SlideShare a Scribd company logo
Biometrics tutorial
Biometrics
AbouttheTutorial
This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would
get sufficient information about the basics of biometrics and different biometric modalities
such as physiological, behavioral, and combination of both modalities.
This tutorial also provides a glimpse of various security issues related to biometric systems,
and the comparison of various biometric systems.
Audience
This tutorial is prepared for the students at beginner level who aspire to understand
biometrics and various biometric systems. It would also be useful for enthusiasts in the
fields of Electronics, IT security, and Biology.
Prerequisites
Biometrics is an advanced concept and we cannot claim that a reader can sail through this
tutorial without having any grip over some basic knowledge of Computer Science, and
Mathematics.
Disclaimer&Copyright
Copyright 2015 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent of
the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at contact@tutorialspoint.com.
i
Biometrics
TableofContents
About the Tutorial ......................................................................................................................................i
Audience.....................................................................................................................................................i
Prerequisites...............................................................................................................................................i
Disclaimer & Copyright ...............................................................................................................................i
Table of Contents.......................................................................................................................................ii
1. BIOMETRICS – OVERVIEW..................................................................................................... 1
What is Biometrics?...................................................................................................................................1
What is a Biometric System?......................................................................................................................1
Evolution of Biometrics..............................................................................................................................1
Why Biometrics is Required? .....................................................................................................................2
Basic Components of a Biometric System ..................................................................................................3
General Working of a Biometric System ....................................................................................................4
Biometrics Terminology.............................................................................................................................5
Application Areas of Biometrics.................................................................................................................5
2. BIOMETRIC MODALITIES....................................................................................................... 6
Types of Biometric Modalities ...................................................................................................................6
3. PHYSIOLOGICAL MODALITIES................................................................................................ 8
Fingerprint Recognition System .................................................................................................................8
Facial Recognition System..........................................................................................................................9
Iris Recognition System............................................................................................................................10
Hand Geometry Recognition System .......................................................................................................11
Retinal Scanning System ..........................................................................................................................12
DNA Recognition System .........................................................................................................................13
4. BEHAVIORAL MODALITIES................................................................................................... 15
Gait Recognition ......................................................................................................................................15
ii
Biometrics
Signature Recognition System .................................................................................................................16
Keystroke Recognition System.................................................................................................................17
5. VOICE RECOGNITION .......................................................................................................... 19
Voice Recognition System........................................................................................................................19
Difference between Voice and Speech Recognition.................................................................................20
6. MULTIMODAL BIOMETRIC SYSTEMS................................................................................... 21
Why Multimodal Biometrics is Required?................................................................................................21
Working of Multimodal Biometric System ...............................................................................................21
Design Issues with Multimodal Biometric Systems ..................................................................................22
7. BIOMETRIC MODALITY SELECTION...................................................................................... 23
Criteria for Effective Biometric System ....................................................................................................23
Comparison of Various Biometric Modalities...........................................................................................24
8. BIOMETRIC SYSTEM PERFORMANCE................................................................................... 25
Performance Measurements ...................................................................................................................25
9. PATTERN RECOGNITION AND BIOMETRICS......................................................................... 26
Pattern Recognition in Biometrics ...........................................................................................................26
Components of Pattern Recognition........................................................................................................26
Popular Algorithms in Pattern Recognition..............................................................................................27
10. SIGNAL PROCESSING AND BIOMETRICS .............................................................................. 28
What is a Signal?......................................................................................................................................28
Signal Processing in Biometrics................................................................................................................28
Digital Signal Processing Systems (DSPs)..................................................................................................28
DSP in Biometrics.....................................................................................................................................29
11. BIOMETRICS AND IMAGE PROCESSING............................................................................... 30
Requirement of Image Processing in Biometrics ......................................................................................30
iii
Biometrics
12. BIOMETRIC SYSTEM SECURITY ............................................................................................ 32
Biometric System Vulnerability................................................................................................................32
