SlideShare a Scribd company logo
Dr. N.G.P. Institute of Technology
Department of Biomedical Engineering
22OBM103 – Biometrics and its Application
Dr. R. Mothi
Assistant Professor
Department of Biomedical Engineering
Biometrics?
Life Measurement
Biometrics?
Unique
Characteristics
Biometrics?
• Biometrics measures the unique physical and behavioral characteristics of a living
creature.
• Recognizing a person based on a physiological or behavioral characteristics.
Life Measurement
Biometrics?
The physical attributes such as finger prints,
color of iris, color of hair, hand geometry, and
behavioral characteristics such as tone and
accent of speech, signature, or the way of typing
keys of computer keyboard etc., make a person
stand separate from the rest.
This uniqueness of a person is then used by the
biometric systems to
• Identify and verify a person.
• Authenticate a person to give appropriate
rights of system operations.
• Keep the system safe from unethical
handling.
Evolution of Biometric System
Time Period Biometric Technology Key Development Inventor(s) Origin Country
Late 19th Century Fingerprint Recognition
The concept of using
fingerprints as a unique
identifier for individuals.
Sir Francis Galton (First to
study fingerprint patterns)
United Kingdom
1892
Fingerprint Identification
System
The use of fingerprints for
criminal identification in
Argentina.
Juan Vucetich (Developed
fingerprint-based system for
police work)
Argentina
1890 Anthropometry (Bertillonage)
A system of identifying
criminals using physical
measurements.
Alphonse Bertillon France
1930s - 1940s Iris Recognition
Early experiments on using
the iris as a unique biometric
identifier.
Sir William Herschel (Initiated
iris studies for identification)
United Kingdom
1960s Facial Recognition
The development of early facial
recognition algorithms for
identity verification.
Woodrow W. Bledsoe, Helen
Chan Wolf
United States
1960s Voice Recognition
Early work in voice recognition
and speaker verification
systems.
Davis S. R. (Pioneering
research in voiceprints)
United States
1970s Retina Scanning
Exploration of retina scanning
as a biometric identifier.
Not attributed to a single
inventor
United States
1980s
Automated Fingerprint
Identification Systems (AFIS)
Introduction of digital
fingerprint matching systems
for law enforcement.
Various researchers (including
W. B. Scharf and others for
AFIS development)
United States
1990s Iris and Retinal Scanning
Advancements in iris and
retinal scanning systems for
secure identification.
John Daugman (Iris
recognition algorithm)
United Kingdom
1990s
Facial Recognition
(Algorithms)
The development of facial
recognition algorithms for
practical use.
F. M. Bonneau, S. B. Kang
United States / United
Kingdom
2000s
Fingerprint Scanning in
Mobile Devices
Integration of fingerprint
scanning for mobile devices
like smartphones.
Apple Inc. (Pioneered
fingerprint sensor in mobile
devices)
United States
2000s
Voice Recognition in
Consumer Devices
Widespread use of voice
recognition for consumer
applications.
Various developers (e.g.,
Amazon and Google for voice
assistants)
United States
2010s
Facial Recognition in
Smartphones
Launch of Face ID and
adoption of facial recognition
technology in smartphones.
Apple Inc. (Developed Face ID
for iPhone)
United States
2010s
Multi-modal Biometric
Systems
The combination of multiple
biometric technologies, such
as fingerprints and facial
recognition, for enhanced
security.
Various research teams Global (Various countries)
2020s Behavioral Biometrics
Development of behavioral
biometrics, including the
analysis of typing patterns
and user behavior.
Various researchers
United States / United
Kingdom
2020s Liveness Detection
Use of advanced techniques in
liveness detection to prevent
spoofing in biometric systems.
Various developers (e.g., IDEX
Biometrics for anti-spoofing
technology)
Global (Various countries)
Evolution of Biometric System
Time Period Biometric Technology Key Development Inventor(s) Origin Country
Why Biometrics is Required?
Biometrics is used for authenticating and authorizing a
person.
Authentication (Identification)
• This process tries to find out
answer of question, “Are you the
same who you are claiming to
