Image processing domain in biometrics

download Image processing domain in biometrics

of 20

Transcript of Image processing domain in biometrics

  • 8/12/2019 Image processing domain in biometrics

    1/20

    KNOWLEDGE

    INSTITUTE OF TECHNOLOGY

    Biometrics

    Y.KARTHICK

    CSE II YEAR,

    PH: 9150057641MAIL:!"#$%&'!!&($)*+"&.'(

    +

    K.KUMARESAN

    CSE II YEAR

    PH: 9715747-04

    MAIL:!+"#/"+!15)*+"&.'(+

  • 8/12/2019 Image processing domain in biometrics

    2/20

    A2STRACT:

    Biometrics is seen by many as a

    solution to a lot of the user

    identification and securityproblems in todays networks.

    Password abuse and misuse,

    intentional and inadvertent is a

    gaping hole in network security.

    This results mainly from human

    error, carelessness and in some

    cases maliciousness. Biometrics

    removes human error from thesecurity equation.

    ur paper will e!amine all the

    technological and feasibility

    aspects as well as the practical

    applications. "e will look at many

    different biometric methods of

    identifying the user.

    INTRODUCTION:

    This paper provides a broad

    overview of the sub#ect ofbiometrics, their usage, how

    performance is measured, the

    typical construction of systems and

    practical implementation issues. $

    basic understanding of computer

    networks is requisite in order to

    understand the principles of

    network security. $ %NETWORK&

    has been defined as %any set of

    interlinking lines resembling a net,

    a network of roadsan

    interconnected system, a network

    of alliances. This

    definition suits our purpose well. $

    interconnected computers.

    'oving on to the definition ofbiometrics, it is a means of

    identifying a person by measuring

    a particular physical or behavioral

    characteristic and later comparing

    it to those of many people

    computer network is simply a

    system of that are stored in the dat

    base. Biometrics was identified as

    one amongst () emerging

  • 8/12/2019 Image processing domain in biometrics

    3/20

    technologies which would change

    the world in the twenty*first

    century.

    Definition:

    The statistical use of the

    characteristic variations in unique

    elements of living organisms is

    known as biometrics.

    Why we need biometrics?

    +n order to avoid the

    problems of forgetting passwords

    and + codes, Biometrics based

    authentication helps us in verifying

    your finger prints, iris pattern and

    voice for your identity at $.T.'-s,

    $irports etc.., you can unlock your

    houses, withdrawing money from a

    bank with #ust a blink of an eye, a

    tap of your finger or by #ust

    showing your face.

    Biometrics-what is it?

    Biometrics refers to the

    automatic identification of a

    person based on hisher

    physiological or behavioral

    characteristics. This method of

    identification is preferred over

    traditional methods involving

    password-s and P+/ numbers for

    various reasons:

    0i1 The person to be identified

    is required to be

    physically present at the

    point of identification.

    0ii1 +dentification based on

    biometric techniques

    obviates the need to

    remember a password or

    carry a token. By

    replacing P+/-s, biometrictechniques can potentially

    prevent unauthori2ed

    access to or fraudulent use

  • 8/12/2019 Image processing domain in biometrics

    4/20

    of $.T.'s, 3mart cards,

    computer networks.

    0iii1 P+/s passwords may be

    forgotten, and token based

    methods of identification

    like passwords and

    driver-s licenses may be

    forged, stolen or lost. $

    biometric system is

    essentially a pattern

    recognition system which

    makes a personal

    identification by

    determining the

    authenticity of a specific

    physiological or

    behavioral characteristic

    possessed by the user.

    Desin iss!es of biometric

    systems: $n important issue in

    designing a practical system is to

    determine how an individual is

    identified and are designed by

    keeping two characteristics in

    mind, they are:

    P%&'"

    '%"#"'$/#&$&'

    P/#(" $#"&$

    * 4ingerprint,

    5andprint

    * 6oice pattern

    * 4ace

    * 5andwriting

    * 3cent, Thermal

    image *

    $coustic 3ignature

    * +ris Pattern

    epending on the conte!t a

    biometric system can be

  • 8/12/2019 Image processing domain in biometrics

    5/20

    either a

    verification0authentication1

    system or an identification

    system

    "erification "s #dentification:

    There are two different

    ways to resolve a person-s identity:

    verification and identification.

