inter bio paper

Upload: atul-narkhede

Post on 03-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Inter Bio Paper

    1/5

    Overview of Biometrics for Secure Identity Verification

    Deepali P. Chaudhari1, Prof. Nareshkumar D.Harale2

    1PG student, Department of computer, M.G.M.C.E.T.Kamothe, Navi Mumbai

    [email protected] Of Department, Department of computer, M.G.M.C.E.T.Kamothe, Navi Mumbai

    [email protected]

    Abstract:

    As online security threats continue to spread,protecting valuable data becomes one of the securitychallenges businesses face in todays business-to-customer (B2C) and business-to-business (B2B) e-commerce. Biometrics technology shows increased

    promise in enterprise network security. It will play avital role as system developers fortify the security

    apparatus of its organization. In this paper, weanalyze biometrics technologies and describetechniques that can be utilized to decrease the

    probabilities of online attacks.

    Key Words: - Biometric, Filter Based, Gabor Based

    Introduction:

    Biometrics based personal authenticationsystems that use physiological and/or behavioral traits

    (e.g. fingerprint, face, iris, hand geometry, signature,

    voice, etc...) of individuals have been shown to bepromising candidates for either replacing oraugmenting these traditional systems. They are based

    on entities (traits) that are actually bound with the

    individual at a much deeper level than, for Eg.passwords and ID cards. As a result, they are more

    reliable since biometric information can not be lost,

    forgotten, or guessed easily. They lead to increaseduser convenience there is nothing to remember or

    carry. They improve the authentication accuracy.

    Single biometric may not be able to achieve

    the desired performance requirement in real worldapplications. One of the methods to overcome these

    problems is to make use of multimodal biometric

    authentication systems, which combine informationfrom multiple modalities to arrive at a decision.

    Studies have demonstrated that multimodal biometric

    systems can achieve better performance comparedwith uni-modal systems.

    Any aspect of human physiology or behavior

    that can be accepted as a biometric should satisfy fiveproperties described by Clarke which are as follows:

    a) Universality: Every person should have the

    biometric characteristic.

    b) Uniqueness: No two persons should be the same interms of the biometric characteristic

    c) Permanence: The biometric characteristic should

    be invariant over time.d) Collectability: The biometric characteristic should

    be measurable with some practical sensing device. e)

    Acceptability: The public should have no strongobjection to the measuring or collection of the

    biometric.

    Components of Biometric system

    Fig. 1. Components of Biometric System

    1) Capture the chosen biometric (requires an

    appropriate capture device)2) Process the biometric and extract and enroll the

    biometric template

    3) Store the template in a local repository, centralrepository, and/or portable token such as a smart

    card

    4) Live-scan the chosen biometric5) Process the biometric and extract the biometric

    template

  • 7/29/2019 Inter Bio Paper

    2/5

    6) Match the scanned biometric against the stored

    templates

    7) Provide a matching score and interface withapplications

    8) Record a secure audit trail with respect to system

    use

    Types of Biometrics:A wide variety of systems require reliable

    personal recognition schemes to either confirm or

    determine the identity of an individual requestingtheir services. Examples of such applications include

    secure access to buildings, computer systems, laptops,

    cellular phones and ATMs. In the absence of robustpersonal recognition schemes, these systems are

    vulnerable to the wiles of an impostor. Biometric

    recognition, or simply biometrics, refers to the

    automatic recognition of individuals based on theirphysiological and/or behavioral characteristics.

    Biometrics is the study of distinguishable

    physical, biological or behavioral characteristics usedfor the identification of humans and animals. Physical

    characteristics include items such as fingerprints,

    hand geometry, iris or retina patterns, and facialfeatures. Biological characteristics would include

    DNA and specific fluid or tissue chemistries.

    Behavioral characteristics include things such as asignature, voice and speech patterns. Both behavioral

    and physical characteristics can change over time, butusually, physical features have been found to be morereliable, changing only in the long term.

    In the simplest terms, biometrics technologies

    rely on measuring one or more of these

    distinguishable characteristics and determining if theybelong to an individual whose Characteristics have

    been previously stored in a database. More

    specifically, biometrics is defined as the automaticidentification or identity verification of an individual

    using computer technology in a noninvasive way to

    match patterns of live individuals in real time againstenrolled records.

    Physical characteristics include items such as

    fingerprints, face, Iris, hand geometry, signature, and

    voice.We first focus on:

    1. Fingerprints recognition

    2. Face recognition3. Iris patterns

    Fig 1: Biometric system components and flow diagram.

