Pros & Cons Of Various Bio-Metric Authentication Systems

1y ago
10 Views
2 Downloads
1.66 MB
5 Pages
Last View : 13d ago
Last Download : 3m ago
Upload by : Javier Atchley
Transcription

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018ISSN 2229-5518104Pros & Cons of Various Bio-MetricAuthentication Systems1C.Arunkumar, 2M.DeepanayakiAbstract— This paper presents pros and cons of various biometric authentication systems. A brief introduction is usually offeredregarding commonly used biometrics including, Face, Iris, Fingerprint, Finger Vein, Lips, Voice, Signature Verification, Keystrokedynamic, DNA. With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication sys tembecame a significant task for both of access control and securing user’s private data. Such authentication models have overcome othertraditional security methods like passwords and PIN. This paper outlined opinions about the usability of biometric authentication systems& advantages and disadvantages, future development of biometric authentication system.Keywords—Biometric systems, technique, face, Iris, finger, lips, voice.—————————— ——————————2 BIOMETRIC TECHNIQUES1 INTRODUCTION"Biometrics" implies "life measurement" however theterm associated with the utilization of uniquephysiological characteristics to distinguish an individual.It’s a new way to verify authenticity. Biometrics utilizesbiological characteristics or behavioral features torecognize an individual. In real a Biometrics system is apattern identification system that uses various patternssuch as iris patterns, retina design and biologicalcharacteristics like fingerprints, facial geometry, voicerecognition and hand recognition and so forth. Biometricrecognition system provides possibility to verify one’sidentity simply by determining “who these people are”instead of “what these people possess or may beremembered. The very fact that makes it really interestingis that the various security codes like the securitypasswords and the PIN number could be interchangedamong people but the physical traits cannot be. Theprinciple use of Biometric security is to change theexisting password system. There are numerous pros andcons of Biometric system that must be considered.Jain et al. describe four operations stages of a Unitmodal biometric recognition system. Biometric data hasacquisition. Data evaluation and feature extraction.Enrollment (first scan of a feature by a biometric reader,produce its digital representation and create a template,even a few in most of the systems).IJSER3 NUMEROUS BIOMETRIC SYSTEMS1. Facial recognition2. Iris3. Finger print4. Lips5. VoiceNew and emerging biometric techniques are1. Human scent recognition2. EEG biometrics3. Skin spectroscopy4. Knuckles texture5. Finger nail recognition4 BIOMETRICS METHODS4.1 Facial recognitionFacial scanning involves scanning of the entireface andchecking of critical points and areas in the facewith �——— 1C. Arunkumar, II MCA, Department of Computer Application,Priyadarshini Engineering College, Vaniyambadi, E-mail:arunjai658@gmail.com. 2M. Deepanayaki , Associate Professor, Department of ComputerApplication, Priyadarshini Engineering College, Vaniyambadi, E-mail:mdeepanayaki@priyadarshini.net.inIJSER 2018http://www.ijser.orgFig 1: facial recognition

