Type Of Biometric Systems

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

1. Introduction

At this times became the security is important things in all Work areas. That make many companies and organization to choice this field ( development the security). Used some methodologies in security for keep data , protect information or, access controls. Most of systems and resources need high security to protect itself therefor use many method to achieve that .

Access control plays important role in physical security that given advantage ,efficient and reliable that make corporates able to control, restrict, monitor, and protected .Conceded the Identification Authentication and Authorization more access control methods common which Checks the people who have powers in access to resources or the systems. Authenticators are based on one of these factors[1].

� What you are, for example : fingerprint or voice (biometric systems).

� What you know for example : password or (PIN ) needed to access the account.

� What you have, for example : a smart card, driver's license or passport.[1]

As traditional manners of access control like token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number, But recently appeared in the modern methods in the verification and called biometric which are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information . credentials (documents and PIN) it can be lost, stolen ,or forget but biometric traits (e.g., fingerprint, face, voice , hand and iris) it can be persistent and unique and can�t be stolen or lost . Use of biometrics used for over one hundred years in apprehend criminals.[2].

Bio (life) + Metrics (measurement) both of them are Biometrics is the Measurement of Life.biometric is characteristics or traits refers to the identification of humans. Biometrics is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.[3]

Biometrics are collections of physiological characteristics and traits that make each person has a unique value which able to determine features of each person from the other.

2. biometric technologies

Biometrics refers to the identification of a person on the basis of their physical and behavioral characteristics also Biometric has been widely used for access control and security systems. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them.

A physiological biometric like voice, DNA, hand print or behavior. Behavioral biometrics typing rhythm, gait, and voice [3].

Biometric systems is automat pattern recognition systems that Distinguishes a person from other by certain value through behavioral or Physiological characteristic of the human body .

physiological biometric : which used shape and properties of body for identification person . behavioral biometric : which used behavior of person for identification same person.

There are two types to recognize a person: verification and identification. verification which authentication about characteristics , is it related to the claimed person or not 1:1 . identification which authentication about characteristics , is it related to the one of the list 1:N . Identification is a more difficult and challenging problem because it involves 1:N matching compared to 1:1 matching for verification.[4]

Figure 2. Block diagram of biometric system

2.1 Operation Biometric System

there are two operation for using biometric systems

� Enrollment: which create template for all users via captured and extract the features and characteristics, associated with user information .

� Authentication: captured and extract the features and characteristics of users and compare all the templates (identification) or (ii) the templates associated with a claimed identity[5].

Figure 2.1 Enrollment and Authentication[5]

2.2 Type of biometric systems

There are two type of biometric Physiological and Behavioral . A physiological biometric would identify voice, DNA, hand print or behavior. Which show list of types A physiological biometric in table 2.2.1 .Behavioral biometrics are the behavior of a person, including: typing rhythm, gait, and voice ,list of types as show at Table 2.2.2.[7]

Table 2.2.1 type of Physiological biometric.

Biometric Type Description

1- PHYSIOLOGICAL 1- IRIS that uses mathematical pattern-recognition techniques on video images of the irises of an individual's eyes,

2- FINGER That use pattern recognition by a print made by an impression of the ridges in the skin of a finger;

3- HAND This type uses the geometric shape of the hand .

4- FACIAL Use digital image by analyzing and comparing patterns.

5- VOICE Is a numerical representation of the sound, pattern and rhythm of an individual�s voice

6- RETINA use infrared light to survey the unique pattern of blood vessels of the retina.

7- DNA use the number of VNTR repeats at a number of distinctive loci, and use it to create an individual's DNA profile

8- ODOR, EARLOBE, SWEAT

PORE, LIPS Which contain features characteristic of each person by using ODOR, EARLOBE, SWEAT PORE, LIPS

Table 2.2.2 type of Behavioral biometric

Biometric Type Description

2- Behavioral 1- Signature An authentication method that uses the dynamics of a person's handwritten signature.

2- Keystroke is the detailed timing information that describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard

3- Speech Speech recognition is a core human-computer communications technology, attempting to understand �What you are saying, irrespective of who you are.� .�

4- Gait which involves people being identified purely through the analysis of the way they walk.

2.3 Compare between types of biometric systems

As show in table1.1 and table 1.2 determine five biometric type and compare between them (Facial, Fingerprint, Hand, Iris, and Voice).

