Wednesday, February 20, 2013

basic biometrix tips

BioMetrix




Biometrix  a new technique which was differentiated in two ways there are:

* Physiological
* Behaviour

Face



Add caption

                                A facial recogonizer device that receive image or video of human face.Then after it receive for authentication process it get the image or video and convert it into binary digits which was compared with previously converted code that should be matched means it will autherization that user . Facial recogonizer which was identify the digital image or video.once it receive image with different expression or different angle means,the subject or image that should be stand in front on verification time perioud.To prevent a subject from using a picture or mask when being scanned in a facial recogonizition 
when the user is scaned it will apear blinke for smile or nod the head. Nowaday used 3d technology in face recogonization. 

Skin Texture Analysis:
                     Another technology after 3d technology was skin texture analysis which received the visual skin details captured as standard digital or scanned image.That should be turns unique line,pattern,marks,spots,etc,, should be received as Mathematical term.This type of identification was improve the performance of authentication.Not intrusive is one of major advantage which means user can't known that he/she was scanning ie. in jewellery shop,bank and government office. 
facial recogonization which was applied to  find terrorist, wanted criminals and missiing childs are unawared  they are scanned.
Fingerprint


Add caption
Finger print which is the oldest well known technique was appear in number of area's. Everyone has unique identification with unmatchable pattern. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending.  Initialy large amount of monry which was spend to the finger print technique. Nonintrunsive -easily receive finger print without user consiousness. 

Structure:
         Finger print which was identify by two parts,there are ridges and valley.
* Ridges are upper skin of layer
* Valley was lowest segments
There are five basic finger prints 
    arch
    tented arch
    left loop
    right loop
    whorl

Best application of finger prints which was : Cell phone,Computer,Atm machine USB flash drive.

Irish



Add caption
Irish which was take most important position in biometrix, that should be intrusive which is one of major disadvantage.  Irish which is one of accurate process of user identification that should be uniqly identified for every human like computer term entity. There are six steps to process irish in biometrix 
concept there are:
1. Taking picture
2. Localitation of irish
3. Determine the inner and outer layer of irish
4. Filtering for the usable structure of analysis
5. Determination of usable structure
6. Calculation of the irish code

Which method was highly accuracy,and which term was converted into mathematical term that should be compared with the database if unique means well authorized or else un-authorized. The verification time is gerndraly less than 5 seconds.

One major thing is non-living human can be easily identify by the irish scanning technique .

DNA


Add caption

Human man have 23 pairs of chromosomes containing their DNABlueprint. One chromozomes come from each pairs of their mother and father,every cell in a human body contain a copy of DNA. Large majority of DNA does't different from each other more or less same from parents and family members of gendration.  Variable number tendum repeater(VNTR) which was present in loci which was present in DNA, So major concept is count number of VNTR present in loci on chromosomes varies between  individuals. That should be uniquely identifed and converted as mathematical term in system of database that should be stored as unique code , which was identified for future authentication. By taking blood sample,hair,saliva,semen,tissue


Keystoke:



Add caption
keystoke which was done by user as any where in anytime as they are identify by the user authentication. That user authentication which was identified by some steps as given below:
1. hold time: how long key is pressed
2. seek time:how long it takes to get to and depress a key
3. latency: how long it take to move one key to another key
4.It does not require special hardware but easily modify result
5. It's low cost and user friendly
6. Almost no false acceptance 
7. keyboard is the only sensor
8. It's does not require software 


Voice:

Add caption
Initially human voice was received with identification as uniquely , that should be analysis and stored as digital information as convertion of binary digit record in data base.  soon after voice should be received by voice receiver and find that matching record of digital mathematical data if that should be identified means the authentication which was performed succesfully. 

Human voice which was received with unique word with unique pronounciation so that should be also compared on during comparision of  user data and data in data base . 
Cheap technology, Non intrusive ,verification time in 5 seconds.
Major disadvantage is to easily record the voice and cheat the data base of authentication and an illness  of cold voice make changes from same user means also consider as wrong information. 


Signature:



Add caption
Add caption

Signature received by signature receiver.
That should be recogonized.
Every one known to give signature .
But everyone can't be unique .
Because some of person be in same name.
So, this method of recogonization which was less expensive.
Which can be easily received and saved on database.
But not all of data should be different some thing should be same.

Uniquness identified by the behaviour of sign design.
Mostly it was applicable in Licence.




Biometrix Using finger prints







Usefull links for biometrix


Types of biometric devices

· Face scanner - Biometric face scanners identify a person by taking measurements of a person face. For example, the distance between the persons chin, eyes, nose, and mouth. These types of scanners can be very secure assuming they are smart enough to distinguish between a picture of a person and a real person.
· Hand scanner - Like your finger print, the palm of your hand is also unique to you. A biometric hand scanner will identify the person by the palm of their hand.
· Finger scanner - Like the picture shown on this page a biometric finger scanner identifies the person by their finger print. These can be a secure method of identifying a person, however, cheap and less sophisticated finger print scanners can be duped a number of ways. For example, in the show Myth Busters they were able to fake a finger print using a Gummy Bear candy treat.
· Retina or iris scanner - A biometric retina or iris scanner identifies a person by scanning the iris or retina of their eyes. These scanners are more secure biometric authentication schemes when compared to the other devices because there is no known way to duplicate the retina or iris.
· Voice scanner - Finally, a voice analysis scanner will mathematically break down a person's voice to identify them. These scanners can help improve security but with some less sophisticated scanners can be bypassed using a tape recording.