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018ISSN 2229-55184.1.1 Advantages1.2.3.4.5.1054.2.1 AdvantagesIt does not require any co-operation of the testsubject to do any work.Systems set up in airports, multiplexes, and otheropen public areas can easily identify anindividual among the massive crowd.This performs massive identification whichusually other biometric system can’t perform.The systems don’t require any direct contact of aperson in order to verify his/her identity. Thiscould be advantageous in clean environments,for monitoring or tracking, and in automationsystems.Incident monitoring for security with photowhich in turn taken by a camera, but there is nosuch evidence with the fingerprint technology totrack these incidents.1.2.3.4.5.6.Iris possesses unique structure shaped by 10months of age, and is always stable throughoutlife.The iris incorporates fine texture. Evengenetically similar people have entirelyindependent iris textures.An iris scan can be carried out through 10 cm toa few meters apart.Non-intrusive data collection (no actual contactwith a scanner is required).Data capturing can be carried out even though auser is putting contact lenses or glasses.High accuracy and High recognition processspeed.4.2.2 Disadvantages4.1.2 Disadvantages1.2.3.4.Face recognition isn’t perfect and faceschallenges to perform under certain conditions.One obstacle associated with the viewingpositionof face.Face recognition doesn’t work effectively inbad/weaklighting,sunglasses/sunshades,lengthy hair, or other objects partly covering thesubject’s face.Not much effective for low resolution images.1.2.Iris scanners might be very easily fooled througha superior quality image of an iris or face insteadof the real thing.The scanning devices are often hard to adjustand may annoy multiple people of variousheights.The accuracy of scanning devices may impactedby unusual lighting effects and illumination fromreflective types of surfaces.Iris scanners tend to be more expensive incomparison with additional biometrics.Because iris is a tiny organ to scan from a longdistance, Iris recognition becomes challenging toperform well at a distance larger than a fewmeters.Iris recognition is vulnerable to inadequateimage qualityIJSERA serious drawback is that many systems are usuallyless efficient if facial expressions vary. Even a biggrin/laugh can render the system’s performance lesseffectively. (so significantly North america now permitsonly neutral facial expressions on passport photos )Additionally, when used for security purposes, it is morecostly and complex as compared to some othertechniques. Iris recognition offers one of the most securestrategies of authentication and recognition. Once theimpression of an iris has been taken using a standarddigicam, the authentication process involves, evaluatingthe present subject's iris with stored version. It is one ofthe most accurate technique with very low falseacceptance as well as rejection rates. This is how thetechnology becomes very useful.3.4.5.6.4.3 Fingerprint VerificationThis is one of the oldest forms of biometrictechniqueswhich involves mapping of the pattern of the fingerprintof the individual and then comparing the ridges,furrows,within the template. The fingerprint given to thedevice isfirst searched at the coarse level in the databaseand thenfiner comparisons are made to get the result.4.2 Iris RecognitionIn Iris and Retinal scanning, the iris and the retina arescanned by a low intensity light source and the image iscompared with the stored patterns in the databasetemplate. This is one of the fastest forms of biometry.Fig 3: fingerprintFig 2: IrisIJSER 2018http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018ISSN 2229-55184.3.1 Advantages1.2.3.4.5.6.7.1064.4.1 AdvantagesThese systems usually are simple to use andinstall.It requires inexpensive equipment which usuallyhave low power intake.A fingerprint pattern has individually distinctivecomposition and characteristic remains the samewith time.Finger prints are largely universal. Only, of the2% of human population cannot use finger printsdue to skin damage or hereditary factors.Fingerprints are the most preferred biometric.Biometric fingerprint scanner presents a methodto record an identity point which is very hard tobe fake, making the technology incrediblysecure.It is easy to use along with the high verificationprocess speed and accuracy.1.2.3.4.5.6.7.8.Study proves that lips attributes are usuallydistinctive and also unchangeable for everysingle examined person.Lips prints used by forensics professionalsand criminal police training.Size of template is small.Lips based human recognition dependent onstatic mouth/face photos.Lips biometric certainly are passivebiometrics – person’s interaction is just notnecessary.Photos might be obtained from the ipsusuallyarevisible–nothidden/overcast by anything.Lips biometric can be hybrid to use as lipsvoice or lips-face biometric systems4.3.2 Disadvantages1.2.3.4.5.Because fingerprint scanner only scans onesection of a person's finger, it may susceptible toerror.Many scanning system could be cheat employingartificial fingers or perhaps showing anotherperson’s fingerSometimes it may take many swipe offingerprint to register.Fingerprints of people working in chemicalsectors often affected.Cuts, marks transform fingerprints which oftenhas negatively effect on performance.4.4.2 Disadvantages1.2.The concept of developing hybrid (multimodal)biometric system needs a lot of attention.Main drawback of this method is that theparticular facial attributes chosen may notacquire relevant details. E.g. visibility of teethmay present additional details that can’t beutilized by a lip shape model alone.A big smile might cause difficulty in recognitionof a person with respect to same person withneutral appearance as before.IJSER4.4 Lip identificationEssentially the most growing technique of humanrecognition, which originates from felony and forensicprocess, is usually human lips identification. Thisbiometric accumulate significant focus recently because itdeals with many difficulties of traditional identification.So as to recognize human identity, lips form and colorcharacteristics are taken into consideration. Lip biometricmay be used to improve the potency of biometrics such asfacial and voice recognition.3.4.5 Voice BiometryIt is proved that the frequency, stress and accent ofspeech differ from person to person. Voice biometry usesthis concept to solve the problem of illegal user. Thissystem has been implemented in the latest laptops aswell.Fig: Voice Biometry4.5.1 Advantages1.2.Fig: Lip IdentificationIJSER 2018http://www.ijser.orgSpeech can be recommended as a naturalinput as it does not demand any trainingand it is considerably quicker as comparedto some other input.Voice is usually a quite natural strategy tocommunicate, and in fact it is not necessaryfor you to sit at keyboard set or even workwith handheld remote control.