be?”, or, “Do I know you?” This
is one-to-many matching and
comparison of a person’s
biometrics with the whole
database.
Verification
• This is the one-to-one process
of matching where live sample
entered by the candidate is
compared with a previously
stored template in the
database.
Authorization
It is the process of
assigning access rights
to the authenticated or
verified users.
Shortcoming of Conventional Aids?
• They all mean recognizing some code associated with
the person rather than recognizing the person who
actually produced it.
• They can be forgotten, lost, or stolen.
• They can be bypassed or easily compromised.
• They are not precise.
The security of the system is threatened.
When the systems need high level of reliable protection,
biometrics comes to help by binding the identity more
oriented to individual.
Biometric System
Sensors
Converts human biological data
into digital form.
• A Metal Oxide Semiconductor
(CMOS) imager or a Charge
Coupled Device (CCD) in the
case of face recognition,
handprint recognition, or
iris/retinal recognition
systems.
• An optical sensor in case of
fingerprint systems.
• A microphone in case of voice
recognition systems.
Processing Unit
Microprocessor, Digital Signal
Processor (DSP), or computer
that processes the data
captured from the sensors
• Sample image enhancement
• Sample image normalization
• Feature extraction
• Comparison of the biometric
sample with all stored
samples in database.
Database Store
The database stores the enrolled
sample, which is recalled to
perform a match at the time of
authentication. For identification,
there can be any memory from
Random Access Memory (RAM),
flash EPROM, or a data server.
Output Interface
The output interface communicates
the decision of the biometric system
to enable the access to the user.
Working of Biometric System
1. Acquire live sample from candidate.
(using sensors)
2. Extract prominent features from
sample. (using processing unit)
3. Compare live sample with samples
stored in database. (using
algorithms)
4. Present the decision. (Accept or
reject the candidate.)
Two Modes of Operation
Identification – One to Many Comparison of the captured biometric against a biometric
database in attempt to identify an unknown individual.
Verification – One to One Comparison of a captured biometric with a stored template to verify
that the individual is who he claims to be.
Types of Biometric Modalities
Biometric Modality Person’s Biological Traits
• This modality pertains to the shape and size of the
body.
Physiological
• This modality is related to change in human
behavior over time.
Behavioural
• This modality includes both traits, where the traits
are depending upon physical as well as behavioral
changes.
Combination of
physiological and
behavioral modality
Laws of Biometrics
Three Laws
Physiological
Modality
Behavioural
Modality
Fingerprint Biometrics
There are three basic patterns of ridges namely,
arch, loop, and whorl. The uniqueness of
fingerprint is determined by these features as well
as minutiae features such as bifurcation and
spots (ridge endings)
Minutiae Based Techniques − In these minutiae
points are found and then mapped to their relative
position on finger. There are some difficulties such as if
image is of low quality, then it is difficult to find
minutiae points correctly. Another difficulty is, it
considers local position of ridges and furrows; not
global.
Correlation Based Method − It uses richer gray scale
information. It overcomes problems of minutiae-based
method, by being able to work with bad quality data.
Pattern Based (Image Based) Matching − Pattern
based algorithms compare the basic fingerprint
patterns (arch, whorl, and loop) between a stored
template and a candidate fingerprint.
Fingerprint Biometrics – Unit 2
• Finger print using vein pattern of
palm
• Fingerprint Biometrics
• Fingerprint recognition system
• minutiae extraction
• advantage and disadvantages of
fingerprint biometrics.
Facial Recognition
• Facial recognition is based on determining shape and size of jaw, chin, shape and location
of the eyes, eyebrows, nose, lips, and cheekbones.
• 2D facial scanners start reading face geometry and recording it on the grid.