Risks with Biometric System Security.......................................................................................................32
Biometric System Security .......................................................................................................................33
Criteria for Generating Biometric Templates ...........................................................................................34
iv
1. BIOMETRICS – OVERVIEW
The term Biometrics is composed of two words: Bio (Greek word for Life) and Metrics
(Measurements). Biometrics is a branch of information technology that aims towards
establishing one’s identity based on personal traits.
Biometrics is presently a buzzword in the domain of information security as it provides
high degree of accuracy in identifying an individual.
WhatisBiometrics?
Biometrics is a technology used to identify, analyze, and measure an individual’s physical
and behavioral characteristics.
Each human being is unique in terms of characteristics, which make him or her different
from all others. The physical attributes such as finger prints, color of iris, color of hair,
hand geometry, and behavioral characteristics such as tone and accent of speech,
signature, or the way of typing keys of computer keyboard etc., make a person stand
separate from the rest.
This uniqueness of a person is then used by the biometric systems to:
 Identify and verify a person.
 Authenticate a person to give appropriate rights of system operations.
 Keep the system safe from unethical handling.
WhatisaBiometricSystem?
A biometric system is a technology which takes an individual’s physiological, behavioral,
or both traits as input, analyzes it, and identifies the individual as a genuine or malicious
user.
EvolutionofBiometrics
The idea of biometrics was present since few years from now. In 14th century, China
practiced taking finger prints of merchants and their children to separate them from all
others. Fingerprinting is still used today.
 In the 19th century, an Anthropologist named Alphonse Bertillion developed a
method (named Bertillionage) of taking body measurements of persons to identify
them. He had realized that even if some features of human body are changed, such
as length of hair, weight, etc., some physical traits of body remain unchanged, such
as length of fingers. This method diminished quickly as it was found that the persons
with same body measurements alone can be falsely taken as one. Subsequently,
Richard Edward Henry from Scotland Yard developed a method for fingerprinting.
 The idea of retinal identification was conceived by Dr. Carleton Simon and Dr.
Isadore Goldstein in 1935. In 1976, a research and development effort was put in
at EyeDentify Inc. The first commercial retina scanning system was made available
in 1981.
1
Biometrics
 Iris recognition was invented by John Daugman in 1993 at Cambridge University.
 In 2001, Biometrics Automated Toolset (BAT) was introduced in Kosovo, which
provided a concrete identification means.
Today, biometric has come up as an independent field of study with precise technologies
of establishing personal identities.
WhyBiometricsisRequired?
With increasing use of Information Technology in the field of banking, science,
medication, etc., there is an immense need to protect the systems and data from
unauthorized users.
Biometrics is used for authenticating and authorizing a person. Though these terms are
often coupled; they mean different.
Authentication (Identification)
This process tries to find out answer of question, “Are you the same who you are claiming
to be?”, or, “Do I know you?” This is one-to-many matching and comparison of a person’s
biometrics with the whole database.
Verification
This is the one-to-one process of matching where live sample entered by the candidate is
compared with a previously stored template in the database. If both are matching with
more than 70% agreeable similarity, then the verification is successful.
Authorization
It is the process of assigning access rights to the authenticated or verified users. It tries
to find out the answer for the question, “Are you eligible to have certain rights to access
this resource?”
Shortcomings of Conventional Security Aids
The conventional methods of information system security used ID cards,
passwords, Personal Identification Numbers (PINs), etc. They come with the following
disadvantages:
 They all mean recognizing some code associated with the person rather than
recognizing the person who actually produced it.
 They can be forgotten, lost, or stolen.
 They can be bypassed or easily compromised.
 They are not precise.
In such cases, the security of the system is threatened. When the systems need high level
of reliable protection, biometrics comes to help by binding the identity more oriented to
individual.
2
Biometrics
BasicComponentsofaBiometricSystem
In general, a biometric system can be divided into four basic components. Let us see them
briefly:
Input Interface (Sensors)
It is the sensing component of a biometrics system that converts human biological data
into digital form.
For example,
 A Metal Oxide Semiconductor (CMOS) imager or a Charge Coupled Device (CCD) in
the case of face recognition, handprint recognition, or iris/retinal recognition
systems.
 An optical sensor in case of fingerprint systems.
 A microphone in case of voice recognition systems.
Processing Unit
The processing component is a microprocessor, Digital Signal Processor (DSP), or
computer that processes the data captured from the sensors.
The processing of the biometric sample involves:
 Sample image enhancement
 Sample image normalization
 Feature extraction
 Comparison of the biometric sample with all stored samples in database.
Database Store
The database stores the enrolled sample, which is recalled to perform a match at the time
of authentication. For identification, there can be any memory from Random Access
Memory (RAM), flash EPROM, or a data server. For verification, a removable storage
element like a contact or contactless smart card is used.
3
Biometrics
Output Interface
The output interface communicates the decision of the biometric system to enable the
access to the user. This can be a simple serial communication protocol RS232, or the higher
bandwidth USB protocol. It could also be TCP/IP protocol, Radio Frequency Identification
(RFID), Bluetooth, or one of the many cellular protocols.
GeneralWorkingofaBiometricSystem
There are four general steps a biometric system takes to perform identification and
verification:
1. Acquire live sample from candidate. (using sensors)
2. Extract prominent features from sample. (using processing unit)
3. Compare live sample with samples stored in database. (using algorithms)
4. Present the decision. (Accept or reject the candidate.)
The biometric sample is acquired from candidate user. The prominent features are
extracted from the sample and it is then compared with all the samples stored in the
database. When the input sample matches with one of the samples in the database, the
biometric system allows the person to access the resources; otherwise prohibits.
4
FAR =
FRR =
Biometrics
BiometricsTerminology
Biometric Template: It is a digital reference of the distinct characteristics that
are extracted from a biometric sample.
Candidate/Subject: A person who enters his biometric sample.
Closed-Set Identification: The person is known to be existing in the database.
Enrollment: It is when a candidate uses a biometric system for the first time, it records
the basic information such as name, address, etc. and then records the candidate’s
biometric trait.
False Acceptance Rate (FAR): It is the measure of possibility that a biometric
system will incorrectly identify an unauthorized user as a valid user.
Number of False Acceptances
Number of Identification
Attempts
A biometric system providing low FAR ensures high security.
False Reject Rate (FRR): It is the measure of possibility that the biometric system
will incorrectly reject an authorized user as an invalid user.
Number of False Rejections
Number of Identification
Attempts
Open-Set Identification: The person is not guaranteed to be existing in the database.
Task: It is when the biometric system searches the database for matching sample.
ApplicationAreasofBiometrics
There are a number of applications where biometric systems are useful. Few of them
are given below:
5
Biometrics
End of ebook preview
If you liked what you saw…
Buy it from our store @ https://store.tutorialspoint.com
6

