SlideShare a Scribd company logo
1 of 6
Download to read offline
International Association of Scientific Innovation and Research (IASIR) 
(An Association Unifying the Sciences, Engineering, and Applied Research) 
International Journal of Emerging Technologies in Computational 
and Applied Sciences (IJETCAS) 
www.iasir.net 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 256 
ISSN (Print): 2279-0047 
ISSN (Online): 2279-0055 
Comparison of Various Biometric Methods 
Dr. Rajinder Singh1, Shakti Kumar2 
Department of Electronics & IT 
S.D.College, Ambala Cantt 
Haryana 
Abstract: Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who he claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear (structure of the cartilaginous tissue of the pinna), palm vein and DNA structures etc where as Behavioral biometric traits include gait patterns, signatures, keystroke and odor etc. Biometric is a very accurate and reliable method as compared to traditional knowledge based (e.g., passwords) and token based (e.g., ID cards) mechanisms. Various biometrics are used on the basis of the scope of the testing medium, the accuracy required and speed required. Every medium of authentication has its own advantages and shortcomings. 
Keywords: Biometric System, Enrollment, Identification, Verification, Biometric traits. 
I. Introduction 
The term biometrics is derived from the Greek words bio (life) and metric (to measure). Biometrics implies life measurement, the term is associated with the utilization of unique physiological or behavioral characteristics to distinguish an individual. There are two phases in a biometric system a learning phase (enrolment) and a recognition phase (verification or identification). 
Fig.1 Various modules of a biometric system 
Various modules used in a biometric system are: 
Sensor- This module is used for signal acquisition. Sensors are used to capture the data. For example, a facial recognition system might employ multiple cameras to capture different angles on a face. 
Feature Extraction- This module is used to extract features to be stored in database. For example in finger print recognition we extract minute points. 
Matcher Module- This module is used to compare the claimed identity with the stored template. And then decision is carried out whether the clamed identity is true or not. 
Template Database-This module is used to store templates which are actually the output of feature extraction module. 
Biometric system can recognize a person by using different physiological or behavioral characteristics of that person. Depending on the application context, a biometric system may operate either in verification mode or identification mode. In verification mode, the system validates a personā€™s identity by comparing the captured biometric characteristic with the individualā€™s biometric template, which is pre-stored in the system database and system conducts a one-to-one comparison to determine whether the claim is true or not. In identification mode, the system recognizes an individual by searching the entire template database for a match.
Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 
256-261 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 257 
Fig.2 Enrollment, Verification, & Identification tasks.[4] 
The system conducts one-to-many comparison to establish an individualā€™s identity (or fails if the subject is not enrolled in the system database).Enrollment creates an association between an identity and its biometric characteristics. In a verification task, an enrolled user claims an identity and the system verifies the authenticity of the claim based on his biometric feature. An identification system identifies an enrolled user based on his biometric characteristics without the user having to claim an identity. 
II. BIOMETRICS HISTORY 
Bertillonage is the first type of biometrics came into form in 1890, created by an anthropologist named Alphonse Bertillon. He based his system on the claim that measurement of adult bones does not change after the age of 20. The method consisted of identifying people by taking various body measurements like a personā€™s height, arm length, length and breadth of the head, the length of different fingers, the length of forearms, etc. using calipers. However, the methodology was unreliable as non-unique measurements allowed multiple people to have same results, decreasing the accuracy and hence is no longer used.[5] 
III. TYPES OF BIOMETRICS 
A. Fingerprint Recognition 
It involves taking an image of a person's fingertips and records its characteristics like whorls, arches, and loops along with the patterns of ridges, furrows, and minutiae. Fingerprint matching can be achieved in three ways 
ā€¢ Minutae based matching stores minutiae as a set of points in a plane and the points are matched in the template and the input minutiae. 
ā€¢ Correlation based matching superimposes two fingerprint images and correlation between corresponding pixels is computed. 
ā€¢ Ridge feature based matching is an advanced method that captures ridges, as minutiae capturing are difficult in low quality fingerprint images. 
Fig.3 Minutiae of a Fingerprint 
