Biometrics: Kamala Institute of Technology & Science Singapur, Huzurabad 2008-2009
Biometrics: Kamala Institute of Technology & Science Singapur, Huzurabad 2008-2009
First used in China in the 14th Using Biometrics for identification, for
century -- merchants stamped hand and example, DNA evidence or fingerprints,
foot prints of children on paper with ink to has been used for many years. It is widely
distinguish one child from another. In accepted as being credible and accurate.
Europe, Richard Edward Henry developed Biometrics is now being used for
fingerprinting for Scotland Yard in the verification as part of security systems.
later half of the 19th century. Verification has been part of security
systems for many years. We have been
asked for physical items of identification
like a license or passport. We have also
been asked for things we know to verify
our identity, like a pin number or a maiden
name. Unfortunately, security systems that of a part of the human body.
use physical forms of identification and
personal information can be easily Physiological Biometric Applications:
"fooled". It is the increasing need for more
• Fingerprints
security that has enabled biometrics to
• Retina Scans
evolve to its current state of development.
• Hand Geometry
Biometrics determines who we are using
• Facial Patterns
our distinct physical features.
• DNA
PARTS OF BIOMETRICS
2.Behavioral
Biometric systems consist of three parts: Behavioral biometrics measure the distinct
actions that humans take, which are
1.Scanner:
generally very hard to copy from one
Scans the anatomy being used.
person to another. They measure
2.Software:
characteristics of the human body
The software which gathers the
indirectly.
information and converts it to digital form
3.Database: Behavioral Biometric Applications:
The database which compares the current
data to a stored database and determines • Speaker Recognition
• Retina scan devices are one of the phrase. Verification time is approximately
Cons:
Cons:
• Hand geometry is not unique to an Humans are quite adept at
individual, therefore possible to recognizing a person at a distance from his
have duplicate readings. gait. Although, the characteristic gait of a
• Hardware is costly and takes up human walk has been well researched in
much space. the Department of Immigration and
biometric, evolve over a period of time forger has to not only know the impression
and are influenced by physical and of the signature but also the way the
Face recognition:
3. Once the facial detection
software has targeted a face, it
can be analyzed. As noted in slide
three, facial recognition analyzes
the spatial geometry of
distinguishing features of the
face. Different vendors use
different methods to extract the
1. First, an image of the face is acquired. method. PCA has also been
accessories (e.g., glasses, hat), another when they perform facial recognition in
card with a photograph of a person similar surveillance or watch post scenario. Dr.
in appearance to the shopper, and the last James L. Wayman, a leading biometrics
expert, has explained that performing
facial recognition processes with relatively
high fidelity and at long distances remains
technically challenging for automated
systems. At the most basic level, detecting
whether a face is present in a given
electronic photograph is a difficult
technical problem. Dr. Wayman has noted
that subjects should ideally be
photographed under tightly controlled
conditions. For example, each subject By controlling a person’s facial
should look directly into the camera and expression, as well as his distance from the
fill the area of the photo for an automated camera, the camera angle, and the scene’s
system to reliably identify the individual lighting, a posed image minimizes the
or even detect his face in the photograph. number of variables in a photograph. This
Thus, while the technology for facial control allows the facial recognition
recognition systems shows promise, it is software to operate under near ideal
not yet considered fully mature. The conditions – greatly enhancing its
“Facial Recognition Vendor Test 2000” accuracy. Similarly, using a human
study makes clear that the technology is operator to verify the system’s results
not yet perfected. This comprehensive enhances performance because the
study of current facial recognition operator can detect machine-generated
technologies, sponsored by the false alarms.
Department of Defense (DoD)
Counterdrug Technology Development
Program Office, the Defense Advanced
Research Projects Agency (DARPA), and
the National Institute of Justice, showed
that environmental factors such as
differences in camera angle, direction of
lighting, facial expression, and other
parameters can have significant effects on
the ability of the systems to recognize
individuals.
An “obvious” point that needs stating: The
better the quality of the captured image
and the database images, the better the
facial recognition system will perform.
The “facetrap” triangle above
demonstrates this point, with respect to
acquiring high-quality images of the
target’s face. It is difficult to acquire an
image if the authorities only know that a
The following factors need to be
suspect might be at an airport west of the
considered with respect to testing and
Mississippi River. It is easier to capture
evaluation of facial recognition systems:
the image at a facetrap. For example, a
1. Testing should be conducted by
surveillance camera can more easily
independent organizations that will not
capture images of people at the check-in
reap any benefits should one system
counter. Sometimes facetraps can be
outperform another (i.e. no conflicts of
designed to take advantage of people’s
interest involved). The Facial Recognition
inclinations. For example, a person going
Vendor Test (FVRT) testing which
up an escalator will naturally look at a red
government agencies sponsor is likely to
flashing light above a clock at the top of
be very objective.
the escalator. A surveillance camera
2. The test philosophy must be considered.
located there can easily capture an image;
For example, the FVRT tries to make the
the face has been trapped. A camera
test neither too difficult nor too easy, as it
located at a metal detector also takes
does not want all the systems’
advantage of a facetrap. The best facetrap
performance to cluster at one end of the
is the one shown at the apex of the triangle
spectrum. The FVRT also wants to
—an image captured under tightly
distinguish performance of systems and
controlled conditions.
give feedback to designers for
improvement. But a drawback here is that
real life data does not present itself this
way. Performance in real life may very
well prove that none of the systems are
useful.
3. Vendors and developers should not
know test data beforehand; otherwise, they
may be tempted to fine-tune their
technology’s performance to the specific
test data. Performance data that has been
fine-tuned to specific test data is not
representative of the general performance
of the technology being tested.
4. Testing and evaluation should be
repeatable. That is, statistically similar Conclusion:
Biometric is a new but promising people to create more safe and secure