More Related Content

Similar to Biometrics tutorial (20)

PDF
Biosimilar & Patents - Challenges for Research & Analysis
IntellectPeritus Services
 
PDF
BiometricsReportFlat
Kevin Swenson
 
PDF
Testlodge tutorial
HarikaReddy115
 
PDF
Penetration testing tutorial
HarikaReddy115
 
PDF
Software quality management_tutorial
HarikaReddy115
 
PDF
Report for AI powered healthcare Assistant.pdf
prikshitgautam27
 
PPT
Shrm Bio Technologies Pvt Ltd Company Profile
frederick_correa
 
PDF
Microfluidic Biosensors Wing Cheung Mak Aaron Ho Pui Ho
frumajontzxc
 
PDF
AI-Driven Psychometrics and Community Strategy Masterclass (AIPCS)
Jayakumar K
 
PDF
Big data analytics_tutorial
HarikaReddy115
 
PDF
Digital Future Of Healthcare 1st Edition Edited By Nilanjan Dey
iocczbzhic6960
 
PDF
Advanced Methods and Mathematical Modeling of Biofilm Mojtaba Aghajani Delavar
tlaglltsin5442
 
PDF
Serology
EsubalewHabitu
 
PPTX
Biometrics
Mufaddal AunAli
 
PDF
Advanced Methods and Mathematical Modeling of Biofilm Mojtaba Aghajani Delavar
ravauxjantzi
 
PDF
Perak biotechnology masterplan-8th
jongos89
 
PDF
IRJET- Artificial Intelligence Dietician
IRJET Journal
 
PDF
Jira tutorial
HarikaReddy115
 
PDF
Auditing tutorial
HarikaReddy115
 
Biosimilar & Patents - Challenges for Research & Analysis
IntellectPeritus Services
 
BiometricsReportFlat
Kevin Swenson
 
Testlodge tutorial
HarikaReddy115
 
Penetration testing tutorial
HarikaReddy115
 
Software quality management_tutorial
HarikaReddy115
 
Report for AI powered healthcare Assistant.pdf
prikshitgautam27
 
Shrm Bio Technologies Pvt Ltd Company Profile
frederick_correa
 
Microfluidic Biosensors Wing Cheung Mak Aaron Ho Pui Ho
frumajontzxc
 
AI-Driven Psychometrics and Community Strategy Masterclass (AIPCS)
Jayakumar K
 
Big data analytics_tutorial
HarikaReddy115
 
Digital Future Of Healthcare 1st Edition Edited By Nilanjan Dey
iocczbzhic6960
 
Advanced Methods and Mathematical Modeling of Biofilm Mojtaba Aghajani Delavar
tlaglltsin5442
 
