COMPARISON OF VARIOUS BIOMETRIC METHODS



Similar documents
Assignment 1 Biometric authentication

May For other information please contact:

Voice Authentication for ATM Security

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

A Various Biometric application for authentication and identification

Framework for Biometric Enabled Unified Core Banking

Biometric authentication systems today and in the future

W.A.R.N. Passive Biometric ID Card Solution

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Multi-Factor Biometrics: An Overview

Accessing the bank account without card and password in ATM using biometric technology

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

NFC & Biometrics. Christophe Rosenberger

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Multimodal Biometric Recognition Security System

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Application-Specific Biometric Templates

De-duplication The Complexity in the Unique ID context

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

Development of Academic Attendence Monitoring System Using Fingerprint Identification

ATM Transaction Security Using Fingerprint/OTP

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Efficient Attendance Management: A Face Recognition Approach

Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION

Multi-factor authentication

Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Biometrics in Secure e-transaction

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm

22 nd NISS Conference

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

How To Improve Security Of An Atm

WHITE PAPER. Let s do BI (Biometric Identification)

GLOBAL BIOMETRICS MARKET IN THE RETAIL SECTOR

A Comparative Study on ATM Security with Multimodal Biometric System

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES

Computers and Society: Security and Privacy

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

ADVANCE AUTHENTICATION TECHNIQUES

Biometrics: Trading Privacy for Security

White paper Fujitsu Identity Management and PalmSecure

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Understanding The Face Image Format Standards

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Biometric SSO Authentication Using Java Enterprise System

DNA as a Biometric. Biometric Consortium Conference 2011 Tampa, FL

Smart Card in Biometric Authentication

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

Two Factor Authentication for VPN Access

ALLEGION: SCHLAGE HANDPUNCH GUIDEBOOK

MegaMatcher Case Study

Security Model in E-government with Biometric based on PKI

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Traceable Physical Security Systems for a Safe and Secure Society

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

PalmSecureID for the EDUCATION MARKETPLACE

HUMANS have used body characteristics such as face,

IDRBT Working Paper No. 11 Authentication factors for Internet banking

An Analysis of Keystroke Dynamics Use in User Authentication

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

White paper. In the best of light The challenges of minimum illumination

How To Choose An Electronic Signature

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Application of Biometric Technology Solutions to Enhance Security

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Two-Factor Authentication Making Sense of all the Options

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRIC SOLUTIONS 2013 ISSUE

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Transcription:

COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT errupindersaini27@gmail.com, narinderkrana@gmail.com Abstract This paper presents comparison concerning various biometric systems simply by defining their advantages and disadvantages. A brief introduction is usually offered regarding commonly used biometrics, including, Face, Iris, Fingerprint, Finger Vein, Lips, Voice. The comparison criteria list introduced is restricted to accuracy, size of template, cost, security level, and long term stability. Keywords Biometric systems, technique, face, Iris, finger, lips, voice. 2. Biometric Techniques Jain et al. describe four operations stages of a uni-modal biometric recognition system [1]: Biometric data acquisition. Data evaluation and feature extraction. Corresponding scores creation (analyzed data is then compared with what is actually saved in the database). Enrollment (first scan of a feature by a biometric reader, produce its digital representation and create a template, even a few in most of the systems). 1. Introduction "Biometrics" implies "life measurement" however the term associated with the utilization of unique physiological characteristics to distinguish an individual. It s a new way to verify authenticity. Biometrics utilizes biological characteristics or behavioral features to recognize an individual. In real a Biometrics system is a pattern identification system that uses various patterns such as iris patterns, retina design and biological characteristics like fingerprints, facial geometry, voice recognition and hand recognition and so forth. Biometric recognition system provides possibility to verify one s identity simply by determining who these people are instead of what these people possess or may be remembered [4]. The very fact that makes it really interesting is that the various security codes like the security passwords and the PIN number could be interchanged among people but the physical traits cannot be. The principle use of Biometric security is to change the existing password system. There are numerous pros and cons of Biometric system that must be considered. 24 2. Numerous Biometric Systems : 1. Facial recognition 2. Iris 3. Finger print 4. Finger vein 5. Lips 6. Voice New and emerging biometric techniques are: 1. Human scent recognition 2. EEG biometrics 3. Skin spectroscopy 4. Knuckles texture 5. Finger nail recognition 2.1 Facial recognition Face recognition involves an evaluation of facial features. It is a computer system application for automatically determining or verifying an individual from a digital image or a video framework from a video source. One of the techniques to do this is simply by evaluating selected facial features from the image as well as from facial database.