• Facial geometry is transferred to the database in terms of points.
• The comparison algorithms perform face matching and come up with the results.
Steps Involved in Facial Recognition
Facial recognition is performed in the following ways:
• Facial Metrics − In this type, the distances between pupils or from nose to lip or chin are
measured.
• Eigen faces − It is the process of analyzing the overall face image as a weighted combination
of a number of faces.
• Skin Texture Analysis − The unique lines, patterns, and spots apparent in a person’s skin
are located.
Facial Recognition – Unit 3
• Background of face recognition
• Design of face recognition
system
• Neural network for face
recognition
• Face detection in video
sequences
• Face recognition methods.
Iris Recognition is a biometric technology that uses the unique patterns in the colored part of the
eye (the iris) to identify or verify individuals. The iris, located around the pupil, has intricate and
distinctive features that remain stable throughout a person's lifetime, making it an excellent trait
for biometric identification.
Key Features of Iris Recognition:
•Uniqueness: The iris patterns are unique to each individual, even between identical twins, and
are highly stable over time.
•Stability: Unlike fingerprints or facial features, the iris does not change significantly over a
person's lifetime.
•Accuracy: Iris recognition systems are considered one of the most accurate biometric
technologies, with a low False Acceptance Rate (FAR) and False Rejection Rate (FRR).
IRIS Recognition
IRIS Recognition Hand Geometry Recognition
IRIS RECOGNITION & HAND GEOMETRY – Unit 4
Design of iris recognition system – iris segmentation method – application of iris
biometrics – basics of hand geometry – image capturing, hand segmentation, feature
extraction
https://youtu.be/F820W0_PBwo?si=pW284J9lZ-8a5vrC
Multimodal Biometrics
Multimodal Biometrics refers to the use of multiple biometric traits or modalities (such as
fingerprints, facial recognition, iris patterns, voice, etc.) for identification or authentication.
Instead of relying on a single biometric trait, a multimodal system combines two or more
biometrics to enhance accuracy, security, and reliability.
Fusion in Multimodal
Biometrics refers to the
process of combining data or
results from multiple biometric
modalities (such as
fingerprints, facial recognition,
iris, voice, etc.).
Unit -5
22OBM103 – BIOMETRICS AND ITS APPLICATIONS
UNIT I BIOMETRICS SYSTEM 9
History of Biometrics – Types of Biometric Traits – General Architecture
of Biometric Systems – Basic working of Biometric matching – Biometric
system error and performance measure.
UNIT II FINGERPRINT BIOMETRICS 9
Finger print using vein pattern of palm – Fingerprint Biometrics –
Fingerprint recognition system – minutiae extraction – advantage and
disadvantages of fingerprint biometrics.
UNIT III FACE RECOGNITION 9
Background of face recognition – design of face recognition system -
neural network for face recognition – face detection in video sequences –
face recognition methods.
UNIT IV IRIS RECOGNITION & HAND GEOMETRY 9
Design of iris recognition system – iris segmentation method –
application of iris biometrics – basics of hand geometry – image
capturing, hand segmentation, feature extraction.
UNIT V
MULTIMODAL BIOMETRICS & BIOMETRIC
APPLICATIONS
9
Basic architecture of multimodal biometrics – multimodal biometrics
using face and ear – multimodal biometrics application – case study of
biometric application.
Total Hours 45
Course outcomes: At the end of the course, students will be able to
CO1: Demonstrate knowledge on biometric authentication system using
biometric applications.
CO2: Explain the fingerprint technology using fingerprint enhancement,
feature extraction, classification and matching technique used for criminal
application.
CO3: Design face recognition system using neural network, video
sequences used for various biometric applications
CO4: Describe about iris recognition and hand geometry using
segmentation and feature extraction
technique used for commercial application.
CO5: Identify issues in multimodal biometrics using face and ear used for
biometric application.
Biometrics and its applications for system Analysis

