Submit Search
Upload
Ijetcas14 598
ā¢
1 like
ā¢
301 views
Iasir Journals
Follow
Comparison of Various Biometric Methods
Read less
Read more
Education
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
Ā
E0364024030
E0364024030
inventionjournals
Ā
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Ā
Biometrics Security System
Biometrics Security System
Shalika Dissanayaka
Ā
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
Ā
Bio shiv
Bio shiv
Shivank Garg
Ā
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
IOSR Journals
Ā
Slide-show on Biometrics
Slide-show on Biometrics
Pathik504
Ā
Recommended
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
Ā
E0364024030
E0364024030
inventionjournals
Ā
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Ā
Biometrics Security System
Biometrics Security System
Shalika Dissanayaka
Ā
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
Ā
Bio shiv
Bio shiv
Shivank Garg
Ā
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
IOSR Journals
Ā
Slide-show on Biometrics
Slide-show on Biometrics
Pathik504
Ā
Bio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
Ā
Jss academy of technical education
Jss academy of technical education
Arhind Gautam
Ā
Ear Biometrics
Ear Biometrics
Abhineet Bhamra
Ā
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
Dr. Vinayak Bharadi
Ā
Biometric Systems
Biometric Systems
Sn Moddho
Ā
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
Ā
Biometrics
Biometrics
Sandeep Kamath
Ā
Biometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
Ā
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Ā
Biometric security Presentation
Biometric security Presentation
Prabh Jeet
Ā
Biometics technology
Biometics technology
Praween Lakra
Ā
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
Ā
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
Ā
Biometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
Ā
Biometrics final ppt
Biometrics final ppt
Vishak Illath veed
Ā
Chapters 3 4
Chapters 3 4
sakshi_20
Ā
Face Recognition Technology
Face Recognition Technology
Agrani Rastogi
Ā
Biometrics
Biometrics
Bhupeshkumar Nanhe
Ā
Biometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
Ā
Biometrics
Biometrics
umertariq12345
Ā
Ijetcas14 403
Ijetcas14 403
Iasir Journals
Ā
Ijetcas14 473
Ijetcas14 473
Iasir Journals
Ā
More Related Content
What's hot
Bio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
Ā
Jss academy of technical education
Jss academy of technical education
Arhind Gautam
Ā
Ear Biometrics
Ear Biometrics
Abhineet Bhamra
Ā
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
Dr. Vinayak Bharadi
Ā
Biometric Systems
Biometric Systems
Sn Moddho
Ā
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
Ā
Biometrics
Biometrics
Sandeep Kamath
Ā
Biometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
Ā
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Ā
Biometric security Presentation
Biometric security Presentation
Prabh Jeet
Ā
Biometics technology
Biometics technology
Praween Lakra
Ā
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
Ā
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
Ā
Biometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
Ā
Biometrics final ppt
Biometrics final ppt
Vishak Illath veed
Ā
Chapters 3 4
Chapters 3 4
sakshi_20
Ā
Face Recognition Technology
Face Recognition Technology
Agrani Rastogi
Ā
Biometrics
Biometrics
Bhupeshkumar Nanhe
Ā
Biometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
Ā
Biometrics
Biometrics
umertariq12345
Ā
What's hot
(20)
Bio-metrics Technology
Bio-metrics Technology
Ā
Jss academy of technical education
Jss academy of technical education
Ā
Ear Biometrics
Ear Biometrics
Ā
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
Ā
Biometric Systems
Biometric Systems
Ā
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
Ā
Biometrics
Biometrics
Ā
Biometrics ppt
Biometrics ppt
Ā
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
Ā
Biometric security Presentation
Biometric security Presentation
Ā
Biometics technology
Biometics technology
Ā
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Ā
