iv. applications of biometric systems

advertisement
Multimodal biometric system over
Unimodal biometric system
Priya Singh[1],Meenakshi Saraswat[2],Pragya Gupta[3]
1.priyasingh.8sept@gmail.com
2.cutegrl.aditi@gmail.com
3.pragya@rkgitw.edu.in
RKGITW,Ghaziabad
Abstract— A biometric system is essentially a pattern
recognition system that operates by acquiring biometric data
from an individual, extracting features from data and
comparing features. The purpose of such schemes is to ensure
that the rendered services are accessed only by Multimodal
biometric system is becoming more and more popular. It
integrates face recognition or behavior characteristics. It
integrates face recognition, finger print verification and
speaker verification etc. By using this it confirm an individual
identity. In this paper, we give a brief overview of the field of
Biometrics and summarize some of its advantages,
disadvantages, strengths and its limitation.
Keywords—Unimodel Biometrics, Multimodel Biometrics,
Physiological Biometrices, Behavioural
Biometrices,
Application of Biometrices and Limitations.
I.
INTRODUCTION
Humans have used body characteristics such as face, voice,
etc. for thousands of years to recognize each other.
Biometrics is a technique for identification of an individual
by his or her physiological or behavioural characteristics.
The characteristics of Physiological are related to the shape
of the body. Examples such as face recognition, fingerprint,
iris recognition, retina, DNA, Palm print, hand geometry.
The characteristics of Behavioral related to the shape of the
body. Examples such as voice, vein, typing rhythm, gait.
Most Unimodel biometric system have a variety of
problem such as noisy data, inter-class variation, nonuniversality or spoof attacks. As a typical example of
biometrics, Face recognition is a technique which identifies
individuals based on their unique facial characteristics.
Unlike many other recognition method such as finger-print,
palm print and finger-vein recognition, they do not need to
require an individual to directly contact with the sensor in
order for recognition.
I. BIOMETRICS
A multimodal security solution uses two or more levels of
security (both external and internal). A multimodal solution
would, for example, consist of a swipe card in combination
with a PIN code. In contrast, a uni-modal solution would
involve the swipe card or use of a PIN code. It is also
possible to use a some part of building uni-modal security
solution, and in others a multimodal solution. For a
multimodal system to function well, it must use technology
and different security systems within each mode. In this
way, the quality and accuracy of the verification and
authentication processes are optimised. Whereas an
impostor may be verified at one level of security, the
statistical probability of him or her being verified at
another level. The definition of a multimodal security
system can be further extended to include: “… a biometric
system that uses multiple biometric characteristics.”
II. OVERVIEW OF COMMONLY USED
BIOMETRICS
Since there are number of biometric methods in use a brief
overview of various biometric characteristics will be given,
starting with newer technologies and then progressing to
older ones :
Infrared thermo gram (facial, hand or hand vein). It is
possible to capture the pattern of heat radiated by the
human body with in infrared camera. That pattern is unique
for each person. It is a non invasive method, but image
acquisition is rather difficult where there are other heat
emanating surfaces near the body. A related technology
using near infrared imaging is used to scan the back of a
fist to determine hand vein structure, also believed to be
unique. Like face recognition, it must deal with the extra
issues of three-dimensional space and orientation of the
hand.
I.
Gait-Gait is one of the newer technologies.
Basically, gait is the peculiar way one walks
and it is a complex biometrics. It is not
supposed to be very distinctive but can be
II.
III.
IV.
V.
VI.
used in some low-security applications. Gait
is a behavioural biometric and may not
remain the same for a long period of time,
due to change in body weight or serious brain
damage .etc. Keystroke- It is believed that
each person types on a keyboard in a
characteristic way and have different speed of
typing. This is also not very distinctive but it
is offers sufficient information to permit
identity verification. Keystroke dynamics is a
behavioural biometric; for some individuals,
one could expect to observe large variations
in typical typing patterns.
Odour-Each object spreads around an odour
that is characteristic of its chemical
composition and this could be used for
differentiating various objects. This would be
done by chemical sensors, each sensitive to a
certain group of compounds. Deodorants and
perfumes could lower the distinctiveness.
