Friday, 13 July 2018

Bio-metric Module

INTRODUCTION TO BIOMETRIC MODULE
What Are Biometrics?
àThe term "biometrics" is derived from the Greek words bio (life) and metric (to measure).
àFor our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique to individuals hence
Can be used to verify or identify a person.
àThe term Biometrics is becoming highly important in computer security world. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics.

    Fingerprints have been successfully used for over one hundred years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. Human identification leads to mutual trust that is essential for the proper functioning of society.
         
HARDWARE SPECIFICATIONS:
PIN
NAME
SPECIFICATION
1
GND
GROUND
2
TXD
SERIAL SENDER
3
RXD
SERIAL RECEIVER
4
VCC
5V
We have been identifying fellow humans based on their voice, appearance, or gait for thousands of years. However, a systematic and scientific basis for human identification started in the 19th century when Alphonse Bertillon introduced the use of a number of anthropomorphic Measurements to identify habitual criminals. The Bertillon system was short-lived: soon after it’s
Introduction, the distinctiveness of human fingerprints was established. Since the early 1900s, Fingerprints have been an accepted method in forensic investigations to identify suspects and Repeat criminals. Now, virtually all law enforcement agencies worldwide use Automatic Fingerprint Identification Systems (AFIS). With growing concerns about terrorist activities, Security breaches, and financial fraud, other physiological and behavioral human characteristics Have been used for person identification. These distinctive characteristics, or biometric traits, Include features such as face, iris, palm print, and voice. Biometrics is now a mature Technology that is widely used in a variety of applications ranging from border crossings. Voice biometric is appropriate in authentication applications involving Mobile phones since a sensor for capturing voice (microphone) is already embedded in the phone.
Fingerprint is the most popular biometric for accessing laptops, mobile phones and PDAs since low cost, small footprint fingerprint sweep sensors can be easily embedded in these devices. Some of the traits, for example, hand geometry, are more appropriate for verification applications whereas others like fingerprint, iris, and face have sufficient discriminating power to be applicable in large-scale identification applications. One of the unique applications of biometrics is in the negative identification, i.e., the person is not the one who has already been registered/enrolled in the system. The negative identification is required to prevent multiple enrolments of the same person which is critical for large scale biometric applications,
Some of the Popular Biometric Modalities:
(a) Face:       Humans have a remarkable ability to recognize fellow beings based on facial Appearance. So, face is a natural human trait for automated biometric recognition. Face Recognition systems typically utilize the spatial relationship among the locations of facial Features such as eyes, nose, lips, chin, and the global appearance of a face. The forensic and civilian applications of face recognition technologies pose a number of technical challenges Both for static mug-shot photograph matching (e.g., for ensuring that the same person is not Requesting multiple passports) to unconstrained video streams acquired in visible or Near-infrared illumination (e.g., in surveillance). An excellent survey of existing face Recognition technologies and challenges is available in the problems associated with Illumination, gesture, facial makeup, occlusion, and pose variations adversely affect the face Recognition performance. While face recognition is non-intrusive, has high user acceptance, and provides acceptable levels of recognition performance in controlled environments, robust face recognition in non-ideal situations continues to pose challenges.
(b) Fingerprint:    Fingerprint-based recognition has been the longest serving, most successful and popular method for person identification. There are numerous historical accounts which suggest that fingerprints have been used in business transactions as early as 500 B.C. in Babylon and later by Chinese officials to seal the official documents in the 3rd century B.C. Fingerprints consist of a regular texture pattern composed of ridges and valleys. These ridges are characterized by several landmark points, known as minutiae, which are mostly in the form of ridge endings and ridge bifurcations. The spatial distribution of these minutiae points is claimed to be unique to each finger; it is the collection of minutiae points in a fingerprint that is primarily employed for matching two fingerprints. In addition to minutiae points, there are sweat pores and other details (referred to as extended or level 3 features) which can be acquired in high resolution (1000 ppi) fingerprint images. These extended features are receiving increased attention since forensics experts seem to utilize them particularly for latent and poor quality fingerprint images. Nearly all forensics and law enforcement agencies worldwide utilize Automatic Fingerprint Identification Systems (AFIS).
 (c) Iris:        The iris is the colored annular ring that surrounds the pupil. Iris images acquired under infrared illumination consist of complex texture pattern with numerous individual attributes, e.g. stripes, pits, and furrows, which allow for highly reliable personal identification. The iris is a protected internal organ whose texture is stable and distinctive, even among identical
Twins (similar to fingerprints), and extremely difficult to surgically spoof. An excellent survey on the current iris recognition technologies and future research challenges is available in First invented by Daugman both the accuracy and matching speed of currently available iris recognition systems is very high. Iris recognition has been integrated in several large-scale personal identification systems (e.g., border crossing system in the United Arab Emirates  Several efforts are also being made to capture iris at a distance  However, relatively high sensor cost, along with relatively large failure to enrol (FTE) rate reported in some studies, and lack of legacy iris databases may limit its usage in some large-scale government applications.
(d) Palm print:      The image of a human palm consists of palmer friction ridges and flexion creases Latent palm print identification is of growing importance in forensic applications since around 30% of the latent prints lifted from crime scenes (from knifes, guns, steering wheels) are of palms rather than of fingers Similar to fingerprints, latent palm print systems utilize minutiae and creases for matching. While law enforcement and forensics agencies have always collected fingerprints, it is only in recent years that large palm print databases are becoming available. Based on the success of fingerprints in civilian applications, some attempts have been made to utilize low resolution palm print images (about 75 dpi) for access control applications, these systems utilize texture features which are quite similar to those employed for iris recognition. To our knowledge, palm print recognition systems have not yet been deployed for civilian applications (e.g., access control), mainly due to their large physical size and the fact that fingerprint identification based on compact and embedded sensors works quite well for such applications.