To capture the fingerprints, current techniques employ optical sensors that use a CCD or CMOS image sensor; solid state sensors that work on the transducer technology using capacitive, thermal, electric field or piezoelectric sensors; or ultrasound sensors that work on echography in which the sensor sends acoustic signals through the transmitter toward the finger and captures the echo signals with the receiver.[5] 
B. Face Recognition 
Face recognition involves an evaluation of facial features. It is a computer system application for automatically determining or verifying an individual from a digital image or a video framework from a video source. One of
Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 
256-261 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 258 
the techniques to do this is simply by evaluating selected facial features from the image as well as from facial database[1]. This technique records face images through a digital video camera and analyses facial characteristics like the distance between eyes, nose, mouth, and jaw edges. These measurements are broken into facial planes and retained in a database, further used for comparison. Face recognition can be done in two ways: 
ā€¢ Face appearance employs Fourier transformation of the face image into its fundamental frequencies and formation of eigenfaces, consisting of eigen vectors of the covariance matrix of a set of training images. The distinctiveness of the face is captured without being oversensitive to noise such as lighting variations. 
ā€¢ Face geometry models a human face created in terms of particular facial features like eyes, mouth, etc. and layout of geometry of these features is computed. Face recognition is then a matter of matching constellations. 
Another face identification technology, Facial thermograms, uses infrared heat scans to identify facial characteristics. This non-intrusive technique is light-independent and not vulnerable to disguises. Even plastic surgery, cannot hinder the technique. This technique delivers enhanced accuracy, speed and reliability with minimal storage requirements. This technique is gaining support as a potential tool for averting terrorism, law enforcement areas and also in networks and automated bank tellers.[5] 
C. Voice Recognition 
It combines physiological and behavioral factors to produce speech patterns that can be captured by speech processing technology. Inherent properties of the speaker like fundamental frequency, nasal tone, cadence, inflection, etc. are used for speech authentication. 
Fig.4 Image sample of Voice Recognition 
Voice recognition techniques can be divided into categories depending on the type of authentication domain. 
ā€¢ Fixed text method is a technique where the speaker is required to say a predetermined word that is recorded during registration on the system. 
ā€¢ In the text dependent method the system prompts the user to say a specific word or phrase, which is then computed on the basis of the userā€™s fundamental voice pattern. 
ā€¢ The text independent method is an advanced technique where the user need not articulate any specific word or phrase. The matching is done by the system on the basis of the fundamental voice patterns irrespective of the language and the text used. 
ā€¢ Conversational technique verifies identity of the speaker by inquiring about the knowledge that is secret or unlikely to be known or guessed by a fraud. This technique is inexpensive but is sensitive to background noise and it can be duplicated.Also, it is not always reliable as voice is subject to change during bouts of illness, hoarseness, or other common throat problems. Applications of this technique include voice-controlled computer system, telephone banking, m-commerce and audio and video indexing.[5] 
D. Iris recognition 
It analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. 
Fig. 5 Outer structure of iris 
The scans use a regular video camera and works through glasses and contact lenses. The image of the iris can be directly taken by making the user position his eye within the field of a single narrow-angle camera. This is done by observing a visual feedback via a mirror. The isolated iris pattern obtained is then demodulated to extract its phase information. Iris image acquisition can be done in two ways:
Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 
256-261 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 259 
ā€¢ Daugman System that uses an LED based point light source in conjuction with a standard video camera. The system captures images with the iris diameter typically between 100-200 pixels from a distance of 15-46 cm using 330mm lens. 
ā€¢ Wildes System in comparison results in an illumination rig that is more complex. The system images the iris with approximately 256 pixels across the diameter from 20cm using an 80mm lens.[5] 
E. Hand geometry 
As the name suggests, involves the measurement and analysis of the human hand. Features like length and width of the fingers, aspect ratio of the palm or fingers, width of the palm, thickness of the palm, etc are computed 
. 
Fig.6 Features of Hand 
The user places the palm on a metal surface, which has guidance pegs on it to properly align the palm, so that the device can read the hand attributes. 
Hand Vascular Pattern Identification 
