Vous êtes sur la page 1sur 7

INTRODUCTION workstations, and computer networks and it can

be used during transactions conducted via


Electronically, Instead of with pencil and paper telephone and Internet (electronic commerce
or face to face. This growth in electronic and electronic banking) to minimize risks.
transactions has resulted in a greater demand Biometric authentication offers a highly
for fast and accurate user identification and secure , reliable and efficient solution. So where
authentication.Traditional means of security security is highly required, implementation of
using personal identification numbers (PINs) biometrics security is a very good solution as
through passwords or security-access cards there is to fear of stealing or forgetting the
(smart cards) has a major drawback. They password.
recognize the PIN but not the person who has
provided it. So we would like to give information INTRODUCTION
on more secured way, which is biometrics WHAT IS BIOMETRICS?
security.
Biometrics is the science and
ABSTRACT technology of authentication (i.e.
establishing the identity of an individual) by
Biometrics is the science andtechnology of measuring the person's physiological or
authentication (i.e. This present century is full of behavioral features. The term is derived
inventions establishing the identity of an from the Greek words "bios" for life and
individual) and discovery, which lead to the "metron" for degree. Biometrics ensures that
invention of the individual trying to log on is actually the
by measuring the person's physiological authorized person and not just someone who
many sophisticated things. The more the things maliciously found a card or cracked a that converts
or behavioral features. The term is the scanned information into digital form, and,
are the more the security is needed. This has wherever the data is to be analyzed,
derived from the Greek words "bios" a database that stores the biometric
lead to the invention of many security items. The data for comparison with entered
for life and "metron" for degree. biometric data.
information age is quickly revolutionizing the
Biometrics is seen by many as a
Biometrics ensures that the solution to a lot of the user identification and
way transactions are completed. Every day security problems in today’s networks. Password
individual trying to log on is actually abuse and misuse, intentional and inadvertent is
actions are increasingly being handled a gaping hole in network security. This results
the authorized person and not justsomeone who mainly from human error, carelessness and in
maliciously found acard or cracked a password. some case maliciousness. Biometrics removes
Biometric technology is a way toachieve fast, user- human error from the security equation.
friendlyauthentication with a high level ofaccuracy.
. The promise of ease andincreased security are Our paper will examine all the
perhapsbiometrics most appealing features. technological and feasibility aspects as well as
the practical applications. We will look at many
The popular biometrictechnologies are : different biometric methods of identifying the
user. The presentation has been divided into the
• ..finger recognition following areas:
• ..face recognition ..What is biometrics?
• ..hand geometry ..History of biometrics
• ..voice recognition ..Different methodologies of biometrics.
• ..iris recognition ..Several applications of biometrics
..Benefits of using biometrics
• ..signature recognition
password. In the development of biometric
identification systems, physical and
There are number of applications of
behavioral features for recognition are
biometrics. They are widely used in forensics
required which must possess:
such as criminal identification , prison
security and in a large number of civilian
applications. Biometrics can also help in the • Uniqueness : that is, an identical trait
prevention of unauthorized access to ATMs, • shouldn't appear in two people:
cellular phones, smart cards, desktop PCs, • Universality :occur in as many people
• as possible

1
• Permanence: don't change over time
• Measurability : measurable with
• simple technical instruments
• User-friendliness : easy and
• comfortable to measure

HISTORY OF BIOMETRICS:

