DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Biometrics research paper
1. Research Paper on Biometrics: Use in Aadhar
Card, Pan Card and Finger Print App Lock
NAME: BHAWNA DOBRIYAL
Email Id: Bhawna.dobriyal@gmail.com
ABSTRACT
Biometric is basically used to identify individuals in groups
that are under surveillance. In this biometric identifiers are the
distinctive, measureable characteristics used to label and
describe individuals. In order to provide authentication to
every individual, biometric authentication has to look
everyone is unique and an individual can be identified by his
or intrinsic physical and behavioural traits. Previously,
biometric system were made to use in the identificatory
systems of criminal activity where application of
mathematical models to fingerprints, phrenology, and facial
characteristics as part of “absolute identification” and “a key
to both inclusion and exclusion" of populations but in recent
time or modern era biometric security is developed which
scans the entire body of prospects in order to have guarantee
of better identification on this prospect. Currently, this method
is not globally accepted because it is very complex and
prospects are concerned about their privacy.
INTRODUCTION
Biometrics refers to metrics related to human characteristics.
Biometrics authentication (or realistic authentication) is used
in computer science as a form of identification and access
control. Biometric identifiers are often categorized as
physiological versus behavioural characteristics.
Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint,
palm veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odour/scent.
Behavioural characteristics are related to the pattern of
behaviour of a person, including but not limited to typing
rhythm, gait, and voice.
More traditional means of access control include token-based
identification systems, such as a driver's license or passport,
and knowledge-based identification systems, such as
a password or personal identification number.
Since, biometric identifiers are unique to individuals, they are
more reliable in verifying identity than token and knowledge-
based methods; however, the collection of biometric
identifiers raises privacy concerns about the ultimate use of
this information.
Types of biometric are:
1. DNA Matching
a) Chemical Biometric: The identification of an
individual using the analysis of segments from
DNA.
b) Ear: Visual Biometric The identification of an
individual using the shape of the ear.
c) Eyes - Iris Recognition
Visual Biometric: The use of the features found
in the iris to identify an individual.
d) Eyes - Retina Recognition
Visual Biometric: The use of patterns of veins in
the back of the eye to accomplish recognition.
2. Face Recognition
Visual Biometric: The analysis of facial features or
patterns for the authentication or recognition of an
individual’s identity. Most face recognition systems
either use local feature analysis.
3. Fingerprint Recognition
Visual Biometric: The use of the ridges and valleys
(minutiae) found on the surface tips of a human
finger to identify an individual.
4. Finger Geometry Recognition
Visual/Spatial Biometric The use of 3D geometry of
the finger to determine identity.
5. Gait
Behavioral Biometric: The use of an individual’s
walking style or gait to determine identity.
6. Hand Geometry Recognition
Visual/Spatial Biometric The use of the geometric
features of the hand such as the lengths of fingers and
the width of the hand to identify an individual.
7. Odor
Olfactory Biometric: The use of an individual’s odor
to determine identity.
2. 8. Signature Recognition
Visual/Behavioral Biometric The authentication of
an individual by the analysis of handwriting style, in
particular the signature. There are two key types of
digital handwritten signature authentication, Static
and Dynamic. Static is most often a visual
comparison between one scanned signature and
another scanned signature, or a scanned signature
against an ink signature. Technology is available to
check two scanned signatures using advances
algorithms. Dynamic is becoming more popular as
ceremony data is captured along with the X,Y,T and
P Coordinates of the signor from the signing device.
This data can be utilized in a court of law using
digital forensic examination tools, and to create a
biometric template from which dynamic signatures
can be authenticated either at time of signing or post
signing, and as triggers in workflow processes.
9. Typing Recognition
Behavioral Biometric: The use of the unique
characteristics of a person’s typing for establishing
identity.
10. Vein Recognition
Vein recognition is a type of biometrics that can be
used to identify individuals based on the vein
patterns in the human finger or palm.
