Abstract – In modern security systems, to recognize a person we have replace earlier recognition techniques like atm cards, pin code with person’s biological characteristics like fingerprint, eye, hand, etc. This technology is referred to as biometrics. In this paper we will discuss a biometrics technique based on human hand’s shape and features that is hand geometry. It has gained popularity in low to medium security system because of its easy of collectability, public acceptance and low template size. This paper first discuss basic hand geometry module and then present survey of the hand geometry biometrics technology. Various recognition techniques used in this approach are SVM, Neural network approach, k-NN, genetic algorithm, fuzzy logic, HMM, etc. To determine performance of hand geometry system various parameters like FAR, EER, FFR, ROC curve will be discussed. At last, we will provide few limitations of the system and will provide future work that can further improve biometrics.
Keywords : biometrics, hand geometry, recognition INTRODUCTION
With the increasing frauds in today’s world security is a big issue. So to increase the security we need to automate various identification systems. For that biometrics emerged as a new technology. Biometrics emerged as an automated identification system based on person’s biological traits. Two types of traits are used- physiological and behavioral [1]. Physiological characteristics relate to the shape of body and includes-
Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.
The thing with biometrics is that it works great only if the verifier can verify two things: Firstly, that the biometric to be used has come from the intended person at the time of verification, and Secondly, which the biometric should match with the master biometric entry in the file database. If the system can't do that, it can't work. Biometrics are good in uniquely identifying the people, butat the same time they are not secrets and cannot be trusted [1].
Biometrics are important to not only information systems, but to information security as a subject. Today, most information is kept secure via ID cards or secret information, such as a PIN, password, pattern, etc., the downside to this type of security is the lack of a failsafe (Ashok, Shivashankar and Mudiraj)! What would happen if an ID card was lost? Or a PIN, password or pattern was leaked to individuals who were not on a “need to know” basis”? This is where the importance of biometrics comes into play.
Theorist working on a comparison of the biometric template that is created and temporarily stored template with a number of people. And then takes the decision-maker in mind the similarity measures produced by matcher.
Biometrics is a very beneficial and quickly growing form of technology, but with that growth comes key considerations. These considerations must take into an account the security of the system itself in respect to the privacy of the user. There are several key elements and concerns that are included in this and must be highlighted during the development of the system as well as the implementation.
However, there has a problem challenge the biometric systems which use fingerprints to identify the status of people.The system is hard to
Biometrics is the use of physiological characteristics such as iris or retinal scan, fingerprint, or voice that is unique to a particular person (Sewell & Thede, 2013, p. 363). The use of biometrics is one of the most secure ways of authentication. They "rely on physical or behavioral characteristics to allow for effective identification" (Lambardo, 2015) The usage of biometrics has now been around for approximately 30 years. Healthcare agencies use biometrics to clock in to work, access patient’s medications, access a facilities electronic health record, and more. Biometrics have recently started to be used at blood banks to ensure patient identification before a blood transfusion happens. Voice biometrics is more commonly used in the banking
Palm print recognition is one of biometrics available at present. Biometric systems are used to authenticate identity by measuring physiological
The idea of using someone’s body as a form of their identification has been a concept put to use for thousands of years. Although, since the incorporation of biometrics - the measurement and analysis of unique physical or behavioral characteristics (Merriam-Webster, 1902) - in the early 1900’s, the primary focus has been to advance private security and accessibility. When first introduced, biometrics were used in the public sector of the economy to help identify people, in ways such as: health care, police investigation, military usage, etc. Within recent years, the demand for biometrics, due to its attractiveness in the security field, not only led to a shift in economic sectors but to an overall expansion in the biometric companies; as well as, lead to an increase in their gross income. And with a shift in economic sectors and a rise in revenue, the debate is whether the pros will outweigh the cons, and if biometrics is the most beneficial outcome for the country at whole.
The student attendance system is very relevant in an institute like ours since it aims at
Introduction: Biometric authentication is the process of verifying an individual based on behavioral and physiological characteristics. Iris recognition verification is one of the most reliable personal identification methods in biometrics. In the beginning, the idea of using iris patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980 's the idea had appeared in James Bond films, but it still remained science fiction and conjecture. As biometric of human for identification purpose which cannot be stolen or lost. From the biometric system there exist different types of biometric such as thumb recognition, palm recognition, face recognition and iris recognition etc.
Nowdays, security and privacy is a major concern of our data that’s why we can use biometric techniques for identification and recognition of users for creating secure system. Biometrics refers to the identification of humans by their characteristics or traits. A biometric system is a technological system that uses information about a person (or other biological organism) to identify that person .A Biometrics system is a pattern recognition system that uses various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc. This paper deals with various biometric systems by defining their advantages and disadvantages.
Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them. Many of the next generation personal computer systems will have integrated biometric technology so that no external hardware is needed. In the mean time, users can buy small peripherals, like a mouse with integrated biometric technology or a small finger terminal for finger scans, to secure their personal computers.
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.
In recent years there have been heightened concerns about security due to the advancements of networking, communications, and mobility. This has led to the increase in biometrics in different applications for authentication and identification. The applications can be divided into 3 main groups Forensics, Government and Commercial (Jain, Flynn & Ross, 2008).