Figure 2: Face Recognition

advertisement
Biometrics – An Introduction and Current State
Divya J
M.E. (VLSI and Embedded system)
G. H. Raisoni College of Engineering & Management,
Wagholi, Pune
divyavikram73@gmail.com
Prof. Dr.R.S.Bichkar
G. H. Raisoni College of Engineering & Management,
Wagholi, Pune
rajankumar.bichkar@raisoni.net
The recent couple of decades had seen the
Abstract:
This paper describes the popularly used physical and
behavioral biometric techniques. These techniques
are mostly used for the purpose of identification and
recognition of users, which forms a significant part of
security systems. Authentication is of utmost
importance while dealing with security. This paper
provides a crisp review on the biometrics technologies
beginning with introduction to the concept of
biometrics and its comparison with other similar
techniques currently available. Next, we have a quick
glance through the various modalities in the
technology and finally a quick comparison on these
modalities along with the advantages and
disadvantages with respect to each of them.
availability of wide range of financial instruments
Keywords: Biometrics, Iris scan, Fingerprint recognition, Face
recognition, Retina scan, Hand geometry, Voice recognition.
identification in place. This resulted in the emergence
being brought to regular usage. Although this has
brought a tremendous improvement in which the
financial services have been perceived and made use of
by the masses, the occurrences of financial crimes has
grown
multiple
times.
This
implied
that
the
accompanying technologies to combat such frauds are
getting outdated and the time expects more powerful
technologies. These technologies must be capable of
getting more stringent variants of authentication and
of range of security devices that made heavy use of
1. Introduction
B
biometric concepts, since biometrics was the only
IOMETRIC technologies have become one of
the trendsetters in today’s world. With drastic
technical improvements being achieved in the recent
past, it is all set to change the way in which most of the
critical day-to-day tasks had been performed till date.
One of the major issues of concern in a wider society is
“Security”. As a result of this, authentication has
gained
significant
importance.
Researchers
had
constantly been intrigued by a question, “How can
machines be made to identify human beings?” It was a
breakthrough when it struck them that, unique
biological traits of the human beings can be harnessed,
for this to be achieved. With this idea as a baseline,
most security systems built over the principles of
biometrics can successfully identify individuals with
their unique biological traits.
known field to be capable of catering to such demands.
The biometric traits captured by such devices are
processed through a complex set of algorithms and
mathematical calculations to effectively produce the
desired output. Moreover, the fear of theft of the
captured data can be overcome by another layer of
security, provided by encryption, cryptography and
related concepts.
This paper is organized as follows: This section
one throws light on the background information
pertaining to the topic. In the next section two, we have
a history of biometric technologies, basic classification
and also provide performance metrics. Section three
gives a brief introduction to the biometric technologies,
along with the advantages and disadvantages that each
one of these technologies have to offer. Section four
takes a dip in the implementation details, by describing
 19th century France: Alphonse Bertillon, a member
the representation scheme and matching algorithm.
of police, invented Anthropometry that used body
Based on the factors for an effective biological trait, we
measurements to identify criminals.
then have a look at the comparison among the
 Late
19th
century
Argentina/UK/US:
An
biometric technologies in section five, which is later
Argentine police official was the first person to
used in section six to figure out the suitability of these
maintain fingerprint files. Sir Francis Galton
technologies for certain applications in particular.
discovered that fingerprints of two individuals
Finally, the last section hints on the scope available for
cannot be the same. In 1920s, the U.S. Military and
future research in this field.
FBI started using fingerprints for identification.
 Late 20th century: In the last quarter of the
Identification Techniques
Traditionally,
the
identification process can be
20thcentury,
biometrics
accomplished by any of the three techniques;
i. Something you possess: Refers to the token based
authentication systems using physical objects such
as ID cards. The main disadvantage of this
based
authentication
systems.