More Related Content

Similar to Biometrics and its applications for system Analysis (20)

PPT
Biometric Presentation
Anand Yadav
 
PPTX
Biometrics
Shivani Gautam
 
PPTX
Biometrics
Jeevjyot Singh Chhabda
 
PPTX
Bio shiv
Shivank Garg
 
PPTX
Biomatric
NA000000
 
PPT
A study on biometric authentication techniques
Subhash Basistha
 
PDF
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
PPT
Session -I.ppt Session -I.ppt Session -I.ppt
JeevithaRajeshkanna1
 
PPTX
Biometrics technology ravi kumar
Ravi Kumar
 
PPTX
Biometrics Technology
lole2
 
PPTX
Biometric authentication
mahtabrasheed195
 
PPSX
Biometrics Technology by Capt Awal
Awal
 
PPTX
Biometrics
shweta-sharma99
 
PPTX
Biometrics
shweta-sharma99
 
PPTX
Biometrics
Sandeep Kamath
 
PPT
Biometric
Pratish Sardar
 
PPT
A86eseminar on biometrics
Chill Chaithanya
 
PPTX
Biometrics clear presentation by Adduri kalyan(AK)
kalyanAdduri
 
PPT
BIOMETRIC SOFTWARE FOR ATTENDANCE
Roy Awais
 
PPT
BIMETRIC ATTENDANCE SYSTEM
Roy Awais
 
Biometric Presentation
Anand Yadav
 
Biometrics
Shivani Gautam
 
Bio shiv
Shivank Garg
 
Biomatric
NA000000
 
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
Session -I.ppt Session -I.ppt Session -I.ppt
JeevithaRajeshkanna1
 
Biometrics technology ravi kumar
Ravi Kumar
 
Biometrics Technology
lole2
 
Biometric authentication
mahtabrasheed195
 
Biometrics Technology by Capt Awal
Awal
 
Biometrics
shweta-sharma99
 
Biometrics
shweta-sharma99
 
Biometrics
Sandeep Kamath
 
Biometric
Pratish Sardar
 
A86eseminar on biometrics
Chill Chaithanya
 
Biometrics clear presentation by Adduri kalyan(AK)
kalyanAdduri
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
Roy Awais
 
BIMETRIC ATTENDANCE SYSTEM
Roy Awais
 

More from ssuser1ecccc (20)