    6erification 0$m + whom + claim +

    am71 involves confirming are

    denying a person-s claimed

    identity. +n identification, one has

    to establish a person-s identity

    0"ho am +71. 8ach one of these

    approaches has its own

    comple!ities and could probably

    be solved best by a certain

    biometric system.

    Ty$es of biometric de%ices and

    their ser%ices: /ow let-s see some of the

    biometric devices being widely

    used in many areas like

    computernetwork security,

    government organi2ations,

    prisons9. They are:

    4ingerprint

    identification.

    4ace recognition.

    +ris recognition.

    5and geometry.

    3ignature recognition.

    etinal scanning

    6oice verification9.

    $nd now let-s see some

    of these biometric devices, their

    services, advantages and

    disadvantages in detail.

    &iner$rint reconition:

    4inger prints are unique

    to each individual and no two

    fingerprints are alike. 4ingerprint

    recognition is most widelyaccepted biometric among the

    technology being used today.

    4ingerprints contain patterns of

  • 8/12/2019 Image processing domain in biometrics

    6/20

    ridges and valleys as well as

    minutiae points. 'inutiae points

    are local ridge characteristics that

    occur at either the ridge bifurcation

    or a ridge ending.

    There are three methods for

    scanning finger prints: 0(1

    ptical scanners,

    0;1Thermal scanners and0?*coordinate that is then

    stored in a file.

    The correlation*based

    method looks at the entire

    pattern of ridges and valleys

    in the fingerprint. The

    location of the whorls, loops

    and arches and the direction

    that they flow in are

    e!tracted and stored. /either

    method actually keeps the

    captured image@ only the data

    is kept, therefore making it

    impossible to recreate the

    fingerprints.&

  • 8/12/2019 Image processing domain in biometrics

    7/20

    nce the scanning is complete, the

    analysis is done by a comparison

    of several features of the

    fingerprint know as minutia.

    +nvestigators are systems look at

    where the ridge lines end or where

    one ridge splits into two

    0bifurcation1. The scanning system

    uses complicated algorithms to

    recogni2e and analy2e the minutia.

    +f two prints have three ridge

    endings, two bifurcations, and

    form the same shape with the same

    dimensions, then it is likely the

    same person-s fingerprints.

    'd%antaes:

    5igh accuracy rate.

    =an perform (*to*

    many comparisons.

    +ne!pensive

    equipment.

    8asy to use 0samples

    are easy to capture

    and maintain1.

    'ost established and

    oldest of the biometri

    technology.

    Disad%antaes:

    $ctual finger scan

    images cannot be

    recreated from a

    template image

    Asers relate

    fingerprint

    recognition tocriminal activity.

    &ace (or &acial) reconition:

    4ace recognition is one of the

    newer biometrics technologies.

    The technology analy2es facial

    characteristics and attempts to

    match it to database of digiti2ed

    pictures. This technology is

  • 8/12/2019 Image processing domain in biometrics

    8/20

    relatively new and has only been

    commercially available since the

    ()-s. 4ace recognition has

    received a surge of attention since

    of disaster of (( for its ability to

    identify known terrorists and

    criminals.

    4ace recognition uses distinctive

    features of the face Cincluding the

    upper outlines of the eye socket,

    the areas surrounding the

    cheekbones, the sides of the

    mouth, and the location of the nose

    and ears C to perform verification

    and identification. The first step in

    the face recognition is to obtain an

    image of an individual and store it

    in a database for later use. Asually,

    several pictures 0or video images1

    at different angles are taken.+ndividuals may also be asked to

    make different facial e!pressions

    for the data base. /e!t, the images

    are analy2ed and e!tracted to

    create a template. The last step is

    to verify the individual-s identity

    by matching images to those

    images that been stored in

    database.

    There are four main methods being

    used for facial recognition:

    E&*/3"'/:a tool developed

    by '+T that e!tracts

    characteristics through the

    use of two*dimensional

    grayscale imagery.

    F/"$#/ A"& "(

    !( " L('" F/"$#/

    A"& LFA:is the mos

    widely used technique

    because of its ability to

    accommodate for facial

    changes and aspect. D4$

    uses an algorithm to create a

    face print 0EF bytes in si2e1

    for comparison.

  • 8/12/2019 Image processing domain in biometrics

    9/20

    N/#" /$(#!:a method

    that e!tracts features from

    the face and create a

    template of contrasting

    elements that is then

    matched to a template in

    database.