2.3.1 Facial Recognition

Technology identifies individuals by analyzing certain facial characteristics such as the distance between the eyes, the length of the nose, and the angle of the jaw.[7].Table 2.3.1 advantage and disadvantages of facial recognition .

Advantages Disadvantages

? Non-intrusive

? Cheap technology.

? Using verification and identification ? affected by changes in lighting, hair, age, or wear glasses.

? Requires cameras as standard equipment for user identification which are expensive.

2.3.2 Fingerprint Recognition

is common one of the biometric systems. Fingerprint recognition is based on features found in the impressions made by unique ridges and valleys on the surface of a human's fingertips. Table 2.3.2 advantage and disadvantages of fingerprint recognition

Advantages Disadvantages

?Very high accuracy and use verification and identification

? the most authentication technique used.

?the most developed biometrics

?Easy to use

?need Small storage space for template and reducing the size of the database memory required

? It is standardized. ? it is very intrusive, and related to criminal identification.

? the dryness or dirty of the finger�s skin Cause a mistakes as well as not appropriate with children, because their fingerprint changes quickly.

? need high Resolution: 8 bits per pixel

2.3.3 Hand Geometry

Is based on the shape of a person's hand as well as it can be used for verification by width, height, and length of the fingers, or distance between joints . Table 2.3.4 advantage and disadvantages of Hand Geometry

Advantages Disadvantages

� need special hardware but, it can be easily integrated with other systems.

� it is associated most commonly with authorized access.

� require small size of data to uniquely identify a user in a system which allow it to be used with Smartcards easily. � Very expensive

� Considerable size.

� cannot put the hand on the scanner in valid way for who arthritic person,

2.3.4 Iris Recognition

is the process of recognizing a person by analyzing the distinctly colored ring that surrounds the pupil of the eye.. This technology is typically used for access control into a facility. the iris is believed to go unchanged throughout a person's lifespan. Table 2.3.4 advantage and disadvantages of Iris Recognition

Advantages Disadvantages

� Very high accuracy.

� Verification time is generally less than 5 seconds.

� It can Distinguish between the dead person and the person living . � Intrusive.

� Size of memory very big for the data to be stored.

� Very expensive

2.3.5 Voice Recognition

It is based on the different characteristics in their voice such as tone, pitch, cadence which used to uniquely identify . The system captures samples of the individual's speech and then converts them to an electronic format to create a biometric template. Table 2.3.5 advantage and disadvantages of Voice Recognition

Advantages Disadvantages

� Non-intrusive.

� High social acceptability.

� Verification time is about five seconds.

� Cheap technology. � can be recorded voice easily and used for unauthorized

� Low accuracy.

� Getting a cold affects the verification of a person's voice

2.3.6 schedule compareing between biometric systems

Biometric Universality Distinctiveness Permanence Collectability Performance Acceptability Circumvention

Fingerprint M H H M H M H

Face H L M H L H L

Hand Geometry M M M H M M M

Iris H H M L H L H

Voice M L L M L H L

H:High ,M=Medium, L=Low[6]

Table 2.3.6 Comparison of Biometric

1. Universality: is it each person have the biometric characteristic.

2. Distinctiveness: there are not two persons are equal in characteristic.

3. Permanence: The characteristic has not abrupt changes along time .

4. Collectability: The characteristic able to be measured quantitatively.

5. Performance: The degree of accuracy and speed that the biometric system can achieve.

6. Acceptability: is it acceptance in the end-users to using the biometric system along time .

7. Circumvention: The degree of fraudulent attacks on the security of the system.

3. The attacks against biometric systems

biometric system can be categorized into two classes: intrinsic failure in system and failure due to an adversary attack[5].

3.1 Intrinsic failures

occur due in one of these stages sensing, feature extraction, or matching technologies

the vulnerabilities in system allow the adversary to attack and exploit from one or more side. Four side to attach system.

? Attacks at the interfaces

? Attack at software between modules,

? attacks on the modules

? attacks on the template database[5]

Figure 3.: Points of attack in a generic biometric system [5]

3.1.1 Attacks at the user interface

Attack at user interface is mostly due to

? a spoof biometric trait.

? sensor is unable to distinguish between fake and genuine biometric traits,

? the adversary use a false identity[5].

3.1.2 Attacks at the interface between modules

An adversary can make a damage on the communication interfaces between different modules.

3.1.3 Attacks on the software modules

The executable program at a module can be modified such that it always outputs the values desired by the adversary..