It uses a non-harmful near infrared light to produce an image of one's vein pattern in their face, wrist, or hand, as veins are relatively stable through one's life. It is a non-invasive, computerized comparison of shape and size of subcutaneous blood vessel structures in the back of a hand. The vein "tree" pattern, picked up by a video camera, is sufficiently idiosyncratic to function as a personal code that is extremely difficult to duplicate or discover. The sensor requires no physical contact, providing excellent convenience and no performance degradation even with scars or hand contamination.[5] 
F. Retina Recognition 
This technology uses infrared scanning and compares images of the blood vessels in the back of the eye, the choroidal vasculature. The eyeā€™s inherent isolation and protection from the external environment as an internal organ of the body is a 
Fig.7 Retina Image 
benefit. Retina scan is used in high-end security applications like military installations and power plants.[5] 
G. Signature recognition 
It is an instance of writer recognition, which has been accepted as irrefutable evidence in courts of laws. The way a person signs his name is known to be a characteristic of that individual. Approach to signature verification is based on features like number of interior contours and number of vertical slope components. Signatures are behavioral biometric that can change with time, influenced by physical and emotional conditions of the signatories. Furthermore, professional forgers can reproduce signatures to fool an unskilled eye and hence is not the preferred choice. [5] Different biometric and their trait is listed in the Table 1.
Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 
256-261 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 260 
Table 1: List of Biometric Features [6] 
Biometric 
Biometric Trait 
Fingerprint 
Finger lines ,pore structure 
Signature (dynamic) 
Writing with pressure and speed 
Differentials 
Facial geometry 
Distance of specific facial features(eyes, nose, mouth) 
Iris 
Iris pattern 
Retina 
Eye background (pattern of the vein structure) 
Hnad Geometry 
Measurements of fingers and palm 
Finger Geometry 
Finger measurement 
Vein structure of back 
of hand 
Vein structure of the back of the hand 
Ear Form 
Dimensions of the visible ear 
Voice 
Tone or timbre 
COMPARISON OF BIOMETRIC TYPES 
We can compare various technologies on the basis of Accuracy, Cost, Size of Template, Long term stability, & Security level. Various Biometric features are used for authentication some of them form a large template size and offer high security level 
Table 2: Comparison table of all biometrics[1] 
Biometrics 
Accuracy 
Cost 
Size of template 
Stability 
Security level 
Finger print 
Medium 
Low 
small 
Low 
Low 
Facial recognition 
Low 
High 
Large 
Low 
Low 
Voice recognition 
Low 
Medium 
Small 
Low 
Low 
Iris scan 
High 
High 
Small 
High 
Medium 
Finger vein 
High 
Medium 
Medium 
High 
High 
Hand Geometry 
High 
Medium 
small 
Medium 
Medium 
Retina 
High 
High 
small 
Low 
medium 
Signature 
Medium 
Low 
Medium 
Low 
Low 
. 
Comparison for various Biometric on the basis of accuracy, reliability, security & stability is given below.[5]. We have plotted these results using MATLAB with different values of reliability, security & accuracy with a maximum value 4 and minimum value 0 Above graph show that accuracy of Iris, Retina & Finger Biometric is very high. Graph given below shows that Finger, Iris & Retina Biometric are highly reliable. 
Fig. 8 Accuracy for various biometric
Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 
256-261 
IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 261 
Fig. 9 Reliability for various biometric 
Fig.10 Security for various biometric 
Above figure shows that Iris, Retina & Finger Biometric are more secure as compared to Face & Voice Recognition systems. Various Biometric & their trais are also given below in the table. 
IV. CONCLUSION 
Current electronic security systems, which rely primarily on personal identification to ensure that a client is an authorized user of a system, have a common vulnerability; this can be eliminated using biometrics. Biometric authentication refers to automated methods of identifying or verifying the identity of a person. Using this technology, we can easily identify a person in a crowd and by so we can verify their identity [1]. Biometrics can be used by various organizations to increase security levels and protect their data and patents. It is clear that each trait has different parameters in the field of accuracy, efficiency, speed cost and security. 
REFERENCES 
[1] Rupinder Saini ,Narinder Rana, ā€œComparison of Various Biometric Methods,ā€ (IJAST) Vol 2 Issue I (March 2014) 
[2] Alina Klokova, ā€œComparison of Various Biometric Methodsā€(2011) 
[3] Alastair Cummings, Mark Nixon and John Carter ā€œA Novel Ray Analogy for Enrolment of Ear Biometrics.ā€ In: IEEE Fourth Conference on Biometrics: Theory, Applications and Systems, September 2010, Washington DC, USA. 
[4] S. Prabhakar, S. Pankanti, Anil K. Jain ā€œBiometric Recognition: Security and Privacy Concernsā€ In: IEEE Security & Privacy,( 2003) 
[5] Siddhesh Angle, Reema Bhagtani, Hemali Chheda ā€œBiometrics : A Further Echelon of Securityā€,(2005) 
[6] K.P.Tripathi ā€œA Comparative Study of Biometric Technologies with Reference to Human Interfaceā€ International Journal of Computer Applications (0975 ā€“ 8887) Volume 14ā€“ No.5, January (2011)