    A$(+"$/ F"'/

    P#('/&* AFP:a

    technique that looks for

    distances and ratios between

    certain facial features, and is

    more ideal for poorly lit

    areas.

    'd%antaes:

    5igh accuracy rate.

    =an be performed

    from a distance.

    $ccepted by most

    users.

    /on*intrusive.

    5ands*free.

    Disad%antaes:

    =annot not always

    account for the effect

    of aging.

    3ensitive to lighting

    conditions.

    =an perform limited

    (*to*many

    comparisons.

    #ris reconition:

    /o two irises are alike, not even in

    one individual or in identical

    twins. The iris consists of over F))

  • 8/12/2019 Image processing domain in biometrics

    10/20

    distinguished characteristics.

    =ompared to the F) or G) points of

    distinct fingerprint characteristics,

    the iris has more than ;G) distinct

    features. Therefore, iris scanning is

    much more accurate than

    fingerprints or even /$ analysis

    of the distinguishing features.

    +ris scanning is e!ecuted by

    scanning the measures of the

    colored circle that surrounds the

    pupil. "ith video technology, a

    camera scans the iris pattern,

    which consists of corona, pits,

    filaments, crypts, striations, and

    radial furrows 0page1. The systemsoftware then digiti2es the unique

    information of the iris and stores it

    for authentication at a later

    time. +ris scanning is easy,

    accurate, and convenient. ne

    significant downfall of +ris

    recognition is the initial startup

    costs as they are e!tremely high.

    +n identifying one-s +ris, there are

    two types of methods that are used

    by +ris identification systems,

    passive and active. The active +ris

    system method requires that a user

    be anywhere from si! to (F inches

    away from the camera. +t also

    requires the user to move back and

    forth so that the camera can ad#ust

    and focus in on the user-s iris. The

    passive system allows the user to

    be anywhere from one to three fee

    http://images.google.co.in/imgres?imgurl=http://www.abcmoney.co.uk/aimage/1136_eye_scanning.jpg&imgrefurl=http://www.abcmoney.co.uk/news/1220062146.htm&h=152&w=225&sz=12&hl=en&start=5&tbnid=tjgRL7vzqcq0LM:&tbnh=73&tbnw=108&prev=/images%3Fq%3Diris%2Bscan%26gbv%3D2%26svnum%3D10%26hl%3Denhttp://en.wikipedia.org/wiki/Image:Humaniris.jpg
  • 8/12/2019 Image processing domain in biometrics

    11/20

    away from the camera0s1 that

    locate and focus in on the iris.

    This technology-s main uses are

    for authentication, identification,

    and verification of an individual.

    'd%antaes:

    5igh accuracy rate

    +mitation is almost

    impossible

    Disad%antaes:

    perceived to be

    intrusive and invasive

    =an be done from a

    short distance optical readers are

    difficult to operate

    requiring advanced

    training for employees

    *and eometry:

    5and geometry is concerned with

    measuring the physical

    characteristics of the user-s hand

    and fingers and it is believed to be

    sufficiently unique for use as a

    means of biometric authentication.

    The technology records various

    dimensions of the human hand, it

    is relatively easy to use, and offers

    a good balance of performance

    characteristics. eader

    configurations vary among a

    softball*shaped device which the

    sub#ect grabs in his hand and a flat

    plate which the sub#ect places

    hisher hand, a bar which the

    sub#ect grabs as if opening a door,

    and a flat plate which the sub#ect

    places hisher hand on.

    5and geometry readers are

    developed in a wide range of

  • 8/12/2019 Image processing domain in biometrics

    12/20

    scenarios, including time and

    attendance recording where they

    have proved e!tremely popular.

    The methodology may be suitable

    where there is a large user base or

    there are users who access the

    system infrequently. $ccuracy can

    be very high if desired.

    5and geometry readers are

    relatively large and e!pensive but

    the ease of integration into other

    systems and processes, small

    template si2e 0only bytes for pure

    hand geometry template1 and ease

    of use makes it a good choice for

    many pro#ects.

    *and eometry "s &iner$rints:

    Anlike

    fingerprints

    the human hand isn-t unique. ne

    can use finger length, thickness

    and curvature for the purposes of

    verification but not for

    identification. 4or some kinds of

    access control like immigration

    and border control, invasive

    biometrics 0e.g., fingerprints1 may

    not be desirable as they infringe on

    privacy. +n such situations it is

    desirable to have a biometric

    system that is sufficient for

    verification. $s hand geometry is

    not distinctive, it is idle choice.

