Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
ABSTRACT ON BIOMETRICS
H OM OM E
J NT NTU ZO ZON E
AMAZING ARTICLES
M OB OB IL IL E AN D I NT NT RE RE NE NE T T IP IP S TECH TASKS
ART OF LIVING
AB ST ST RA RAC TS TS WI WI TH TH F UL UL L PA PE PE RS RS
P C P ER ER FO FO RM RM AN AN CE CE TI TI PS PS
I IT IT VI VI DE DE O LE CT CTU RE RE S
M S OF FI FI CE CE 20 20 10 10 TI TI PS PS
PRIVACY POLICY
SEARCH THIS BLOG
A b s t r a c t o n B I OM O M E T R I CS CS MONDAY, MAY 30, 2011 | TAGS: ABSTRACT TAGS: ABSTRACT OF IT BRANCH IN IEEE F ORMAT ORMAT,, IEEE ABSTRACTS WITH FULL PAPERS DIGG IT | STUMBLE IT | SAVE TO DEL.ICO.US
B I O M ET ET RI R I CS
SUBSCRIBE TO E-MAIL ALERTS ENTER YOUR EMAIL ADDRESS:
Abstract Over the last few years a new area of engineering science has been established whose products are likely to create a large market in the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his/h his/her er ''bio ''biologi logical' cal''' chara characterist cteristics: ics: voice, dynamics of movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different charac cha racteri teristic stics s whi which ch ma may y var vary y from one pers person on to an anoth other. er. Thi This s property is made use of by Biometric technology to distinctly identify each person Biometric Biome tric system is essentially essentially a pattern recognition recognition system which recog rec ogni nize zes s a us user er by det determ ermin inin ing g the au authe thent ntic icity ity of a sp spec ecifi ific c physio phys iolo logic gical al or beha behavio vioral ral cha charac racteri teristi stic c pos posses sessed sed by the use user. r. Several important issues must be considered in designing a practical biometric system. First, a user must be enrolled in the system so that his bio biomet metric ric tem templa plate te can be cap capture tured. d. Thi This s tem templa plate te is sec securel urely y stored in a central central database database or a smart card issued issued to the user. The POPULAR POSTS
templa tem plate te is ret retri rieve eved d wh when en an in indi divi vidu dual al ne needs eds to be id iden enti tifie fied. d. Depending on the context, a biometric system can operate either in a
HOW TO COMBINE ALL .VCF FILES TO SINGLE .VCF FILE MANUALLY
verification (authentication) or an identification mode. Biometrics refers to the automatic identification of a person based on his/her his/h er physi physiolo ological gical or behav behavioral ioral characteristics characteristics.. This method of identi ide ntific ficati ation on offe offers rs sev severa erall adv advant antage ages s ove overr trad traditi ition onal al met method hods s
1
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
involving ID cards (tokens) or PIN numbers (passwords) for various
NOKIA SECURITY CODES LIST & NOKIA EMERGENCY BATTERY
reasons: (i) the person to be identified is required to be physically
BACKUP CODE
present at the point-of-identification; (ii) identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased integration of computers and
ABSTRACTS AND FULL PAPERS ON ELECTRICAL,ELECTRONICS,COMPUTERS,INSTRUME BRANCHES
Internet into our everyday lives, it is necessary to protect sensitive
ABSTRACT AND FULL PAPER ON RENEWABLE ENERGY RESOURCES
and personal data. By replacing PINs (or using biometrics in addition to PINs), biometric techniques can potentially prevent unauthorized
JNTU KAKINADA B.TECH R10 SEM-1
access to ATMs, cellular phones, laptops, and computer networks.
