biometric technology document

Upload: jeetu-parmar

Post on 06-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Biometric Technology Document

    1/23

    1

    A Technical Seminar Report on

    BIOMETRIC TECHNOLOGY

    Submitted to

    JAWAHARLAL NEHRU TECHNOLOGY UNIVERSITY, HYDERABAD

    In partial fulfillment for the requirement of the award of the degree

    BACHELOR OF TECHNOLOGY

    In

    ELECTRONICS AND COMMUNICATION ENGINEERING

    Submitted By

    ANURAG SHARMA 08R01A0406

    Under the Esteemed guidance of

    P.Sirisha, Associate Professor

    Department Of Electronics and Communication Engineering

    CMR INSTITUTE OF TECHNOLOGY

    (Approved by AICTE, Affiliated by JNTU, Kukatpally)

    Kandlakoya, Medchal Road, Hyderabad

  • 8/2/2019 Biometric Technology Document

    2/23

    2

    CMR INSTITUTE OF TECHNOLOGY

    (Approved by AICTE, Affiliated by JNTU, Kukatpally)

    Kandlakoya, Medchal Road, Hyderabad

    Department of Electronics and Communication Engineering

    CERTIFICATE

    This is to certify that the seminar entitled BIOMETRIC TECHNOLOGY is submitted by

    ANURAG SHARMA (08R01A0406) submitted in partial fulfillment of the requirement

    for the award of the degree Bachelor of Technology in Electronics and Communication

    Engineering from Jawaharlal Nehru Technology University, Kukatpally, Hyderabad for

    the academic year 2011-2012.

    P.Sirisha Prof. A. Balaji Nehru

    (Internal Guide) (Head of Department)

  • 8/2/2019 Biometric Technology Document

    3/23

    3

    ACKNOWLEDGEMENT

    I am extremely thankful to my internal guide P.Sirisha, Associate Professor and

    Prof. A Balaji Nehru, Head of Department, Department of Electronics and

    Communication, for there constant inspiration and support. I express my thanks to all the

    help and co-ordination extended in bringing out this seminar successfully on time.

    I express my sincere gratitude to respected Dr. Janga Reddy, Principal of CMRIT

    and Pof. A Balaji Nehru, Head of Department of ECE, for their valuable guidance

    encouragement and suggestions.

  • 8/2/2019 Biometric Technology Document

    4/23

    4

    BIOMETRICS

    Abstract

    Over the last few years a new area of engineering science has been established

    whose products are likely to create a large market in the near future. It has been

    called ''biometrics". The pioneers of this new domain intend to construct devices

    which would allow identification of a person on the basis of his/her ''biological''

    characteristics: voice, dynamics of movements, features of face and other parts of

    the body, retina or iris pattern. Nature has made human beings with different

    characteristics which may vary from one person to another. This property is made

    use of by Biometric technologyto distinctly identify each personBiometric system is essentially a pattern recognition system which recognizes a

    user by determining the authenticity of a specific physiological or behaviora

    characteristic possessed by the user. Several important issues must be considered

    in designing a practical biometric system. First, a user must be enrolled in the

  • 8/2/2019 Biometric Technology Document

    5/23

    5

    system so that his biometric template can be captured. This template is securely

    stored in a central database or a smart card issued to the user. The template is

    retrieved when an individual needs to be identified. Depending on the context, a

    biometric system can operate either in a verification (authentication) or an

    identification mode.

    Biometrics refers to the automatic identification of a person based on his/her

    physiological or behavioral characteristics. This method of identification offers

    several advantages over traditional methods involving ID cards (tokens) or PIN

    numbers (passwords) for various reasons: (i) the person to be identified is

    required to be physically present at the point-of-identification; (ii) identification

    based on biometric techniques obviates the need to remember a password or carry

    a token. With the increased integration of computers and Internet into our

    everyday lives, it is necessary to protect sensitive and personal data. By replacing

    PINs (or using biometrics in addition to PINs), biometric techniques can potentially

    prevent unauthorized access to ATMs, cellular phones, laptops, and computer

    networks. Unlike biometric traits, PINs or passwords may be forgotten, and

    tokens like passports and driver's licenses may be forged, stolen, or lost.