It does not require any co-operation of the test subject to do any work. Systems set up in airports, multiplexes, and other open public areas can easily identify an individual among the massive crowd. This performs massive identification which usually other biometric system can t perform [2]. The systems don t require any direct contact of a person in order to verify his/her identity. This could be advantageous in clean environments, for monitoring or tracking, and in automation systems [2]. User-friendly design: Contactless authentication. Incident monitoring for security with photo which in turn taken by a camera, but there is no such evidence with the fingerprint technology to track these incidents. Face recognition isn t perfect and faces challenges to perform under certain conditions. One obstacle associated with the viewing position of face. Face recognition doesn t work effectively in bad/weak lighting, sunglasses/sunshades, lengthy hair, or other objects partly covering the subject s face. Not much effective for low resolution images [2]. A serious drawback is that many systems are usually less efficient if facial expressions vary. Even a big grin/laugh can render the system s performance less effectively. (so significantly North america now permits only neutral facial expressions on passport photos ) Additionally, when used for security purposes, it is more costly and complex as compared to some other techniques. Fig.1 Image sample for Facial recognition 2.2 IRIS Iris recognition offers one of the most secure strategies of authentication and recognition. Once the impression of an iris has been taken using a standard digicam, the authentication process involves, evaluating the present subject's iris with stored version. It is one of the most accurate technique with very low false acceptance as well as rejection rates. This is how the technology becomes very useful. Iris possesses unique structure shaped by 10 months of age, and is always stable throughout life. The iris incorporates fine texture. Even genetically similar people have entirely independent iris textures [2]. An iris scan can be carried out through 10 cm to a few meters apart. Non-intrusive data collection (no actual contact with a scanner is required)[2]. Data capturing can be carried out even though a user is putting contact lenses or glasses [2]. High accuracy and High recognition process speed [2]. Easy recognition of fake irises (e.g. when somebody wear color contacts). Scalability along with the speed is significantly advantageous [4]. Minimal false acceptance rate. Two seconds processing time. 25

Iris recognition security systems are viewed as one of the most appropriate security system nowadays. It is truly a distinctive and easy way to identify a user. Iris scanners might be very easily fooled through a superior quality image of an iris or face instead of the real thing. The scanning devices are often hard to adjust and may annoy multiple people of various heights. The accuracy of scanning devices may impacted by unusual lighting effects and illumination from reflective types of surfaces. Iris scanners tend to be more expensive in comparison with additional biometrics [1]. Because iris is a tiny organ to scan from a long distance, Iris recognition becomes challenging to perform well at a distance larger than a few meters. Iris recognition is vulnerable to inadequate image quality. People suffer from diabetes or some other serious disease cause alterations in valleys are the lower portions". The particular individuality of a fingerprint could be determined by the several patterns of ridges and furrows plus the minutiae points. Fingerprint authentication in actual an automated method of verifying a match among different human fingerprints. These systems usually are simple to use and install. It requires inexpensive equipment which usually have low power intake. A fingerprint pattern has individually distinctive composition and characteristic remains the same with time [2]. Finger prints are largely universal. Only, of the 2% of human population cannot use finger prints due to skin damage or hereditary factors [10]. Fingerprints are the most preferred biometric. One should not have to remember passwords, you simply swipe your finger on scanner and done it. Biometric fingerprint scanner presents a method to record an identity point which is very hard to be fake, making the technology incredibly secure. It is easy to use along with the high verification process speed and accuracy [1]. ir is. Fig.2 Image sample for Iris Recognition 2.3 Finger print Our fingerprint is constructed of numerous ridges and valley on the surface of finger which are unique to each and every human [1]. "Ridges are the top skin layer portions of the finger and 26 Because fingerprint scanner only scans one section of a person's finger, it may susceptible to error. Many scanning system could be cheat employing artificial fingers or perhaps showing another person s finger [2]. Sometimes it may take many swipe of fingerprint to register. Fingerprints of people working in chemical sectors often affected. Cuts, marks transform fingerprints which often has negatively effect on performance [2].