11. Voice / Speaker Recognition
There are two major applications of speaker
recognition:
A) Voice - Speaker Verification / Authentication
Auditory Biometric: The use of the voice as a
method of determining the identity of a speaker
for access control. If the speaker claims to be of
a certain identity and the voice is used to verify
this claim. Speaker verification is a 1:1 match
where one speaker's voice is matched to one
template (also called a "voice print" or "voice
model"). Speaker verification is usually
employed as a "gatekeeper" in order to provide
access to a secure system (e.g.: telephone
banking). These systems operate with the user's
knowledge and typically require their
cooperation.
For example, presenting a person’s passport at
border control is a verification process - the
agent compares the person’s face to the picture
in the document.
B) Voice - Speaker Identification
Auditory Biometric Identification is the task of
determining an unknown speaker's
identity. Speaker identification is a 1: N (many)
match where the voice is compared against N
templates. Speaker identification systems can
also be implemented covertly without the user's
knowledge to identify talkers in a discussion,
alert automated systems of speaker changes,
check if a user is already enrolled in a system,
etc.
For example, a police officer compares a sketch
of an assailant against a database of previously
documented criminals to find the closest
matches. In forensic applications, it is common
to first perform a speaker identification process
to create a list of "best matches" and then
perform a series of verification processes to
determine a conclusive match.
Note: There is a difference between speaker
recognition (recognizing who is speaking) and
speech recognition (recognizing what is being
said). These two terms are frequently confused,
as is voice recognition. Voice recognition is a
synonym for speaker, and thus not speech,
recognition. In addition, there is a difference
between the act of authentication (commonly
referred to as speaker verification or speaker
authentication) and identification.
What biometrics include?
1. Aadhar card
2. Pan card
3. Finger print screen lock
AADHAR CARD
What was the reason behind in interlinking in Aadhar
Card?
The reason behind of interlinking in Aadhar card was that
every individual has to give their finger & thumb prints, face
and iris recognition which give security & reliability unique
Aadhar ID Number.
.
What was the effect on biometric in Aadhar card?
Through biometric sensor increasingly implementing live
detection in preventing fake fingers/iris etc Biometric locking
feature allows Aadhaar holders to lock their biometrics and
unlock only when needed.
Due to this various people are finding aadhar card more
convenient than other cards.
How use of biometric in Aadhar card has changed its
outlook?
Through Aadhar number one can access useful services such
as mobile phone and cooking gas connections and banking.
Due to this effect, people can use their aadhar cards more
often than other and also their satisfaction level would
increase.
3. PAN CARD
What was the reason behind interlinking in PAN card?
The reason behind interlinking in Pan cards was PAN cards
would be biometric to taxpayers across the country in order to
erase delicacy and fake one and this decision was taken to
ensure that a single tax payer is not issued multiple cards
which could create them hurdles or problems at the time of
payment of their respective tax within or out of the due course
of time (allotted time period).
What was the effect of biometric in PAN card?
PAN cards validate the identity of a person by checking the
intrinsic physical or behavioural traits of that person which
include fingerprint impressions, or scans of the iris or retina of
a person, hand geometry, voice recognition and signature.
Due this type of effect many tax payers are finding more
convenient than the older one.
How biometrics is been used in PAN cards in opening
various paths in maintaining authenticity and security
measures?
Biometrics in PAN cards have opened various paths with the
help of biometric smart cards which reduce the chances of
duplication since the biometric identification parameter is
unique to each individual in getting forged, misplaced or lost.
FINGER PRINT LOCK APP
What was the reason behind the interlinking of biometrics
in Finger Print Lock App?
The reason behind the interlinking of biometrics in finger
print lock app as it shows your own wallpaper behind the lock
screen, even Live Wallpaper includes large, visible time and
date and Customizable Features, including Themes and Fonts
with adjustable positions for everything.
What was the effect of biometrics in Finger Print Lock
App?
