veer narmad south gujarat university, surat. m.sc. (information technology) programme

Upload: emily-hall

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    1/47

    Veer Narmad South Gujarat University,

    Surat.

    M.Sc. (Information Technology)Programme

    Seminar Report

    7

    th

    Semester

    M.Sc. (Information Technology)

    5 Year Integrated Course

    Year 2008 2009

    BIOMETRIC TECHNOLOGY

    Guided By : Parul Madam Submitted By : Freny SinghviExam No. : 74

    Semester : 7th

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    2/47

    BIOMETRIC TECHNOLOGY

    Veer Narmad South Gujarat University,Surat.

    M.Sc. (Information Technology)

    Programme

    Certificate

    This is to certify that Ms. Freny Singhvi Exam Seat Number000074 has

    satisfactorily given his/her seminar entitled Biometric Technology as a

    partial fulfilment of the requirements for 7th Semester - M.Sc.

    (Information Technology) [5 Year Integrated course], during the

    academic Year 2008-2009.

    Date : 7/12/09 Prof. S.V. PatelI/C Director

    Place : Surat M.Sc. (I.T.) Programme.

    2

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    3/47

    BIOMETRIC TECHNOLOGY

    VN South Gujarat University, Surat

    INDEX

    Sr.no TOPIC PAGE NO.

    1. What is biometrics? 3

    2. Why are biometric systems used? 4

    3. Why are biometric systems secured? 5

    4. Advantages of biometrics 6

    5. Identification/ verification 7

    6. Typology of biometrics 8

    7. How biometric systems work? 98. Various biometric systems 11

    9. Fingerprint recognition 12

    10. Iris scanning 21

    11. Retinal scanning 25

    12. Hand geometry 28

    13. Face recognition 33

    14. Voice recognition 36

    15. Signature recognition 4016. Multimodal biometrics 41

    17. Applications of biometrics 43

    18. Attacks and issues 44

    19. Conclusion 45

    20. References 46

    3

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    4/47

    BIOMETRIC TECHNOLOGY

    What is BIOMETRICS?

    BIOMETRICS refers to the automatic identification of a

    person based on his physiological / behavioral

    characteristics .

    Biometrics is the study of methods for uniquely recognizing

    humans based upon one or more intrinsic physical or

    behavioral traits.

    BIOS = LIFE METRICS = MEASURE

    In technical terms, Biometrics is the automated technique of

    measuring the physical characteristics or personal trait of an

    individual and comparing that characteristic or trait to a

    database for purpose of recognizing that individual.

    4

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    5/47

    BIOMETRIC TECHNOLOGY

    Why are biometric systems used?

    Currently, the prevailing techniques of user authenticationare linked to passwords, user IDs, identification cards and

    PINs (personal identification numbers).

    These techniques suffer from several limitations: Passwords

    and PINs can be guessed, stolen or illicitly acquired by covert

    observation.

    In addition, there is no way to positively link the usage of thesystem or service to the actual user. A password can be

    shared, and there is no way for the system to know who the

    actual user is. A credit card transaction can only validate the

    credit card number and the PIN, not if the transaction is

    conducted by the rightful owner of the credit card.

    This is where biometrics systems provide a more accurate

    and reliable user authentication methods.

    5

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    6/47

    BIOMETRIC TECHNOLOGY

    Why are biometric systems secure?

    Unique: The various biometrics systems have been

    developed around unique characteristics of individuals. The

    probability of 2 people sharing the same biometric data is

    virtually nil.

    Cannot be shared: Because a biometric property is an

    intrinsic property of an individual, it is extremely difficult to

    duplicate or share (you cannot give a copy of your face or

    your hand to someone!).

    Cannot be copied: Biometric characteristics are nearly

    impossible to forge or spoof, especially with new

    technologies ensuring that the biometric being identified is

    from a live person.

    Cannot be lost: A biometric property of an individual can be

    lost only in case of serious accident.

    6

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    7/47

    BIOMETRIC TECHNOLOGY

    Advantages of biometrics over existing

    techniques:

    Uniqueness.

    No need to remember passwords or carry tokens.

    Biometrics cannot be stolen, lost or forgotten.

    More secure than a long password.

    Solves repudiation problem.

    7

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    8/47

    BIOMETRIC TECHNOLOGY

    Biometrics are used for:

    IDENTIFICATION

    VERIFICATION (AUTHENTICATION)

    Identification is determining who a person is. It involves

    trying to find a match for a person's biometric data in a

    database containing records of people and that characteristic.

    This method requires time and a large amount of processing

    power, especially if the database is very large.