    1) Fingerprints recognition:-

    In the fingerprint-based scheme

    during enrollment the user presents her fingerFto thesensor, whose output Fs (e.g., fingerprint image) is

    passed through a feature extractor to arrive at the

    template Ft, which, along with the identity I of the

    user, is saved in a database (note that this databasecan be central, such as a law enforcement database or

    local, such as a smart-card issued to an individual)During verification, the user's fingerprint is capturedagain, and the generated template Fv; t is matched

    against the database templateFtcorresponding to the

    claimed identity I. If these two representations areclose enough", the matcher outputs a Yes" decision

    This decision is generally based on a similarity

    (dissimilarity) measure: if the similarity

    (dissimilarity) score between two representations ishigher (lower) than a specific threshold T, a Yes

    decision is output, otherwise, a No decision is output

    Conversely, during identification, the user's templategenerated online, Fi; t, is matched against all the

    database templates. If there is a match, the matcher

    outputs the associated identityIof the user.Four technologies are in use to extract

    fingerprint images.

    These are as listed below

    a) Optical Sensors: These sensors capture

    visual image of finger surface. Finger touches the

    surface of a prism and LEDs provide a light source

    Image is captured after its total internal reflection in

    the prism, by a Charge Coupled Device IC (CCD-IC)or CMOS Camera. Optical sensors are reliable and

    inexpensive.

    b) Capacitive Sensors: These sensors scan

    surface of finger using dielectric measurements to

    distinguish ridges and valleys. Higher dielectricconstant of ridges results in higher capacitance than

    that of valleys which contain air. Capacitive sensors

  • 7/29/2019 Inter Bio Paper

    3/5

    produce better image quality over wider operating

    conditions. However they are expensive, consume

    more power and also do not work well with dryfingers.

    c) Thermal sensors: These sensors consist of

    contiguous arrangement of heating elements and

    thermal sensors and capture images based ondifferentials in heat emission between the ridges and

    valleys. Heat map is converted to an optical image ofridges which are cooler due to presence of sweat

    pores and valleys which are warmer. Thermal sensors

    are compact and inexpensive. But they consume morepower and are ineffective on warm days.

    d) Radio Frequency Sensor: These sensors

    scan subsurface to get a true image of the finger. They

    use reflected RF beam to create an image of the layer.RF sensors are not affected by dirt or other impurities,

    have improved accuracy and reliability. Also, it isvery difficult to fake the finger with this sensor as ittakes subsurface image.

    2) Face Recognition:-

    Face recognition has become one of the major

    areas of biometric research because of its noninvasivenature and because it is a persons primary method of

    personal identification. Face image acquisition is

    done in the following ways

    a) Single image: This consists of digital

    photographs obtained using cameras or scanners.

    b) Video Sequence: This is obtained from

    surveillance cameras. However, due to low spatialresolution, it is not very useful for face recognition.

    c) 3D Images: This is based on skin/skull

    geometry and requires 3D images of the face insteadof 2D images .Newer face recognition techniques

    such as Stereo, structured light and phase based

    ranging are used for capturing 3D images.The fundamental principle of face recognition

    is to use a special mathematical model to measure the

    dissimilarity of features in the face. These algorithmscan use features, such as distance between eyes, nose,

    and lips, as parameters. Structured light is used to

    acquire the 3-D geometry of the face. Then, 3-D

    reconstruction algorithms are used to formulate the 3-D mesh surface and the surface of the face, which is

    then used for identification.

    Face Recognition Approaches:

    Digital Face Images:-

    The face image of a person can be obtained

    from a passport document by capturing a digitaimage of the photograph page via a digital camera or

    a scanner. Then these photos can be compared against

    live face photos of the same person acquired using a

    high resolution digital camera. The methodologyproposed for passport facial matching is illustrated in

    Figure 2.The salient stages of the proposed method are listed

    below:1) Face Detection2) Channel Selection3) Normalization4) Watermark Removal5) Feature Extraction and Classification

    3) Iris pattern :-When a subject wishes to be identified by irisrecognition system, their eye is first photographed

    and then a template created for their iris region. This

    template is then compared with the other templates

    stored in a database until either a matching template isfound and the subject is identified, or no match is

    found and the subject remains unidentified. It is

    Fig 2: Overview of the methodology used when passport mug-shots areused to test the system

    composed of iris image acquisition, imagepreprocessing, and feature extraction and classifier

    design. The algorithm for iris feature extraction is

    based on texture analysis using multi-channel Gabor

    filtering and wavelet transform. Compared withexisting methods, our method employs the rich 2-D

    information of the iris and is translation, rotation, and

    scale invariant.