The effect of biometrics in finger print lock app as it locks
your phone by preventing button presses, no notification bar
and all button presses are disabled (including Home and Back
buttons) and themes with options to customize your own
personal lock screen and set positions and sizes of the Time,
Date, and everything else.
How use of biometrics in Finger Print Lock App has
opened different areas in measuring security and safety
measures?
The use of biometric in Finger Print lock App has opened
different areas in measuring security and safety measures as
it change scanner images, including the scan area, and the
scan line colour, shows your own personal wallpaper,
including Live Wallpapers and includes home screen Widget
to run the app. Due to this app, women can secure their
personal details and also can provide safeguard to those
informations which could be easily misused by others.
CONCLUSION
Biometric verification is any means by which a person can be
uniquely identified by evaluating one or more distinguishing
biological traits. Unique identifiers include fingerprints, hand
geometry, earlobe geometry, retina and iris patterns, voice
waves, DNA, and signatures.
The oldest form of biometric verification is fingerprinting.
Historians have found examples of thumbprints being used as
a means of unique identification on clay seals in ancient
China. Biometric verification has advanced considerably with
the advent of computerized databases and the digitization
of analog data, allowing for almost instantaneous personal
identification. Iris-pattern and retina-pattern authentication
methods are already employed in some bank automatic teller
machines. Voice waveform recognition, a method of
verification that has been used for many years with tape
recordings in telephone wiretaps, is now being used for access
to proprietary databanks in research facilities. Facial-
recognition technology has been used by law enforcement to
pick out individuals in large crowds with considerable
reliability. Hand geometry is being used in industry to provide
physical access to buildings. Earlobe geometry has been used
to disprove the identity of individuals who claim to be
someone they are not (identity theft). Signature comparison is
not as reliable, all by itself, as the other biometric verification
methods but offers an extra layer of verification when used in
conjunction with one or more other methods. No matter what
biometric methodology is used, the identification verification
process remains the same.
A record of a person's unique characteristic is captured and
kept in a database. Later on, when identification verification is
required, a new record is captured and compared with the
previous record in the database. If the data in the new record
matches that in the database record, the person's identity is
confirmed. As, authentication through biometric verification is
increasingly becoming common in corporate and public
security systems, consumer electronics, and point-of-sale
applications the driving force behind biometric verification
has been convenience, as there are no passwords to remember
or security tokens to carry.
In India, Aadhar is the largest biometric database in the world
which is a biometrics-based digital identity assigned for a
person's lifetime, verifiable online instantly in the public
4. domain, at any time, from anywhere, in a paperless way which
enable government agencies to deliver a retail public service
securely based on biometric data (fingerprint, iris scan and
face photo), along with demographic data (name, age, gender,
address, parent/spouse name, mobile phone number) of a
person.
Moreover, due to security point of view and for minimizing
the threat of fraudulation in PAN card it has recently got
linked with the Aadhar. Along with this, in finger print screen
lock maximum individuals place the finger on the lock and
then on the scan place and it works through this it develop
ability to individual fingerprint assign to each app.
BIBLIOGRAPHY
1. HTTPS://EN.WIKIPEDIA.ORG/WIKI/BIOMETRICS
2. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITI
ON/BIOMETRICS
3. HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID=
COM.YCDROID.FINGERLOCK&HL=EN
4. HTTP://UIDAI.GOV.IN/WHAT-IS-AADHAAR.HTML
5. HTTPS://WWW.YOUTUBE.COM/WATCH?V=YC8WJGSK
PCO
6. HTTP://WWW.MAPSOFINDIA.COM/MY-
INDIA/GOVERNMENT/AADHAAR-CARD-USES-
OBJECTIVES-AND-BENEFITS
7. HTTP://WWW.BUSINESSTODAY.IN/MAGAZINE/TRENDS/
GET-A-BIOMETRIC-PAN-CARD/STORY/93.HTML
8. HTTP://WWW.GEEKOMAD.COM/2013/08/5-BEST-
FINGERPRINT-LOCK-SCREEN-FREE-APPS.HTML