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018ISSN 2229-55183.4.5.107This technique helps those people who havedifficulty of using their hands.It does not require any training for users.It offers a big advantage to those who sufferfrom problems that may impact their writingcapability but they can use their voicetoproducewords/textondesktopcomputers or may be other equipment.4.5.2 DISADVANTAGES1.2.3.4.5.6.Even the most efficient voice recognitionsystems very often may make mistakes,when there is disturbance or some noise inthe surrounding.Voice Recognition systems works well onlyif the microphone is actually close to the enduser. Much more far-away microphones arelikely to boost the number of errors.May hacked with prerecorded voicemessages.Possesses primary amount of time foradjustment with each user's voice.Different persons might speak variouslanguages.Several words sound very similarly. Case:two, to, tooIJSERFig: Block diagram for Biometric Authentication5 COMPARISON OF BIOMETRICSA biometric system can provide two functions. Oneof which is verification and the other one isAuthentication. So, the techniques used for biometricauthentication has to be stringent enough that they canemploy both these functionalities simultaneously.Currently, cognitive biometrics systems are beingdeveloped to use brain response to odor stimuli, facialperception and mental performance for search at portsand high security areas. Other biometric strategies arebeing developed such as those based on gait (way ofwalking), retina, Hand veins, ear canal, facial thermogram DNA, odor and scent and palm prints. In the nearfuture, these biometric techniques can be the solution forthe current threats in world of information security. Oflate after a thorough research it can be concluded thatapproaches made for simultaneous authentication andverification is most promising for iris, finger print andpalm, vain policies. But whatever the method we choose,main constraint will be its performance in real lifesituation. So, application of Artificial System can be asolution for these cases. We have given emphasis on theIris recognition. According to us, after detection of an irispattern, the distance between pupil and the iris boundarycan be computed. This metric can be used for therecognition purposes because this feature remains uniquefor each and every individual. Again, an artificial systemcan be designed which will update the stored metric asthe proposed feature may vary for a particular personafter certain time period After doing the manual analysisof the above discussed method, we have got a satisfactoryresult. Due to the dynamic modification of the proposedmetric, the rejection ration for a same person reduces blot.The work is being carried out to make the system viable.Fig: Block diagram for verification or identification5.1 Comparison Table of biometrics ognitionLowIJSER tylevelHighSize iumHighLow

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018ISSN 2229-55186 CONCLUSIONSecuring critical and sensitive systems from beingillegally accessed by imposters has been a potentialresearch field. Biometric based security authenticationobtained considerable attention for its accuracy,reliability, universality and permanence etc. This paperoverviewed the most conducted pros and cons ofbiometric authentication system. The focus of this work isto briefly present various biometric security methods.Such, as Facial recognition, Iris, Finger print, Lips, Voice.Moreover, transforming such security authenticationtechniques from traditional practical environment intomore flexible one such as mobile phones it can potentiallyupgrade the integration of the overall system.REFERENCES123456789101112131415161718John R.Vacca.,”Biometric technologies and ASurveyofEmergingBiometricTechnologies”. International Journal of ComputerApplications,2010.A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometricrecognition,” IEEE Trans. Circuits Syst.Video Technology, Special IssueImage- and Video-Based Biomet., Volume 14, Issue 1, Jan. 2004.R. Sanchez-Reillo, C. Sanchez-Avila, and A. Gonzales-Marcos,“Biometric identification through handgeometry measurements,”,IEEE Trans. Pattern Anal. Mach. Intell., Volume 22, Issue. 10, Oct. 2000.Jain, A., Bolle, R. and Pankanti S. (1999). BIOMETRICS: PersonalIdentificationin Networked Society. Kluwer Academic Publishers.Smart Cart Alliance Identity Council (2007): Identity and Smart CardTechnology and application.http://www.smartcardalliance.org, as visited on 25/10/2008.Jain,sA.K.;Ross, A. &Pankanti, S., "Biometrics: A Tool for InformationSecurity", IEEE Transactions onInformation Forensics And Security,Volume 1, issue 2, Jun. 2006.R.Cappelli,D.Maio,D.Maltoni,J.L.Wayman, and A.K.Jain, “Performanceevaluation of fingerprintverification systems”, IEEE Trans. PatternAnal. Mach. Intell., Volume 28, issue 1, Jan. 2006.S. Hocquet, J. Ramel, H. Cardot, “Fusion of Methods for KeystrokeDynamic Authentication”, In Proc. of 4thIEEE Workshop onAutomatic Identification Advanced Technologies, USA, Oct. 2005.S. Im, H. Park, Y. Kim, S. Han, S. Kim, C. Kang, and C. Chung, “ABiometric Identification System byExtracting Hand Vein Patterns”,Journal of the Korean Physical Society, Korean Publication, Volume38,Issue 3, Mar. 2001Deutschmann, I., Nordstrom, P., & Nilsson, L. (2013). Continuousauthentication using behavioral biometrics. IT Professional,Zaeri, N. (2011). Minutiae-based fingerprint extraction and recognition.INTECH Open Access Publisher.Faundez-Zanuy, M., "Biometric security technology," in Aerospace andElectronic Systems Magazine, IEEE, June 2006Narhar, U.K.; Joshi, R.B., "Highly Secure Authentication Scheme," inComputing Communication Control and Automation (ICCUBEA),2015 International Conference on , Feb. 2015Jain, A.K.; Ross, A.; Prabhakar, S., "An introduction to biometricrecognition," in Circuits and Systems for Video Technology, IEEETransactions on, Jan. 2004Liu, Simon; Silverman, M., "A practical guide to biometric securitytechnology," in IT Professional, Jan/Feb 2001Delac, K.; Grgic, M., "A survey of biometric recognition methods," inElectronics in Marine, 2004. Proceedings Elmar 2004. 46th InternationalSymposium,June 2004IJSERIJSER 2018http://www.ijser.org108

