Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
ii
Publishing-in-support-of,
EDUCREATION PUBLISHING
RZ 94, Sector - 6, Dwarka, New Delhi - 110075
ShubhamVihar, Mangla, Bilaspur, Chhattisgarh - 495001
Website: www.educreation.in
________________________________________________________________
© Copyright, Authors
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted, in any form by any means, electronic, mechanical, magnetic, optical, chemical,
manual, photocopying, recording or otherwise, without the prior written consent of its writer.
ISBN: 978-1-5457-0832-3
Price: ` 245.00
The opinions/ contents expressed in this book are solely of the authors and do not
represent the opinions/ standings/ thoughts of Educreation or the Editors .The book is
released by using the services of self-publishing house.
Printed in India
Sample Copy. Not for Distribution.
iii
Manish Mahant Manikpuri
EDUCREATION PUBLISHING (Since 2011)
www.educreation.in
Sample Copy. Not for Distribution.
v
CONTENTS
Sr. Index Page
UNIT 1 1. OVERVIEW OF BIOMETRICS 1-26
1.1. Introduction 2
1.2. History of Biometrics 3
1.3. Benefits of biometrics 9
1.4. Biometric Architecture 11
1.5. Selecting a biometric for a system 12
1.6. Biometric application 14
1.7. Key biometrics terms and process 15
1.8. Matching process of biometrics 20
1.9. Limitations in biometric system 24
1.10. Myth and misrepresentation 26
UNIT 2 2. : PHYSIOLOGICAL BIOMETRIC
TECHNOLOGIES
27-48
2.1. Fingerprints 28-36
2.1.1. Technical description 28
2.1.2. Characteristics 29
2.1.3. Deployment 31
2.1.3.1. Measuring biometric accuracy 32
2.1.3.2. Security of biometric data within
the system
35
2.2. Facial scan 36
2.2.1. Technical description 36
2.2.2. Characteristics 38
2.2.3. Deployment 39-43
2.2.3.1. Applications and examples 42
2.3. Retina vascular pattern 43-45
2.3.1. Technical description 43
2.3.2. Characteristics 44
2.4. Iris Scan 45-46
2.4.1. Technical description 45
2.4.2. Characteristics 46
UNIT 3 3. BEHAVIORAL BIOMETRIC TECHNOLOGIES 49-71
3.1. Introduction 50
3.2. Handprint Biometrics 50-53
Sample Copy. Not for Distribution.
vi
3.2.1. History 50
3.2.2. Approach 51
3.2.3. Concept 51
3.2.4. Hardware used for palm print 52
3.2.5. Software used for palm print 53
3.3. DNA biometrics 54-61
3.3.1. Advantages of DNA as a biometric 55
3.3.2. Human identification based on DNA 55
3.3.3. Short Tandem Repeat 56
3.3.4. DNA Sample Collection 58
3.3.5. DNA extraction and quantification 58-61
3.3.5.1. DNA Amplifications (PCR) 59
3.3.5.2. DNA separation and detection 59
3.3.6. DNA personal ID using STR system 61
3.4. Signature and handwritten technologies 62-67
3.4.1. Technical description and Classification 63
3.4.2. Application of signature biometric 67
3.5. Voice data acquisition(VDA) 67-71
3.5.1. Speech processing 67
3.5.2. Types of voice biometrics 67
3.5.3. Applications 71
UNIT 4 4. MULTI BIOMETRICS 72-87
4.1. Multi biometrics 73
4.2. Sources of multiple pieces of evidence 73-86
4.2.1. Design issues in multi-biometrics 75
4.2.2. Acquisition and processing sequence 75
4.2.3. Multi-biometrics fusion
4.2.3. Sources of evidence
77
80
4.3. Two-factor authentication with passwords 86
4.4. Tickets and tokens 87
UNIT 5 5. CASE STUDIES AND PROGRAM 88-102
5.1. Case study: The motivation for biometric 89
5.2. Case study: Loomis Sayles implements
multifactor authentication
91
5.3. Case study: Banq 93
5.4. Program of Biometric In Java Language 95-101
5.4.1. Introduction to java card 95
5.4.2. Java card 95
5.4.3. Biometric verification 96
5.4.4. Biometric match on card 97
Sample Copy. Not for Distribution.
vii
5.4.5. Biometric API for java card 98
5.4.6. Requirements 98
5.4.7. Architecture 99
5.4.8. The JC biometric API interface and
classes
99
5.4.9. API method call sequences 100
5.4.10. Using the JC biometric API 100
5.4.11. Developmental process 101
Sample Copy. Not for Distribution.
viii
ACKNOWLEDGMENT
I would like to express my gratitude to the many researchers who have
contributed in the field of Biometric security systems.