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Ā
Biometrics For Security Systems
Biometrics For Security Systems
Ā
Biometrics final ppt
Biometrics final ppt
Ā
Chapters 3 4
Chapters 3 4
Ā
Face Recognition Technology
Face Recognition Technology
Ā
Biometrics
Biometrics
Ā
Biometric Class Attendace System
Biometric Class Attendace System
Ā
Biometrics
Biometrics
Ā
Viewers also liked
Ijetcas14 403
Ijetcas14 403
Iasir Journals
Ā
Ijetcas14 473
Ijetcas14 473
Iasir Journals
Ā
Ijebea14 285
Ijebea14 285
Iasir Journals
Ā
Ijebea14 280
Ijebea14 280
Iasir Journals
Ā
Aijrfans14 233
Aijrfans14 233
Iasir Journals
Ā
Ijetcas14 447
Ijetcas14 447
Iasir Journals
Ā
Ijetcas14 383
Ijetcas14 383
Iasir Journals
Ā
Ijetcas14 395
Ijetcas14 395
Iasir Journals
Ā
Ijetcas14 376
Ijetcas14 376
Iasir Journals
Ā
Ijebea14 209
Ijebea14 209
Iasir Journals
Ā
Ijetcas14 466
Ijetcas14 466
Iasir Journals
Ā
Ijebea14 251
Ijebea14 251
Iasir Journals
Ā
Ijebea14 261
Ijebea14 261
Iasir Journals
Ā
Ijebea14 277
Ijebea14 277
Iasir Journals
Ā
Ijetcas14 360
Ijetcas14 360
Iasir Journals
Ā
Ijetcas14 537
Ijetcas14 537
Iasir Journals
Ā
Aijrfans14 246
Aijrfans14 246
Iasir Journals
Ā
Ijetcas14 641
Ijetcas14 641
Iasir Journals
Ā
Aijrfans14 244
Aijrfans14 244
Iasir Journals
Ā
Viewers also liked
(19)
Ijetcas14 403
Ijetcas14 403
Ā
Ijetcas14 473
Ijetcas14 473
Ā
Ijebea14 285
Ijebea14 285
Ā
Ijebea14 280
Ijebea14 280
Ā
Aijrfans14 233
Aijrfans14 233
Ā
Ijetcas14 447
Ijetcas14 447
Ā
Ijetcas14 383
Ijetcas14 383
Ā
Ijetcas14 395
Ijetcas14 395
Ā
Ijetcas14 376
Ijetcas14 376
Ā
Ijebea14 209
Ijebea14 209
Ā
Ijetcas14 466
Ijetcas14 466
Ā
Ijebea14 251
Ijebea14 251
Ā
Ijebea14 261
Ijebea14 261
Ā
Ijebea14 277
Ijebea14 277
Ā
Ijetcas14 360
Ijetcas14 360
Ā
Ijetcas14 537
Ijetcas14 537
Ā
Aijrfans14 246
Aijrfans14 246
Ā
Ijetcas14 641
Ijetcas14 641
Ā
Aijrfans14 244
Aijrfans14 244
Ā
Similar to Ijetcas14 598
Biometrics
Biometrics
Alan Leewllyn Bivera
Ā
Biometric technology
Biometric technology
Madugula Kumar
Ā
Biometric technology
Biometric technology
Sudip Sadhukhan
Ā
4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
Ā
Biometrics
Biometrics
shweta-sharma99
Ā
Biometrics
Biometrics
shweta-sharma99
Ā
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
Ā
Biometrics
Biometrics
Shivani Gautam
Ā
Biometric authentication system
Biometric authentication system
Manoj Kumar
Ā
Biometric.docx
Biometric.docx
ShubhamYadav769267
Ā
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
Ā
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
Ā
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
Ā
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
Ā
Biometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
Ā
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
Ā
A study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
Ā
E0543135
E0543135
IOSR Journals
Ā
Biometrics
Biometrics
Rajan Kumar
Ā
Iris scanning
Iris scanning
Ankit Kumar
Ā
Similar to Ijetcas14 598
(20)
Biometrics
Biometrics
Ā
Biometric technology
Biometric technology
Ā
Biometric technology
Biometric technology
Ā
4.report (biometric security system)
4.report (biometric security system)
Ā
Biometrics
Biometrics
Ā
Biometrics
Biometrics
Ā
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Ā
Biometrics
Biometrics
Ā
Biometric authentication system
Biometric authentication system
Ā
Biometric.docx
Biometric.docx
Ā
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
Ā
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Ā
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Ā
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
Ā
Biometric Security Systems ppt
Biometric Security Systems ppt
Ā
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Ā
A study on biometric authentication techniques
A study on biometric authentication techniques
Ā
E0543135
E0543135
Ā
Biometrics
Biometrics
Ā
Iris scanning
Iris scanning
Ā
More from Iasir Journals
ijetcas14 650
ijetcas14 650
Iasir Journals
Ā
Ijetcas14 648
Ijetcas14 648
Iasir Journals
Ā
Ijetcas14 647
Ijetcas14 647
Iasir Journals
Ā
Ijetcas14 643
Ijetcas14 643
Iasir Journals
Ā
Ijetcas14 639
Ijetcas14 639
Iasir Journals
Ā
Ijetcas14 632