Serology
EsubalewHabitu
 
Biometrics
Mufaddal AunAli
 
Advanced Methods and Mathematical Modeling of Biofilm Mojtaba Aghajani Delavar
ravauxjantzi
 
Perak biotechnology masterplan-8th
jongos89
 
IRJET- Artificial Intelligence Dietician
IRJET Journal
 
Jira tutorial
HarikaReddy115
 
Auditing tutorial
HarikaReddy115
 

More from HarikaReddy115 (20)

PDF
Dbms tutorial
HarikaReddy115
 
PDF
Data structures algorithms_tutorial
HarikaReddy115
 
PDF
Wireless communication tutorial
HarikaReddy115
 
PDF
Cryptography tutorial
HarikaReddy115
 
PDF
Cosmology tutorial
HarikaReddy115
 
PDF
Control systems tutorial
HarikaReddy115
 
PDF
Computer logical organization_tutorial
HarikaReddy115
 
PDF
Computer fundamentals tutorial
HarikaReddy115
 
PDF
Compiler design tutorial
HarikaReddy115
 
PDF
Communication technologies tutorial
HarikaReddy115
 
PDF
Behavior driven development_tutorial
HarikaReddy115
 
PDF
Basics of computers_tutorial
HarikaReddy115
 
PDF
Basics of computer_science_tutorial
HarikaReddy115
 
PDF
Basic electronics tutorial
HarikaReddy115
 
PDF
Artificial neural network_tutorial
HarikaReddy115
 
PDF
Artificial intelligence tutorial
HarikaReddy115
 
PDF
Antenna theory tutorial
HarikaReddy115
 
PDF
Analog communication tutorial
HarikaReddy115
 
PDF
Amplifiers tutorial
HarikaReddy115
 
PDF
Agile tutorial
HarikaReddy115
 
Dbms tutorial
HarikaReddy115
 
Data structures algorithms_tutorial
HarikaReddy115
 
Wireless communication tutorial
HarikaReddy115
 
Cryptography tutorial
HarikaReddy115
 
Cosmology tutorial
HarikaReddy115
 
Control systems tutorial
HarikaReddy115
 
Computer logical organization_tutorial
HarikaReddy115
 
Computer fundamentals tutorial
HarikaReddy115
 
Compiler design tutorial
HarikaReddy115
 
Communication technologies tutorial
HarikaReddy115
 
Behavior driven development_tutorial
HarikaReddy115
 
Basics of computers_tutorial
HarikaReddy115
 
Basics of computer_science_tutorial
HarikaReddy115
 
Basic electronics tutorial
HarikaReddy115
 
Artificial neural network_tutorial
HarikaReddy115
 
Artificial intelligence tutorial
HarikaReddy115
 
Antenna theory tutorial
HarikaReddy115
 
Analog communication tutorial
HarikaReddy115
 
Amplifiers tutorial
HarikaReddy115
 
Agile tutorial
HarikaReddy115
 
Ad

Recently uploaded (20)

PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PPTX
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
community health nursing question paper 2.pdf
Prince kumar
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
Ad