PPTX
Biometrics and its applications in Medical
ssuser1ecccc
 
PDF
DIP-Introduction Lecture 13-10-14 image analysis
ssuser1ecccc
 
PDF
Chap_9_Representation_and_Description.pdf
ssuser1ecccc
 
PPTX
Biometrics and its applications for system
ssuser1ecccc
 
PDF
Project formulation in image analysis in various methods
ssuser1ecccc
 
PPTX
2 R ladder architecture analysis for image
ssuser1ecccc
 
DOCX
Existing method used for analysis of images
ssuser1ecccc
 
DOCX
Histogram analysis of image using wavelet
ssuser1ecccc
 
DOCX
Structure_of_How_to_Write_a_Journal.docx
ssuser1ecccc
 
PPTX
pixelrelationships in image processing enhancement
ssuser1ecccc
 
PPTX
Knowledge representation and reasoning in AI
ssuser1ecccc
 
PPTX
Artificial Intelligence and Machine Learning
ssuser1ecccc
 
PPTX
Intro class. U1 M1.pptx
ssuser1ecccc
 
PPT
NGP BME Final.ppt
ssuser1ecccc
 
PPTX
ES.pptx
ssuser1ecccc
 
PPTX
TASK Sixth Sensor Technology.pptx
ssuser1ecccc
 
PPTX
4.-personal-productive-equipment.pptx
ssuser1ecccc
 
PPTX
5.-accident-causation-theories-accident-reporting.pptx
ssuser1ecccc
 
PPTX
unit-3-osha-hcs-dot.pptx
ssuser1ecccc
 
PPTX
unit-iv-facility-safety.pptx
ssuser1ecccc
 
Biometrics and its applications in Medical
ssuser1ecccc
 
DIP-Introduction Lecture 13-10-14 image analysis
ssuser1ecccc
 
Chap_9_Representation_and_Description.pdf
ssuser1ecccc
 
Biometrics and its applications for system
ssuser1ecccc
 
Project formulation in image analysis in various methods
ssuser1ecccc
 
2 R ladder architecture analysis for image
ssuser1ecccc
 
Existing method used for analysis of images
ssuser1ecccc
 
Histogram analysis of image using wavelet
ssuser1ecccc
 
Structure_of_How_to_Write_a_Journal.docx
ssuser1ecccc
 
pixelrelationships in image processing enhancement
ssuser1ecccc
 
Knowledge representation and reasoning in AI
ssuser1ecccc
 
Artificial Intelligence and Machine Learning
ssuser1ecccc
 
Intro class. U1 M1.pptx
ssuser1ecccc
 
NGP BME Final.ppt
ssuser1ecccc
 
ES.pptx
ssuser1ecccc
 
TASK Sixth Sensor Technology.pptx
ssuser1ecccc
 
4.-personal-productive-equipment.pptx
ssuser1ecccc
 
5.-accident-causation-theories-accident-reporting.pptx
ssuser1ecccc
 
unit-3-osha-hcs-dot.pptx
ssuser1ecccc
 
unit-iv-facility-safety.pptx
ssuser1ecccc
 
Ad

Recently uploaded (20)

PDF
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PPTX
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
PPTX
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPT on the Development of Education in the Victorian England
Beena E S
 