  • 7/29/2019 Inter Bio Paper

    4/5

    Iris image acquisition is done in two ways

    a) Daugman System: In this system, an LED

    based point light source is used along with a standardvideo camera. The system captures images with the

    Iris diameter between 100 to 200 pixels from a

    distance of 15 to 46cm using 330mm lens. John

    Daugman at the university of Cambridge computerlaboratory developed Gabor wavelet based Iris

    recognition algorithm which is the basis for almost allcommercially available Iris recognition systems

    b) Wildes system: This system images the

    Iris with approximately 256 pixels across the diameterfrom 20cm using 80 mm lens and is area based i.e. it

    captures the iris as part of a larger image which also

    contains data derived from the immediately

    surrounding eye region. Iris recognition based onJohn Daugmans algorithms, is used by the United

    Arab Emirates (UAE) Ministry of Interior forrecognizing foreigners entering the UAE, at 35 air,land, and sea ports. Each traveler is compared against

    about a million Iris codes on a watch-list through

    internet links; the time required for an exhaustivesearch through the database is about 1 second. On an

    average day, about 12,000 arriving passengers are

    compared against the entire watch list i.e. about 12

    billion comparisons per day.

    Fig 3: Block diagram of a typical iris recognition System

    Feature Extraction:-

    The feature extraction problem can be reduced

    to applying a frequency band filters which are

    circularly symmetric in nature for the extraction.

    a. Non filter based technique:-

    Instead of using Gabor Filters, to extract thetextural features from the image we propose the use

    of a non filter based technique that depends on second

    order statistics of the pixel intensities. The co-occurrence matrix estimates the joint probability

    distribution function of gray level pairs in an image.

    The technique uses the GLCM (Grey Level Co-occurrence Matrix) of an image and it provides a

    simple approach to capture the spatial relationship

    between two points in a texture pattern . It is

    calculated from the normalized iris image using pixels

    as primary information.

    b. Multi-channel Gabor filtering:-

    The multi-channel Gabor filtering technique is

    inspired by the psychophysical findings that theprocessing of pictorial information in the humanvisual cortex involves a set of parallel and quasi

    independent mechanisms or cortical channels which

    can be modeled by band pass filters.

    Comparison of Biometrics methods

    Table A: Comparison of Biometric

    Technologies

    Biometri

    cs

    Per

    man

    Perfor

    manc

    Uniq

    uene

    Acce

    ptabiFingerprin H H H M

    Hand

    GeometryM M M M

    Retinal

    ScanningM H H L

    Iris

    ScanningH H H L

    Facial

    RecognitiM L L H

    Dynamic

    SignatureL L L H

    Keystroke

    DynamicsL L L M

    Voice

    RecognitiL L L H

    H= High, M= Medium, L= Low

    Selection criteria for Biometric types

    1. Economic Feasibility or Cost

    2. Risk Analysis

    3. Perception of Users

    4. Techno_Socio Feasibility

    5. Security

  • 7/29/2019 Inter Bio Paper

    5/5

    6. User friendly and social acceptability

    7. Legal Feasibility

    8. Privacy

    CONCLUSION:This study has shown that biometrics is the

    most accurate and secured representation of what an

    element is. Its technology can isolate false positive

    results, misrepresentation or creation of false identityduring an identification process. We have discussed

    the usefulness of biometric technology in protectingenterprise network systems from unwanted onlineintruders. We have also identified the possible

    features and characteristics of an object that can be

    used in biometric technologies. Furthermore, an

    enterprise authentication process that uses acombination of traditional password and biometric

    fingerprint identification methodology is described.

    REFERENCES[1] Theory, Applications, and Systems,

    2009. BTAS09. IEEE 3rd InternationalConference On Matching Digital Face

    Images Against Scanned Passport Photos.

    [2] Jammi Ashok, Vaka Shivashankar,

    P.V.G.S.Mudiraj An Overview of Biometricsernational Journal on Computer Science and

    Engineering Vol. 02, No. 07, 2010, 2402-2408

    [3] Prof. (Dr.) Dattatray V. Jadhav, Prof. Vijay M.

    Mane, Review of Multimodal Biometrics:Applications, challenges and Research Areas,

    International Journal of Biometrics andBioinformatics (IJBB), Volume 3, Issue 5

    [4] Emmanuel Opara, Mohammad Rob, Vance

    Etnyre, Biometric and Systems Security: AnOverview of End-To-End Security System

    Communications of the IIMA 2006 Volume 6

    Issue 2

    [5] B. Andrew, A brief history of us passportPhotograph blakeandrews

    blogspot.com/2009/05/brief-history-of-us-passport.html (may-2009)

    [6] http://www.findbiometrics.com

    [7] http://www.biometricsinfo.org

    [8] http://www.biometrics.gov

    http://www.findbiometrics.com/http://www.biometrics.gov/http://www.findbiometrics.com/http://www.biometrics.gov/