3.1.4 Attacks on the template database

One of the most potentially damaging attack on a biometric

system is against the biometric templates stored in the system

database.

3.2 adversary attack.

occur due someone attack on system design from any loopholes

3.2.1 Administration attack

attack from inside ,This attack refers to all vulnerabilities due to improper administration of the biometric system.

3.2.2 Non secure infrastructure

biometric system consists of hardware, software, and the communication channels There are many ways in which an adversary can manipulate the biometric infrastructure that can lead to security breaches

3.2.3 Biometric overtness

adversary ,can get the characteristics of a genuine user.

3.3 Effects of biometric system failure

There are two main effects of system failure : (i) denial-of-service and (ii) intrusion.

3.3.1 Denial-of-service

where a legitimate user can�t obtaining the service that he is entitled to.

3.3.2 Intrusion

refers to someone access to the system by illegitimate way resulting in loss of privacy like unauthorized access to personal information

.

4. finger print

Fingerprint , which are the most popularity of biometric system reasons:

? requires a minimal effort from the user.

? does not capture other information than strictly necessary for the recognition process.

? provides relatively good performance.

? low price of fingerprint sensors.

? which enables easy

? integration into PC keyboards, smart cards and wireless hardware

4.1 User Interface

4.1.1 Fingerprint main window

figure 4.1.1 Fingerprint main window

4.1.2 Manage User window

Mange user window used to enter or edit user information, which can be used later in the identification process and other operations.

Figure 4.1.2 Manage User window

4.1.3 Fingerprint Registration window

In this window you can register user fingerprint by the followed steps:

4.1.3.1 Select user or enter user number.

Figure 4.1.3.1 Select user or enter user number.

4.1.3.2 Register the user fingerprint and specify the primary fingerprint to be used by the user.

Figure 4.1.3.2 Register the user fingerprint

4.1.2. Fingerprint Identification Window

Slide your finger to verify your fingerprint, until the authentication is successful according to stored fingerprint in the system database.

Figure 4.1.2. Fingerprint Identification Window

4.1.3 Backup Window

To backup system database, which can be restored when needed.

Figure 4.1.3 Backup Window

4.1.4 Restore Window

When system database crashed or any information you lost, you can use the backup file to restore database.

Figure 4.1.4 Restore Window

5. Database structure

5.1 Entity Relational Diagram

Figure 5.1 Entity Relational Diagram

5.2 .User's Entity with attributes

User table contains all the user basic information.

Table 5.2 .User's Entity with attributes

Column Name Data Type Constrain Description

UserID numeric(18, 0) Primary key Auto generated primary user identification number.

UserNo nvarchar(50) Not Null Employee number or home id of the user.

UserName nvarchar(256) Not Null User name

UserLastName nvarchar(50) Not Null User last name or nickname

Gender Bit Not Null Specify the user gender 0/False Male and 1/True female.

UserImg Image User image if available.

primaryFBID numeric(18, 0) Foreign key Primary fingerprint number to be used by the user.

5.3. fingerNames's Entity with attributes

Table 5.3 fingerNames's

Column Name Data Type Constrain Description

FingerID Int Primary key Finger identification number.

FingerName nvarchar(256) Not Null Finger name.

5.4 fingerprintRegisterationLog's Entity with attributes

User fingerprints will be read and stored in this table for the later usage.

Table 5.4 fingerprintRegisterationLog's

Column Name Data Type Constrain Description

FBRLID numeric(18, 0) Primary key User fingerprint auto generated number.

UserID numeric(18, 0) Not Null User ID which this fingerprint belong to.

registerDate datetime Not Null Fingerprint register date and time.

registerBy_UserID numeric(18, 0) User ID which the current fingerprint registered by.

isPrimary bit Not Null Determine if this fingerprint is the primary one to be used by the user, 0/False Not primary and 1/True is primary.

FBImg binary(256) Not Null Fingerprint image for the current finger specified by fingered column.

FingerID int Foreign key Specify the finger which the current fingerprint belong to.

5.5 FingerprintIdentificationLog's Entity with attributes

This table stored the log for the user and time when he/she logged to the system, this information can be used to track user and for management reports.

Table 5.5 FingerprintIdentificationLog's

Column Name Data Type Constrain Description

FILID numeric(18, 0) Primary key Fingerprint identification log auto generated number.

UserID numeric(18, 0) Foreign key User ID which this fingerprint identification process belong to.

OperationDateTime datetime Not Null Identification process date and time.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now