Hand geometry- It is one of the earliest
automated biometric system. Hand geometry
is the comparative dimensions of fingers and
the location of joints, shape and size of palm.
The technique is very simple, relatively easy
to use and inexpensive. Dry weather or
individual anomalies such as dry skin do not
appear to have any negative effects on the
verification accuracy.
Fingerprint- A fingerprint is a pattern of
ridges and furrows located on the tip of each
finger. Fingerprints were used for personal
identification for many centuries and the
matching accuracy was very high . Patterns
are extracted by creating an inked impression
of the fingertip on the paper. Today, compact
sensors provide digital images of these
patterns.
Fingerprint
recognition
for
identification acquires the initial image
through live scan of the finger by direct
contact with a reader device that can also
check for validating attributes such as
temperature and pulse.
Face-Facial images are the most common
biometric characteristic used by humans to
make a personal recognition, hence the idea
to use this biometric in technology. Face
verification involves extracting a feature set
from a two-dimensional image of the user's
face and matching it with matter stored in a
database. The most popular approaches to
face recognition are based on shape of facial
attributes such as eyes, eyebrows, nose, lips
and chin, and their spatial relationships.
Retina-Retinal recognition creates an "eye
signature" from the vascular configuration of
the retina which is supposed to be a
VII.
VIII.
IX.
X.
XI.
characteristic of each individual and each eye.
Since it is protected in an eye itself, and since
it is not easy to change or replicate the retinal
vasculature, this is one of the most secure
biometric.
Iris- Iris scanning is less intrusive than retinal
because the iris is easily visible from several
meters away. Responses of the iris to changes
in light can provide an important secondary
verification that the iris presented belongs to a
live subject. Irises of identical twins are
different, which is another advantage.
Palm print- Like fingerprints, palms of the
human hands contain unique pattern of ridges
and valleys. Since palm is larger then a
finger, palm print is expected to be even more
reliable than fingerprint. Palm print scanners
need to capture larger area with similar
quality as
fingerprint scanners, so they are more
expensive. A highly accurate biometric
system could be combined by using a highresolution palm print scanner that would
collect all the features of the palm such as
hand geometry, ridge and valley features,
principal lines, and wrinkles.
Voice-The features of an individual's voice
are based on physical characteristics such as
vocal tracts, mouth, nasal cavities and lips
that are used in creating a sound. These
characteristics of human speech are invariant
for an individual, but the behavioural part
changes over time due to age, medical
conditions and emotional state.
Signature-Signature is a simple, concrete
expression of the unique variations in human
hand geometry. The way a person signs his or
her name is known to be characteristic of that
individual. Signatures are a behavioural
biometric that change over a period of time
and are influenced by physical and emotional
conditions of a subject.
DNA- Deoxyribonucleic acid (DNA) is
probably the most reliable biometrics. It is in
fact a one-dimensional code unique for each
person. Exception are identical twins. This
method, however, has some drawbacks:
I.
Contamination and sensitivity, since
it is easy to steal a piece of DNA
from an individual and use it for an
ulterior purpose.
II.
no real-time application is possible
because DNA matching requires
complex
chemical
methods
involving expert's skills, 3) privacy
issues since DNA sample taken from
an individual is likely to show
susceptibility of a person to some
diseases. All this limits the use of
DNA
matching
to
forensic
applications.
Cannot replace a biometric that has been lost or
misappropriated. Once a biometric has been compromised,
it cannot be made right again. Biometrics evolve and
degrade over time and require constant updates of the
reference biometric.
IV. APPLICATIONS OF BIOMETRIC SYSTEMS
The applications of biometrics can be divided into the
following three main groups:
I.
Commercial applications such as computer
network login, electronic data security, ecommerce, Internet access, ATM, credit card,
physical access control, cellular phone, PDA,
medical records management, distance learning,
etc.
II. Government applications such as national ID card,
correctional facility, driver’s license, social
security, welfare-disbursement, border control,
passport control, etc.
III. Forensic
applications
such
as
corpse
identification, criminal investigation, terrorist
identification, parenthood determination, missing
children, etc.
V.
ADVANTAGES OF BIOMETRICES
I.
Increase security- Provide a convenient and lowcost additional tier of security.
