17
Sample Copy. Not for Distribution.

Sample Copy. Not for Distribution. · 2017-10-26 · Java card 95 5.4.3. Biometric verification 96 5.4.4. Biometric match on ... Sir Henry later established the first British fingerprint

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Sample Copy. Not for Distribution.

i

Biometric Security Systems for Beginner

Sample Copy. Not for Distribution.

ii

Publishing-in-support-of,

EDUCREATION PUBLISHING

RZ 94, Sector - 6, Dwarka, New Delhi - 110075

ShubhamVihar, Mangla, Bilaspur, Chhattisgarh - 495001

Website: www.educreation.in

________________________________________________________________

© Copyright, Authors

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or

transmitted, in any form by any means, electronic, mechanical, magnetic, optical, chemical,

manual, photocopying, recording or otherwise, without the prior written consent of its writer.

ISBN: 978-1-5457-0832-3

Price: ` 245.00

The opinions/ contents expressed in this book are solely of the authors and do not

represent the opinions/ standings/ thoughts of Educreation or the Editors .The book is

released by using the services of self-publishing house.

Printed in India

Sample Copy. Not for Distribution.

iii

Manish Mahant Manikpuri

EDUCREATION PUBLISHING (Since 2011)

www.educreation.in

Sample Copy. Not for Distribution.

iv

Sample Copy. Not for Distribution.

v

CONTENTS

Sr. Index Page

UNIT 1 1. OVERVIEW OF BIOMETRICS 1-26

1.1. Introduction 2

1.2. History of Biometrics 3

1.3. Benefits of biometrics 9

1.4. Biometric Architecture 11

1.5. Selecting a biometric for a system 12

1.6. Biometric application 14

1.7. Key biometrics terms and process 15

1.8. Matching process of biometrics 20

1.9. Limitations in biometric system 24

1.10. Myth and misrepresentation 26

UNIT 2 2. : PHYSIOLOGICAL BIOMETRIC

TECHNOLOGIES

27-48

2.1. Fingerprints 28-36

2.1.1. Technical description 28

2.1.2. Characteristics 29

2.1.3. Deployment 31

2.1.3.1. Measuring biometric accuracy 32

2.1.3.2. Security of biometric data within

the system

35

2.2. Facial scan 36

2.2.1. Technical description 36

2.2.2. Characteristics 38

2.2.3. Deployment 39-43

2.2.3.1. Applications and examples 42

2.3. Retina vascular pattern 43-45

2.3.1. Technical description 43

2.3.2. Characteristics 44

2.4. Iris Scan 45-46

2.4.1. Technical description 45

2.4.2. Characteristics 46

UNIT 3 3. BEHAVIORAL BIOMETRIC TECHNOLOGIES 49-71

3.1. Introduction 50

3.2. Handprint Biometrics 50-53

Sample Copy. Not for Distribution.

vi

3.2.1. History 50

3.2.2. Approach 51

3.2.3. Concept 51

3.2.4. Hardware used for palm print 52

3.2.5. Software used for palm print 53

3.3. DNA biometrics 54-61

3.3.1. Advantages of DNA as a biometric 55

3.3.2. Human identification based on DNA 55

3.3.3. Short Tandem Repeat 56

3.3.4. DNA Sample Collection 58

3.3.5. DNA extraction and quantification 58-61

3.3.5.1. DNA Amplifications (PCR) 59

3.3.5.2. DNA separation and detection 59

3.3.6. DNA personal ID using STR system 61

3.4. Signature and handwritten technologies 62-67

3.4.1. Technical description and Classification 63

3.4.2. Application of signature biometric 67

3.5. Voice data acquisition(VDA) 67-71

3.5.1. Speech processing 67

3.5.2. Types of voice biometrics 67

3.5.3. Applications 71

UNIT 4 4. MULTI BIOMETRICS 72-87

4.1. Multi biometrics 73

4.2. Sources of multiple pieces of evidence 73-86

4.2.1. Design issues in multi-biometrics 75

4.2.2. Acquisition and processing sequence 75

4.2.3. Multi-biometrics fusion

4.2.3. Sources of evidence

77

80

4.3. Two-factor authentication with passwords 86

4.4. Tickets and tokens 87

UNIT 5 5. CASE STUDIES AND PROGRAM 88-102

5.1. Case study: The motivation for biometric 89

5.2. Case study: Loomis Sayles implements

multifactor authentication

91

5.3. Case study: Banq 93

5.4. Program of Biometric In Java Language 95-101

5.4.1. Introduction to java card 95

5.4.2. Java card 95

5.4.3. Biometric verification 96

5.4.4. Biometric match on card 97

Sample Copy. Not for Distribution.

vii

5.4.5. Biometric API for java card 98

5.4.6. Requirements 98

5.4.7. Architecture 99

5.4.8. The JC biometric API interface and

classes

99

5.4.9. API method call sequences 100

5.4.10. Using the JC biometric API 100

5.4.11. Developmental process 101

Sample Copy. Not for Distribution.

viii

ACKNOWLEDGMENT

I would like to express my gratitude to the many researchers who have

contributed in the field of Biometric security systems.

At the outset, the author would like to express his thanks to all the

members of LCIT, especially Management for their constant support.