    4urther more, hand geometry data

    is easier to collect. "ith

    fingerprint collection good

    frictional skin is required by

    imaging systems, and with retina*

    based recognition systems, speciallighting is necessary. $dditionally

    hand geometry can be easily

    combined with other biometrics,

  • 8/12/2019 Image processing domain in biometrics

    13/20

    namely fingerprint. ne can

    envision a system where

    fingerprints are used for 0in

    frequent1 identification and hand

    geometry is used for 0frequent1

    verification.

    +ec!rity concerns:

    Biometric systems are not

    bulletproof. They present a number

    of security concerns absent in

    traditional cryptographic systems.

    The most important of these as

    follows:

    +$oofin:

    Biometric systems are much more

    vulnerable spoofing attacks than a

    cryptographic system. The

    %leakage& of biometric data iscommon by ways photographs,

    sound recordings and fingerprints

    left on doorknobs. 6ulnerability is

    essentially unavoidable in

    biometric systems.

    ,ni%ersality:

    'ost biometric systems are

    unusable by non*negligible

    percentage of population. $n

    estimate shows, for e!ample, that

    appro!imately ;.GH of the

    population does not have sufficien

    quality that can be used for

    authentication purpose. Dikewise a

    number of users have problematic

    irises. 3o, it is recommended that a

    biometric device is used in

    con#unction with another layer of

    security@ either another type of

    biometric device or some other

    means of authentication, like a

    password or a smart card.

    ri%acy:The e!tensive use of biometrics

    raises serious privacy issues of

    anonymity and tracking. +n some

  • 8/12/2019 Image processing domain in biometrics

    14/20

    ways a combination of privacy and

    freedom of movement allows us to

    conduct some %public& transactions

    without widespread public

    knowledge.

    Reliability:

    The appeal of biometrics

    identifiers lies in their low error

    rates and automated nature. But

    regardless of the actual reliability,

    if the popular perception is that

    they have virtual infallibility then

    we may have a serious problem.

    Because in this case, access to

    sensitive buildings and computers,

    high stakes commercial

    transaction, and criminal and civil

    litigation may turn on faulty

    assumptions about this technology.

    APPLICATIONS AREAS:

    The uses for biometric security are

    varied and growing. +t was

    developed in response to a need to

    associate human action with

    identity C whether conducting a

    transaction, accessing a computer

    or a critical information system, or

    entering secure physical area.

    3ome of the e!isting and proposed

    applications in general we use are

    described below:

    .om$!ter/Network sec!rity:

    'any stand*alone and network

    computer systems carry valuable

    and sensitive information.

    =ontrolling access to these system

    is another ma#or use of biometric

    authentication systems.

    #nternet transactions:ue to growing security

    requirements that results from the

    boom in e*commerce, many think

  • 8/12/2019 Image processing domain in biometrics

    15/20

    of on*line transactions as being an

    obvious area for biometrics. The

    biometric authentication generates

    a greater degree of vendor

    confidence because he knows that

    person that the person at the

    terminal is he who he claims to be.

    hysical area sec!rity:

    'ilitary, Iovernment, and

    =ommercial installations have

    sufficiently strong confidentiality

    concerns. The biometric identifiers

    play a ma#or role in controlling

    physical access to these

    installations.

    Bankin:

    'any leading banks have been

    e!perimenting with biometrics for

    $T' use as a means of combating

    card fraud. Beginning ;));, some

    companies will being issuing smar

    credits cards, with customer-s

    fingerprint information embedded.

    "otin:

    $ logical use of biometrics is in

    voting process where eligible

    politicians are required to verify

    their identity. This is intended to

    stop %pro!y& voting.

    risons:

  • 8/12/2019 Image processing domain in biometrics

    16/20

    $n interesting use of biometrics is

    in prisons where the visitors to a

    prisoner are sub#ected to

    verification procedures in order

    that identities may not be swapped

    during the visit.

    0eadin $rod!cts in biometrics:

    Biometric is a new but promising

    technology and therefore a number

    of companies have appeared in the

    market in a very short period of

    time. 3ome of those products are:

    S$"$ (3 2&(+/$#&':

    The resent:

    There are many various fields in

    which biometrics is being used

    today and the future holds more

    advances. 3ome of such e!amples

    are:

    $t =oca*=ola =o., hand*

    scanning machines recently

    replaced the venerable time

    card for many workers.