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
Ad

Biometrics and its applications for system Analysis

  • 1. Dr. N.G.P. Institute of Technology Department of Biomedical Engineering 22OBM103 – Biometrics and its Application Dr. R. Mothi Assistant Professor Department of Biomedical Engineering
  • 4. Biometrics? • Biometrics measures the unique physical and behavioral characteristics of a living creature. • Recognizing a person based on a physiological or behavioral characteristics. Life Measurement
  • 5. Biometrics? The physical attributes such as finger prints, color of iris, color of hair, hand geometry, and behavioral characteristics such as tone and accent of speech, signature, or the way of typing keys of computer keyboard etc., make a person stand separate from the rest. This uniqueness of a person is then used by the biometric systems to • Identify and verify a person. • Authenticate a person to give appropriate rights of system operations. • Keep the system safe from unethical handling.
  • 6. Evolution of Biometric System Time Period Biometric Technology Key Development Inventor(s) Origin Country Late 19th Century Fingerprint Recognition The concept of using fingerprints as a unique identifier for individuals. Sir Francis Galton (First to study fingerprint patterns) United Kingdom 1892 Fingerprint Identification System The use of fingerprints for criminal identification in Argentina. Juan Vucetich (Developed fingerprint-based system for police work) Argentina 1890 Anthropometry (Bertillonage) A system of identifying criminals using physical measurements. Alphonse Bertillon France 1930s - 1940s Iris Recognition Early experiments on using the iris as a unique biometric identifier. Sir William Herschel (Initiated iris studies for identification) United Kingdom 1960s Facial Recognition The development of early facial recognition algorithms for identity verification. Woodrow W. Bledsoe, Helen Chan Wolf United States 1960s Voice Recognition Early work in voice recognition and speaker verification systems. Davis S. R. (Pioneering research in voiceprints) United States 1970s Retina Scanning Exploration of retina scanning as a biometric identifier. Not attributed to a single inventor United States 1980s Automated Fingerprint Identification Systems (AFIS) Introduction of digital fingerprint matching systems for law enforcement. Various researchers (including W. B. Scharf and others for AFIS development) United States 1990s Iris and Retinal Scanning Advancements in iris and retinal scanning systems for secure identification. John Daugman (Iris recognition algorithm) United Kingdom
  • 7. 1990s Facial Recognition (Algorithms) The development of facial recognition algorithms for practical use. F. M. Bonneau, S. B. Kang United States / United Kingdom 2000s Fingerprint Scanning in Mobile Devices Integration of fingerprint scanning for mobile devices like smartphones. Apple Inc. (Pioneered fingerprint sensor in mobile devices) United States 2000s Voice Recognition in Consumer Devices Widespread use of voice recognition for consumer applications. Various developers (e.g., Amazon and Google for voice assistants) United States 2010s Facial Recognition in Smartphones Launch of Face ID and adoption of facial recognition technology in smartphones. Apple Inc. (Developed Face ID for iPhone) United States 2010s Multi-modal Biometric Systems The combination of multiple biometric technologies, such as fingerprints and facial recognition, for enhanced security. Various research teams Global (Various countries) 2020s Behavioral Biometrics Development of behavioral biometrics, including the analysis of typing patterns and user behavior. Various researchers United States / United Kingdom 2020s Liveness Detection Use of advanced techniques in liveness detection to prevent spoofing in biometric systems. Various developers (e.g., IDEX Biometrics for anti-spoofing technology) Global (Various countries) Evolution of Biometric System Time Period Biometric Technology Key Development Inventor(s) Origin Country
  • 8. Why Biometrics is Required? Biometrics is used for authenticating and authorizing a person. Authentication (Identification) • This process tries to find out answer of question, “Are you the same who you are claiming to be?”, or, “Do I know you?” This is one-to-many matching and comparison of a person’s biometrics with the whole database. Verification • This is the one-to-one process of matching where live sample entered by the candidate is compared with a previously stored template in the database. Authorization It is the process of assigning access rights to the authenticated or verified users.
  • 9. Shortcoming of Conventional Aids? • They all mean recognizing some code associated with the person rather than recognizing the person who actually produced it. • They can be forgotten, lost, or stolen. • They can be bypassed or easily compromised. • They are not precise. The security of the system is threatened. When the systems need high level of reliable protection, biometrics comes to help by binding the identity more oriented to individual.
  • 10. Biometric System Sensors Converts human biological data into digital form. • A Metal Oxide Semiconductor (CMOS) imager or a Charge Coupled Device (CCD) in the case of face recognition, handprint recognition, or iris/retinal recognition systems. • An optical sensor in case of fingerprint systems. • A microphone in case of voice recognition systems. Processing Unit Microprocessor, Digital Signal Processor (DSP), or computer that processes the data captured from the sensors • Sample image enhancement • Sample image normalization • Feature extraction • Comparison of the biometric sample with all stored samples in database. Database Store The database stores the enrolled sample, which is recalled to perform a match at the time of authentication. For identification, there can be any memory from Random Access Memory (RAM), flash EPROM, or a data server. Output Interface The output interface communicates the decision of the biometric system to enable the access to the user.