Above all I want to thanks my wife, Kiran, my family, and all friends

who supported and encouraged me in the spite of all the time it took me away

from them; it was long and difficult journey for them.

Special thanks to Dr. Dhananjay Yadav for his guidance and valuable

suggestions.

I deeply express my heartful thanks to the publishers Educreation for

publishing this book in such a beautiful get-up and well in time.

Sample Copy. Not for Distribution.

ix

Sample Copy. Not for Distribution.

Sample Copy. Not for Distribution.

Manish Mahant

1 |

OVERVIEW OF BIOMETRIC

UNIT I

Sample Copy. Not for Distribution.

Biometric Security Systems for Beginner

2 |

1.1 INTRODUCTION

The term ―biometrics‖ is derived from Greek words bio (life) and metric (to

measure).

Biometrics refers to metrics related to human characteristics. Biometrics

authentication (or realistic authentication) is used in computer science as a form

of identification and access control. It is also used to identify individuals in

groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label

and describe individuals. Biometric identifiers are often categorized as

physiological versus behavioral characteristics. Physiological characteristics are

related to the shape of the body. Examples include, but are not limited

to fingerprint, palm veins, face recognition, DNA, palm print, hand

geometry, iris recognition, retina and odor/scent. Behavioral characteristics are

related to the pattern of behavior of a person, including but not limited to typing

rhythm, gait, and voice.

More traditional means of access control include token-based identification

systems, such as a driver's license or passport, and knowledge-based

identification systems, such as a password or personal identification number.

Since biometric identifiers are unique to individuals, they are more reliable in

verifying identity than token and knowledge-based methods; however, the

collection of biometric identifiers raises privacy concerns about the ultimate use

of this information.

With the help of below figure, we can define the various biometric.

Biometric can be divided into two types:-

a. Physical

b. Behavioral

Sample Copy. Not for Distribution.

Manish Mahant

3 |

Figure 1.1: Types of Biometrics

Figure 1.2: (a) face, (b) fingerprint, (c) hand geometry, (d) iris, (e) signature,

(f) Voice

1.2 HISTORY OF BIOMETRICS

1858 – First systematic capture of hand images for identification purposes

is recorded Sir William Herschel, working for the Civil Service of India, recorded a

handprint on the back of a contract for each worker to distinguish employees

from others who might claim to be employees when payday arrived. This was

the first recorded systematic capture of hand and finger images that were

uniformly taken for identification purposes.

1870 – Bertillon develops anthropometries to identify individuals

Sample Copy. Not for Distribution.

Biometric Security Systems for Beginner

4 |

Alphonse Bertillon developed ―Bertillonage‖ or anthropometrics, a method of

identifying individuals based on detailed records of their body measurements,

physical descriptions, and photographs. Repeat criminal offenders often

provided different aliases when arrested. Bertillon noted that although they

could change their names, they could not change certain elements of their

bodies. Police authorities throughout the world used his system until its use

quickly faded when it was discovered that some people shared the same

measurements.

1892 – Galton develops a classification system for fingerprints

Sir Francis Galton wrote a detailed study of fingerprints in which he presented a

new classification system using prints from all ten fingers. The characteristics

(minutiae) that Galton used to identify individuals are still used today. These

details are often referred to as Galton‘s details.

1896 – Henry develops a fingerprint classification system Sir Edward Henry, Inspector General of the Bengal Police, was in search of a

method of identification to implement concurrently or to replace

anthropometries. Henry consulted Sir Francis Galton regarding fingerprinting as

a method of identifying criminals. Once the fingerprinting system was

implemented, one of Henry‘s workers, Azizul Haque, developed a method of

classifying and storing the information so that searching could be performed

easily and efficiently. Sir Henry later established the first British fingerprint files

in London. The Henry Classification System, as it came to be known, was the

precursor to the classification system used for many years by the Federal Bureau

of Investigation (FBI) and other criminal justice organizations that perform ten-

print fingerprint searches.

1903 – NY State Prisons begin using fingerprints

―The New York Civil Service Commission established the practice of

fingerprinting applicants to prevent them from having better-qualified persons

take their tests for them.‖ This practice was adopted by the New York state

prison system where fingerprints were used ―for the identification of criminals

in 1903. In 1904 the fingerprint system accelerated when the United States

Penitentiary at Leavenworth, Kansas, and the St. Louis, Missouri Police

Department both established fingerprint bureaus. During the first quarter of the

20th century, more and more local police identification bureaus established

fingerprint systems. The growing need and demand by police officials for a

national repository and clearinghouse for fingerprint records led to an Act of

Congress on July 1, 1921, establishing the Identification Division of the FBI.‖

1960 – Face recognition becomes semi-automated

The first semi-automatic face recognition system was developed by Woodrow

W. Bledsoe under contract to the US Government. This system required the

administrator to locate features such as eyes, ears, nose, and mouth on the

photographs. This system relied solely on the ability to extract useable feature

points. It calculated distances and ratios to a common reference point that was

compared to the reference data.

1960 – TheFirst model of acoustic speech production is created

Sample Copy. Not for Distribution.

Get Complete Book At Educreation Store

www.educreation.in

Sample Copy. Not for Distribution.

Sample Copy. Not for Distribution.