    Verification is determining if a person is who they say theyare. It involves comparing a user's biometric data to the

    previously recorded data for that person to ensure that this is

    the same person. This method requires less processing power

    and time, and is used for access control (to buildings or data).

    8

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    9/47

    BIOMETRIC TECHNOLOGY

    Typology of Biometrics

    There are two types of biometrics :-

    PHYSICAL BIOMETRICS

    BEHAVIORAL BIOMETRICS

    Physical biometrics

    A physiological characteristic is a relatively stable physical

    feature such as finger print, hand silhouette , iris

    pattern or facial features. These factors are basically

    unalterable with out trauma to the individual.

    The degree of intrapersonal variation is smaller in

    physical characteristics than in a behavioral one.

    Behavioral Biometrics

    A behavioral tract, on the other hand, has some

    physiological basis, but also reflects persons physiological

    makeup. The most common trait used in identification is a

    persons signature. Other behaviours used include a

    persons keyboard typing and speech patterns.

    The degree of intrapersonal variation is larger in

    behavioral characteristics than in a physical one.

    Hence, as most of behavioural characteristics change over

    time, many biometrics machines do not rely on behaviour.

    9

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    10/47

    BIOMETRIC TECHNOLOGY

    How biometric systems work?

    Biometric devices normally consist of 3 elements:

    a scanner / reader : that captures the user's biometrics

    characteristics .

    a piece of software : that converts this data into digital form

    and compares it with data previously recorded

    a database : which stores the biometric data .

    The Biometric Process

    The biometric process comprises 4 main steps:

    sample capture

    feature extraction

    template comparison and

    matching.

    At enrollment, a persons biometric information is captured

    by the scanner.

    The software then translates this information with an

    algorithm , into a code that the database stores.

    When the person needs to be identified, the system will take

    the information about the person again, translates this new

    information with the algorithm , and then compares the new

    code with the ones in the database to discover a match and

    hence, identification

    10

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    11/47

    BIOMETRIC TECHNOLOGY

    Block diagram of biometric process.

    Types of biometric systems:

    11

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    12/47

    BIOMETRIC TECHNOLOGY

    The main physical biometric technologies include:

    Fingerprint Recognition

    Iris Scanning

    Retinal Scanning

    Hand Geometry

    Face Recognition

    The main behavioral biometric technologies include:

    Voice Recognition (analyzing a speaker's vocal behavior)

    Signature Recognition (analyzing the way you sign).

    Keystroke Recognition (measuring the time spacing of

    typed words).

    Other biometric techniques, still in exploratory stages would

    include DNA biometrics, ear shape, fingernails, odor.

    Fingerprint Recognition

    12

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    13/47

    BIOMETRIC TECHNOLOGY

    Principles of fingerprint biometrics

    Fingerprints are usually considered to be unique, with no two

    fingers having the exact same dermal ridge characteristics.

    A fingerprint is made of a number of ridges and valleys on

    the surface of the finger.

    Ridges are the upper skin layer segments of the finger and

    valleys are the lower segments.

    The ridges form so-called minutia points: ridge endings

    (where a ridge end) and ridge bifurcations (where a ridgesplits in two).

    The uniqueness of a fingerprint can be determined by the

    pattern of ridges and furrows as well as the minutiae

    points.

    13

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    14/47

    BIOMETRIC TECHNOLOGY

    14

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    15/47

    BIOMETRIC TECHNOLOGY

    There are five basic fingerprint patterns:

    arch

    tented arch,

    left loop

    right loop and

    whorl.

    15

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    16/47

    BIOMETRIC TECHNOLOGY

    How the fingerprint biometrics work?

    The fingerprint recognition system uses a compact

    terminal that incorporates light and CCD image sensors

    to take high-resolution picture of a fingerprint .

    To enrol a user is assigned a personal identification number

    and then puts a single finger on the glass or Plexiglas

    plate for scanning by a CCD image sensor.

    16

    Step 1:Finger is scanned and viewed by the Systemsaccess unit at the point of entry.

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    17/47

    BIOMETRIC TECHNOLOGY

    Step 2:

    In applications for children (under the age of 18) the image is

    standardized and resized before processing.

    17

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    18/47

    BIOMETRIC TECHNOLOGY

    Step 3:

    System develops a grid of intersection points (minutia points) from

    the swirls and arcs of the scanned finger.

    18

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    19/47

    BIOMETRIC TECHNOLOGY

    Step 4:

    The image is discarded from the record and is no longer available

    to the system or any operator.

    Only a Template remains that indicates the intersection points.