  • 8/2/2019 Biometric Technology Document

    6/23

    6

    INDEX Page no.

    CERTIFICATE 2

    ACKNOWLEDGEMENT 3

    ABSTRACT 4

    CHAPTER 1 8

    1. INTRODUCTION

    1.1 Biometrics

    1.2 Definition

    1.3 Why we need it?

    1.4 Biometrics - What is it?

    CHAPTER 2 10

    2.DESIGN ISSUES OF BIOMETRIC SYSTEM

    2.1 Physical characteristics

    2.2 Personal traits

    2.3 Verification vs Identification

    CHAPTER 3 12

    3. TYPES OF BIOMETRIC DEVICES AND THEIR SERVICES

    3.1 Fingerprint identification

    3.1.1 Advantages

    3.1.2 Disadvantages

    3.2 Face recognition

    3.2.1 Advantages

    3.2.2 Disadvantages

  • 8/2/2019 Biometric Technology Document

    7/23

    7

    3.3 Iris recognition

    3.3.1 Advantages

    3.3.2 Disadvantages

    3.4 Hand geometry

    3.5 Hand geometry vs fingerprints

    CHAPTER 4 18

    4. APPLICATION AREA

    4.1 Leading product in biometrics

    CHAPTER 5 22

    5. CONCLUSION

    CHAPTER 6 23

    6.REFERENCE

  • 8/2/2019 Biometric Technology Document

    8/23

    8

    1. Introduction:

    The first modern biometric device was introduced on a commercial basis over 25years ago when a machine that measured finger length was installed for a time

    keeping application at Shearson Hamil on Wall Street. In the ensuing years,

    hundreds of these hand geometry devices were installed at high security facilities

    operated by Western Electric, Naval Intelligence, the Department of Energy, and

    the like. There are now over 20,000 computer rooms, vaults, research labs, day

    care centers, blood banks, ATMs and military installations to which access is

    controlled using devices that scan an individual's unique physiological or

    behavioral characteristics. Reduced prices have lead to increased awareness of

    biometric technologies; this coupled with lower overall prices will certainly bodewell for this industry as we move through the new millennium.

    1.1 Biometrics:The term biometrics refers to the emerging field of technology devoted to the

    identification of individuals using biological traits or behaviors. In practice, this

    means capturing an image of a unique feature of an individual such as a

    fingerprint, hand, eye or face, and comparing it with a template captured

    previously. For ease of explanation this has been over-simplified, but in essence

    this is how biometric technology works.1.2 Definition:

    The statistical use of the characteristic variations in unique elements of living

    organisms is known as biometrics.

    1.3 Why we need biometrics?

    In order to avoid the problems of forgetting passwords and ID codes, Biometrics

    based authentication helps us in verifying your finger prints, iris pattern and voice

    for your identity at A.T.Ms, Airports etc.., you can unlock your houses,

    withdrawing money from a bank with just a blink of an eye, a tap of your finger or

    by just showing your face.

  • 8/2/2019 Biometric Technology Document

    9/23

    9

    1.4 Biometrics-what is it?Biometrics refers to the automatic identification of a person based on his/her

    physiological or behavioral characteristics. This method of identification ispreferred over traditional methods involving passwords and PIN numbers for

    various reasons:

    (i) The person to be identified is required to be physically present at the point

    of identification.

    (ii) Identification based on biometric techniques obviates the need to remember

    a password or carry a token. By replacing PINs, biometric techniques can

    potentially prevent unauthorized access to or fraudulent use of A.T.Ms,Smart cards, computer networks.

    (iii) PINs passwords may be forgotten, and token based methods of

    identification like passwords and drivers licenses may be forged, stolen or lost. A

    biometric system is essentially a pattern recognition system which makes a

    personal identification by determining the authenticity of a specific physiological or

    behavioral characteristic possessed by the user.