Certain
programs/tools are available that can crack the
passwords. Also, the person may forget a
password/PIN, leading to manual intervention.
iii. Something you are: The biometric systems make
use of this technique. It efficiently overcomes the
disadvantage of the above two techniques, since it
makes it nearly impossible to steal the identity.
based
identification
techniques
have
for
rapidly
developed. For example, in 1985 it was proposed
that irises were unique and first iris recognition
algorithm was patented in 1994.
The biometric technologies can be broadly
approach is that, it can be forged and misused.
ii. Something you know: Refers to password/PIN
computer-aided
classified based on physiological and/or behavioral
characteristics, which can be used for identification or
verification. The physiological biometrics includes
fingerprint, hand geometry, iris, face, retina, etc.
whereas the behavioral biometrics includes signature,
gait, voice, key stroke, etc.
At any given point of time, a biometric device is
said to operate in either of the two modes ‘Verification’
or ‘Identification’. The verification (or Authentication)
deals with one-to-one comparison of the captured
iv.
2. History,
classifications,
performance
criteria of biometrics
biometric with an available template. This template is
previously enrolled against the person’s record (known
individual). Similarly, the identification mode deals
The term ‘Biometrics’ is derived from two Greek
with
words, ‘Bios’ (life) and ‘Metrics’ (measure). The basic
biometric image is compared with multiple templates
idea of using a person’s bodily features like eyes, face
previously enrolled and available in the database.
and fingers for his identification was developed over
one-to-many
comparison,
where
captured
Biometric systems can be evaluated for their
time, with the efforts of many people across the globe.
performance on the basis of following criteria:
 14th century China: In order to distinguish their
 False Acceptance Rate (FAR) or False Match
children from one another, merchants were using
their palm and footprints.
Rate (FMR): It measures the percentage of invalid
input that is erroneously accepted. This also depends
Figure 1 shows how a fingerprint scanner records the
on the threshold value.
identities.
 False Rejection Rate (FRR) or False Non-Match
Rate (FNMR): It measures the percentage of valid
input that is erroneously rejected.
 Receiver/Relative
(ROC):
The
ROC
Operating
plot
Characteristic
provides
a
visual
characterization depicting a fair balance between the
FAR and FRR.
 Equal Error Rate (EER) or Crossover Error Rate
(CER): It depicts the rate at which rejection errors
and acceptance errors are equal. Generally lower
Figure1: Fingerprint Recognition
EER means more accuracy.
 Failure to Enroll Rate (FTE or FER): It is the rate
at which attempts for the creation of a template from
the input turns unsuccessful. It is usually a result of
low quality inputs.
 Failure to Capture Rate (FTC): In case of
automatic systems, this gives a probability that the
system fails to recognize a correctly presented
biometric input.
 Template Capacity: It provides the highest number
of data sets that can be stored in the system.
3.2 Face Recognition
Face Recognition is a process of verifying or
identifying an individual against a video frame or a
digital image from a video source, mostly using a
computer application. Typically this is accomplished
by comparing facial features from the captured image
against the template available in the database as shown
in figure 2. Unlike other technologies, face recognition
works automatically. Algorithms are developed mainly
based on two approaches i.e. either Geometric (feature
based) or Photometric (view based).In order that the
face recognition system provides the desired output the
3. Encapsulated Technologies
3.1 Fingerprint Recognition
acquired image must automatically detect whether a
face is present. If yes, locate the face. Finally, the
Fingerprint recognition refers to the automated method
located faces should be recognizable from general
of verifying a match between two or more human
perspective (from any pose).
fingerprint. The underlying fingerprint matching
techniques can be classified as either Minutiae based or
Correlation based.
In Minutiae based recognition, initially the scanner
tries to find the minutiae points on the finger and later
maps its relation with the template that is already saved
in database. Whereas, correlation based recognition
scheme needs a specific location for registration, which
may be impacted by image translation and rotation.