Biometrics tutorial

  • 2. Biometrics AbouttheTutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities such as physiological, behavioral, and combination of both modalities. This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Audience This tutorial is prepared for the students at beginner level who aspire to understand biometrics and various biometric systems. It would also be useful for enthusiasts in the fields of Electronics, IT security, and Biology. Prerequisites Biometrics is an advanced concept and we cannot claim that a reader can sail through this tutorial without having any grip over some basic knowledge of Computer Science, and Mathematics. Disclaimer&Copyright Copyright 2015 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected]. i
  • 3. Biometrics TableofContents About the Tutorial ......................................................................................................................................i Audience.....................................................................................................................................................i Prerequisites...............................................................................................................................................i Disclaimer & Copyright ...............................................................................................................................i Table of Contents.......................................................................................................................................ii 1. BIOMETRICS – OVERVIEW..................................................................................................... 1 What is Biometrics?...................................................................................................................................1 What is a Biometric System?......................................................................................................................1 Evolution of Biometrics..............................................................................................................................1 Why Biometrics is Required? .....................................................................................................................2 Basic Components of a Biometric System ..................................................................................................3 General Working of a Biometric System ....................................................................................................4 Biometrics Terminology.............................................................................................................................5 Application Areas of Biometrics.................................................................................................................5 2. BIOMETRIC MODALITIES....................................................................................................... 6 Types of Biometric Modalities ...................................................................................................................6 3. PHYSIOLOGICAL MODALITIES................................................................................................ 8 Fingerprint Recognition System .................................................................................................................8 Facial Recognition System..........................................................................................................................9 Iris Recognition System............................................................................................................................10 Hand Geometry Recognition System .......................................................................................................11 Retinal Scanning System ..........................................................................................................................12 DNA Recognition System .........................................................................................................................13 4. BEHAVIORAL MODALITIES................................................................................................... 15 Gait Recognition ......................................................................................................................................15 ii
  • 4. Biometrics Signature Recognition System .................................................................................................................16 Keystroke Recognition System.................................................................................................................17 5. VOICE RECOGNITION .......................................................................................................... 19 Voice Recognition System........................................................................................................................19 Difference between Voice and Speech Recognition.................................................................................20 6. MULTIMODAL BIOMETRIC SYSTEMS................................................................................... 21 Why Multimodal Biometrics is Required?................................................................................................21 Working of Multimodal Biometric System ...............................................................................................21 Design Issues with Multimodal Biometric Systems ..................................................................................22 7. BIOMETRIC MODALITY SELECTION...................................................................................... 23 Criteria for Effective Biometric System ....................................................................................................23 Comparison of Various Biometric Modalities...........................................................................................24 8. BIOMETRIC SYSTEM PERFORMANCE................................................................................... 25 Performance Measurements ...................................................................................................................25 9. PATTERN RECOGNITION AND BIOMETRICS......................................................................... 26 Pattern Recognition in Biometrics ...........................................................................................................26 Components of Pattern Recognition........................................................................................................26 Popular Algorithms in Pattern Recognition..............................................................................................27 10. SIGNAL PROCESSING AND BIOMETRICS .............................................................................. 28 What is a Signal?......................................................................................................................................28 Signal Processing in Biometrics................................................................................................................28 Digital Signal Processing Systems (DSPs)..................................................................................................28 DSP in Biometrics.....................................................................................................................................29 11. BIOMETRICS AND IMAGE PROCESSING............................................................................... 30 Requirement of Image Processing in Biometrics ......................................................................................30 iii
  • 5. Biometrics 12. BIOMETRIC SYSTEM SECURITY ............................................................................................ 32 Biometric System Vulnerability................................................................................................................32 Risks with Biometric System Security.......................................................................................................32 Biometric System Security .......................................................................................................................33 Criteria for Generating Biometric Templates ...........................................................................................34 iv