existing password system. There are numerous pros and cons of Biometric system that must be considered. 2 BIOMETRIC TECHNIQUES Jain et al. describe four operations stages of a Unit-modal biometric recognition system. Biometric data has acquisition. Data evaluation and feature extraction. Enrollment (first scan of a feature by a biometric reader,

Related Documents:

PSI AP Physics 1 Name_ Multiple Choice 1. Two&sound&sources&S 1∧&S p;Hz&and250&Hz.&Whenwe& esult&is:& (A) great&&&&&(C)&The&same&&&&&

Argilla Almond&David Arrivederci&ragazzi Malle&L. Artemis&Fowl ColferD. Ascoltail&mio&cuore Pitzorno&B. ASSASSINATION Sgardoli&G. Auschwitzero&il&numero&220545 AveyD. di&mare Salgari&E. Avventurain&Egitto Pederiali&G. Avventure&di&storie AA.&VV. Baby&sitter&blues Murail&Marie]Aude Bambini&di&farina FineAnna

The program, which was designed to push sales of Goodyear Aquatred tires, was targeted at sales associates and managers at 900 company-owned stores and service centers, which were divided into two equal groups of nearly identical performance. For every 12 tires they sold, one group received cash rewards and the other received

College"Physics" Student"Solutions"Manual" Chapter"6" " 50" " 728 rev s 728 rpm 1 min 60 s 2 rad 1 rev 76.2 rad s 1 rev 2 rad , π ω π " 6.2 CENTRIPETAL ACCELERATION 18." Verify&that ntrifuge&is&about 0.50&km/s,∧&Earth&in&its& orbit is&about p;linear&speed&of&a .

Pros and Cons Pros and Cons:A Debater's Handbook offers an indispensable guide to the arguments both for and against over 140 current controversies and global issues. The nineteenth edition includes new entries on topics such as the right to possess nuclear weapons, the bailing out of failing companies, the protection of indigenous

theJazz&Band”∧&answer& musical&questions.&Click&on&Band .

Pros and cons of rapid tests . Not all testing projects of AIDS service organ-isations use rapid tests: The pros and cons basically balance each other out. Whether or not rapid tests can be usedpurposeful ly ulti-mately depends on the local circumstances and the judgement of the responsible physi-cian. Pros

CONS were isolated in 23 (10.6%) cases. CONS are frequently isolated from blood cultures and are emerging as important nosocomial pathogen. Most of the patients (95.7%) in whom CONS were isolated were of paediatric age group. CONS was isolated in 4.5% of cases in study by Gohel et al., (2014) and among 4% cases by van der Heijden et al. (2011).