Finger prints aren t private. We all leave fingerprints almost everywhere. Once the finger prints are stolen, they are stolen for life time! You possibly in no way get back to a secure situation [10]. Fig.3 Image sample for Finger Print Recognition 2.4 Finger Vein Finger vein authentication is often a biometric technology which specifies an individual when using the vein pattern inside of the fingers. Veins are usually the blood vessels which carry blood towards the heart. Every single person's veins are having unique physical and behavioral features. It provides a greater degree of security that protects information and access control much better. As deoxyhemoglobin in the blood absorbs infrared lights, vein patterns appear as several dark outlines. The infrared lights combine with special camera capturing an image of the finger vein pattern. This image is then transformed into pattern data along with saved as a template of any person's biometric authentication data. While authentication, the particular finger vein image is taken and is compared against the saved template of the person. Finger vein patterns are generally distinctive to every person; even among identical twins, so the actual false acceptance rate is quite low (near to zero). Placing a hand or finger is actually less invasive in comparison to other biometric technologies. 27 Because blood vessels/veins are located inside the human body, it is quite hard to read or steal. There is minor risk of forgery or thieves. As finger veins do not depart any trace during the authentication process and thus can t be duplicated. Finger vein patterns stay continuous throughout the adult years and so reenrollment of the vein pattern does not required once singed up. Finger veins are less likely to be affected by changes in the weather conditions or health conditions of the specific. Rashes, cracks and rough epidermis do not have an impact on the result of authentication. The level of accuracy from vein recognition systems is quite outstanding. Time which delivered to validate each individual is smaller as compared to other methods (average is 1/2 second). Vein patterns need only low image resolution. Finger vein authentication technology is inexpensive and having smaller size of templates. In case an accident causes a user to lose his/her finger then it can be a problem during the verification process. Expensive: The actual technologies seriously aren t cheap enough for bulk deployment. Larger Size: The existence of CC camera makes the system larger than a fingerprint scanner. This technology is still untested mainly because only vendor companies affirm the accuracy levels. Governments and standards companies have not proven its capability yet. Not for bulk recognition.

The particular support significantly eliminates the amount of time period to edit and fix spelling corrections. And so the general advantages could be the time management. The majority of people can speak more rapidly in comparison with they can type with fewer errors. Fig.4 Image sample for Finger vein Recognition 2.5 Voice recognition Voice recognition is a technology through which sounds, phrases and words voiced by human beings are transformed into electrical signals, and then these signals are converted into code design [9]. Here we emphasize on the human voice because we generally and most often use voices to communicate our thoughts, our ideas with others in surrounding environment [9]. Speech can be recommended as a natural input as it does not demand any training and it is considerably quicker as compared to some other input. Voice is usually a quite natural strategy to communicate, and in fact it is not necessary for you to sit at keyboard set or even work with handheld remote control. This technique helps those people who have difficulty of using their hands. It does not require any training for users. It offers a big advantage to those who suffer from problems that may impact their writing capability but they can use their voice to produce words/text on desktop computers or may be other equipments. One of the major advantages of voice recognition technique is to cut back misspelled texts of which many typists may perhaps suffers a problem during typing. 28 Even the most efficient voice recognition systems very often may make mistakes, when there is disturbance or some noise in the surrounding. Voice Recognition systems works well only if the microphone is actually close to the end user. Much more far-away microphones are likely to boost the number of errors. May hacked with prerecorded voice messages. Possesses primary amount of time for adjustment with each user's voice. Different persons might speak various languages. Several words sound very similarly. Case: two, to, too. Largely expensive. Fig.5 Image sample for Voice Recognition 2.6 Lip identification Essentially the most growing technique of human recognition, which originates from felony and forensic process, is usually human lips identification [8]. This biometric accumulate