  • 6. 1. BIOMETRICS – OVERVIEW The term Biometrics is composed of two words: Bio (Greek word for Life) and Metrics (Measurements). Biometrics is a branch of information technology that aims towards establishing one’s identity based on personal traits. Biometrics is presently a buzzword in the domain of information security as it provides high degree of accuracy in identifying an individual. WhatisBiometrics? Biometrics is a technology used to identify, analyze, and measure an individual’s physical and behavioral characteristics. Each human being is unique in terms of characteristics, which make him or her different from all others. The physical attributes such as finger prints, color of iris, color of hair, hand geometry, and behavioral characteristics such as tone and accent of speech, signature, or the way of typing keys of computer keyboard etc., make a person stand separate from the rest. This uniqueness of a person is then used by the biometric systems to:  Identify and verify a person.  Authenticate a person to give appropriate rights of system operations.  Keep the system safe from unethical handling. WhatisaBiometricSystem? A biometric system is a technology which takes an individual’s physiological, behavioral, or both traits as input, analyzes it, and identifies the individual as a genuine or malicious user. EvolutionofBiometrics The idea of biometrics was present since few years from now. In 14th century, China practiced taking finger prints of merchants and their children to separate them from all others. Fingerprinting is still used today.  In the 19th century, an Anthropologist named Alphonse Bertillion developed a method (named Bertillionage) of taking body measurements of persons to identify them. He had realized that even if some features of human body are changed, such as length of hair, weight, etc., some physical traits of body remain unchanged, such as length of fingers. This method diminished quickly as it was found that the persons with same body measurements alone can be falsely taken as one. Subsequently, Richard Edward Henry from Scotland Yard developed a method for fingerprinting.  The idea of retinal identification was conceived by Dr. Carleton Simon and Dr. Isadore Goldstein in 1935. In 1976, a research and development effort was put in at EyeDentify Inc. The first commercial retina scanning system was made available in 1981. 1
  • 7. Biometrics  Iris recognition was invented by John Daugman in 1993 at Cambridge University.  In 2001, Biometrics Automated Toolset (BAT) was introduced in Kosovo, which provided a concrete identification means. Today, biometric has come up as an independent field of study with precise technologies of establishing personal identities. WhyBiometricsisRequired? With increasing use of Information Technology in the field of banking, science, medication, etc., there is an immense need to protect the systems and data from unauthorized users. Biometrics is used for authenticating and authorizing a person. Though these terms are often coupled; they mean different. Authentication (Identification) This process tries to find out answer of question, “Are you the same who you are claiming to be?”, or, “Do I know you?” This is one-to-many matching and comparison of a person’s biometrics with the whole database. Verification This is the one-to-one process of matching where live sample entered by the candidate is compared with a previously stored template in the database. If both are matching with more than 70% agreeable similarity, then the verification is successful. Authorization It is the process of assigning access rights to the authenticated or verified users. It tries to find out the answer for the question, “Are you eligible to have certain rights to access this resource?” Shortcomings of Conventional Security Aids The conventional methods of information system security used ID cards, passwords, Personal Identification Numbers (PINs), etc. They come with the following disadvantages:  They all mean recognizing some code associated with the person rather than recognizing the person who actually produced it.  They can be forgotten, lost, or stolen.  They can be bypassed or easily compromised.  They are not precise. In such cases, the security of the system is threatened. When the systems need high level of reliable protection, biometrics comes to help by binding the identity more oriented to individual. 2
  • 8. Biometrics BasicComponentsofaBiometricSystem In general, a biometric system can be divided into four basic components. Let us see them briefly: Input Interface (Sensors) It is the sensing component of a biometrics system that converts human biological data into digital form. For example,  A Metal Oxide Semiconductor (CMOS) imager or a Charge Coupled Device (CCD) in the case of face recognition, handprint recognition, or iris/retinal recognition systems.  An optical sensor in case of fingerprint systems.  A microphone in case of voice recognition systems. Processing Unit The processing component is a microprocessor, Digital Signal Processor (DSP), or computer that processes the data captured from the sensors. The processing of the biometric sample involves:  Sample image enhancement  Sample image normalization  Feature extraction  Comparison of the biometric sample with all stored samples in database. Database Store The database stores the enrolled sample, which is recalled to perform a match at the time of authentication. For identification, there can be any memory from Random Access Memory (RAM), flash EPROM, or a data server. For verification, a removable storage element like a contact or contactless smart card is used. 3
  • 9. Biometrics Output Interface The output interface communicates the decision of the biometric system to enable the access to the user. This can be a simple serial communication protocol RS232, or the higher bandwidth USB protocol. It could also be TCP/IP protocol, Radio Frequency Identification (RFID), Bluetooth, or one of the many cellular protocols. GeneralWorkingofaBiometricSystem There are four general steps a biometric system takes to perform identification and verification: 1. Acquire live sample from candidate. (using sensors) 2. Extract prominent features from sample. (using processing unit) 3. Compare live sample with samples stored in database. (using algorithms) 4. Present the decision. (Accept or reject the candidate.) The biometric sample is acquired from candidate user. The prominent features are extracted from the sample and it is then compared with all the samples stored in the database. When the input sample matches with one of the samples in the database, the biometric system allows the person to access the resources; otherwise prohibits. 4
  • 10. FAR = FRR = Biometrics BiometricsTerminology Biometric Template: It is a digital reference of the distinct characteristics that are extracted from a biometric sample. Candidate/Subject: A person who enters his biometric sample. Closed-Set Identification: The person is known to be existing in the database. Enrollment: It is when a candidate uses a biometric system for the first time, it records the basic information such as name, address, etc. and then records the candidate’s biometric trait. False Acceptance Rate (FAR): It is the measure of possibility that a biometric system will incorrectly identify an unauthorized user as a valid user. Number of False Acceptances Number of Identification Attempts A biometric system providing low FAR ensures high security. False Reject Rate (FRR): It is the measure of possibility that the biometric system will incorrectly reject an authorized user as an invalid user. Number of False Rejections Number of Identification Attempts Open-Set Identification: The person is not guaranteed to be existing in the database. Task: It is when the biometric system searches the database for matching sample. ApplicationAreasofBiometrics There are a number of applications where biometric systems are useful. Few of them are given below: 5
  • 11. Biometrics End of ebook preview If you liked what you saw… Buy it from our store @ https://store.tutorialspoint.com 6