At the outset, the author would like to express his thanks to all the
members of LCIT, especially Management for their constant support.
Above all I want to thanks my wife, Kiran, my family, and all friends
who supported and encouraged me in the spite of all the time it took me away
from them; it was long and difficult journey for them.
Special thanks to Dr. Dhananjay Yadav for his guidance and valuable
suggestions.
I deeply express my heartful thanks to the publishers Educreation for
publishing this book in such a beautiful get-up and well in time.
Sample Copy. Not for Distribution.
Biometric Security Systems for Beginner
2 |
1.1 INTRODUCTION
The term ―biometrics‖ is derived from Greek words bio (life) and metric (to
measure).
Biometrics refers to metrics related to human characteristics. Biometrics
authentication (or realistic authentication) is used in computer science as a form
of identification and access control. It is also used to identify individuals in
groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label
and describe individuals. Biometric identifiers are often categorized as
physiological versus behavioral characteristics. Physiological characteristics are
related to the shape of the body. Examples include, but are not limited
to fingerprint, palm veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odor/scent. Behavioral characteristics are
related to the pattern of behavior of a person, including but not limited to typing
rhythm, gait, and voice.
More traditional means of access control include token-based identification
systems, such as a driver's license or passport, and knowledge-based
identification systems, such as a password or personal identification number.
Since biometric identifiers are unique to individuals, they are more reliable in
verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate use
of this information.
With the help of below figure, we can define the various biometric.
Biometric can be divided into two types:-
a. Physical
b. Behavioral
Sample Copy. Not for Distribution.
Manish Mahant
3 |
Figure 1.1: Types of Biometrics
Figure 1.2: (a) face, (b) fingerprint, (c) hand geometry, (d) iris, (e) signature,
(f) Voice
1.2 HISTORY OF BIOMETRICS
1858 – First systematic capture of hand images for identification purposes
is recorded Sir William Herschel, working for the Civil Service of India, recorded a
handprint on the back of a contract for each worker to distinguish employees
from others who might claim to be employees when payday arrived. This was
the first recorded systematic capture of hand and finger images that were
uniformly taken for identification purposes.
1870 – Bertillon develops anthropometries to identify individuals
Sample Copy. Not for Distribution.
Biometric Security Systems for Beginner
4 |
Alphonse Bertillon developed ―Bertillonage‖ or anthropometrics, a method of
identifying individuals based on detailed records of their body measurements,
physical descriptions, and photographs. Repeat criminal offenders often
provided different aliases when arrested. Bertillon noted that although they
could change their names, they could not change certain elements of their
bodies. Police authorities throughout the world used his system until its use
quickly faded when it was discovered that some people shared the same
measurements.
1892 – Galton develops a classification system for fingerprints
Sir Francis Galton wrote a detailed study of fingerprints in which he presented a
new classification system using prints from all ten fingers. The characteristics
(minutiae) that Galton used to identify individuals are still used today. These
details are often referred to as Galton‘s details.
1896 – Henry develops a fingerprint classification system Sir Edward Henry, Inspector General of the Bengal Police, was in search of a
method of identification to implement concurrently or to replace
anthropometries. Henry consulted Sir Francis Galton regarding fingerprinting as
a method of identifying criminals. Once the fingerprinting system was
implemented, one of Henry‘s workers, Azizul Haque, developed a method of
classifying and storing the information so that searching could be performed
easily and efficiently. Sir Henry later established the first British fingerprint files
in London. The Henry Classification System, as it came to be known, was the
precursor to the classification system used for many years by the Federal Bureau
of Investigation (FBI) and other criminal justice organizations that perform ten-
print fingerprint searches.
1903 – NY State Prisons begin using fingerprints
―The New York Civil Service Commission established the practice of
fingerprinting applicants to prevent them from having better-qualified persons
take their tests for them.‖ This practice was adopted by the New York state
prison system where fingerprints were used ―for the identification of criminals
in 1903. In 1904 the fingerprint system accelerated when the United States
Penitentiary at Leavenworth, Kansas, and the St. Louis, Missouri Police
Department both established fingerprint bureaus. During the first quarter of the
20th century, more and more local police identification bureaus established
fingerprint systems. The growing need and demand by police officials for a
national repository and clearinghouse for fingerprint records led to an Act of
Congress on July 1, 1921, establishing the Identification Division of the FBI.‖
1960 – Face recognition becomes semi-automated
The first semi-automatic face recognition system was developed by Woodrow
W. Bledsoe under contract to the US Government. This system required the
administrator to locate features such as eyes, ears, nose, and mouth on the
photographs. This system relied solely on the ability to extract useable feature
points. It calculated distances and ratios to a common reference point that was
compared to the reference data.
1960 – TheFirst model of acoustic speech production is created
Sample Copy. Not for Distribution.