0% found this document useful (0 votes)
290 views15 pages

Biometric Seminar Report

1. Biometrics uses biological traits like fingerprints, iris patterns, and voice recognition to identify individuals for authentication purposes. It provides a more secure alternative to passwords and PINs that something only the individual possesses. 2. The document discusses the architecture of biometric systems which use sensors to scan biological patterns, software to extract and analyze data from scans to generate unique templates, and algorithms to compare templates for verification. 3. Common biometric technologies include fingerprint recognition, iris scanning, voice recognition, and face recognition. Fingerprint recognition analyzes minutiae points on fingerprints while iris scanning analyzes features in the iris to perform matching.

Uploaded by

Abhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
290 views15 pages

Biometric Seminar Report

1. Biometrics uses biological traits like fingerprints, iris patterns, and voice recognition to identify individuals for authentication purposes. It provides a more secure alternative to passwords and PINs that something only the individual possesses. 2. The document discusses the architecture of biometric systems which use sensors to scan biological patterns, software to extract and analyze data from scans to generate unique templates, and algorithms to compare templates for verification. 3. Common biometric technologies include fingerprint recognition, iris scanning, voice recognition, and face recognition. Fingerprint recognition analyzes minutiae points on fingerprints while iris scanning analyzes features in the iris to perform matching.

Uploaded by

Abhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Seminar Report

Biometric and Fingerprint verification

Name = Abhishek Pradeep Dhondge.


Div = TE-B
Roll No. = 3218
Department = Computer
Seat No. = T150404201
PRN = 71822974G
Abstract

Humans recognize each other according to their various


characteristics for ages. We recognize others by their face when
we meet them and by their voice as we speak to them. Identity
verification (authentication) in computer systems has been
traditionally based on something that one has (key, magnetic or
chip card) or one knows (PIN, password)
So problem is that a person has to remember their passwords
or secret code and to keep secure to take with him all time. So
biometric system will solve this problem.
This report discusses biometric authentication in relation to
payment systems. Biometrics uses biological traits or
behavioural characteristics to identify an individual. A
Biometrics system is effective pattern recognition system that
utilizes different patterns similar to retina patterns, iris
patterns and biological qualities like fingerprints, voice
recognition, facial geometry and hand recognition etc.
Biometric payment system is protected and sheltered and
incredibly trouble-free to use and even without using password
or top secret codes to keep in mind as compare with previous
system like credit card payment system, and mobile banking
etc. In daily life the usage of credit cards and debit card for
shopping, bill payment, travelling and so on.
Introduction

Biometrics is automated methods of recognizing a person based on a


physiological or behavioral attribute. Along with the quality considered
are; face, fingerprint, hand geometry, iris, retinal, signature, and voice.
Biometric technologies are fetching the establishment of an extensive
array of extremely safe recognition and personal authentication
solutions. As the level of security breaches and transaction fraud
increases, the need for highly secure identification and personal
verification technologies is becoming apparent. Biometric-based
solutions are proficient to offer for confidential financial transactions
and personal data privacy. The need for biometrics can be found in
federal, state and local governments, in the military, and in commercial
applications.
Enterprisewide network security infrastructures, government IDs, secure
electronic banking, investing and other financial transactions, retail
sales, law enforcement, and health and social services are already
benefiting from these technologies. Biometric-based authentication
applications include workstation, network, and domain access, single
sign-on, application logon, data protection, remote access to resources,
transaction security and Web security. Trust in these electronic
transactions is essential to the healthy growth of the global economy.
Utilized alone or integrated with other technologies such as smart cards,
encryption keys and digital signatures, biometrics are set to pervade
nearly all aspects of the economy and our daily lives. Utilizing biometrics
for personal authentication is becoming convenient and considerably
more accurate than current methods (such as the utilization of
passwords or PINs). This is because biometrics links the event to a
particular individual (a password or token may be used by someone
other than the authorized user), is convenient (nothing to carry or
remember), accurate (it provides for positive authentication), can
provide an audit trail and is becoming socially acceptable and
inexpensive.
Biometric System Architecture

A biometric system is designed specifically to map a particular


biometric trait, all biometric systems work on the principle of
mapping patterns with the help of technology. A person’s
physiological or behavioral patterns are mapped, stored and
compared at a later date to verify or identify the owner of the
pattern. Biometric system consists of both hardware and
software elements. Hardware generally includes electronic
components and sensors to be able to read data out of specific
patterns, software portion makes use of algorithms to enhance
and recognize this data to generate a template unique to the
individual it comes from.