II. Reduce fraud by employing hard-to-forge
technologies and materials. for e.g. Minimise the
opportunity for ID fraud, buddy punching.
III. Eliminate problems caused by lost IDs or
forgotten passwords.
IV. Make it possible, automatically, to know WHO
did WHAT, WHERE and WHEN.
VI.
DISADVANTAGES OF BIOMETRICS
While biometric technologies are on the upswing and their
use is becoming widespread because of the advantages we
have outlined above, biometric technologies also have
some disadvantages.
Limitations: Because these technologies apply to human
beings, they are affected and are limited by many situations
that may affect the individual. For example, fingerprint
technology may not be effective if the subject has dirty,
deformed, or cut hands; iris technology may not be
effective if the subject has a bad eye; and voice technology
may be affected by infections. Also background noise can
interfere with voice recognition systems.
Affordability: Because biometric technologies are new
technologies, they tend to be rather expensive without
widespread use. For example, facial and voice recognition
and iris technologies are still not yet affordable.
VII.
CONCLUSION AND FUTURE WORK
Biometrics provides security benefits across the spectrum
and from security system developers to security system
users. For decades, many highly secure environments have
used biometric technology for entry access. Today, the
primary application of biometrics is in physical security: to
control access to secure locations (rooms or
buildings).Biometric system which rely on the evidence of
multiple sources of information for establishing identity are
called Multimodal biometric system. This paper presents
an overview of multimodal biometrics, challenges faced by
multimodal biometric system . It also discuss their
applications to develop the security system for high
security areas. We also discuss the application of biometric
systems and their advantage over unimodal biometric
system. Biometrics permits unmanned access control.
Biometric devices, typically hand geometry readers, are in
office buildings, hospitals, useful for high-volume access
control. . A lot of research work is still need in this area. In
near future combination of more than two biometrics can
apply to enhance the security of our system.
REFRENCES
1) L. I. Kuncheva, C. J. Whitaker, C. A. Shipp, and R. P.
W. Duin, “Is Independence Good for Combining
Classifiers?”, Proc. International Conference on Pattern
Recognition (ICPR), Vol. 2, pp. 168-171, Barcelona,
Spain, 2001.
2) S. Prabhakar and A. K. Jain, “Decision-level Fusion in
Fingerprint Verification”, Pattern Recognition, Vol. 35,
No. 4, pp. 861-874, 2002.
3) J. L. Wayman, “Fundamentals of Biometric
Authentication Technologies”, International Journal of
Image and Graphics, Vol. 1, No. 1, pp. 93-113, 2001.
4) K.Kryszczuk, J. Richiardi, P.Prodanov, and A.Drygajlo,
"Reliability-Based
Decision
Fusion
inMultimodal
Biometric Verification Systems", EURASIP Journal on
Advances in Signal Processing Volume 2007. 5) J. Kittler,
M. Hatef, R. P. W. Duin, and J. Matas, “On Combining
Classifiers”, IEEE Trans. on Pattern Analysis and Machine
Intelligence, Vol. 20, No. 3, pp. 226-239, Mar 1998. [21] S.
Prabhakar and A. K. Jain, “Decision-level Fusion in
Fingerprint Verification”, Pattern Recognition, Vol. 35,
No. 4, pp. 861-874, 2002.
6) W. Zhao, R. Chellapra, P.J. Phillips, A. Rosenfeld,
“Face Recognition: A Literature Survey,” ACM
Computing Surveys, Vol. 35, No. 4, December 2003.
7) M.A. Turk, A.P. Pentland. “Face Recognition Using
Eigenfaces,” IEEE Conference on Computer Vision and
Pattern Recognition, pp.586--591, 1998.
8) P. N. Belhumeur, J. P. Hespanha, D. J. Kriegman,
“Eigenfaces vs. Fisherfaces: Recognition using class
specific linear projection,” IEEE Trans. Pattern Anal.
Machine Intell., vol. 19, pp. 711–720, May 1997.
9) M.S. Bartlett, J.R. Movellan, T.J. Sejnowski, “Face
Recognition by Independent Component Analysis”, IEEE
Trans. on Neural Networks, Vol. 13, No. 6, November
2002.
Download