Ijetcas14 632
Iasir Journals
Ā
Ijetcas14 624
Ijetcas14 624
Iasir Journals
Ā
Ijetcas14 619
Ijetcas14 619
Iasir Journals
Ā
Ijetcas14 615
Ijetcas14 615
Iasir Journals
Ā
Ijetcas14 608
Ijetcas14 608
Iasir Journals
Ā
Ijetcas14 605
Ijetcas14 605
Iasir Journals
Ā
Ijetcas14 604
Ijetcas14 604
Iasir Journals
Ā
Ijetcas14 594
Ijetcas14 594
Iasir Journals
Ā
Ijetcas14 593
Ijetcas14 593
Iasir Journals
Ā
Ijetcas14 591
Ijetcas14 591
Iasir Journals
Ā
Ijetcas14 589
Ijetcas14 589
Iasir Journals
Ā
Ijetcas14 585
Ijetcas14 585
Iasir Journals
Ā
Ijetcas14 584
Ijetcas14 584
Iasir Journals
Ā
Ijetcas14 583
Ijetcas14 583
Iasir Journals
Ā
Ijetcas14 580
Ijetcas14 580
Iasir Journals
Ā
More from Iasir Journals
(20)
ijetcas14 650
ijetcas14 650
Ā
Ijetcas14 648
Ijetcas14 648
Ā
Ijetcas14 647
Ijetcas14 647
Ā
Ijetcas14 643
Ijetcas14 643
Ā
Ijetcas14 639
Ijetcas14 639
Ā
Ijetcas14 632
Ijetcas14 632
Ā
Ijetcas14 624
Ijetcas14 624
Ā
Ijetcas14 619
Ijetcas14 619
Ā
Ijetcas14 615
Ijetcas14 615
Ā
Ijetcas14 608
Ijetcas14 608
Ā
Ijetcas14 605
Ijetcas14 605
Ā
Ijetcas14 604
Ijetcas14 604
Ā
Ijetcas14 594
Ijetcas14 594
Ā
Ijetcas14 593
Ijetcas14 593
Ā
Ijetcas14 591
Ijetcas14 591
Ā
Ijetcas14 589
Ijetcas14 589
Ā
Ijetcas14 585
Ijetcas14 585
Ā
Ijetcas14 584
Ijetcas14 584
Ā
Ijetcas14 583
Ijetcas14 583
Ā
Ijetcas14 580
Ijetcas14 580
Ā
Recently uploaded
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
ErwinPantujan2
Ā
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
TechSoup
Ā
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
Ā
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
navabharathschool99
Ā
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
mary850239
Ā
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
Ā
Visit to a blind student's schoolš§āš¦Æš§āš¦Æ(community medicine)
Visit to a blind student's schoolš§āš¦Æš§āš¦Æ(community medicine)
lakshayb543
Ā
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Anupkumar Sharma
Ā
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
ManeerUddin
Ā
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
cama23
Ā
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
AshokKarra1
Ā
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
JoshuaGantuangco2
Ā
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Ā
Transaction Management in Database Management System
Transaction Management in Database Management System
Christalin Nelson
Ā
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Postal Advocate Inc.
Ā
Hį»C Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRĆNH GLOBAL SUCCESS ÄĆP ĆN CHI TIįŗ¾T - Cįŗ¢ NÄ...
Hį»C Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRĆNH GLOBAL SUCCESS ÄĆP ĆN CHI TIįŗ¾T - Cįŗ¢ NÄ...
Nguyen Thanh Tu Collection
Ā
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
shraddhaparab530
Ā
Concurrency Control in Database Management system
Concurrency Control in Database Management system
Christalin Nelson
Ā
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
mary850239
Ā
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Mark Reed
Ā
Recently uploaded
(20)
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Ā
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Ā
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Ā
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
Ā
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
Ā
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Ā
Visit to a blind student's schoolš§āš¦Æš§āš¦Æ(community medicine)
Visit to a blind student's schoolš§āš¦Æš§āš¦Æ(community medicine)
Ā
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Ā
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
Ā
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
Ā
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
Ā
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Ā
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Ā
Transaction Management in Database Management System
Transaction Management in Database Management System
Ā
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Ā
Hį»C Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRĆNH GLOBAL SUCCESS ÄĆP ĆN CHI TIįŗ¾T - Cįŗ¢ NÄ...