Biometric system architecture is the representation of a system


as a whole, including a mapping of functionality onto hardware
and software components, a mapping of the software
architecture onto the hardware architecture, and human
interaction with these components. Different biometric
recognition systems may have different set of sensors, sub-
systems, algorithms, to achieve the objective of specific pattern
recognition and matching. Here we are covering architecture of
a biometric access control system for restricted areas based on
individual finger print.
Following is the block diagram of basic fingerprint recognition
system architecture:
The Concept

Biometric verifications is an authentication system that uses


unique human information. This information has no mirror in
the world. It is needed physical access to enter authentication
information. Because of this, this type of verification
mechanism using in real world secure mechanism. The most
commonly known biometric verification systems are based on
these;

1. Fingerprint Recognition

2. Finger Vein Recognition

3. Retina and Iris Recognition

4. Hand/Palm Recognition

5. Voice Recognition

6. Signature Recognition.

7. Face Recognition

These verification techniques commonly used around the world.


For example, it is commonly witnessed that fingerprint
recognition system using in ATM machines, secure facility
entering and entrance to working area for employees. Voice
recognition is commonly used in call centers for the purpose of
identifying customers. Palm recognition is commonly used in
medical services for verification patient with high accuracy rate.
Retina and Iris recognition is commonly used secure facility
entrance etc.

In this part, it is explained that how can system recognize these


pattern using machine learning techniques. Fingerprint
recognition, retina-iris recognition, a hand-palm recognition
which are most commonly used biometric systems are explained
with some detailed information. Other techniques explained
shortly.

Fingerprint :

Fingerprint looks at the patterns found on a fingertip. There are


a variety of approaches to fingerprint verification. Some
emulate the traditional police method of matching minutiae;
others use straight pattern-matching devices; and still others
are a bit more unique, including things like patterns and
ultrasonic. Some verification approaches can detect when a live
finger is presented; some cannot. A greater variety of
fingerprint devices is available than for any other biometric. As
the prices of these devices and processing costs fall, using
fingerprints for user verification is gaining acceptance —
despite the common — criminal stigma. Fingerprint verification
may be a good choice for in-house systems, where you can give
users adequate explanation and training, and where the system
operates in a controlled environment. It is not surprising that
the workstation access application area seems to be based
almost exclusively on fingerprints, due to the relatively low
cost, small size, and ease of integration of fingerprint
authentication devices.
Iris :
Iris based biometric, on the other hand, involves analyzing
features found in the colored ring of tissue that surrounds the
pupil. Iris scanning, undoubtedly the less intrusive of the
eyerelated biometrics, uses a fairly conventional camera
element and requires no close contact between the user and the
reader. In addition, it has the potential for higher than average
templatematching performance. Iris biometrics work with
glasses in place and is one of the few devices that can work well
in identification mode. Ease of use and system integration have
not traditionally been strong points with iris scanning devices,
but you can expect improvements in these areas as new
products emerge. 5. Retina Retina based biometric involves
analyzing the layer of blood vessels situated at the back of the
eye. An established technology, this technique involves using a
low-intensity light source through an optical coupler to scan the
unique patterns of the retina. Retinal scanning can be quite
accurate but does require the user to look into a receptacle and
focus on a given point. This is not particularly convenient if you
wear glasses or are concerned about having close contact with
the reading device. For these reasons, retinal scanning is not
warmly accepted by all users, even though the technology itself
can work well.

Voice :
Voice authentication is not based on voice recognition but on
voice to print authentication, where complex technology
transforms voice into text. Voice biometrics has the most
potential for growth, because it requires no new hardware most
PCs already contain a microphone. However, poor quality and
ambient noise can affect verification. In addition, the
enrollment procedure has often been more complicated than
with other biometrics, leading to the perception that voice
verification is not user friendly. Therefore, voice authentication
software needs improvement. One day, voice may become an
additive technology to finger scan technology. Because many
people see finger scanning as a higher authentication form,
voice biometrics will most likely be relegated to replacing or
enhancing PINs, passwords, or account names.

How Fingerprint Sensing work:


The acquisition of fingerprint images has been historically
carried out by spreading the finger with ink and pressing it
against a paper card. The paper card is then scanned, resulting
in a digital representation. This process is known as off-line
acquisition and is still used in law enforcement applications.
Currently, it is possible to acquire fingerprint images by
pressing the finger against the flat surface of an electronic
fingerprint sensor. This process is known as online acquisition.
There are three families of electronic fingerprint sensors based
on the sensing technology.
* Silicon Sensors:
These consist of an array of pixels, each pixel being a sensor
itself. Users place the finger on the surface of the silicon, and
four techniques are typically used to convert the ridge/valley
information into an electrical signal: capacitive, thermal,
electric field and piezoelectric. Since solid-state sensors do not
use optical components, their size is considerably smaller and
can be easily embedded. On the other hand, silicon sensors are
expensive, so the sensing area of solidstate sensors is typically
small.
* Optical Sensors:
The finger touches a glass prism and the prism is illuminated
with diffused light. The light is reflected at the valleys and
absorbed at the ridges. The reflected light is focused onto a CCD
or CMOS sensor. Optical fingerprint sensors provide good
image quality and large sensing area but they cannot be
miniaturized because as the distance between the prism and the
image sensor is reduced, more optical distortion is introduced
in the acquired image.
* Ultrasound:
Acoustic signals are sent, capturing the echo signals that are
reflected at the fingerprint surface. Acoustic signals are able to
cross dirt and oil that may be present in the finger, thus giving
good quality images. On the other hand, ultrasound scanners
are large and expensive, and take some seconds to acquire an
image. A new generation of touch less live scan devices that
generate a 3D representation of fingerprints is appearing .
Several images of the finger are acquired from different views
using a multi camera system, and a contact-free 3D
representation of the fingerprint is constructed.
How Retina & Iris Recognition work:
Retina recognition is a biometric technique that uses the unique
patterns on a person’s retina for person identification. The
retina is the layer of blood vessels situated at the back of an eye.
The eye is positioned in front of the system at a capture distance
ranging from 8 cm to one meter. The output of eye scanner
sensor is a blood vessel image of the retina. Every human’s
blood vessel figure is unique. With image processing techniques,
extracted features of the image, then making a decision using
machine learning techniques. An example of retina image given
on the right.
The iris is the part of the eye that is coloured and it is
responsible for controlling the amount of light entering the eye.
Iris has a veined structure and unique for every human in the
world. The structure of iris extracted by image processing
techniques and creating a decision mechanism using machine
learning techniques.

How Hand / Palm Recognition work:


Palm detection based two different logic, first of these scanning
hand surface like fingerprint scanning, the second one is
extracted blood vessel of palm. In hand recognition systems, the
hand is scanned by the visual scanner and extracted surface of
hand information. In palm detection systems, palm scanned by
an infrared sensor, and output of this type of techniques is a
blood vessel of palm picture. Features extracted by image
processing algorithms in both techniques. And creating decision
mechanism using machine learning algorithms.
Advantages of Biometric System:

1. High security and assurance – Biometric


identification provides the answers to “something a
person has and is” and helps verify identity
2. User Experience – Convenient and fast
3. Non-transferrable – Everyone has access to a
unique set of biometrics
4. Spoof-proof – Biometrics are hard to fake or steal

Disadvantages of Biometric System:

1. Costs – Significant investment needed in biometrics for


security
2. Data breaches – Biometric databases can still be hacked
3. Tracking and data – Biometric devices like facial
recognition systems can limit privacy for users
4. Bias – Machine learning and algorithms must be very
advanced to minimize biometric demographic bias

Applications:
1. Aadhar card - the idea is to include digital biometric
information in the national identification card.

2. Drivers licenses – In many countries the driver license is


also used as identification document, therefore it is
important to prevent the duplicate emission of the driver
license under different name. With the use of biometric
this problem can be eliminated.

3. Employee authentication – The government use of


biometric for PC, network, and data access is also
important for security of building and protection of
information.

4. ATM’s - the use of biometric in the ATM transaction


allows more security.

5. Online Banking - Internet based account access is already


widely used in many places, the inclusion of biometric will
make more secure this type of transactions from home.

6. Attendance monitoring - In this sector the biometrics is


used for controlling the presence of the individuals in a
determine area. For example for controlling the time sheet
of the employees or the presence of students at the
classroom.

7. Border Crossing - The use of biometrics to control the


travelers crossing the national or state border is
increasing, specially in regions with high volume of
travelers or illegal immigrants.

Conclusion:
Biometrics is a means of verifying personal identity by
measuring and analyzing unique physical or behavioural
characteristics like fingerprints or voice patterns. The
conclusion of this whole paper is that the card-less payment
system should be replaced and there must be more easier,
reliable, secure, cash free and tension free payment system, ie
biometric payment system in which no body have to take with
dozens of cards for shopping, travelling, pass in office,
university or bank as door lock.
So to consider all these kinds of problems and disadvantages of
card payment system the fingerprints payment system is
suggested to be implemented because it is easier, reliable,
feasible, secure and easily authorized to everyone. And there is
no any worry that anyone can stolen my finger are can be
loosed anywhere so other body can use it. In fingerprint
payment system customer has to place his fingers on the finger
scanner and then scanner will recognize the account which
belongs to that person and charge the bill. So it is easy for both
customer and seller because there is no need to scratch the
credit card and then enter code if code is forgot or if some time
card cannot read and many more problems can occur in card
payment system.
And in biometric payment system no need to carry cash with
them. Biometric payment system may be like fingerprints, IRIS,
face recognition and blood reading or skin reading and it may
be installed at any store, university, library, hostel, bank, office,
home door lock, internet online shopping and many kinds
where card system is installed. So in this paper we explain the
biometrics with detailed term, how fingerprint system works,
fingerprints’ types and fingerprint recognition through circular
sampling.

References:
1. Google
2. Wikipedia
3. Youtube
4. Medium.com
5. miteksystems.com

You might also like