  • 11. Working of Biometric System 1. Acquire live sample from candidate. (using sensors) 2. Extract prominent features from sample. (using processing unit) 3. Compare live sample with samples stored in database. (using algorithms) 4. Present the decision. (Accept or reject the candidate.) Two Modes of Operation Identification – One to Many Comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification – One to One Comparison of a captured biometric with a stored template to verify that the individual is who he claims to be.
  • 12. Types of Biometric Modalities Biometric Modality Person’s Biological Traits • This modality pertains to the shape and size of the body. Physiological • This modality is related to change in human behavior over time. Behavioural • This modality includes both traits, where the traits are depending upon physical as well as behavioral changes. Combination of physiological and behavioral modality
  • 17. There are three basic patterns of ridges namely, arch, loop, and whorl. The uniqueness of fingerprint is determined by these features as well as minutiae features such as bifurcation and spots (ridge endings) Minutiae Based Techniques − In these minutiae points are found and then mapped to their relative position on finger. There are some difficulties such as if image is of low quality, then it is difficult to find minutiae points correctly. Another difficulty is, it considers local position of ridges and furrows; not global. Correlation Based Method − It uses richer gray scale information. It overcomes problems of minutiae-based method, by being able to work with bad quality data. Pattern Based (Image Based) Matching − Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a stored template and a candidate fingerprint. Fingerprint Biometrics – Unit 2 • Finger print using vein pattern of palm • Fingerprint Biometrics • Fingerprint recognition system • minutiae extraction • advantage and disadvantages of fingerprint biometrics.
  • 18. Facial Recognition • Facial recognition is based on determining shape and size of jaw, chin, shape and location of the eyes, eyebrows, nose, lips, and cheekbones. • 2D facial scanners start reading face geometry and recording it on the grid. • Facial geometry is transferred to the database in terms of points. • The comparison algorithms perform face matching and come up with the results. Steps Involved in Facial Recognition Facial recognition is performed in the following ways: • Facial Metrics − In this type, the distances between pupils or from nose to lip or chin are measured. • Eigen faces − It is the process of analyzing the overall face image as a weighted combination of a number of faces. • Skin Texture Analysis − The unique lines, patterns, and spots apparent in a person’s skin are located.
  • 19. Facial Recognition – Unit 3 • Background of face recognition • Design of face recognition system • Neural network for face recognition • Face detection in video sequences • Face recognition methods.
  • 20. Iris Recognition is a biometric technology that uses the unique patterns in the colored part of the eye (the iris) to identify or verify individuals. The iris, located around the pupil, has intricate and distinctive features that remain stable throughout a person's lifetime, making it an excellent trait for biometric identification. Key Features of Iris Recognition: •Uniqueness: The iris patterns are unique to each individual, even between identical twins, and are highly stable over time. •Stability: Unlike fingerprints or facial features, the iris does not change significantly over a person's lifetime. •Accuracy: Iris recognition systems are considered one of the most accurate biometric technologies, with a low False Acceptance Rate (FAR) and False Rejection Rate (FRR). IRIS Recognition
  • 21. IRIS Recognition Hand Geometry Recognition IRIS RECOGNITION & HAND GEOMETRY – Unit 4 Design of iris recognition system – iris segmentation method – application of iris biometrics – basics of hand geometry – image capturing, hand segmentation, feature extraction https://youtu.be/F820W0_PBwo?si=pW284J9lZ-8a5vrC
  • 22. Multimodal Biometrics Multimodal Biometrics refers to the use of multiple biometric traits or modalities (such as fingerprints, facial recognition, iris patterns, voice, etc.) for identification or authentication. Instead of relying on a single biometric trait, a multimodal system combines two or more biometrics to enhance accuracy, security, and reliability. Fusion in Multimodal Biometrics refers to the process of combining data or results from multiple biometric modalities (such as fingerprints, facial recognition, iris, voice, etc.). Unit -5
  • 23. 22OBM103 – BIOMETRICS AND ITS APPLICATIONS UNIT I BIOMETRICS SYSTEM 9 History of Biometrics – Types of Biometric Traits – General Architecture of Biometric Systems – Basic working of Biometric matching – Biometric system error and performance measure. UNIT II FINGERPRINT BIOMETRICS 9 Finger print using vein pattern of palm – Fingerprint Biometrics – Fingerprint recognition system – minutiae extraction – advantage and disadvantages of fingerprint biometrics. UNIT III FACE RECOGNITION 9 Background of face recognition – design of face recognition system - neural network for face recognition – face detection in video sequences – face recognition methods. UNIT IV IRIS RECOGNITION & HAND GEOMETRY 9 Design of iris recognition system – iris segmentation method – application of iris biometrics – basics of hand geometry – image capturing, hand segmentation, feature extraction. UNIT V MULTIMODAL BIOMETRICS & BIOMETRIC APPLICATIONS 9 Basic architecture of multimodal biometrics – multimodal biometrics using face and ear – multimodal biometrics application – case study of biometric application. Total Hours 45 Course outcomes: At the end of the course, students will be able to CO1: Demonstrate knowledge on biometric authentication system using biometric applications. CO2: Explain the fingerprint technology using fingerprint enhancement, feature extraction, classification and matching technique used for criminal application. CO3: Design face recognition system using neural network, video sequences used for various biometric applications CO4: Describe about iris recognition and hand geometry using segmentation and feature extraction technique used for commercial application. CO5: Identify issues in multimodal biometrics using face and ear used for biometric application.