(e) Hand Geometry:       It is claimed that individuals can be discriminated based on the shape of their hands. Person identification using hand geometry utilizes low resolution (~20 ppi) hand images to extract a number of geometrical features such as finger length, width, thickness, perimeter, and finger area. The discriminatory power of these features is quite limited, and therefore hand geometry systems are employed only for verification applications (1:1 matching) in low security access control and time-and-attendance applications. The hand geometry systems have large physical size, so they cannot be easily embedded in existing security systems.
(f) Voice:     Speech or voice-based recognition systems identify a person based on their spoken words. The generation of human voice involves a combination of behavioral and physiological features. The physiological component of voice generation depends on the shape and size of vocal tracts, lips, nasal cavities, and mouth. The movement of lips, jaws, tongue, velum, and larynx constitute the behavioral component of voice which can vary over time due to person’s age and medical condition (e.g., common cold). The spectral content of the voice is analyzed to extract its intensity, duration, quality, and pitch information, which is used to build a model (typically the Hidden Markov Model) for speaker recognition. Speaker recognition is highly suitable for applications like tele-banking but it is quite sensitive to background noise and playback spoofing. Again, voice biometric is primarily used in verification mode.
(g) Signature:        Signature is a behavioral biometric modality that is used in daily business transactions (e.g., credit card purchase). However, attempts to develop highly accurate signature recognition systems have not been successful. This is primarily due to the large intra-class variations in a person’s signature over time. Attempts have been made to improve the signature recognition performance by capturing dynamic or online signatures that require pressure-sensitive pen-pad. Dynamic signatures help in acquiring the shape, speed, acceleration, pen pressure, order and speed of strokes, during the actual act of signing. This additional information seems to improve the verification performance (over static signatures) as well as circumvent signature forgeries. Still, very few automatic signature verification systems have been deployed.
(h) DNA: The DNA is an acronym for deoxyribonucleic acid which is present in nucleus of every cell in human body and therefore a highly stable biometric identifier that represents physiological characteristic The DNA structure of every human is unique, except from identical twins, and is composed of genes that determine physical characteristics (like eye or hair color). Human DNA samples can be acquired from a wide variety of sources; from hair, finger nails, saliva and blood samples. Identification based on DNA requires first isolating from source/samples, amplifying it to create multiple copies of target sequence, followed by sequencing that generates a unique DNA profile. The DNA matching is quite popular for forensic and law enforcement applications. However, it requires tangible samples and cannot yet be done in real time. Currently, not all the steps in DNA matching are automated and therefore results can be skewed if the process is not conducted properly or the DNA samples themselves get contaminated. In summary, the DNA matching process is expensive, time consuming and therefore not yet suitable for large scale biometrics applications for civilian usage.
(i) Hand Veins:     The pattern of blood vessels hidden underneath the skin is quite distinct in individuals, even among identical twins and stable over long period of time. The primary function of veins is to carry blood from one part of the body to another and therefore vascular pattern is spread throughout the body. The veins that are present in hands, i.e. palm, finger and palm dorsal surface, are easy to acquire (using near infrared illumination) and have been employed for the biometric identification The vein patterns are generally stable for adults (age of 20-50 years) but begin to shrink later due to decline in strength of bones and muscles. There are several diseases, like diabetes, atherosclerosis, or tumors, which can influence the vein patterns and make them thick or thin. Biometric authentication devices using finger and palm vein imaging are now available for some commercial applications to the best of our knowledge; there is no known large scale vascular biometric system. This could be primarily due to concerns about the system cost and lack of large scale studies on vein individuality and stability. On the plus side, these vascular systems are touch less which often appeals to the user.
Biometrics has long being touted as a powerful tool for solving identification and authentication issues for immigration and customs, physical security, and computer security. It involves measuring one or more unique physiological human characteristics the shape of a body, fingerprints, structure of the face, DNA, hand/palm geometry, iris patterns, and even odor/scent. Behavioral traits can also be used – typing rhythm, gait, and voice. These technologies have enormous promise because they can never be forgotten, lost or copied, unlike the current methods of cards and passwords. The potential for biometrics is ever increasing post 9/11. In addition to growing needs for fast, accurate and dependable security, biometric technologies have recently begun to enter into public consciousness due to high profile applications in entertainment media and day-to-day activities.
Increasing requirements for security in many sectors of our society have generated a tremendous interest in biometrics. This has also raised expectations from biometric technologies. These expectations can be summarized into five categories: performance, cost, user convenience, interoperability, and system security.
(i) Performance:   The recognition performance achievable from a biometric system is of utmost interest in the deployment of biometric systems. A biometric system is prone to numerous errors; failure to enroll (FTE), false accept rate (FAR), and false reject rate (FRR). The system performance is further characterized in terms of transaction time or throughput. The accuracy of a biometric system is not static, but it is data dependent and influenced by several factors:
(a) Biometric quality, which is related to the quality of sensed signal/image
(b) Composition of target user population (e.g., gender, race, age, and profession)
(c) Size of database (i.e., number of subjects enrolled in the system)
(d) Time interval between enrolment and verification data
(e) Variations in the operating environment (e.g., temperature, humidity, and illumination)
(f) Distinctiveness of biometric modality, and
 (g) Robustness of employed algorithms (namely, segmentation, feature extraction, and matching algorithms).
 (ii) Cost:     The cost of deploying a biometric system is often estimated from its direct and indirect components. The direct component includes hardware components (sensor, processor, memory) and the software modules (GUI and matcher). The sensor should be low cost and it should be easy to embed it in the existing security infrastructure. There are multifaceted components that constitute the indirect cost in the usage of biometric system. These include system installation, training/maintenance requirements, and most importantly, user acceptance. In the end, return on investment or the cost-benefit analysis is critical for making a case for biometric systems in most applications.