MID2 ONLINE BITS OF
Unlike biometric traits, PINs or passwords may be forgotten, and tokens like passports and driver's licenses may be forged, stolen, or
ECE,EEE,CSE,IT,MECH BRANCHES; JNTU KAKINADA B.TECH 1-1 MID-2 ONLINE BITS
lost. This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the uses, benefits, drawbacks, and applications. Introduction: The first modern biometric device was introduced on a commercial basis over 25 years ago when a machine that measured finger length was installed for a time keeping application at Shearson Hamil on Wall Street. In the ensuing years, hundreds of these hand geometry devices were installed at high security facilities operated by Western Electric, Naval Intelligence, the Department of Energy, and the like. There are now over 20,000 computer rooms, vaults, research labs, day care centers, blood banks, ATMs and military installations to which access is controlled using devices that scan an individual's unique physiological or behavioral characteristics. Reduced prices have lead to increased awareness of biometric technologies; this coupled with lower overall prices will certainly bode well for this industry as we move through the new millennium. Biometrics: The term biometrics refers to the emerging field of technology devoted to the identification of individuals using biological traits or behaviors. In practice, this means capturing an image of a unique feature of an individual such as a fingerprint, hand, eye or face, and comparing it with a template captured previously. For ease of explanation this has been over-simplified, but in essence this is how biometric technology works.
The statistical use of the characteristic variations in unique elements of living organisms is known as biometrics. W h y w e n e e d b i o m e t r i c s? In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M’s, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face.
FOLLOWERS
with Google Friend Connect
Members (125) More »
Already a member? Sign in
B i o m e t r i c s- w h a t i s i t ? Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving password’s and PIN numbers for various reasons: (i) The person to be identified is required to be physically present at the point of identification.
2
9
16/01/2013 10 45
Abstract on BIOMETRICS
(ii)
(iii)
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
Identification based on biometric techniques obviates the need to remember a password or carry a token. By replacing PIN’s, biometric techniques can potentially prevent unauthorized access to or fraudulent use of A.T.M‘s, Smart cards, computer networks. PIN‘s passwords may be forgotten, and token based methods of identification like passwords and driver’s licenses may be forged, stolen or lost. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.
D e si g n i s s u e s o f b i o m e t r i c s y s t e m s : An important issue in designing a practical system is to determine how an individual is identified and are designed by keeping two characteristics in mind, they are: Physical characteristics -Fingerprint, Handprint -Face -Scent, -Thermalimage - Iris Pattern P er s o n a l t r a i t s -Voice pattern - Handwriting - Acoustic Signature
Depending on the context a biometric system can be either a verification(authentication) system or an identification system V e r i f ic a t i o n V s I d e n t i f i c a t i o n : There are two different ways to resolve a person’s identity: verification and identification. Verification (Am I whom I claim I am?) involves confirming are denying a person’s claimed identity. In identification, one has to establish a person’s identity (Who am I?). Each one of these approaches has its own complexities and could probably be solved best by a certain biometric system.
Ty p e s o f b i o m e t r i c d e v i c e s a n d t h e i r s e r v i c e s: Now let’s see some of the biometric devices being widely used in many areas like computer/network security, government organizations, prisons…. They are: F Fingerprint identification. F Face recognition. F Iris recognition. F Hand geometry. F Signature recognition. F Retinal scanning F Voice verification…. And now let’s see some of these biometric devices, their services, advantages and disadvantages in detail. Fi n g e r p r i n t r e c o g n i t i o n : Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted
3
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
biometric among the technology being used today. Fingerprints contain patterns of ridges and valleys as well as minutiae points. Minutiae points are local ridge characteristics that occur at either the ridge bifurcation or a ridge ending. There are three methods for scanning finger prints: (1) Optical scanners, (2) Thermal scanners and (3) Capacitance (solid state) scanners Currently, there are two accepted methods for extracting the fingerprint data (I) Minutia-based and (II) Correlation-based “Minutia-based is the more microscopic of the two. This method locates the ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file. The correlation-based method looks at the entire pattern of ridges and valleys in the fingerprint. The location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints.” Once the scanning is complete, the analysis is done by a comparison of several features of the fingerprint know as minutia. Investigators are systems look at where the ridge lines end or where one ridge splits into two (bifurcation). The scanning system uses complicated algorithms to recognize and analyze the minutia. If two prints have three ridge endings, two bifurcations, and form the same shape with the same dimensions, then it is likely the same person’s fingerprints. Advantages: · High accuracy rate. · Can perform 1-to-many comparisons. · Inexpensive equipment. · Easy to use (samples are easy to capture and maintain). · Most established and oldest of the biometric technology.