    19

    5178954

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    20/47

    BIOMETRIC TECHNOLOGY

    Step 5:

    In fact, all that the system stores and recognizes for each individual

    is a set of numbers that can only be interpreted as a template.

    The system only remembers and processes numbers for eachindividual, just like a social security number.

    The advantages with a biometric approach is that the number

    cannot be duplicated, lost or stolen, and uniqueness is defined

    by the individual.

    At the matching stage, the fingerprint image is processed to

    extract its minutia points, which are then compared with theregistered template.

    207895.3094.92345.128056.123987.10294.24360.193245.3495.2983.07895.3094.92345.128056.123987.10294.24360.193245.3495.2983.7895.3094.92345.128056.123987.10294.24360.193245.3495

    .2983.207895.3094.92345.128056.123987.10294.24360.193245.3495.2983.07895.3094.92345.128056.123987.10294.24360.193245.3495.2983.7895.3094.92345.128056.123987.10294.24360.193245.3495.2983.207895.3094.92345.1

    28056.123987.10294.24360.193245.3495.2983.07895.3094.92345.128056.123987.10294.24360.193245.3495.2983.7895.3094.92345.

    20

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    21/47

    BIOMETRIC TECHNOLOGY

    Advantages:

    The fingerprints do not change over time.

    Easy to use.

    Small size.

    Low power

    Non intrusive

    Disadvantages:

    Finger imaging includes the need for physical contact withthe optical scanner.

    The possibility of poor quality images due to residue on the

    finger such as dirt and body oils.

    Scars.

    21

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    22/47

    BIOMETRIC TECHNOLOGY

    Iris Scanning

    22

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    23/47

    BIOMETRIC TECHNOLOGY

    Principles of Iris Biometrics

    The iris is the elastic, pigmented, connective tissue that

    controls the pupil.

    The iris is formed in early life in a process called

    morphogenesis.

    Once fully formed, the texture is stable throughout life.

    It is the only internal human organ visible from the outside

    and is protected by the cornea.

    The iris of the eye has a unique pattern, from eye to eye and

    person to person.

    How iris biometrics works?

    23

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    24/47

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    25/47

    BIOMETRIC TECHNOLOGY

    To prevent an image / photo of the iris from being used

    instead of a real "live" eye, iris scanning systems will vary

    the light and check that the pupil dilates or contracts.

    Advantages Highly accurate: There is no known case of a false

    acceptance for iris recognition .

    Not intrusive and hygienic - no physical contact required .

    Disadvantages: The user must hold still while the scan is taking place .

    Relatively high expense of the system as compared to other

    biometric technologies.

    25

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    26/47

    BIOMETRIC TECHNOLOGY

    Retinal Scanning

    Principles of retinal biometrics

    The blood vessels on the retina, at the back of the eye have a

    unique pattern, from eye to eye and person to person.

    26

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    27/47

    BIOMETRIC TECHNOLOGY

    How retinal biometrics work?

    Retina scans require that the person removes the glasses,

    places his eye close to the scanner, stare at a specific point,

    and remain still, and focus on a specified location for

    approximately 10 to 15 seconds while the scan is completed.

    A retinal scan involves the use of a low-intensity coherent

    light source, which is projected onto the retina.

    This light illuminates the blood vessels which are then

    photographed and analysed.

    Light is projected on retina

    A coupler is used to read the blood vessel patterns and

    represents it in less than 35 bytes of information.

    27

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    28/47

    BIOMETRIC TECHNOLOGY

    This information is stored as small data templates which

    provides quick identity confirmations, and handles well the

    job of recognizing individuals in a database at the time

    of matching.

    Advantages Low occurrence of false negatives

    Highly reliable because no two people have the same retinal

    pattern

    Speedy results: Identity of the subject is verified very

    quickly.

    Disadvantages Measurement accuracy can be affected by diseases such as

    cataracts and glaucoma.

    High equipment costs.

    Poor lighting can affect results.

    Enrollment and scanning are intrusive and slow

    Hand Geometry

    28

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    29/47

    BIOMETRIC TECHNOLOGY

    29

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    30/47

    BIOMETRIC TECHNOLOGY

    Principles of hand biometrics

    An individual's hand does not significantly change after a

    certain age.

    Unlike fingerprints, the human hand isn't unique. Individual

    hand features are not descriptive enough for identification.

    However, hand biometric recognition systems are accurate

    for verification purposes when combining various individual

    features and measurements of fingers and hands.

    How hand biometrics work?