(iii) Interoperability:     As biometrics systems are being increasingly deployed in a wide range of applications, it is necessary that the system be interoperable among different biometrics technologies (sensors/algorithms/vendors). A biometric system can no longer operate under the assumption that the same sensor, same algorithms, or same operating conditions will always be available during its lifetime. The biometric system should be highly interoperable to authenticate individuals using sensors from different vendors and on varying hardware/software platforms. The system should employ usage/development/deployment of common data exchange facilities and the formats to exchange the biometric data/features between different vendors, from different geographical locations. This would significantly reduce the need for additional software development and bring all the associated advantages (cost savings and efficiency).
(iv) User Convenience:     A biometrics system should be user friendly. Any perceived health or hygienic concerns with the continuous usage of biometric sensors can influence user acceptance. Hygiene as well as security has been one of the motivations for developing touch less fingerprint sensors. Some biometric modalities are easier to acquire than others and require less user cooperation during data acquisition. Human factors and ergonomic issues will continue to play a major role in widespread deployment of biometric systems in non-government applications (such as physical and logical access control).
(v) Security:     Biometric systems are vulnerable to potential security breaches from spoof and malicious attacks. These systems should therefore offer a high degree of protection to various vulnerabilities resulting from intrinsic failures and adversary attacks [48]. One of the major system security concerns deals with biometric template security. The access protocols and the storage of biometric and other user specific data should be provided the highest level of security. Based on the above considerations, the second generation biometric systems should be easy to use, have low cost, be easy to embed and integrate in the target security application and be robust, secure, and highly accurate in their matching performance.


First Generation Biometrics:
 (a) Face recognition system (Smart Gate) at Sydney airport (b) iris recognition system at Amsterdam Schiphol airport (c) at Manchester airport (d) at UAE airport (e) fingerprint Recognition using index fingers at airports in Japan (f) ten fingerprint acquisition


Overview of biometric applications:
            


No comments:

Post a Comment