International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 4 - May 2014 Biometric Security Systems Amit kumar, Sunita Sangwan HOD M.Tech( CSE) MDU Rohtak India Abstract— This paper describes the design of a biometric security system based upon the fingerprint, face, signature and speech technology. In the first chapter there are the biometric security systems and a concept of an integration of the these technologies introduced. Then the fingerprint technology followed by the face, signature and speech technology is shortly described. There are discussed some basic principles of each of these technologies. Keywords:face, signature, speech, recognition, biometric, security I. INTRODUCTION includes physical attributes (fingerprint, face, iris, retina, palm and hand) and the second class includes behavioural attributes (e.g. voice, signature, movement characteristics (walk, lips or hands movement, key press, etc.)). II. MODEL OF BIOMETRIC SECURITY Most biometric identification systems are two-piece systems, which consist of a special hardware and a processing hardware. The special hardware part consists of a sensor, which is connected to the processing hardware. The recognition and identification is performed on the processing hardware (usually a PC). These separate parts are hazardous or the security of the whole system. The term "biometrics" is derived from the Greek words bio (life) and metric(to measure). biometrics refers to technologies for measuring and analysing a person's physiological or behavioural characteristics. These characteristics are unique to individuals hence can be used to verify or identify a person. Authenticate person identification is necessary due to the growing importance of the information technology and the necessity of the protection and access restriction. The authentication or verification might serve for a purpose of an access grant. Everyone successfully identified and accepted may acquire certain privileges. The person authentication/verification is not the only part of the biometry. The biometry includes all systems that make the interface between a computer system and a human. Figure1 III. FINGERPINTS ANAYLYSIS There are a lot of ways that could be used for identification purposes. These ways are unique for each person. Of those ways, the fingerprint was the first one to be discovered and examined. Everyone’s finger carries a unique pattern. This pattern consists of different loops, spirals and curves and is absolutely unique. Fingerprint-recognition-based IT security has reached great importance as a mean of admitting information and services. Other attributes, which are unique for each human, include face features, eye iris and retina features, palm and hand geometry, ear shape, DNA and hand writing feature. Some methods using these features are still under development, but they require new devices and technologies for detecting the deviations. The speech-based methods are not common yet, but they are supposed to be very important as soon as the reliable identification methods will be developed. The biometric attributes could be divided into two classes. The first class ISSN: 2231-5381 This is one of the most commonly used algorithms for extracting features that characterizes a fingerprint. The different Minutiae feature locations and types can identify different individuals. These are what are stored in the Biometric template. Image & Signal processing used to process. Figure 1.1 Figure 1.2 IV. FACE ANYALYSIS Humans are very good at recognizing faces and complex patterns. Even a passage of time doesn't effect this capability http://www.ijettjournal.org Page 169 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 4 - May 2014 and therefore it would help if computers become as robust as humans in face recognition. Face recognition system can help in many ways : 1) Checking for criminal records. 2) Enhancement of security by using surveillance cameras in conjunction with face recognition system. 3) Finding lost children's by using the images received from the cameras fitted at some public places . 4) Knowing in advance if some VIP is entering the hotel. 5) Detection of a criminal at public place. 6) Can be used in different areas of science for comparing a entity with a set of entities. 7) Pattern Recognition V. SIGNATURE ANALYSIS Signature verification is the process used to recognize an individual’s hand-written signature. Dynamic signature verification technology uses the behavioural biometrics of a hand written signature to confirm the identity of a computer user. This is done by analysing the shape, speed, stroke, pen pressure and timing information during the act of signing. Natural and intuitive, the technology is easy to explain and trust. Figure 1.4 Figure 1.5 VI. SPEECH ANALYSIS Figure 1.6 Figure 1.7 VII. CONCLUSIONS Nowadays, a PIN code or a password is being used for the purposes of an authentication, which is the weakest point of the whole system. Biometry offers one reasonable solution. Biometry should be used instead of passwords and PIN codes. A user will be authenticated by his/her biometric attributes and he/she will be either confirmed or refused. The confirmation or refusal depends on the acceptance of his/her biometric attributes. But the PIN and password replacement is not the only benefit of biometry. Present biometric technology is not advanced enough to be used for the cryptographic purposes, because it is very difficult to detect and extract always the same or nearly the same features. The features are changing with growth and age. Hence some rough pasteurization (to avoid the position change of some feature) and subsets computation (to ensure the repeatability of some part of the features) is necessary. VIII. REFERENCES [1] Drahansky,M.:Fingerabdruckerkennung mittels neuronaler Netze, Diploma thesis, 2001 [2] Smolik, L., Drahansky, M.: Exploitation of smart cards and human biometric attributes,CATE, 2001 [3] Emyroglu, Y.: Fingerprint Image Enhancement & Recognition; Yldyz Technical University,Turkey, 1997 [4] Hong, L.: Automatic Personal Identification Using Fingerprints, Michigan State University,1998 [5] Jain, L.C., Halici, U., Hayashi, I., Lee, S.B., Tsutsui, S.: Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press LLC, 1999 [6] Nanavati, S., Thieme, M., Nanavati, R.: Biometrics: Identity Verification in a Networked World, John Wiley & Sons, 2002 [7] Huang, X., Acero, A., Hon, HW.: Spoken Language Processing, New Jersey, USA, Prentice Speech recognition is the process by which a computer (or other type of machine) identifies spoken words. Basically, it means talking to your computer, AND having it correctly recognize what you are saying ISSN: 2231-5381 http://www.ijettjournal.org Page 170