Figure 2: Face Recognition
3.3 Signature Recognition:
places his hand palm down on a metal surface with
This technique refers to the recognition of an
guidance pegs. These pegs are used to confirm that the
individual’s signature using devices. The dynamic
fingers are positioned correctly and also verify the
signature
correct hand position.
verification
technology
provides
the
capability to identify a computer client, by harnessing
the behavioral biometrics of a hand written signature as
shown in figure 3.Signatures are widely accepted as a
means of authentication, including for commercial and
legal transactions. However, studies on signatures have
proved that they tend to change as time passes and are
significantly influenced by the mental and physical
state of the signatories. Also, for a considerable amount
Figure 4: Hand Geometry Recognition
of people, their signatures vary to some extent. This
has been the case even when the signatures marked in a
3.5 Voice recognition:
successive manner were considered. Further, there
In voice recognition sound sensations of a person
exist some professional forgers, whose services could
is measured and compared to an existing dataset as
be availed to fool the system.
shown in figure 5. The person to be identified is
usually required to speak a secret code, which facilitate
the verification process. An individual’s voice depends
on the shape and size of mouth, vocal tracts, lips and
nasal cavities that are collectively referred to as
appendages. They are used in the synthesis of the
sound.
Figure 3: Signature Recognition
3.4 Hand geometry:
As the name implies, these biometric systems take into
account
the
various
measurements
from
the
individual’s hand. Some of these measurements include
shape & size of the palm, length & width of the fingers,
etc, which is shown in figure 4. It has 3D image of top
& sides of hand & fingers collected. From these
Figure 5: Speech Recognition
images, feature vectors are extracted and compared
3.6 Iris recognition
with the dataset feature vector. Even though the
This technique is based on the iris of the eye. Iris is a
recognition devices are bulky, the identification
colored area that surrounds pupil. The iris structure
process is performed quickly in seconds. The user
contains a highly unique complex pattern. The gray
scale image of the eye is obtained and presented to the
Schemes and Matching Algorithms are listed below
software, which then covers the iris by creating a net of
in Table 1:
curves. The Iris code is generated based on the
darkness of the points that emerges along the lines of
Modality
Representation
Scheme
Minutiae
Distribution
Matching
Algorithm
String Matching.
Face
Principal
Component
Analysis (PCA),
Local
Feature
Analysis(LFA)
Euclidean
Distance, Bunch
graph matching.
Hand
Geometry
Length/width
finger/Palm
Euclidean
Distance
Voice
Mel-Cepstum
Hidden
Markov
Model, Gaussian
Mixture Model
Iris
Texture Analysis,
Key-point
Extraction
Hamming
Distance
the software. Figure below shows iris recognition
Finger-
system.
print
of
Figure 6: Iris Recognition
3.7 Retinal scanning
This technique scans the complex network of blood
vessels in the retina, which is shown in the figure 7.
Table1: Representation scheme and matching algorithms
Since the capillaries that supplies blood to the retina is
a complex structure, even the identical twins do not
5. Comparison
share similar pattern. The scan is performed by
directing a beam of low energy light (infrared) into the
individual’s eye. This beam detects a standardized path
in the retina and discovers a unique pattern. This
pattern can then be converted to computer code and can
be used as a template for future use.
of
various
biometric
technologies
5.1 Comparison based on Performance:
Different biometric technologies discussed in Section 3
possess their own set of pros and cons, making it
suitable for different set of applications. These
technologies can be weighed on the basis of seven
factors described below, which can help to determine
the most specific areas of application domain.
i.
Universality: Measures how good is the system in
capturing each of the members of the population.
ii.
Distinctiveness: Measures how well is the system
able to distinguish among individuals.
iii. Permanence: Measures how well the system
remains resistant to biological changes throughout
Figure 7: Retina Recognition
4. Representation
algorithms:
scheme
Commonly
the enrolled person’s lifetime.
and
used
matching
Representation
iv. Collectability: Measures how good is the system
in acquiring measurements to capture the data.
v.