Hį»C Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRĆNH GLOBAL SUCCESS ÄĆP ĆN CHI TIįŗ¾T - Cįŗ¢ NÄ...
Ā
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
Ā
Concurrency Control in Database Management system
Concurrency Control in Database Management system
Ā
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
Ā
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Ā
Ijetcas14 598
1.
International Association of
Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 256 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Comparison of Various Biometric Methods Dr. Rajinder Singh1, Shakti Kumar2 Department of Electronics & IT S.D.College, Ambala Cantt Haryana Abstract: Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who he claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear (structure of the cartilaginous tissue of the pinna), palm vein and DNA structures etc where as Behavioral biometric traits include gait patterns, signatures, keystroke and odor etc. Biometric is a very accurate and reliable method as compared to traditional knowledge based (e.g., passwords) and token based (e.g., ID cards) mechanisms. Various biometrics are used on the basis of the scope of the testing medium, the accuracy required and speed required. Every medium of authentication has its own advantages and shortcomings. Keywords: Biometric System, Enrollment, Identification, Verification, Biometric traits. I. Introduction The term biometrics is derived from the Greek words bio (life) and metric (to measure). Biometrics implies life measurement, the term is associated with the utilization of unique physiological or behavioral characteristics to distinguish an individual. There are two phases in a biometric system a learning phase (enrolment) and a recognition phase (verification or identification). Fig.1 Various modules of a biometric system Various modules used in a biometric system are: Sensor- This module is used for signal acquisition. Sensors are used to capture the data. For example, a facial recognition system might employ multiple cameras to capture different angles on a face. Feature Extraction- This module is used to extract features to be stored in database. For example in finger print recognition we extract minute points. Matcher Module- This module is used to compare the claimed identity with the stored template. And then decision is carried out whether the clamed identity is true or not. Template Database-This module is used to store templates which are actually the output of feature extraction module. Biometric system can recognize a person by using different physiological or behavioral characteristics of that person. Depending on the application context, a biometric system may operate either in verification mode or identification mode. In verification mode, the system validates a personās identity by comparing the captured biometric characteristic with the individualās biometric template, which is pre-stored in the system database and system conducts a one-to-one comparison to determine whether the claim is true or not. In identification mode, the system recognizes an individual by searching the entire template database for a match.
2.
Rajinder Singh et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 257 Fig.2 Enrollment, Verification, & Identification tasks.[4] The system conducts one-to-many comparison to establish an individualās identity (or fails if the subject is not enrolled in the system database).Enrollment creates an association between an identity and its biometric characteristics. In a verification task, an enrolled user claims an identity and the system verifies the authenticity of the claim based on his biometric feature. An identification system identifies an enrolled user based on his biometric characteristics without the user having to claim an identity. II. BIOMETRICS HISTORY Bertillonage is the first type of biometrics came into form in 1890, created by an anthropologist named Alphonse Bertillon. He based his system on the claim that measurement of adult bones does not change after the age of 20. The method consisted of identifying people by taking various body measurements like a personās height, arm length, length and breadth of the head, the length of different fingers, the length of forearms, etc. using calipers. However, the methodology was unreliable as non-unique measurements allowed multiple people to have same results, decreasing the accuracy and hence is no longer used.[5] III. TYPES OF BIOMETRICS A. Fingerprint Recognition It involves taking an image of a person's fingertips and records its characteristics like whorls, arches, and loops along with the patterns of ridges, furrows, and minutiae. Fingerprint matching can be achieved in three ways ā¢ Minutae based matching stores minutiae as a set of points in a plane and the points are matched in the template and the input minutiae. ā¢ Correlation based matching superimposes two fingerprint images and correlation between corresponding pixels is computed. ā¢ Ridge feature based matching is an advanced method that captures ridges, as minutiae capturing are difficult in low quality fingerprint images. Fig.3 Minutiae of a Fingerprint To capture the fingerprints, current techniques employ optical sensors that use a CCD or CMOS image sensor; solid state sensors that work on the transducer technology using capacitive, thermal, electric field or piezoelectric sensors; or ultrasound sensors that work on echography in which the sensor sends acoustic signals through the transmitter toward the finger and captures the echo signals with the receiver.[5] B. Face Recognition Face recognition involves an evaluation of facial features. It is a computer system application for automatically determining or verifying an individual from a digital image or a video framework from a video source. One of
3.