The concept of biometrics probably


began with the human use of facial features to
identify other people. One of the most
wellknown biometrics characteristics is the Among all the biometric techniques,
fingerprint. British scientist Sir Francis Galton fingerprint-based identification is the oldest
proposed the use of fingerprints for identification method which has been successfully used in
purposes in the late 19th century. He wrote a numerous applications. Everyone is known to
detailed study of fingerprints, in which he have unique, immutable fingerprints. A
presented a new classification system using fingerprint is made of a series of ridges and
prints of all ten fingers, which is the basis of furrows on the surface of the finger. The
identification systems still in use. British police uniqueness of a fingerprint can be determined by
official Sir Richard Edward Henry introduced the pattern of ridges and furrows as well as the
fingerprinting in the 1890s as a means of identifying criminals. Automatic
identification systems have been fingerprintbased
commercially available since the early 1960s. minutiae points. Minutiae points are local ridge
Until the 1990s these systems were used characteristics that occur at either a ridge
primarily by the police and in certain security bifurcation or a ridge ending.
applications.
WHAT IS FINGERPRINT SCANNING?
Personal Identification Numbers (PINs)
were one of the first methods used for There are basically two different types
identification. There are also methods that of finger-scanning technology that make this
involve passwords and physical tokens e.g. smart possible.One is an optical method, which starts
cards. There are a number of problems with a visual image of a finger.The other uses a
associated with this kind of identification. People semiconductor-generated electric field to image a
forget passwords, lose tokens, reuse passwords, finger. There are a range of ways to identify
write them down, tokens can get stolen. The fingerprints.Fingerprint matching techniques can
recognition of the above does not mean the be placed into two categories: minutae-based and
identification of the person providing it - they correlation based. Minutiae-based techniques
could be presented by anybody.. This results in a first find minutiae points and then map their
deluge of passwords and means of access, which relative placement on the finger. However,it is
are often forgotten, misused or lost. With the difficult to extract the minutiae points accurately
increased population accessing these networks when the fingerprint is of low quality. Also this
the risk of attacks on the networks is increased. method does not take into account the global
Companies are turning to Biometrics Systems to pattern of ridges and furrows. The
bring tighter security to their computer networks. correlationbased
method is able to overcome some of the
THE POPULAR BIOMETRIC difficulties of the minutiae-based approach. But
TECHNOLOGIES: correlation-based techniques require the precise
1. Finger recognition. location of a registration point and are affected
2. Hand geometry. by image translation and rotation.
3. Face recognition.
4. Voice recognition. FINGERPRINT CLASSIFICATION:
5. Iris recognition.
6. Signature recognition. Large volumes of fingerprints are
collected and stored everyday in a wide range of
FINGER RECOGNITION: applications including forensics, access control,
and driver license registration. An automatic
recognition of people based on fingerprints
requires that the input fingerprint be matched
with a large number of fingerprints in a database
(FBI database contains approximately 70 million

2
fingerprints!). To reduce the search time and other. Typical sources of images for use in facial
computational complexity, it is desirable to recognition include video camera signals and
classify these fingerprints in an accurate and pre-existing photos such as those in driver's
consistent manner so that the input fingerprint is license databases.
required to be matched only with a subset of the
fingerprints in the database HOW DOES FACIAL RECOGNITION
The algorithms are developed to WORKS?
classify fingerprints into five classes, namely,
whorl, right loop, left loop, arch, and tented arch.
The algorithm separates the number of ridges
present in four directions (0 degree, 45 degree,
90 degree, and 135 degree) by filtering the
central part of a fingerprint.
The classifier is tested on 4,000 images
in the database. . For the four-class problem
(arch and tented arch combined into one class),
we are able to achieve a classification accuracy Faces are highly complex patterns that
of 94.8%. often differ in only subtle ways, and that it can
be impossible for man or machine to match
ACCURACY AND INTEGRITY: images when there are differences in lighting,
Someone may attempt to use latent print camera, or camera angle, let alone changes in the
residue on the sensor just after a legitimate user appearance of the face itself.
accesses the system. At the other end of the Not surprisingly, government studies of
scale, there is the gruesome possibility of facerecognition
presenting a finger to the system that is no longer software have found high rates of
connected to its owner. Therefore, sensors both "false positives" (wrongly matching
attempt to determine whether a finger is live, and innocent people with photos in the database) and
not made of latex (or worse). Detectors for "false negatives" (not catching people even when
temperature, blood-oxygen level, pulse, blood their photo is in the database). One problem is
flow, humidity, or skin conductivity would be that unlike our fingerprints or irises, our faces do
integrated. not stay the same over time. These systems are
easily tripped up by changes in hairstyle, facial
FACE RECOGNITION: hair, or body weight, by simple disguises, and by
the effects of aging. In addition, questions have
been raised about how well the software works on
darkskinned people, whose features may not appear
clearly on lenses optimized for
lightskinnedpeople.
It would work especially poorly in the
frenetic environment of an airport, where
fastmoving crowds and busy background images
would further reduce its already limited
effectiveness.