Disadvantages: · Actual finger scan images cannot be recreated from a template image · Users relate fingerprint recognition to criminal activity. F a ce ( o r F a c i a l ) r e c o g n i t i o n : Face recognition is one of the newer biometrics technologies. The technology analyzes facial characteristics and attempts to match it to database of digitized pictures. This technology is relatively new and has only been commercially available since the 1990’s. Face recognition has received a surge of attention since of disaster of 11/9 for its ability to identify known terrorists and criminals. Face recognition uses distinctive features of the f ace –including the upper outlines of the eye socket, the areas surrounding the cheekbones, the sides of the mouth, and the location of the nose and ears – to perform verification and identification. The first step in the face recognition is to obtain an image of an individual and store it in a database for later use. Usually, several pictures (or video images) at different angles are taken. Individuals may also be asked to make different facial expressions for the data base. Next, the images are analyzed and extracted to create a template. The last step is to verify the individual’s identity by matching images to those images that been stored in database. There are four main methods being used for facial recognition: E i g e n f a c e s : a tool developed by MIT that extracts · characteristics through the use of two-dimensional grayscale imagery. F ea t u r e A n a l y s is ( a l so k n o w n a s L o ca l F ea t u r e A n a l y si s · ( L F A ) ) : is the most widely used technique because of its ability to accommodate for facial changes and aspect. LFA uses an algorithm to create a face print (84 bytes in size) for comparison.
4
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
·
N e u r al n e t w o r k : a method that extracts features from the face and create a template of contrasting elements that is then matched to a template in database. · A u t o m a t e d F ac e P r o c e s si n g ( A FP ) : a technique that looks for distances and ratios between certain facial features, and is more ideal for poorly lit areas.
Advantages: · High accuracy rate. · Can be performed from a distance. · Accepted by most users. · Non-intrusive. · Hands-free. Disadvantages: · Cannot not always account for the effects of aging. · Sensitive to lighting conditions. · Can perform limited 1-to-many comparisons.
I ris recognition: No two irises are alike, not even in one individual or in identical twins. The iris consists of over 400 distinguished characteristics. Compared to the 40 or 50 points of distinct fingerprint characteristics, the iris has more than 250 distinct features. Therefore, iris scanning is much more accurate than fingerprints or even DNA analysis of the distinguishing features. Iris scanning is executed by scanning the measures of the colored circle that
surrounds the pupil. With video technology, a camera scans the iris pattern, which consists of corona, pits, filaments, crypts, striations, and radial furrows (page). The system software then digitizes the unique information of the iris and stores it for authentication at a later time. Iris scanning is easy, accurate, and convenient. One significant downfall of Iris recognition is the initial startup costs as they are extremely high. In identifying one’s Iris, there are two types of methods that are used by Iris identification systems, passive and active. The active Iris system method requires that a user be anywhere from six to 14 inches away from the camera. It also requires the user to move back and forth so that the camera can adjust and focus in on the user’s iris. The passive system allows the user to be anywhere from one to three feet away from the camera(s) that locate and focus in on the iris. This technology’s main uses are for authentication, identification, and verification of an individual. Advantages: · High accuracy rate · Imitation is almost impossible Disadvantages: · perceived to be intrusive and invasive · Can be done from a short distance · optical r eaders are difficult to operate r equiring advanced training for employees H a n d g eo m e t r y : Hand geometry is concerned with measuring the physical characteristics of the user’s hand and fingers and it is believed to be
5
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
sufficiently unique for use as a means of biometric authentication. The technology records various dimensions of the human hand, it is relatively easy to use, and offers a good balance of performance characteristics. Reader configurations vary among a softball-shaped device which the subject grabs in his hand and a flat plate which the subject places his/her hand, a bar which the subject grabs as if opening a door, and a flat plate which the subject places his/her hand on.