    +n /ew Jersey and si! other

    states, fingerprint scanners

    are now used to crack down

  • 8/12/2019 Image processing domain in biometrics

    17/20

    on people claiming welfare

    benefits fewer than two

    different names.

    +n =ook =ounty, +llinois, a

    sophisticated camera that

    analy2es the iris patterns of

    an individualKs eyeball is

    helping ensure that the right

    people are released from #ail.

    $t Purdue Aniversity in

    +ndiana, the campus credit

    union is installing automated

    teller machines with a finger

    scanner that will eliminate

    the need for plastic bankcards

    and personal identification

    numbers.

    'aster=ard +nternational +nc.

    and 6isa A3$ +nc., the

    worldKs two largest credit

    card companies, have begun

    to study the feasibility of

    using finger*scanning device

    at the point of sale to verify

    that the card user is really the

    card holder.

    "alt isney "orld in

    rlando has started taking

    hand scans of people who

    purchase yearly passes.

    The technology also received

    widespread attention at

    lympic Iames $tlanta,

    where LG,))) athletes,

    coaches and officials used a

    hand*scanning system to

    enter the lympic 6illage.

    'any and many more such

    organi2ations at many parts of the

    world use biometric devices of

    their own choice for their desired

    purposes.

  • 8/12/2019 Image processing domain in biometrics

    18/20

    The &!t!re:

    +n future biometrics will be a keyinstrument in our society. The

    increase in use of biometrics day to

    day shows a vivid picture that it

    has to play an important role in the

    oncoming days.

    Biometrics is a rapidly evolving

    technology which is being widely

    used in forensics such as criminal

    identification and prison security,

    and has the potential to be used in

    a large range of civilian application

    areas. Biometrics can be used to

    prevent unauthori2ed access to

    $T's, cellular phones, smart

    cards, desktop P=s, workstations,

    and computer networks. +t can be

    used during transactions conducted

    via telephone and

    internet0electronic commerce and

    electronic banking1. +n

    automobiles, biometrics can

    replace keys with key*less entry

    devices.

    The future of this technology is

    #ust starting to bloom. 'any issues

    are arising from this technology

    and MP+6$=?M is their main

    concern. "ith the increasing rate

    of disaster and fraud, biometrics

    surely would be an answer for

    many oncoming problems, which

    are to be faced.

    .oncl!sion:

  • 8/12/2019 Image processing domain in biometrics

    19/20

    The advances in accuracy

    and usability and decreasing cost

    have made the biometric

    technology a secure, affordable

    and cost effective way of

    identifying individuals. Biometric

    parameters such as fingerprint

    scanning, iris scanning, retinal

    scanning, hand geometry, signature

    verification, voice verification andothers are all well established with

    their own particular characteristics.

    The limiting factors of speed and

    band width are now a thing of the

    past and their practical

    performance might in many

    instances be better than e!pected.

    Today, it is an efficient and

    effective method of replacing

    passwords, tokens and smart cards

    +t is important to

    recogni2e that although biometric

    authentication has served

    e!tensively in high security

    applications in defense industry, it

    is still fledgling technology in

    commercial world, both in terms o

    its technical sophistication and

    current e!tent of deployment.

    There are no established standards

    for biometric system architecture,

    for template formation, or even for

    biometric reader testing. +t is alsonot clear as which technology or

    technologies will dominate the

    customer market. +n the absence of

  • 8/12/2019 Image processing domain in biometrics

    20/20

    standards and direction, the rapid

    and wide spread deployment of

    biometric authentication system

    could easily facilitate the

    problematic proliferation of

    authentication and tracking of the

    people.

    R/3/#/'/:

    Web sites:

    www1interhack1networksec!

    rity

    www1fa2s1intr!sion

    www1co!nter$ane1com

    www1irisscan1com

    www.biometrics.co.in

    Books:

    Network +ec!rity

    'ssessment

    Network +ec!rity Essentials

    '. $. abbah, ". D. "oo,

    and 3. 3. lay, M3ecure

    $uthentication for 4ace

    ecognition,M presented at=omputational +ntelligence in

    +mage and 3ignal Processing

    ;))N. =++3P ;))N. +888

    3ymposium on, ;))N