    30

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    31/47

    BIOMETRIC TECHNOLOGY

    The user places the palm of his or her hand on the reader's

    surface and aligns his or her hand with the guidance pegs

    which indicate the proper location of the fingers .

    Looking down upon the hand is a charge-coupled device

    (CCD) digital camera, which with the help of mirrorcaptures the side and top view of the hand simultaneously

    The digital image is analysed by software running on a

    built in HD 64180 microprocessor to extract identifying

    characteristics from the hand image .

    The system then measures and analyzes the overall structure,

    shape and proportions of the hand like- Length , width and thickness of hand, fingers and joints.

    characteristics of the skin surface such as creases and ridges.

    Thus the system stores the hand geometry template in the

    database.

    At the time of matching, the device checks its database forverification of the user.

    To prevent a mold or a cast of the hand from being used,

    some hand biometric systems will require the user to move

    their fingers.

    Also, hand thermography can be used to record the heat of

    the hand, or skin conductivity can be measured.

    Measurements of hand are taken.

    31

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    32/47

    BIOMETRIC TECHNOLOGY

    Hand is alligned on the readers surface by guidance pins.

    Advantages

    32

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    33/47

    BIOMETRIC TECHNOLOGY

    Easy to use .

    Non intrusive .

    Small amount of data required to uniquely identify a user, so

    a large number of templates can be easily stored in a

    standalone device .

    Disadvantages

    Lack of accuracy .

    Fairly expensive .

    Injuries to hands are fairly common and would prevent thehand biometric system from working properly .

    Face recognition

    33

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    34/47

    BIOMETRIC TECHNOLOGY

    Face biometrics principles

    The dimensions, proportions and physical attributes of a person's

    face are unique.

    34

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    35/47

    BIOMETRIC TECHNOLOGY

    How face biometrics work?

    At enrolment, several pictures are taken of the user's face,

    with slightly different angles and facial expressions, to allow

    for more accurate matching.

    Biometric facial recognition systems will measure and

    analyze the overall structure, shape and proportions of the

    face:

    Distance between the eyes, nose, mouth, and jaw edges

    upper outlines of the eye sockets

    the sides of the mouth

    the location of the nose and eyes

    the area surrounding the cheekbones.

    The system then stores the template containing the facial

    geometry.

    35

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    36/47

    BIOMETRIC TECHNOLOGY

    For verification and identification, the user stands in front of

    the camera for a few seconds, and the scan is compared with

    the template previously recorded.

    To prevent an image / photo of the face or a mask from beingused, face biometric systems will require the user to smile,

    blink, or nod their head. Also, facial thermography can be

    used to record the heat of the face (which won't be affected

    by a mask).

    The main facial recognition methods are:

    feature analysis

    neural network, eigenfaces

    automatic face processing.

    Advantages:Not intrusive .

    No physical contact with system: can be done from a

    distance.

    Disadvantages: User perceptions / civil liberty: Most people are not

    comfortable with having their picture taken.

    It is easy to change the proportion of one's face by wearing a

    mask, a nose extension, etc.

    36

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    37/47

    BIOMETRIC TECHNOLOGY

    Voice Recognition

    Principles of voice biometrics

    Our voices are unique to each person (including twins), and

    cannot be exactly replicated

    How voice biometrics work?

    37

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    38/47

    BIOMETRIC TECHNOLOGY

    Speech includes two components:

    a physiological component (the voice tract)

    and a behavioural component (the accent).

    It is almost impossible to imitate anyone's voice perfectly.

    Voice recognition systems can discriminate between two

    very similar voices, including twins.

    A cold does not affect the vocal tract, so there will be no

    adverse affect on accuracy levels.

    Only extreme vocal conditions such as laryngitis will prevent

    the user from using the system.

    The performance of voice recognition systems may vary

    depending on the quality of the audio signal.

    At enrollment , the person is asked to speak a stated upon

    phrase.

    Voice recognition can utilize various audio capture device(microphones, telephones and PC microphones).

    Voice recognition involves taking the acoustic signal of

    persons voice and converting it into a unique digital code

    which can be the stored in a template.

    For future recognition, the exact same phrase is spoken andthe signal is analysed by the voice recognition system.

    To prevents the risk of unauthorised access via tape

    recordings, the user is asked to repeat random phrases.

    38

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    39/47

    BIOMETRIC TECHNOLOGY

    VOICE PRINT

    COMPARISION OF TWO VOICE SIGNALS

    Advantages

    39

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    40/47

    BIOMETRIC TECHNOLOGY

    Ability to use existing telephones .

    Can be automated, and coupled with speech recognition

    systems .

    Disadvantages

    High false non-matching rates .