Hand geometry readers are developed in a wide range of scenarios, including time and attendance recording where they have proved extremely popular. The methodology may be suitable where there is a large user base or there are users who access the system infrequently. Accuracy can be very high if desired. Hand geometry readers are relatively large and expensive but the ease of integration into other systems and processes, small template size (only 9 bytes for pure hand geometry template) and ease of use makes it a good choice for many projects. H a n d g e o m e t r y V s Fi n g e r p r i n t s : Unlike fingerprints the human hand isn’t unique. One can use finger length, thickness and curvature for the purposes of verification but not for identification. For some kinds of access control like immigration and border control, invasive biometrics (e.g., fingerprints) may not be desirable as they infringe on privacy. In such situations it is desirable to have a biometric system that is sufficient for verification. As hand geometry is not distinctive, it is idle choice. Further more, hand geometry data is easier to collect. With fingerprint collection good frictional skin is required by imaging systems, and with retina-based recognition systems, special lighting is necessary. Additionally, hand geometry can be easily combined with other biometrics, namely fingerprint. One can envision a system where fingerprints are used for (in frequent) identification and hand geometry is used for (frequent) verification. Application Areas: The uses for biometric security are varied and growing. It was developed in response to a need to associate human action with identity – whether conducting a transaction, accessing a computer or a critical information system, or entering secure physical area. Some of the existing and proposed applications in general we use are described below: Co m p u t e r / N e t w o r k se cu r i t y : Many stand-alone and network computer systems carry valuable and sensitive information. Controlling access to these systems is another major use of biometric authentication systems. I n t e r n e t t r a n s ac t i o n s : Due to growing security requirements that results from the boom in e-commerce, many think of on-line transactions as being an obvious area for biometrics. The biometric authentication generates a greater degree of vendor confidence because he knows that person that the person at the terminal is he who he claims to be. P h y s i c a l a r e a se c u r i t y : Military, Government, and Commercial installations have sufficiently strong confidentiality concerns. The biometric identifiers play a major role in controlling physical access to t hese installations. Banking: Many leading banks have been experimenting with biometrics for ATM use as a means of combating card fraud. Beginning 2002, some companies will being issuing smart credits cards, with customer’s fingerprint information embedded. Voting: A logical use of biometrics is in voting process where eligible politicians
6
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
are required to verify their identity. This is intended to stop “proxy” voting. Prisons: An interesting use of biometrics is in prisons where the visitors to a prisoner are subjected to verification procedures in order that identities may not be swapped during the visit. L ea d in g p r o d u c t s i n b i o m e t r i c s: Biometric is a new but promising technology and therefore a number of companies have appeared in the market in a very short period of time. Some of those products are:
Conclusion: The advances in accuracy and usability and decreasing cost have made the biometric technology a secure, affordable and cost effective way of identifying individuals. Biometric parameters such as fingerprint scanning, iris scanning, retinal scanning, hand geometry, signature verification, voice verification and others are all well established with their own particular characteristics. The limiting factors of speed and band width are now a thing of the past and their practical performance might in many instances be better than expected. Today, it is an efficient and effective method of replacing passwords, tokens and smart cards. It is important to recognize that although biometric authentication has served extensively in high security applications in defense industry, it is still fledgling technology in commercial world, both in terms of its technical sophistication and current extent of deployment. There are no established standards for biometric system architecture, for template formation, or even for biometric reader testing. It is also not clear as which technology or technologies will dominate the customer market. In the absence of standards and direction, the rapid and wide spread deployment of biometric authentication system could easily facilitate the problematic proliferation of authentication and tracking of the people. Link To This Page:
Related Posts : a b s t r a c t
o f I T b r a n c h i n i e e e f o r m a t , I E E E A B S TR A CT S
WI TH FULL PAPERS A b s t r a c t o n Z F S: T H E L A S T W O R D I N F I L E S Y ST E M A b s t r a c t o n B I O M ET R I C S – N O M O RE A FU T U R I S T I C W H I M A b s t r a c t o n I n t e l l i g e n c e I n s i d e - E m b e d d e d Sy s t e m Abstracts and full papers on e l e ct r i c a l , el e c t r o n i c s ,c o m p u t e r s ,i n s t r u m e n t a t i o n b r a n c h e s A b s t r a c t a n d f u l l p a p e r o n T h e U l t r a Ca n e ( A N I N T E LL I G EN T T O OL F OR B L I N D W I T H A I T E CH N I Q U ES ) Abstract and full paper on Compact Fluorescent Lamps (CFL’s)—The future of lighting A b s t r a c t a n d F u l l p a p e r o n M U T U A L L Y I M M E RS I V E A U D I O TELEPRECENSE (ARTI FICI AL I NTELLI GENCE) Abstract and full paper on RENEWABLE ENERGY RESOURCES A b s t r a c t a n d f u l l p a p e r o n G E N D ER R EC OG N I T I O N A b s t r a c t a n d f u l l p a p e r o n I N F RA R ED P L A ST I C SO L A R C EL L zigbee technology abstract A b s t r a c t a n d F u l l p a p e r o n E L E CT R I C P U L SE M A G N ET I C B RA K I N G USIN G MECHATRONICS
7
9
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
A b s t r a c t o n F i n i t e E l e m e n t A n a l y s i s o f A U T O M OB I L E S U SP EN S I O N SYSTEM Abst ract and f ull p aper on OCEAN THERMAL ENERGY CONVERSION A b s t r a c t o n O n l i n e B an k i n g S ec u r i t y Abstract on Web- based Medical Data Archive System A b s t r a c t o n w e b T e ch n o l o g i e s A b s t r a c t o n P RE D I C T I N G E A R T H QU A K E T H RO U GH D A T A M I N I N G Abst ract o n DNA: THE FUTURE OF COMPUTI NG A b s t r a c t o n B I O M E T RI CS R e l a t e d P o s t s W i d g e t [ ?]
Link To Home Page:
h i f r i e n d s ! !J u s t s u b s c r i b e h e r e t o g e t a l l u p d a t e s l ik e "e-books,ppt's,online bits,New Mp3songs..etc".Everything d i r e c t ly t o u r E -m a i l w i t h f r e e o f c o s t ! ! A lr e a d y h a v e e n t e r e d t h e i r e - m a i l id s . D o n ' t f o r g et t o c lic k o n t h e c o n fi r m a t i o n l in k s e n t i n y o u r I n b o x / S p a m fo l d e r o f E m a i l
Yo u m i g h t a l s o l i k e :
Abstract on BIOMETRICS –NO MORE A FUTURISTIC WHIM
Abstract and full paper on Artificial Intelligence For ...
Abstract and full paper on EXPERIMENTAL INVESTIGATION ON ...
Abstract and full paper on ARTIFICIAL HEART LinkWithin
1 R e s p o n s e t o " Ab s t r a c t o n B I OM E TR I C S"
T im e a n d A t t e n d a n c e S o lu t i o n s S a yPso:s t e d o n
Novembe r 15, 2011 at 10:53 P M
Biometric Identification today is more and more an essential part of access control its safe and secure and very easy to use and even without using any password or secret codes.
P o s t a Co m m e n t
Comment as:
Ne we r Po st
8
9
Old e r Po st
16/01/2013 10 45
Abstract on BIOMETRICS
http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
A b s t r a c t o n B I O M E T R I CS
We b si te Designed & Maintained by " A A R Y AN A D I T Y A & P R A K A S H "© Copyrights reserved 2012 | Entries (RSS) an d | D M C A P O L I C Y an d | P r i v a c y P o l i cy an d | D I S C L A I M E R
9
9
16/01/2013 10 45