Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Authentication and Authorization using Biometric Device

Biometric recognition refers to the use of distinctive physiological (e.g., fingerprints, face, retina, iris) and behavioral (e.g., gait, signature) characteristics, called biometric identifiers (or simply biometrics) for automatically recognizing individuals. Perhaps all biometric identifiers are a combination of physiological and behavioral characteristics and they should not be exclusively classified into either physiological or behavioral characteristics. For example, fingerprints may be physiological in nature but the usage of the input device (e.g., how a user presents a finger to the fingerprint scanner) depends on the person?s behavior. Thus, the input to the recognition engine is a combination of physiological and behavioral characteristics. Similarly, speech is partly determined by the biological structure that produces speech in an individual and partly by the way a person speaks. Often, a similarity can be noticed among parent, children, and siblings in their voice, gait, and even signature. The same argument applies to the face: faces of identical twins may be extremely similar at birth but during development, the faces change based on the person?s behavior (e.g., lifestyle differences leading to a difference in bodyweight, etc.).

A biometric system is essentially a pattern recognition system that recognizes a person by determining the authenticity of a specific physiological and/or behavioral characteristic possessed by that person. An important issue in designing a practical biometric system is to determine how an individual is recognized. Depending on the application context, a biometric system may be called either a verification system or an identification system:

? A verification system authenticates a person?s identity by comparing the captured biometric characteristic with her own biometric template(s) pre-stored in the system. It conducts one-to-one comparison to determine whether the identity claimed by the individual is true. A verification system either rejects or accepts the submitted claim of identity (Am I whom I claim I am?);

? An identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subject?s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (Who am I?).
[Image: image002.jpg]
The term authentication is also frequently used in the biometric field, sometimes as a synonym for verification; actually, in the information technology language, authenticating a user means to let the system know the user identity regardless of the mode (verification or identification).

Throughout this book we use the generic term recognition where we are not interested in distinguishing between verification and identification.

The block diagrams of a verification system and an identification system are depicted in Figure 1.1; user enrollment, which is common to both tasks is also graphically illustrated. The enrollment module is responsible for registering individuals in the biometric system database (system DB). During the enrollment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a raw digital representation of the characteristic. A quality check is generally performed to ensure that the acquired sample can be reliably processed by successive stages. In order to facilitate matching, the raw digital representation is usually further processed by a feature extractor to generate a compact but expressive representation, called a template. Depending on the application, the template may be stored in the central database of the biometric system or be recorded on a magnetic card or smartcard issued to the individual. The verification task is responsible for verifying individuals at the point of access. During the operation phase, the user?s name or PIN (Personal Identification Number) is entered through a keyboard (or a keypad); the biometric reader captures the characteristic of the individual to be recognized and converts it to a digital format, which is further processed by the feature extractor to produce a compact digital representation. The resulting representation is fed to the feature matcher, which compares it against the template of a single user (retrieved from the system DB based on the user?s PIN). In the identification task, no PIN is provided and the system compares the representation of the input biometric against the tem- plates of all the users in the system database; the output is either the identity of an enrolled user or an alert message such as ?user not identified.? Because identification in large databases is computationally expensive, classification and indexing techniques are often deployed to limit the number of templates that have to be matched against the input. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive
BIOMETRICS - An authentication

Movies to Real World

-Access to a security vault granted by a retinal scan
-A door unlocks as someone approaches, activated by facial recognition
-My car door unlocks as I touch the door handle
-Accessing a computer system by presenting a fingerprint

Biometrics Overview

The security field uses three different types of identification:
Something You Know — a password, PIN, or piece
of personal information (such as your mother's maiden name);
Something You Have — a card key, smart card, or token (like a Secur ID card); and/or
Something You Are —a biometric.
Of these, a biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. (Replacement part surgery, by the way, is outside the scope of this presentation.)

What are Biometrics?

Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic
Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent.
Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, and voice. Some researchers have coined the term behavior metrics for this class of biometrics.
Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

Biometric: Operation method

A biometric system can operate in the following two modes:
Verification – A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number.
Identification – A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold.


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: device, electronics biometric project, authentication credentials, treatment authorization request, enhancing privacy and authorization control scalability in the grid through ontologies, enhancing privacy and authorization control scalability in the grid through ontologies abstract and basepaper, seminar on biometric authentication system,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Image Authentication Techniques computer science crazy 2 3,452 15-11-2012, 12:24 PM
Last Post: seminar details
  DTMF Based Interfacing and Control of Induction Motor using TRIAC computer girl 0 1,295 07-06-2012, 11:02 AM
Last Post: computer girl
  WIRELESS POWER TRANSMISSION AND RECEPTION USING SPS & RECTENNA full report project topics 1 4,795 18-02-2012, 10:58 AM
Last Post: seminar paper
  Modeling and Performance Analysis of Automatic Meter Reading Systems Using Power Lin project report helper 1 1,349 04-02-2012, 09:52 AM
Last Post: seminar addict
  Gen2-Based RFID Authentication Protocol for Security and Privacy computer science crazy 4 3,656 17-05-2011, 11:05 AM
Last Post: Rockzzzzz
  MEASURING AND TRANSMITTING VITAL BODY SIGNS USING MEMS SENSORS. computer science crazy 2 2,430 10-05-2011, 11:29 AM
Last Post: project topics
  Digital Design using VHDL and Verilog seminar class 0 2,390 24-03-2011, 11:53 AM
Last Post: seminar class
Last Post: seminar surveyer
  Automatic switching ON and OFF of lights in warehouses using micro processors and sen seminar surveyer 0 1,252 22-12-2010, 11:34 AM
Last Post: seminar surveyer
  ZIGBEE and GSM-SMS Based Conductor Temperature and Sag Monitoring seminarsonly 1 2,615 25-10-2010, 06:06 PM
Last Post: Wifi