  • 8/2/2019 Biometric Technology Document

    10/23

    10

    2. Design issues of biometric systems:An important issue in designing a practical system is to determine how anindividual is identified and are designed by keeping two characteristics in mind

    ,they are:

    2.1 Physical characteristics

    Fingerprint,

    Handprint,

    FaceScent,ThermalimageIris Pattern

    2.2 Personal traits

    Voice patternHandwritingAcoustic Signature

  • 8/2/2019 Biometric Technology Document

    11/23

    11

    Depending on the context a biometric system can be either a

    verification(authentication) system or an identification system

    2.3 Verification Vs Identification:

    There are two different ways to resolve a persons identity: verification and

    identification. Verification (Am I whom I claim I am?) involves confirming are

    denying a persons claimed identity. In identification, one has to establish a

    persons identity (Who am I?). Each one of these approaches has its own

    complexities and could probably be solved best by a certain biometric system.

  • 8/2/2019 Biometric Technology Document

    12/23

    12

    3. Types of biometric devices and their services:Now lets see some of the biometric devices being widely used in many areas

    like computer/network security, government organizations, prisons. They are:

    1. Fingerprint identification.2 . Face recognition.3 .Iris recognition.4 .Hand geometry.5 .Signature recognition.6 .Retinal scanning7 Voice verification.And now lets see some of these biometric devices, their services, advantages and

    disadvantages in detail.

    3.1 Fingerprint recognition:

  • 8/2/2019 Biometric Technology Document

    13/23

    13

    Finger prints are unique to each individual and no two fingerprints are alike.

    Fingerprint recognition is most widely accepted biometric among the technology

    being used today. Fingerprints contain patterns of ridges and valleys as well as

    minutiae points. Minutiae points are local ridge characteristics that occur at either

    the ridge bifurcation or a ridge ending.

    There are three methods for scanning finger prints:

    (1) Optical scanners,(2) Thermal scanners and(3) Capacitance (solid state) scannersCurrently, there are two accepted methods for extracting the fingerprint data

    (I) Minutia-based and(II) Correlation-based

    Minutia-based is the more microscopic of the two. This method locates the ridge

    characteristics (branches and endings) and assigns them a XY-coordinate that is

    then stored in a file.

    The correlation-based method looks at the entire pattern of ridges and valleys in

    the fingerprint. The location of the whorls, loops and arches and the direction that

    they flow in are extracted and stored. Neither method actually keeps the captured

    image; only the data is kept, therefore making it impossible to recreate the

    fingerprints.Once the scanning is complete, the analysis is done by a comparison of several

    features of the fingerprint know as minutia. Investigators are systems look at

    where the ridge lines end or where one ridge splits into two (bifurcation). The

    scanning system uses complicated algorithms to recognize and analyze the

    minutia. If two prints have three ridge endings, two bifurcations, and form the

    same shape with the same dimensions, then it is like ly the same persons

    fingerprints.3.1.1 Advantages:

    High accuracy rate. Can perform 1-to-many comparisons. Inexpensive equipment. Easy to use (samples are easy to capture and maintain).

    https://lh6.googleusercontent.com/-DbBcUeqZXnE/TX0NQYp3COI/AAAAAAAACDo/2DLzDUSol7o/s1600/003.jpg
  • 8/2/2019 Biometric Technology Document

    14/23

    14

    Most established and oldest of the biometric technology.

    3.1.2 Disadvantages: Actual finger scan images cannot be recreated from a template image Users relate fingerprint recognition to criminal activity.

    3.2 Face (or Facial) recognition:Face recognition is one of the newer biometrics technologies. The technology

    analyzes facial characteristics and attempts to match it to database of digitized

    pictures. This technology is relatively new and has only been commercially

    available since the 1990s. Face recognition has received a surge of attention since

    of disaster of 11/9 for its ability to identify known terrorists and criminals.