More Related Content

What's hot

Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics TechnologyAvanitrambadiya
Ā 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
Ā 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
Ā 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
Ā 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
Ā 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
Ā 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
Ā 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
Ā 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
Ā 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
Ā 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
Ā 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
Ā 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
Ā 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
Ā 

What's hot (20)

Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Ā 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Ā 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
Ā 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
Ā 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Ā 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
Ā 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
Ā 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
Ā 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Ā 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Ā 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Ā 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Ā 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Ā 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
Ā 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 

Viewers also liked (19)

Ijetcas14 403
Ijetcas14 403Ijetcas14 403
Ijetcas14 403
Ā 
Ijetcas14 473
Ijetcas14 473Ijetcas14 473
Ijetcas14 473
Ā 
Ijebea14 285
Ijebea14 285Ijebea14 285
Ijebea14 285
Ā 
Ijebea14 280
Ijebea14 280Ijebea14 280
Ijebea14 280
Ā 
Aijrfans14 233
Aijrfans14 233Aijrfans14 233
Aijrfans14 233
Ā 
Ijetcas14 447
Ijetcas14 447Ijetcas14 447
Ijetcas14 447
Ā 
Ijetcas14 383
Ijetcas14 383Ijetcas14 383
Ijetcas14 383
Ā 
Ijetcas14 395
Ijetcas14 395Ijetcas14 395
Ijetcas14 395
Ā 
Ijetcas14 376
Ijetcas14 376Ijetcas14 376
Ijetcas14 376
Ā 
Ijebea14 209
Ijebea14 209Ijebea14 209
Ijebea14 209
Ā 
Ijetcas14 466
Ijetcas14 466Ijetcas14 466
Ijetcas14 466
Ā 
Ijebea14 251
Ijebea14 251Ijebea14 251
Ijebea14 251
Ā 
Ijebea14 261
Ijebea14 261Ijebea14 261
Ijebea14 261
Ā 
Ijebea14 277
Ijebea14 277Ijebea14 277
Ijebea14 277
Ā 
Ijetcas14 360
Ijetcas14 360Ijetcas14 360
Ijetcas14 360
Ā 
Ijetcas14 537
Ijetcas14 537Ijetcas14 537
Ijetcas14 537
Ā 
Aijrfans14 246
Aijrfans14 246Aijrfans14 246
Aijrfans14 246
Ā 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
Ā 
Aijrfans14 244
Aijrfans14 244Aijrfans14 244
Aijrfans14 244
Ā 

Similar to Ijetcas14 598

Biometric technology
Biometric technologyBiometric technology
Biometric technologyMadugula Kumar
Ā 
Biometric technology
Biometric technologyBiometric technology
Biometric technologySudip Sadhukhan
Ā 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
Ā 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
Ā 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
Ā 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
Ā 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
Ā 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
Ā 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
Ā 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
Ā 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
Ā 
Biometrics
BiometricsBiometrics
BiometricsRajan Kumar
Ā 
Iris scanning
Iris scanningIris scanning
Iris scanningAnkit Kumar
Ā 

Similar to Ijetcas14 598 (20)

Biometrics
BiometricsBiometrics
Biometrics
Ā 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Ā 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Ā 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Ā 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
Ā 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
Ā 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Ā 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Ā 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
Ā 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
Ā 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Ā 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Ā 
E0543135
E0543135E0543135
E0543135
Ā 
Biometrics
BiometricsBiometrics
Biometrics
Ā 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ā 

More from Iasir Journals

More from Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
Ā 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
Ā 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
Ā 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
Ā 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
Ā 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
Ā 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
Ā 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
Ā 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
Ā 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
Ā 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
Ā 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
Ā 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
Ā 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
Ā 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Ā 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
Ā 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
Ā 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
Ā 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
Ā 
Ijetcas14 580
Ijetcas14 580Ijetcas14 580
Ijetcas14 580
Ā 