Performance: Measures how quickly, accurately
that meets all requirements. Table 3 below enlists the
and robustly the system collects data and responds.
strengths and weakness associated with each of the
vi. Acceptability: Measures to what extent are the
biometric technologies. It serves as a ready reference to
individuals in the relevant population willing to
understand
accept the system.
technologies.
the
applicability
of
each
of
these
applications
may
vii. Circumvention: Measures how difficult would it
be to imitate the data in order to manipulate the
6. Applications:
Biometric-based
system.
The comparison among the biometric technologies on
authentication
typically consist of one or more of the components:
workstation & network access, data protection,
the basis these factors is described in Table 2 below.
application logon, single sign-on, Web security,
5.2 Comparison
based
on
Strengths
and
weaknesses:
transaction security and remote access to resources.
The services promised by e-government and e-
Even though all biometric systems seem to work in
commerce can be achieved successfully only if strong
similar manner, the quality of template and the ease of
personal authentication procedures are being utilized.
enrolment are found to play an important role in overall
The benefits of these technologies have already been
success. Out of many Characteristics, each biometric
proved by the relative financial and non-financial fields
system has its own strengths and weaknesses. There are
such as secure e-banking, investments and other
no particular biometric systems, which can be
financial transactions, health and social service and
applicable
retail sales.
to
all
applications.
Based
on
the
application’s usage and the biometric characteristics
features, we are able to select a particular biometric
The biometrics technologies, we are talking about
is a key player in network authentication environment
Modality
Fingerprint
Face
Signature
Hand Geometry
Speaker
Recognition
Iris
Retina
Strength
▪ Highly accurate
▪ Very reliable
▪ Consistent
▪ Difficult to duplicate
▪ Readers are economical
▪ Systems require less space
▪ Quick identification
▪ No physical contact - Hygienic
▪ Mass identification possible
▪ Convenient for user
▪ Safe - No privacy concerns
▪ Does not require cooperation of the
subject
▪ Wide acceptance (Government, legal)
▪ Fast and simple training
▪ Economical
▪ Low storage requirements
▪ Inconsistent user detectable on
enrollment
▪ Convenient acquisition
▪ Good performance
▪ Works in harsh environments
▪ Simple & easy to use
▪ Economical
▪ Unaffected by individual anomalies
▪ Public acceptance
▪ No contact required
▪ Simplest to acquire
▪ Safe - No privacy concerns
▪ Does not require cooperation of the
subject
▪ Least obtrusive biometric measure
▪Contact less Process
▪More Secure
▪Highly Reliable.
Weakness
▪ Damageable
▪ Scanners can be tricked
▪ User Resistance (Ethical issues)
▪ Privacy concerns of criminal implications
▪ Enrolment issues (cold, wet, desquamation, elder)
▪ Require a large amount of computational resources
▪ Low Performance - lighting, disguise & image
resolution
▪ Low Accuracy - expression, viewpoint, etc.
▪ Reliability is slightly lower
▪ Cultural & Religious issues
▪ More expensive & complex
▪ Influenced by physical and emotional conditions
▪ Difficulty for Illiterates
▪ Error Rate is high
▪ Forgeable
▪ Require contact with the writing instrument
▪ Inconsistent (Change over time)
▪ Large size of hand geometry device is needed
▪ Not highly unique
▪ Variable during growth period of children
▪ Difficult to embed in other device
▪ Unsuitable for one-to-many applications
▪ Difficult to control sensor and channel variances
▪ Tiring effect (Ex: teachers, sales person)
▪ Susceptible to noise
▪ Error prone
▪ Distant microphone leads to more errors
▪ Difficult to control sensor and channel variances
▪ May covered by eyelids, eyelashes, reflections from
the cornea lens and changes in lighting
▪ Difficult for multiple users of different heights to use
in succession.
▪ Significantly more expensive.
▪ Person to be identified must hold the head still and
look into the camera.
▪ Modern cataract surgeries can change iris structure.
▪ Alcohol consumption causes deformation of iris
pattern.
▪ Scanners can be easily fooled by high quality image
of an iris.