    Face recognition uses distinctive features of the face including the upper outlines

    of the eye socket, the areas surrounding the cheekbones, the sides of the mouth,

    and the location of the nose and ears to perform verification and identification

    The first step in the face recognition is to obtain an image of an individual and

    store it in a database for later use. Usually, several pictures (or video images) at

    different angles are taken. Individuals may also be asked to make different facial

    expressions for the data base. Next, the images are analyzed and extracted to

    create a template. The last step is to verify the individuals identity by matching

    images to those images that been stored in database. There are four main methods being used for facial recognition:

    Eigenfaces: a tool developed by MIT that extracts characteristics through the

    use of two-dimensional grayscale imagery. Feature Analysis (also known as Local Feature Analysis (LFA)): is the most

    widely used technique because of its ability to accommodate for facial changes and

    aspect. LFA uses an algorithm to create a face print (84 bytes in size) for

    comparison.

    Neural network: a method that extracts features from the face and create a

    template of contrasting elements that is then matched to a template in database.

    Automated Face Processing (AFP): a technique that looks for distances and

    ratios between certain facial features, and is more ideal for poorly lit areas.

  • 8/2/2019 Biometric Technology Document

    15/23

    15

    3.2.1 Advantages:

    High accuracy rate. Can be performed from a distance.

    Accepted by most users. Non-intrusive. Hands-free.

    3.2.2 Disadvantages:

    Cannot not always account for the effects of aging. Sensitive to lighting conditions. Can perform limited 1-to-many comparisons.

    https://lh6.googleusercontent.com/-PHHhKRGblTM/TX0NQ_ExUjI/AAAAAAAACDs/7prq5nlK9a8/s1600/004.jpg
  • 8/2/2019 Biometric Technology Document

    16/23

    16

    3.3 Iris recognition:No two irises are alike, not even in one individual or in identical twins. The iris

    consists of over 400 distinguished characteristics. Compared to the 40 or 50 points

    of distinct fingerprint characteristics, the iris has more than 250 distinct features.Therefore, iris scanning is much more accurate than fingerprints or even DNA

    analysis of the distinguishing features.Iris scanning is executed by scanning the measures of the colored circle that

    surrounds the pupil. With video technology, a camera scans the iris pattern, which

    consists of corona, pits, filaments, crypts, striations, and radial furrows (page).

    The system software then digitizes the unique information of the iris and stores it

    for authentication at a later time. Iris scanning is easy, accurate, and

    convenient. One significant downfall of Iris recognition is the initial startup costs

    as they are extremely high.

    In identifying ones Iris, there are two types of methods that are used by Iris

    identification systems, passive and active. The active Iris system method requires

    that a user be anywhere from six to 14 inches away from the camera. It also

    requires the user to move back and forth so that the camera can adjust and focus

    in on the users iris. The passive system allows the user to be anywhere from one

    to three feet away from the camera(s) that locate and focus in on the iris.

    https://lh3.googleusercontent.com/-aERY4Qlxx7Y/TX0NRenMYQI/AAAAAAAACDw/iP5OIh4aaqs/s1600/005.jpg
  • 8/2/2019 Biometric Technology Document

    17/23

    17

    This technologys main uses are for authentication, identification, and verification

    of an individual.

    3.3.1 Advantages:

    High accuracy rate Imitation is almost impossible

    3.3.2 Disadvantages:

    perceived to be intrusive and invasive Can be done from a short distance optical readers are difficult to operate requiring advanced training for employees

    3.4 Hand geometry:

    Hand geometry is concerned with measuring the physical characteristics of the

    users hand and fingers and it is believed to be sufficiently unique for use as a

    means of biometric authentication. The technology records various dimensions of

    the human hand, it is relatively easy to use, and offers a good balance of

    performance characteristics. Reader configurations vary among a softball-shaped

    device which the subject grabs in his hand and a flat plate which the subject

    places his/her hand, a bar which the subject grabs as if opening a door, and a flat

    plate which the subject places his/her hand on.