Recently uploaded

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
Ā 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Ā 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
Ā 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
Ā 
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)lakshayb543
Ā 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
Ā 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
Ā 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
Ā 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
Ā 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Nguyen Thanh Tu Collection
Ā 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
Ā 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
Ā 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
Ā 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
Ā 

Recently uploaded (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Ā 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Ā 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
Ā 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Ā 
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)
Visit to a blind student's schoolšŸ§‘ā€šŸ¦ÆšŸ§‘ā€šŸ¦Æ(community medicine)
Ā 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Ā 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
Ā 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
Ā 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Ā 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Ā 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Ā 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
Ā 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
Ā 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
Ā 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Ā 

Ijetcas14 598

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 256 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Comparison of Various Biometric Methods Dr. Rajinder Singh1, Shakti Kumar2 Department of Electronics & IT S.D.College, Ambala Cantt Haryana Abstract: Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who he claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear (structure of the cartilaginous tissue of the pinna), palm vein and DNA structures etc where as Behavioral biometric traits include gait patterns, signatures, keystroke and odor etc. Biometric is a very accurate and reliable method as compared to traditional knowledge based (e.g., passwords) and token based (e.g., ID cards) mechanisms. Various biometrics are used on the basis of the scope of the testing medium, the accuracy required and speed required. Every medium of authentication has its own advantages and shortcomings. Keywords: Biometric System, Enrollment, Identification, Verification, Biometric traits. I. Introduction The term biometrics is derived from the Greek words bio (life) and metric (to measure). Biometrics implies life measurement, the term is associated with the utilization of unique physiological or behavioral characteristics to distinguish an individual. There are two phases in a biometric system a learning phase (enrolment) and a recognition phase (verification or identification). Fig.1 Various modules of a biometric system Various modules used in a biometric system are: Sensor- This module is used for signal acquisition. Sensors are used to capture the data. For example, a facial recognition system might employ multiple cameras to capture different angles on a face. Feature Extraction- This module is used to extract features to be stored in database. For example in finger print recognition we extract minute points. Matcher Module- This module is used to compare the claimed identity with the stored template. And then decision is carried out whether the clamed identity is true or not. Template Database-This module is used to store templates which are actually the output of feature extraction module. Biometric system can recognize a person by using different physiological or behavioral characteristics of that person. Depending on the application context, a biometric system may operate either in verification mode or identification mode. In verification mode, the system validates a personā€™s identity by comparing the captured biometric characteristic with the individualā€™s biometric template, which is pre-stored in the system database and system conducts a one-to-one comparison to determine whether the claim is true or not. In identification mode, the system recognizes an individual by searching the entire template database for a match.
  • 2. Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 257 Fig.2 Enrollment, Verification, & Identification tasks.[4] The system conducts one-to-many comparison to establish an individualā€™s identity (or fails if the subject is not enrolled in the system database).Enrollment creates an association between an identity and its biometric characteristics. In a verification task, an enrolled user claims an identity and the system verifies the authenticity of the claim based on his biometric feature. An identification system identifies an enrolled user based on his biometric characteristics without the user having to claim an identity. II. BIOMETRICS HISTORY Bertillonage is the first type of biometrics came into form in 1890, created by an anthropologist named Alphonse Bertillon. He based his system on the claim that measurement of adult bones does not change after the age of 20. The method consisted of identifying people by taking various body measurements like a personā€™s height, arm length, length and breadth of the head, the length of different fingers, the length of forearms, etc. using calipers. However, the methodology was unreliable as non-unique measurements allowed multiple people to have same results, decreasing the accuracy and hence is no longer used.