Академический Документы
Профессиональный Документы
Культура Документы
BY
Lt Cdr V Pravin
05IT6019
SIT,IIT KGP
GUIDED BY
Prof D Samanta
SIT,IIT KGP
ABSTRACT- BIOMETRICS
1. Introduction
2. General system
3. Finger Print
4. Iris
5. Performance
6. Application
7. Conclusion
8. References
Introduction
History
Biometric model
The skin on the inside surfaces of our hands, fingers, feet, and
toes is “ridged” or covered with concentric raised patterns. These
ridges are called friction ridges and they serve the useful function of
making it easier to grasp and hold onto objects and surfaces without
slippage. It is the many differences in the way friction ridges are
patterned, broken, and forked which make ridged skin areas,
including fingerprints, unique.
Fingerprint Scanning
Fingerprint Matching
Fingerprint Classification
Image capture
Each of these devices use light to measure the ridges and non-
ridges, take an original fingerprint image, capture the minutia points
and create an identifying template from the minutia points.
Image Processing
Potential Issues
Privacy
False Rejection
False Acceptance
Accuracy
Introduction
Iris
After taking a picture of the eye, the system samples the radial
and angular variations of each individual iris to form an Iris Code, a
digital file that serves as a reference in database. At 512 bytes, the
file is quite small, since it is a hexadecimal code reference rather than
an actual iris image. Research confirms an extraordinarily high level
of statistical reliability for the system. A person using the system
simply looks into a camera. The computer program then locates the
iris. Next, the system locates the iris' outer and inner edges. The
monochrome camera uses both visible and infrared (700-900nm)
light. The program maps segments of the iris into hundreds of
vectors. Position, orientation and spatial frequency provide the basis
for calculation of the Iris Code. The system also manages to take into
account normal changes in the eye. For example, the system
compensates for papillary expansion and contraction. It can also
detect reflections from the cornea.
Drawbacks
Applications
Conclusion
Biometrics faces the same challenges as all new technologies.
To start, there are currently few industry standards. Manufacturers
must be trusted that their false acceptance and false rejection
statistics are accurate. Most systems use proprietary techniques to
store and exchange data, compounding the confusion. Also, some of
the technologies, such as automated fingerprint imaging systems,
require the support of powerful computer systems to perform the
millions of comparisons necessary. Many people worry that
governments and industry will be tempted to use the technology to
monitor individual behavior. In spite of all these pending issues
biometrics is by far the most reliable security solution in the near
future.
References
a) www.biometix.com
b) www.biomet.org
c) www.owlinvestigation.com
d) http://et.wcu.edu
e) www.ddl.ision.co.uk
f) www.zdnetindia.com/techzone/resources/security
g) www.biodata.com.au