Biometric Security Systems — Amit kumar, Sunita Sangwan HOD

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 4 - May 2014
Biometric Security Systems
Amit kumar, Sunita Sangwan HOD
M.Tech( CSE) MDU Rohtak
India
Abstract— This paper describes the design of a biometric
security system based upon the fingerprint, face, signature
and speech technology. In the first chapter there are the
biometric security systems and a concept of an integration
of the these technologies introduced. Then the fingerprint
technology followed by the face, signature and speech
technology is shortly described. There are discussed some
basic principles of each of these technologies.
Keywords:face, signature, speech, recognition, biometric, security
I. INTRODUCTION
includes physical attributes (fingerprint, face, iris, retina, palm
and hand) and the second class includes behavioural attributes
(e.g. voice, signature, movement characteristics (walk, lips or
hands movement, key press, etc.)).
II. MODEL OF BIOMETRIC SECURITY
Most biometric identification systems are two-piece systems,
which consist of a special hardware and a processing
hardware. The special hardware part consists of a sensor,
which is connected to the processing hardware. The
recognition and identification is performed on the processing
hardware (usually a PC). These separate parts are hazardous
or the security of the whole system.
The term "biometrics" is derived from the Greek words bio
(life) and metric(to measure). biometrics refers to technologies
for measuring and analysing a person's physiological or
behavioural characteristics. These characteristics are unique to
individuals hence can be used to verify or identify a person.
Authenticate person identification is necessary due to the
growing importance of the information technology and the
necessity of the protection and access restriction. The
authentication or verification might serve for a purpose of an
access grant. Everyone successfully identified and accepted
may acquire certain privileges.
The person authentication/verification is not the only part of
the biometry. The biometry includes all systems that make the
interface between a computer system and a human.
Figure1
III. FINGERPINTS ANAYLYSIS
There are a lot of ways that could be used for identification
purposes. These ways are unique for each person. Of those
ways, the fingerprint was the first one to be discovered and
examined. Everyone’s finger carries a unique pattern. This
pattern consists of different loops, spirals and curves and is
absolutely unique.
Fingerprint-recognition-based IT security has reached great
importance as a mean of admitting information and services.
Other attributes, which are unique for each human, include
face features, eye iris and retina features, palm and hand
geometry, ear shape, DNA and hand writing feature. Some
methods using these features are still under development, but
they require new devices and technologies for detecting the
deviations.
The speech-based methods are not common yet, but they are
supposed to be very important as soon as the reliable
identification methods will be developed. The biometric
attributes could be divided into two classes. The first class
ISSN: 2231-5381
This is one of the most commonly used algorithms for
extracting features that characterizes a fingerprint. The
different Minutiae feature locations and types can identify
different individuals. These are what are stored in the
Biometric template. Image & Signal processing used to
process.
Figure 1.1
Figure 1.2
IV. FACE ANYALYSIS
Humans are very good at recognizing faces and complex
patterns. Even a passage of time doesn't effect this capability
http://www.ijettjournal.org
Page 169
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 4 - May 2014
and therefore it would help if computers become as robust as
humans in face recognition. Face recognition system can help
in many ways :
1) Checking for criminal records.
2) Enhancement of security by using surveillance cameras in
conjunction with face recognition system.
3) Finding lost children's by using the images received from
the cameras fitted at some public places .
4) Knowing in advance if some VIP is entering the hotel.
5) Detection of a criminal at public place.
6) Can be used in different areas of science for comparing a
entity with a set of entities.
7) Pattern Recognition
V. SIGNATURE ANALYSIS
Signature verification is the process used to recognize an
individual’s hand-written signature.
Dynamic signature verification technology uses the
behavioural biometrics of a hand written signature to confirm
the identity of a computer user. This is done by analysing the
shape, speed, stroke, pen pressure and timing information
during the act of signing. Natural and intuitive, the technology
is easy to explain and trust.
Figure 1.4
Figure 1.5
VI. SPEECH ANALYSIS
Figure 1.6
Figure 1.7
VII.
CONCLUSIONS
Nowadays, a PIN code or a password is being used for the
purposes of an authentication, which is the weakest point of
the whole system. Biometry offers one reasonable solution.
Biometry should be used instead of passwords and PIN codes.
A user will be authenticated by his/her biometric attributes
and he/she will be either confirmed or refused. The
confirmation or refusal depends on the acceptance of his/her
biometric attributes.
But the PIN and password replacement is not the only benefit
of biometry. Present biometric technology is not advanced
enough to be used for the cryptographic purposes, because it
is very difficult to detect and extract always the same or
nearly the same features. The features are changing with
growth and age. Hence some rough pasteurization (to avoid
the position change of some feature) and subsets computation
(to ensure the repeatability of some part of the features) is
necessary.
VIII.
REFERENCES
[1] Drahansky,M.:Fingerabdruckerkennung mittels neuronaler
Netze, Diploma thesis, 2001
[2] Smolik, L., Drahansky, M.: Exploitation of smart cards
and human biometric attributes,CATE, 2001
[3] Emyroglu, Y.: Fingerprint Image Enhancement &
Recognition; Yldyz Technical University,Turkey, 1997
[4] Hong, L.: Automatic Personal Identification Using
Fingerprints, Michigan State University,1998
[5] Jain, L.C., Halici, U., Hayashi, I., Lee, S.B., Tsutsui, S.:
Intelligent Biometric Techniques in Fingerprint and Face
Recognition, CRC Press LLC, 1999
[6] Nanavati, S., Thieme, M., Nanavati, R.: Biometrics:
Identity Verification in a Networked World, John Wiley &
Sons, 2002
[7] Huang, X., Acero, A., Hon, HW.: Spoken Language
Processing, New Jersey, USA, Prentice
Speech recognition is the process by which a computer (or
other type of machine) identifies spoken words. Basically, it
means talking to your computer, AND having it correctly
recognize what you are saying
ISSN: 2231-5381
http://www.ijettjournal.org
Page 170
Download