Rajinder Singh et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 258 the techniques to do this is simply by evaluating selected facial features from the image as well as from facial database[1]. This technique records face images through a digital video camera and analyses facial characteristics like the distance between eyes, nose, mouth, and jaw edges. These measurements are broken into facial planes and retained in a database, further used for comparison. Face recognition can be done in two ways: ā¢ Face appearance employs Fourier transformation of the face image into its fundamental frequencies and formation of eigenfaces, consisting of eigen vectors of the covariance matrix of a set of training images. The distinctiveness of the face is captured without being oversensitive to noise such as lighting variations. ā¢ Face geometry models a human face created in terms of particular facial features like eyes, mouth, etc. and layout of geometry of these features is computed. Face recognition is then a matter of matching constellations. Another face identification technology, Facial thermograms, uses infrared heat scans to identify facial characteristics. This non-intrusive technique is light-independent and not vulnerable to disguises. Even plastic surgery, cannot hinder the technique. This technique delivers enhanced accuracy, speed and reliability with minimal storage requirements. This technique is gaining support as a potential tool for averting terrorism, law enforcement areas and also in networks and automated bank tellers.[5] C. Voice Recognition It combines physiological and behavioral factors to produce speech patterns that can be captured by speech processing technology. Inherent properties of the speaker like fundamental frequency, nasal tone, cadence, inflection, etc. are used for speech authentication. Fig.4 Image sample of Voice Recognition Voice recognition techniques can be divided into categories depending on the type of authentication domain. ā¢ Fixed text method is a technique where the speaker is required to say a predetermined word that is recorded during registration on the system. ā¢ In the text dependent method the system prompts the user to say a specific word or phrase, which is then computed on the basis of the userās fundamental voice pattern. ā¢ The text independent method is an advanced technique where the user need not articulate any specific word or phrase. The matching is done by the system on the basis of the fundamental voice patterns irrespective of the language and the text used. ā¢ Conversational technique verifies identity of the speaker by inquiring about the knowledge that is secret or unlikely to be known or guessed by a fraud. This technique is inexpensive but is sensitive to background noise and it can be duplicated.Also, it is not always reliable as voice is subject to change during bouts of illness, hoarseness, or other common throat problems. Applications of this technique include voice-controlled computer system, telephone banking, m-commerce and audio and video indexing.[5] D. Iris recognition It analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. Fig. 5 Outer structure of iris The scans use a regular video camera and works through glasses and contact lenses. The image of the iris can be directly taken by making the user position his eye within the field of a single narrow-angle camera. This is done by observing a visual feedback via a mirror. The isolated iris pattern obtained is then demodulated to extract its phase information. Iris image acquisition can be done in two ways:
4.
Rajinder Singh et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 259 ā¢ Daugman System that uses an LED based point light source in conjuction with a standard video camera. The system captures images with the iris diameter typically between 100-200 pixels from a distance of 15-46 cm using 330mm lens. ā¢ Wildes System in comparison results in an illumination rig that is more complex. The system images the iris with approximately 256 pixels across the diameter from 20cm using an 80mm lens.[5] E. Hand geometry As the name suggests, involves the measurement and analysis of the human hand. Features like length and width of the fingers, aspect ratio of the palm or fingers, width of the palm, thickness of the palm, etc are computed . Fig.6 Features of Hand The user places the palm on a metal surface, which has guidance pegs on it to properly align the palm, so that the device can read the hand attributes. Hand Vascular Pattern Identification It uses a non-harmful near infrared light to produce an image of one's vein pattern in their face, wrist, or hand, as veins are relatively stable through one's life. It is a non-invasive, computerized comparison of shape and size of subcutaneous blood vessel structures in the back of a hand. The vein "tree" pattern, picked up by a video camera, is sufficiently idiosyncratic to function as a personal code that is extremely difficult to duplicate or discover. The sensor requires no physical contact, providing excellent convenience and no performance degradation even with scars or hand contamination.[5] F. Retina Recognition This technology uses infrared scanning and compares images of the blood vessels in the back of the eye, the choroidal vasculature. The eyeās inherent isolation and protection from the external environment as an internal organ of the body is a Fig.7 Retina Image benefit. Retina scan is used in high-end security applications like military installations and power plants.[5] G. Signature recognition It is an instance of writer recognition, which has been accepted as irrefutable evidence in courts of laws. The way a person signs his name is known to be a characteristic of that individual. Approach to signature verification is based on features like number of interior contours and number of vertical slope components. Signatures are behavioral biometric that can change with time, influenced by physical and emotional conditions of the signatories. Furthermore, professional forgers can reproduce signatures to fool an unskilled eye and hence is not the preferred choice. [5] Different biometric and their trait is listed in the Table 1.