[5] III. TYPES OF BIOMETRICS A. Fingerprint Recognition It involves taking an image of a person's fingertips and records its characteristics like whorls, arches, and loops along with the patterns of ridges, furrows, and minutiae. Fingerprint matching can be achieved in three ways ā€¢ Minutae based matching stores minutiae as a set of points in a plane and the points are matched in the template and the input minutiae. ā€¢ Correlation based matching superimposes two fingerprint images and correlation between corresponding pixels is computed. ā€¢ Ridge feature based matching is an advanced method that captures ridges, as minutiae capturing are difficult in low quality fingerprint images. Fig.3 Minutiae of a Fingerprint To capture the fingerprints, current techniques employ optical sensors that use a CCD or CMOS image sensor; solid state sensors that work on the transducer technology using capacitive, thermal, electric field or piezoelectric sensors; or ultrasound sensors that work on echography in which the sensor sends acoustic signals through the transmitter toward the finger and captures the echo signals with the receiver.[5] B. Face Recognition Face recognition involves an evaluation of facial features. It is a computer system application for automatically determining or verifying an individual from a digital image or a video framework from a video source. One of
  • 3. Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 258 the techniques to do this is simply by evaluating selected facial features from the image as well as from facial database[1]. This technique records face images through a digital video camera and analyses facial characteristics like the distance between eyes, nose, mouth, and jaw edges. These measurements are broken into facial planes and retained in a database, further used for comparison. Face recognition can be done in two ways: ā€¢ Face appearance employs Fourier transformation of the face image into its fundamental frequencies and formation of eigenfaces, consisting of eigen vectors of the covariance matrix of a set of training images. The distinctiveness of the face is captured without being oversensitive to noise such as lighting variations. ā€¢ Face geometry models a human face created in terms of particular facial features like eyes, mouth, etc. and layout of geometry of these features is computed. Face recognition is then a matter of matching constellations. Another face identification technology, Facial thermograms, uses infrared heat scans to identify facial characteristics. This non-intrusive technique is light-independent and not vulnerable to disguises. Even plastic surgery, cannot hinder the technique. This technique delivers enhanced accuracy, speed and reliability with minimal storage requirements. This technique is gaining support as a potential tool for averting terrorism, law enforcement areas and also in networks and automated bank tellers.[5] C. Voice Recognition It combines physiological and behavioral factors to produce speech patterns that can be captured by speech processing technology. Inherent properties of the speaker like fundamental frequency, nasal tone, cadence, inflection, etc. are used for speech authentication. Fig.4 Image sample of Voice Recognition Voice recognition techniques can be divided into categories depending on the type of authentication domain. ā€¢ Fixed text method is a technique where the speaker is required to say a predetermined word that is recorded during registration on the system. ā€¢ In the text dependent method the system prompts the user to say a specific word or phrase, which is then computed on the basis of the userā€™s fundamental voice pattern. ā€¢ The text independent method is an advanced technique where the user need not articulate any specific word or phrase. The matching is done by the system on the basis of the fundamental voice patterns irrespective of the language and the text used. ā€¢ Conversational technique verifies identity of the speaker by inquiring about the knowledge that is secret or unlikely to be known or guessed by a fraud. This technique is inexpensive but is sensitive to background noise and it can be duplicated.Also, it is not always reliable as voice is subject to change during bouts of illness, hoarseness, or other common throat problems. Applications of this technique include voice-controlled computer system, telephone banking, m-commerce and audio and video indexing.[5] D. Iris recognition It analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. Fig. 5 Outer structure of iris The scans use a regular video camera and works through glasses and contact lenses. The image of the iris can be directly taken by making the user position his eye within the field of a single narrow-angle camera. This is done by observing a visual feedback via a mirror. The isolated iris pattern obtained is then demodulated to extract its phase information. Iris image acquisition can be done in two ways:
  • 4. Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 259 ā€¢ Daugman System that uses an LED based point light source in conjuction with a standard video camera. The system captures images with the iris diameter typically between 100-200 pixels from a distance of 15-46 cm using 330mm lens. ā€¢ Wildes System in comparison results in an illumination rig that is more complex. The system images the iris with approximately 256 pixels across the diameter from 20cm using an 80mm lens.[5] E. Hand geometry As the name suggests, involves the measurement and analysis of the human hand. Features like length and width of the fingers, aspect ratio of the palm or fingers, width of the palm, thickness of the palm, etc are computed . Fig.6 Features of Hand The user places the palm on a metal surface, which has guidance pegs on it to properly align the palm, so that the device can read the hand attributes. Hand Vascular Pattern Identification It uses a non-harmful near infrared light to produce an image of one's vein pattern in their face, wrist, or hand, as veins are relatively stable through one's life. It is a non-invasive, computerized comparison of shape and size of subcutaneous blood vessel structures in the back of a hand. The vein "tree" pattern, picked up by a video camera, is sufficiently idiosyncratic to function as a personal code that is extremely difficult to duplicate or discover. The sensor requires no physical contact, providing excellent convenience and no performance degradation even with scars or hand contamination.[5] F. Retina Recognition This technology uses infrared scanning and compares images of the blood vessels in the back of the eye, the choroidal vasculature. The eyeā€™s inherent isolation and protection from the external environment as an internal organ of the body is a Fig.7 Retina Image benefit. Retina scan is used in high-end security applications like military installations and power plants.[5] G. Signature recognition It is an instance of writer recognition, which has been accepted as irrefutable evidence in courts of laws. The way a person signs his name is known to be a characteristic of that individual. Approach to signature verification is based on features like number of interior contours and number of vertical slope components. Signatures are behavioral biometric that can change with time, influenced by physical and emotional conditions of the signatories. Furthermore, professional forgers can reproduce signatures to fool an unskilled eye and hence is not the preferred choice. [5] Different biometric and their trait is listed in the Table 1.
  • 5. Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 260 Table 1: List of Biometric Features [6] Biometric Biometric Trait Fingerprint Finger lines ,pore structure Signature (dynamic) Writing with pressure and speed Differentials Facial geometry Distance of specific facial features(eyes, nose, mouth) Iris Iris pattern Retina Eye background (pattern of the vein structure) Hnad Geometry Measurements of fingers and palm Finger Geometry Finger measurement Vein structure of back of hand Vein structure of the back of the hand Ear Form Dimensions of the visible ear Voice Tone or timbre COMPARISON OF BIOMETRIC TYPES We can compare various technologies on the basis of Accuracy, Cost, Size of Template, Long term stability, & Security level. Various Biometric features are used for authentication some of them form a large template size and offer high security level Table 2: Comparison table of all biometrics[1] Biometrics Accuracy Cost Size of template Stability Security level Finger print Medium Low small Low Low Facial recognition Low High Large Low Low Voice recognition Low Medium Small Low Low Iris scan High High Small High Medium Finger vein High Medium Medium High High Hand Geometry High Medium small Medium Medium Retina High High small Low medium Signature Medium Low Medium Low Low . Comparison for various Biometric on the basis of accuracy, reliability, security & stability is given below.[5]. We have plotted these results using MATLAB with different values of reliability, security & accuracy with a maximum value 4 and minimum value 0 Above graph show that accuracy of Iris, Retina & Finger Biometric is very high. Graph given below shows that Finger, Iris & Retina Biometric are highly reliable. Fig. 8 Accuracy for various biometric
  • 6. Rajinder Singh et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 261 Fig. 9 Reliability for various biometric Fig.10 Security for various biometric Above figure shows that Iris, Retina & Finger Biometric are more secure as compared to Face & Voice Recognition systems. Various Biometric & their trais are also given below in the table. IV. CONCLUSION Current electronic security systems, which rely primarily on personal identification to ensure that a client is an authorized user of a system, have a common vulnerability; this can be eliminated using biometrics. Biometric authentication refers to automated methods of identifying or verifying the identity of a person. Using this technology, we can easily identify a person in a crowd and by so we can verify their identity [1]. Biometrics can be used by various organizations to increase security levels and protect their data and patents. It is clear that each trait has different parameters in the field of accuracy, efficiency, speed cost and security. REFERENCES [1] Rupinder Saini ,Narinder Rana, ā€œComparison of Various Biometric Methods,ā€ (IJAST) Vol 2 Issue I (March 2014) [2] Alina Klokova, ā€œComparison of Various Biometric Methodsā€(2011) [3] Alastair Cummings, Mark Nixon and John Carter ā€œA Novel Ray Analogy for Enrolment of Ear Biometrics.ā€ In: IEEE Fourth Conference on Biometrics: Theory, Applications and Systems, September 2010, Washington DC, USA. [4] S. Prabhakar, S. Pankanti, Anil K. Jain ā€œBiometric Recognition: Security and Privacy Concernsā€ In: IEEE Security & Privacy,( 2003) [5] Siddhesh Angle, Reema Bhagtani, Hemali Chheda ā€œBiometrics : A Further Echelon of Securityā€,(2005) [6] K.P.Tripathi ā€œA Comparative Study of Biometric Technologies with Reference to Human Interfaceā€ International Journal of Computer Applications (0975 ā€“ 8887) Volume 14ā€“ No.5, January (2011)