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    18/23

    18

    Hand geometry readers are developed in a wide range of scenarios, including time

    and attendance recording where they have proved extremely popular. The

    methodology may be suitable where there is a large user base or there are users

    who access the system infrequently. Accuracy can be very high if desired.Hand geometry readers are relatively large and expensive but the ease of

    integration into other systems and processes, small template size (only 9 bytes for

    pure hand geometry template) and ease of use makes it a good choice for many

    projects.

    3.5 Hand geometry Vs Fingerprints:

    Unlike fingerprints the human hand isnt unique. One can use finger length,

    thickness and curvature for the purposes of verification but not for identification.

    For some kinds of access control like immigration and border control, invasive

    biometrics (e.g., fingerprints) may not be desirable as they infringe on privacy. In

    such situations it is desirable to have a biometric system that is sufficient for

    verification. As hand geometry is not distinctive, it is idle choice. Further more,

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    19/23

    19

    hand geometry data is easier to collect. With fingerprint collection good frictional

    skin is required by imaging systems, and with retina-based recognition systems,

    special lighting is necessary. Additionally, hand geometry can be easily combined

    with other biometrics, namely fingerprint. One can envision a system where

    fingerprints are used for (in frequent) identification and hand geometry is used for

    (frequent) verification.

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    20/23

    20

    4. Application Areas:The uses for biometric security are varied and growing. It was developed in

    response to a need to associate human action with identity whether conducting a

    transaction, accessing a computer or a critical information system, or entering

    secure physical area. Some of the existing and proposed applications in general we

    use are described below:

    Computer/Network security:Many stand-alone and network computer systems carry valuable and sensitive

    information. Controlling access to these systems is another major use of biometric

    authentication systems. Internet transactions:Due to growing security requirements that results from the boom in e-commerce,

    many think of on-line transactions as being an obvious area for biometrics. The

    biometric authentication generates a greater degree of vendor confidence because

    he knows that person that the person at the terminal is he who he claims to be. Physical area security:Military, Government, and Commercial installations have sufficiently strong

    confidentiality concerns. The biometric identifiers play a major role in controlling

    physical access to these installations.

    Banking:Many leading banks have been experimenting with biometrics for ATM use as a

    means of combating card fraud. Beginning 2002, some companies will being

    issuing smart credits cards, with customers fingerprint information embedded.

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    21/23

    21

    Voting:A logical use of biometrics is in voting process where eligible politicians are

    required to verify their identity. This is intended to stop proxy voting.

    Prisons:An interesting use of biometrics is in prisons where the visitors to a prisoner are

    subjected to verification procedures in order that identities may not be swapped

    during the visit.4.1 Leading products in biometrics:

    Biometric is a new but promising technology and therefore a number of

    companies have appeared in the market in a very short period of time. Some of

    those products are:

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    22/23

    22

    5. Conclusion:

    The advances in accuracy and usability and decreasing cost have made the

    biometric technology a secure, affordable and cost effective way of identifying

    individuals. Biometric parameters such as fingerprint scanning, iris scanning,

    retinal scanning, hand geometry, signature verification, voice verification and

    others are all well established with their own particular characteristics. The limiting

    factors of speed and band width are now a thing of the past and their practical

    performance might in many instances be better than expected. Today, it is an

    efficient and effective method of replacing passwords, tokens and smart cards.

    It is important to recognize that although biometric authentication has served

    extensively in high security applications in defense industry, it is still fledgling

    technology in commercial world, both in terms of its technical sophistication and

    current extent of deployment. There are no established standards for biometric

    system architecture, for template formation, or even for biometric reader testing.

    It is also not clear as which technology or technologies will dominate the customer

    market. In the absence of standards and direction, the rapid and wide spread

    deployment of biometric authentication system could easily facilitate the

    problematic proliferation of authentication and tracking of the people.

