it works through this it develop ability to individual fingerprint assign to each app. BIBLIOGRAPHY 1. HTTPS://EN.WIKIPEDIA.ORG/WIKI/BIOMETRICS 2. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITI ON/BIOMETRICS 3. HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID= COM.YCDROID.FINGERLOCK&HL=EN 4. HTTP://UIDAI.GOV.IN/WHAT-IS-AADHAAR.HTML 5. HTTPS://WWW.YOUTUBE.COM/WATCH?V=YC8WJGSK PCO 6. HTTP://WWW.MAPSOFINDIA.COM/MY- INDIA/GOVERNMENT/AADHAAR-CARD-USES- OBJECTIVES-AND-BENEFITS 7. HTTP://WWW.BUSINESSTODAY.IN/MAGAZINE/TRENDS/ GET-A-BIOMETRIC-PAN-CARD/STORY/93.HTML 8. HTTP://WWW.GEEKOMAD.COM/2013/08/5-BEST- FINGERPRINT-LOCK-SCREEN-FREE-APPS.HTML