    Phrases can be misspoken.

    Background noises can interfere with the system.

    Peoples voices can change (for e.g.: when they are sick or in

    extreme emotional states).

    Signature Recognition

    40

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    41/47

    BIOMETRIC TECHNOLOGY

    How signature biometrics work? Biometric signature recognition systems will measure and

    analyze the physical activity of signing, such as

    the stroke order

    the pressure applied the pen/stylus speed

    direction in signature

    the points at which the pen is lifted from the paper.

    These behavioral patterns are captured through a specially

    designed pen and compared with a template of process

    patterns.

    Some systems may also compare visual images of signatures.

    Advantages It is extremely difficult to mimic the behavior of signing .

    Low False Acceptance Rates (FAR).

    Disadvantages People may not always sign in a consistent manner.

    Problems of long-term reliability.

    Lack of accuracy.

    Multimodal Biometrics

    41

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    42/47

    BIOMETRIC TECHNOLOGY

    Multimodal biometrics use a combination of different

    biometric recognition technologies

    In order for the biometrics to be ultra-secure and to provide

    more-than-average accuracy, more than one form ofbiometric identification is required.

    Hence the need arises for the use of multimodal biometrics

    which uses a combination of different biometric recognition

    technologies.

    Multimodal biometric technology uses more then one

    biometric identifier to compare the identity of the person.

    Therefore in the case of a system using say three

    technologies i.e. face mimic and voice. If one of the

    technologies is unable to identify, the system can still use the

    other two to accurately identify against.

    Multimodal technologies have been in use commercially

    since 1998.

    Some of the commonly used multimodal biometric

    technologies are:

    Multimodal system Integrating Faces and Fingerprints

    for Personal Identification

    A Multimodal Biometric System Using Fingerprint, Face

    and Speech.

    42

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    43/47

    BIOMETRIC TECHNOLOGY

    Multimodal system including face recognition, fingerprint

    recognition and speech recognition.

    43

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    44/47

    BIOMETRIC TECHNOLOGY

    Applications of biometric technology:

    Banking/Financial services such as ATMs, payment

    terminals, cashless payment , automated cheque cashing etc.

    Computer & IT Security such as Internet transactions, PC

    login etc.

    Healthcare such as privacy concern, patient information

    control, drugcontrol etc.

    Immigration such as border control, frequent travelers,

    asylum seekers etc.

    Law and Order such as public ID card, voting, gun control,

    prison etc.

    Gatekeeper/Door Access Control such as secure installations,

    military, hotel, building management etc.

    Telecommunication such as telephony, mobile phone,

    subscription fraud, call center, games etc.

    Time and Attendance such as school and company

    attendance

    Welfare, including health care services and benefit payments

    Consumer Products such as automated service machines,

    PDA etc.

    44

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    45/47

    BIOMETRIC TECHNOLOGY

    Attacks and issues:

    There are seven main areas where attacks may occur in a biometric

    system:

    Presenting fake biometrics or a copy at the sensor, for

    instance a fake finger or a face mask. It is also possible to try and

    resubmitting previously stored digitized biometrics signals such

    as a copy of a fingerprint image or a voice recording.

    Producing feature sets preselected by the intruder by

    overriding the feature extraction process.

    Tampering with the biometric feature representation: The

    features extracted from the input signal are replaced with a

    fraudulent feature set.

    Attacking the channel between the stored templates and the

    matcher: The stored templates are sent to the matcher through a

    communication channel. The data traveling through this channel

    could be intercepted and modified - There is a real danger if the

    biometric feature set is transmitted over the Internet.

    Corrupting the matcher: The matcher is attacked and

    corrupted so that it produces pre-selected match scores.

    Tampering with stored templates, either locally or remotely.

    Overriding the match result.

    45

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    46/47

    BIOMETRIC TECHNOLOGY

    Conclusion

    A range of biometric systems are in developments or on

    the market because no one system meets all needs. The trade off

    in developing these systems involve component cost, reliability,

    discomfort in using a device, the amount of data needed and

    other factors. But the application of advanced digital techniques

    has made the job possible. Further experiments are going all

    over the world. In India also there is a great progress in this

    field. So we can expect that in the near future itself, the

    biometric systems will become the main part in identification

    purposes.

    46

  • 8/14/2019 Veer Narmad South Gujarat University, Surat. M.sc. (Information Technology) Programme

    47/47

    BIOMETRIC TECHNOLOGY

    References

    www.Biometricnewsportal.com

    Google search

    Biometric image description technology - David Zang.

    Biometric consortium examples of biometrics.