HAND GEOMETRY:

FACIAL RECOGNITION TECHNOLOGY:

Facial recognition systems are built on


computer programs that analyze images of
human faces for the purpose of identifying them.
The programs take a facial image, measure
characteristics such as the distance between the
eyes, the length of the nose, and the angle of the
jaw, and create a unique file called a "template."
Using templates, the software then compares that
image with another image and produces a score
that measures how similar the images are to each

3
HOW IT WORKS ? dark pupil of the eye.
The iris-scan process begins with a
Every hand is unique. Hand geometry photograph. A specialized camera, typically very
scanners such as those made by Recognition close to the subject, no more than three feet, uses
Systems Inc. take over 90 measure- ments of the an infrared imager to illuminate the eye and
length, width, thickness, and surface area of the capture a very high-resolution photograph. This
hand and four fingers--all in just 1 second. process takes only one to two seconds and
provides the details of the iris that are mapped,
The technology uses a 32,000-pixel CCD digital recorded and stored for future
camera to record the hand's three-dimensional matching/verification.
shape from silhouetted images projected within Eyeglasses and contact lenses present
the scanner. The scanner disregards surface no problems to the quality of the image and the
details, such as fingerprints, lines, scars, and dirt, iris-scan systems test for a live eye by checking
as well as fingernails, which may grow or be cut for the normal continuous fluctuation in pupil
from day to day. size.
When a person uses the scanner, it The inner edge of the iris is located by
compares the shape of the user's hand to a an iris-scan algorithm which maps the iris’
template recorded during an enrollment session. distinct patterns and characteristics. Algorithms
If the template and the hand match, the scanner have a number of steps and are used by the
produces an output--it may unlock a door, biometric system to determine if a biometric
transmit data to a computer, verify identification, sample and record is a match.
or log the person's arrival or departure time. Iris’ are composed before birth and,
To register in a hand-scan system a except in the event of an injury to the eyeball,
hand is placed on a reader’s covered flat surface. remain unchanged throughout an individual’s
This placement is positioned by five guides or lifetime. Iris patterns are extremely complex,
pins that correctly situate the hand for the carry an astonishing amount of information and
cameras. A succession of cameras captures 3-D have over 200 unique spots. The fact that an
pictures of the sides and back of the hand. The individual’s right and left eyes are different and
attainment of the hand-scan is a fast and simple that patterns are easy to capture, establishes
process. The hand-scan device can process the 3D irisscan
images in 5 seconds or less and the hand technology as one of the biometrics that is
verification usually takes less than 1 second. The very resistant to false matching and fraud.
image capturing and verification software and The false acceptance rate for iris
hardware can easily be integrated within recognition systems is 1 in 1.2 million,
standalone units. Hand-scan applications that statistically better than the average fingerprint
include a large number of access points and users recognition system. The real benefit is in the
can be centrally administered, eliminating the false-rejection rate, a measure of authenticated
need for individuals to register on each device. users who are rejected. Fingerprint scanners have
a 3 percent false-rejection rate, whereas iris
scanning systems boast ratees at the 0 percent
level. A highly accurate technology such as
IRIS RECOGNITION: iris-scan has vast appeal because the inherent
argument for any biometric is, of course,
increased security. Iris scan biometrics employs the
unique characteristics and features of the human
iris in order to verify the identity of an individual

VOICE RECOGNITION:

In comparing voice to other forms of


biometrics, the frequency locations
Colored circle, usually brown or blue, rings the plotted on the voice