▪ Low occurrence of false positives
▪ Very intrusive. Not user friendly.
▪ False negative rate is considerably low
▪ It has the stigma of consumer's thinking it is
▪ Speedy Result
potentially harmful to the eye.
▪ Highly reliable
▪ Very expensive.
▪ Accuracy affected by diseases such as cataract.
▪ Accuracy affected by severe astigmatism
▪ Not very user friendly
Table 3: Strengths and weakness associated with each of the biometric technologies
in large-scale enterprise. When utilized as standalone
system or integrated with other technologies such as
digital signatures, smart cards and encryption keys,
biometrics is highly anticipated to pervade onto each
and every aspects of the economy as well as our daily
lives.
7. Research Challenges:
In the preceding sections, we saw the extent to which
Biometric Technologies have grown, to provide
effective solutions to some of the most crucial day-today activities. However from the performance aspects,
there still exists a descent scope to be explored. A
number of challenging research problems mostly
related to the matcher design needs to be addressed.
 Effective representation and matching:
One of the biometric system design challenge is to
arrive at a representational/invariance model of the
identifier that is realistic. The samples used to form
these models could have possibly been acquired under
inconsistent conditions. Further, the inherent
discriminatory information in the signal needs to be
formally estimated from the samples. This becomes
more difficult in case of large-scale identification
systems, due to huge number (in millions) of
classes/identifiers.
 Performance modeling:
The inherent signal capacity issue is of utmost
complexity. It involves the interaction between the
physiological and behavioral attributes as well as the
composition of population, at different scales of time,
space.
 Characterizing
enhancement:
signal
quality
and
A particular biometric must be universal in nature, for
it to be effective. In practical use, inconsistent
presentation of the signals and adverse signal
acquisition conditions often leads to nearly unusable
biometric signals. The issue is further affected by the
underlying biometric signal varying over time due to
aging.
 Empirical Performance Measurement:
Determining reliable techniques to estimate
performance is in itself a matter of concern. Besides,
the issue related to security, privacy, aliveness and
integrity detection needs to be addressed.
8. Conclusion
In the recent years biometric authentication has gained
exciting technical improvement. It has become an
essential part of our life. In this paper we have
introduced the concept behind the authentication using
biometric, briefly explained the working of different
techniques and also estimated the effectiveness by
comparing the evaluation metrics. The idea here is not
to provide a deep knowledge of different biometric
technologies to the reader but to introduce its
effectiveness, to show how these technologies differ
from each other, applicability and finally some of the
research challenges.
Bibliography
[1] Debnath Bhattacharyya, Rahul Ranjan, Farkhod
Alisherov
A,
Minkyu
Choi,
"Biometric
Authentication: A Review," International Journal of
u- and e- Service, Science and Technology, vol. 2,
no. 3, p. 16, Sep. 2009.
[2] Fahad Al-harby, Rami Qahwaji, mumtaz kamaka,
"Secure Biometrics Authentication: A brief review
of the Literature," in School of Informatics,
Univercity of Bradford, UK, p. 7.
[3] Sourav Ganguly, Subhayan Roy Moulick, "A
Review On Different Biometric Techniques,"
International Journal of Engineering Research &
Technology (IJERT), vol. 1, no. 5, p. 7, Jul. 2012.
[4] Chun-I Fan and Yi-Hui Lin, "Provably Secure
Remote Truly Three-Factor Authentication Scheme
With Privacy Protection on Biometrics," IEEE
Transactions on Information Forensic and security,
vol. 4, no. 4, p. 13, Dec. 2009.
[5] Anil K. Jain, Fellow, Arun Ross, and Sharath
Pankanti, "Biometrics: A Tool for Information
Security," IEEE Transactions on Information
Forensic and security, vol. 1, no. 2, p. 19, Jun. 2006.
[6] Biometrics. Wikipedia, The free encyclopedia.
[Online]. http://wikipedia.org/wiki/Biometrics
Download