5.
Rajinder Singh et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 260 Table 1: List of Biometric Features [6] Biometric Biometric Trait Fingerprint Finger lines ,pore structure Signature (dynamic) Writing with pressure and speed Differentials Facial geometry Distance of specific facial features(eyes, nose, mouth) Iris Iris pattern Retina Eye background (pattern of the vein structure) Hnad Geometry Measurements of fingers and palm Finger Geometry Finger measurement Vein structure of back of hand Vein structure of the back of the hand Ear Form Dimensions of the visible ear Voice Tone or timbre COMPARISON OF BIOMETRIC TYPES We can compare various technologies on the basis of Accuracy, Cost, Size of Template, Long term stability, & Security level. Various Biometric features are used for authentication some of them form a large template size and offer high security level Table 2: Comparison table of all biometrics[1] Biometrics Accuracy Cost Size of template Stability Security level Finger print Medium Low small Low Low Facial recognition Low High Large Low Low Voice recognition Low Medium Small Low Low Iris scan High High Small High Medium Finger vein High Medium Medium High High Hand Geometry High Medium small Medium Medium Retina High High small Low medium Signature Medium Low Medium Low Low . Comparison for various Biometric on the basis of accuracy, reliability, security & stability is given below.[5]. We have plotted these results using MATLAB with different values of reliability, security & accuracy with a maximum value 4 and minimum value 0 Above graph show that accuracy of Iris, Retina & Finger Biometric is very high. Graph given below shows that Finger, Iris & Retina Biometric are highly reliable. Fig. 8 Accuracy for various biometric
6.
Rajinder Singh et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261 IJETCAS 14-598; Ā© 2014, IJETCAS All Rights Reserved Page 261 Fig. 9 Reliability for various biometric Fig.10 Security for various biometric Above figure shows that Iris, Retina & Finger Biometric are more secure as compared to Face & Voice Recognition systems. Various Biometric & their trais are also given below in the table. IV. CONCLUSION Current electronic security systems, which rely primarily on personal identification to ensure that a client is an authorized user of a system, have a common vulnerability; this can be eliminated using biometrics. Biometric authentication refers to automated methods of identifying or verifying the identity of a person. Using this technology, we can easily identify a person in a crowd and by so we can verify their identity [1]. Biometrics can be used by various organizations to increase security levels and protect their data and patents. It is clear that each trait has different parameters in the field of accuracy, efficiency, speed cost and security. REFERENCES [1] Rupinder Saini ,Narinder Rana, āComparison of Various Biometric Methods,ā (IJAST) Vol 2 Issue I (March 2014) [2] Alina Klokova, āComparison of Various Biometric Methodsā(2011) [3] Alastair Cummings, Mark Nixon and John Carter āA Novel Ray Analogy for Enrolment of Ear Biometrics.ā In: IEEE Fourth Conference on Biometrics: Theory, Applications and Systems, September 2010, Washington DC, USA. [4] S. Prabhakar, S. Pankanti, Anil K. Jain āBiometric Recognition: Security and Privacy Concernsā In: IEEE Security & Privacy,( 2003) [5] Siddhesh Angle, Reema Bhagtani, Hemali Chheda āBiometrics : A Further Echelon of Securityā,(2005) [6] K.P.Tripathi āA Comparative Study of Biometric Technologies with Reference to Human Interfaceā International Journal of Computer Applications (0975 ā 8887) Volume 14ā No.5, January (2011)
Download now