4
print table are proportionate to the physical
locations of minutiae used in fingerprint SIGNATURE RECOGNITION:
identification. The minutiae are the endpoints
and bifurcations of the swirls of your fingerprint.
The advantage of using speech is that the number
of locations is almost endless. The capacity to
extend data collection over multiple words for
even better accuracy is a distinct advantage over
image-based techniques such as fingerprints and
retina scans where only a finite amount of
biometric data is available. Although it is
virtually impossible for an impostor to copy
someone's voice, it is also very difficult for
someone to repeat exactly the phrase originally
Signature verification is the process
enrolled. This is very similar to the fact it is
used to recognize an individual’s hand-written
difficult to reproduce the exact version of your
signature.
signature on your credit card.
There are two types of signature
Voice biometrics works by digitizing a
recognition techniques: simple and
profile of a person's speech to produce a stored
dynamic.There is an important distinction
model voice print, rather like a template, which
between simple signature comparisons and
is referred to each time that person attempts to
dynamic signature verification. Both can be
access secure data. The position and movement
computerized, but a simple comparison only
of the glottal tissues, lips, jaw and tongue
takes into account what the signature looks like.
correspond with speech movements in the vocal
Dynamic signature verification takes into
tract. Biometrics technology reduces each
account how the signature was made. With
spoken word into segments: sub-word like
dynamic signature verification it is not the
syllables, phonemes, trip hones or similar units
of sound, composed of several dominant
for biometric identification.
frequencies called formants, which remain
or look of the signature that is meaningful, it is
relatively constant over that segment. Each
the changes in speed, pressure and timing that
segment has three or four dominant tones that
occur during the act of signing.
dynamic signature verification it is not the
There will always be slight variations in a
shapeshape
person’s handwritten signature, but the
or look of the signature that is meaningful, it is
consistency created by natural motion and
the changes in speed, pressure and timing that
practice over time creates a recognizable pattern
occur during the act of signing.
that makes the handwritten signature a natural
There will always be slight variations in a
person’s handwritten signature, but the
PROPERTIES:
consistency created by natural motion and
practice over time creates a recognizable pattern
that makes the handwritten signature a natural
can be captured in digital form and plotted on a
table or spectrum. This table of tones yields the
speaker's unique voice print.
The voice print is stored as a table of
numbers, where the presence of each dominant
frequency in each segment is expressed as a
binary entry. Since all table entries are either 1 or
0, each column can be read bottom to top as a
long binary code. When a person speaks his or
her passphrase, the code word or words are
extracted and compared to the stored model for
that person. When authenticating, a user is asked to
answer up to three prompted questions, the
answers to which are easily remembered by the
user. In order to provide audible content of at
least one second in length, typical prompts are:
User's first, middle and last name .User's date
and month of birth Mother's first, middle and last
maiden name .Home telephone number

5
APPLICATIONS: • Telephone transaction
• Public identity cards
• Large volumes of fingerprints are
collected and stored everyday in a wide
range of applications DRAWBACKS OF BIOMETRICS:
including forensics, access control, and driver
license registration. Several countries, including Australia, Canada, the
• Geometry scanners verify identity at the United States and New Zealand, have witnessed
front entrances of over half the nuclear public disquiet over identification schemes. Some
power plants in of the fears that have been cited include, that
the U.S. people will be de-humanized by being reduced to
• Employers use hand-scan for entry/exit, codes.
recording staff movement and
time/attendance CONCLUSION:
procedures.
• Iris-scan technology has been piloted in So where security is highly required,
ATM environments in England, the US, implementation of biometrics security is a very
Japan and Germany since as early as 1997. good solution s there is to fear of stealing or
• Airports have begun to use iris-scanning forgetting the password. Tomorrow will find ever-
for such diverse functions as employee expanding applications for this thoroughly time-
identification/verification for movement through tested technology for financial transactions, ticket-
secure areas and allowing registered frequent less travel, and new business
airline passengers a system that enables fast and and residential applications where high security is a
easy identity verification in order to expedite their major concern.
path through passport control.
• Prison visitor systems, where visitors to
inmates are subject to verification
procedures in order that
identities may not be swapped during the visit - a
familiar occurrence among prisons worldwide.

• Border control. A notable example being


the INSPASS trial in America where
travelers were
issued with a card enabling them to use the
strategically based biometric terminals and bypass
long immigration queues. There are other pilot
systems operating in SE Asia and elsewhere in this
respect.
Other applications include monitoring prison
transfers and releases, as well as projects designed
to authenticate on-line purchasing, on-line banking,
on-line voting on-line stock trading ,gold and
diamond mines to name just a few. Iris-scan offers
a high level of user security, privacy and general
peace of mind for the consumer.

FUTURE APPLICATIONS -SOME COMMON


IDEAS:

There are many views concerning potential


biometric applications, some popular examples
being;
• ATM machine use
• Workstation and network access
• Travel and tourism
• Internet transactions

6
7

Vous aimerez peut-être aussi