significant focus recently because it deals with many difficulties of traditional identification. So as to recognize human identity, lips form and color characteristics are taken into consideration [8]. Lip biometric may be used to improve the potency of biometrics such as facial and voice recognition. Study proves that lips attributes are usually distinctive and also unchangeable for every single examined person. Lips prints used by forensics professionals and criminal police training [8]. Size of template is small. Lips based human recognition dependent on static mouth/face photos. Lips biometric certainly are passive biometrics person s interaction is just not necessary [8]. Photos might be obtained from the distance without having analyzed person s knowledge. Lips usually are visible not hidden/overcast by anything [8]. Lips biometric can be hybrid to use as lips-voice or lips-face biometric systems [8]. The concept of developing hybrid (multimodal) biometric system needs a lot of attention. Main drawback of this method is that the particular facial attributes chosen may not acquire relevant details. E.g. visibility of teeth may present additional details that can t be utilized by a lip shape model alone. A big smile might cause difficulty in recognition of a person with respect to same person with neutral appearance as before. Fig.6 Image sample for Iris Recognition 3. Comparison table of all biometrics Biometrics Accuracy Cost Size of Long term Security level template stability Facial Low High Large Low Low recognition Iris scan High High Small Medium Medium Finger print Medium Low small Low Low Finger vein High Medium Medium High High Voice recognition Lip recognition Low Medium Small Low Low Medium medium Small Medium High 29

4. Conclusion This paper presents a shorter introduction on numerous biometric techniques undertaking the comparison examination regarding widely used biometric identifiers and also the identification strategies. As this is a new technology for most of the peoples since it has simply been implemented in public areas for short time period. There are numerous apps along with alternative solutions used in security techniques. It provides benefits that may improve our lives in such a way by increasing security and efficiency, decreasing scams and reducing password administrator cost. Despite the fact the biometrics security systems still have many issues like data privacy, physical privacy, and spiritual arguments etc. Council (2010), Biometric Recognition: Challenges and Opportunities. [5] National Science & Technology Council s (NSTC) Subcommittee on Biometrics (September 2006), Biometrics Frequently Asked Questions. [6] Michelle C. Frye, B.A. (April 27, 2001), University Thesis, The Body as A Password: Considerations, Uses, and Concerns of Biometric Technologies. [7] Penny Khaw ; SANS Security Essentials (GSEC) Practical Assignment Version 1.3, Iris Recognition Technology for Improved Authentication. [8] Michal Choras (2009), The lip as a biometric. [9] Jim Baumann, VoiceRecognition. [10] David Weiss (2009), Fingerprint Biome 5. Future work Biometrics technology is used in a number of ways and in different fields of our daily lives. In future we mainly focus on facial expression recognition technology. Using this technology, we can easily identify a person in a crowd and by so we can verify their identity. We can furthermore make use of this technology to detect previously identified terrorists, criminals or scammers in society. It may help us to reduce the criminal offense in the world. But as we can see from the above given comparison between different biometrics, it is clear that face recognition faces a challenging problem in the field of accuracy, effeiciency, speed cost and security. So we need to work upon it to make it more effective. References [1] Anil K. Jain, Arun Ross and Salil Prabhakar (2004), An Introduction to Biometric Recognition. [2] Alina Klokova, Comparison of Various Biometric Methods. [3] Rabia Jarfi and Hamid R. Arabina, A Survey of Face Recognition Techniques, Journal of Information Processing Systems, Vol.5, No.2, June 2009. [4] Joseph N. Pato and Lynette I. Millett, Editors; Whither Biometrics Committee; National Research 30