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpg
  • 8/2/2019 Biometric Technology Document

    23/23

    23

    6. REFERENCES

    The Use of Technology to Combat

    Identity Theft Department of the

    Treasurey Feb 2005 [PDF]

    Fingerprint Indentification FBI [PDF]

    Putting an End to Account-Hijacking

    Identity Theft FDIC December 14, 2004

    [PDF]

    Face Recognition 101: A Brief Primer by

    Duane M. Blackburn 07 April 2003

    [PDF]

    FINGERPRINT VENDOR

    TECHNOLOGY EVALUATION

    2003 FpVTE 2003 [PDF]

    Technology Assessment TechnologyAssessment Using Biometrics for Border

    Security Using Biometrics for Border

    Security, November 2002 (GAO-03-174)

    [PDF 23.13 Mb]

    Aviation Security: Registered Traveler

    Program Policy and Implementation

    Issues, November 2002 (GAO-03-253)

    [PDF]

    "Common Biometric Exchange File

    Format (CBEFF)" NISTIR January 3,2001 [PDF]

    Canada-United States Accord on Our

    Shared Border Minister of Public Works

    and Government Services Canada 2000

    Biometric Authentication Technology:

    From the Movies to Your Desktop by

    Fernando L. Podio and Jeffrey S. Dunn

    [PDF]

    Integrated Automated FingerprintIdentification System @FBI

    Fingerprint Indentification Intro@NIST

    Approved IAFIS Equipment@ FBI

    face recognition information@ornl

    Iris Identification

    Information@University of Cambridge

    Iris Identification Advantages and

    Disadvantages@University of

    Cambridge Biometrics Consortium

    Department of Homeland Security

    Putting an End to Account-Hijacking

    Identity Theft@FDIC

    Volpe Engineers Use Biometrics to Help

    Ease Border Crush@DOT

    https://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttps://lh3.googleusercontent.com/-THI5c-zs1ak/TX0NR_G-CEI/AAAAAAAACD0/kHIzHMY4_t4/s1600/006.jpghttp://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.itl.nist.gov/iaui/894.03/fing/fngcmps.htmlhttp://www.itl.nist.gov/iaui/894.03/fing/fngcmps.htmlhttp://www.fbi.gov/hq/cjisd/iafis/cert.htmhttp://www.fbi.gov/hq/cjisd/iafis/cert.htmhttp://www.ornl.gov/sci/ismv/research_ns_face.shtmlhttp://www.ornl.gov/sci/ismv/research_ns_face.shtmlhttp://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/addisadvans.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/addisadvans.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/addisadvans.htmlhttp://www.biometrics.org/http://www.biometrics.org/http://www.dhs.gov/dhspublic/index.jsphttp://www.dhs.gov/dhspublic/index.jsphttp://www.fdic.gov/consumers/consumer/idtheftstudy/technology.html#part8http://www.fdic.gov/consumers/consumer/idtheftstudy/technology.html#part8http://www.fdic.gov/consumers/consumer/idtheftstudy/technology.html#part8http://www.volpe.dot.gov/infosrc/journal/spring97/biomet.htmlhttp://www.volpe.dot.gov/infosrc/journal/spring97/biomet.htmlhttp://www.volpe.dot.gov/infosrc/journal/spring97/biomet.htmlhttp://www.volpe.dot.gov/infosrc/journal/spring97/biomet.htmlhttp://www.volpe.dot.gov/infosrc/journal/spring97/biomet.htmlhttp://www.fdic.gov/consumers/consumer/idtheftstudy/technology.html#part8http://www.fdic.gov/consumers/consumer/idtheftstudy/technology.html#part8http://www.dhs.gov/dhspublic/index.jsphttp://www.biometrics.org/http://www.cl.cam.ac.uk/users/jgd1000/addisadvans.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/addisadvans.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.htmlhttp://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.htmlhttp://www.ornl.gov/sci/ismv/research_ns_face.shtmlhttp://www.fbi.gov/hq/cjisd/iafis/cert.htmhttp://www.itl.nist.gov/iaui/894.03/fing/fngcmps.htmlhttp://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.fbi.gov/hq/cjisd/iafis.htm