suru handa

7
CHAPTER 1 INTRODUCTION TO BIOMETRIC SYSTEM Biometric system refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and  access control . It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. The two categories of biometric identifiers include physiological and behavioral characteristics. A biometeric would identify by ones voice DNA, hand print or behavior. Behavioral characteristics are related to the behavior of a person, including  but not limited to typing, gait, and voice. Some r esearchers have coined the term behaviometrics to describe the latter class of biometrics. More traditional means of access control include token-based identificat ion systems, such as a driver's license or  passport, and knowledge-based identification systems, such as a   password or  personal identification number . Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods, however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this Biometric recognition, or biometrics, refers to the automatic identification of a person based on his/her anatomical (e.g., fingerprint, iris) or behavioral (e.g., signature) characteristics or traits. This method of identification offers several advantages over traditional methods involving ID cards (tokens) or PIN numbers (passwords) for various reasons: (i) the person to be identified is required to be physically present at the  point-of-identification; (ii ) identification ba sed on bio met ric tec hniqu es obvia tes the nee d to remember a password or carry a token. With the increased integration of computers and Internet into our everyday lives, it is necessary to protect sensitive and personal data. By replacing PINs (or using biometrics in addition to PINs), biometric techniques can  potentially prevent unauthorized access to ATMs, cellular phones, laptops, and compute r networks. Unlike biometri c traits, PINs or passwo rds may be

Upload: manpreet-kaur

Post on 06-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 1/7

CHAPTER 1 INTRODUCTION TO BIOMETRIC SYSTEM

Biometric system refers to the identification of humans by their 

characteristics or traits. Computer science, biometrics to be specific, is usedas a form of identification and access control. It is also used to identify

individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to

label and describe individuals. The two categories of biometric identifiers

include physiological and behavioral characteristics.

A biometeric would identify by ones voice DNA, hand print or behavior.

Behavioral characteristics are related to the behavior of a person, including

 but not limited to typing, gait, and voice. Some researchers have coined theterm behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification

systems, such as a driver's license or  passport, and knowledge-based

identification systems, such as a  password or  personal identification number .

Since biometric identifiers are unique to individuals, they are more reliable

in verifying identity than token and knowledge-based methods, however, the

collection of biometric identifiers raises privacy concerns about the ultimate

use of this

Biometric recognition, or biometrics, refers to the automatic identification of 

a person based on his/her anatomical (e.g., fingerprint, iris) or behavioral

(e.g., signature) characteristics or traits. This method of identification offers

several advantages over traditional methods involving ID cards (tokens) or 

PIN numbers (passwords) for various reasons:

(i) the person to be identified is required to be physically present at the

 point-of-identification;

(ii) identification based on biometric techniques obviates the need to

remember a password or carry a token.

With the increased integration of computers and Internet into our everyday

lives, it is necessary to protect sensitive and personal data. By replacing

PINs (or using biometrics in addition to PINs), biometric techniques can

 potentially prevent unauthorized access to ATMs, cellular phones, laptops,

and computer networks. Unlike biometric traits, PINs or passwords may be

Page 2: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 2/7

Page 3: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 3/7

specifically, a trait with 'good' permanence will be reasonably invariant over 

time with respect to the specific matching algorithm.

Measurability (collectability) relates to the ease of acquisition or 

measurement of the trait. In addition, acquired data should be in a form that

 permits subsequent processing and extraction of the relevant feature sets.

Performance relates to the accuracy, speed, and robustness of technology

used .

Acceptability relates to how well individuals in the relevant population

accept the technology such that they are willing to have their biometric trait

captured and assessed.

Circumvention relates to the ease with which a trait might be imitated using

an artifact or substitute.

 No single biometric will meet all the requirements of every possible

application.

2.1 The basic block diagram of a biometric system

2.1 Modes of biometric system

A biometric system can operate in the following two modes.

2.1.1 Verification mode:

Page 4: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 4/7

Page 5: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 5/7

Page 6: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 6/7

Fingerprint biometrics are used in a variety of applications including

electronic door locks, smart cards, vehicle ignition control systems, USB

sticks with fingerprint controlled access, and many others. Digital signal

 processing elements in fingerprint scanners perform complex DSP functions

such as filters, transforms, feature extraction, matching operations and other 

algorithms.

Fingerprint sensors can use capacitive, optical, pressure, or thermal

technologies to obtain an image of a finger’s features. The most common

fingerprint sensor solution first illuminates the print with a laser or LED

light and then captures the image using a CCD or less expensive CMOS

sensor. Fingerprint sensors are typically self contained modules that include

an analog to digital converter to translate the analog information into a

digital data stream. Resolution, dynamic range and pixel density are factors

that contribute to the image quality and influence the accuracy of the sensor.Once the image is captured the digital information is transferred to a digital

signal processor to generate a match. The first step in the matching process

is conditioning the scanned fingerprint. Finger print readers rarely use the

full fingerprint for identification. Rather, DSPs use algorithms to extract the

unique features and patterns of each print to generate a unique digital code.

The second step in the software flow is to take the code generated from the

scanned image and compare it to a database of potential matches. The

compare step requires the system to have access to print information in a

networked database or a non-volatile memory unit.

The need for real-time signal processing in biometric fingerprint scanning

makes the C55x DSP a compelling solution for this application. The low

 power capabilities of the C55x in both active and passive modes make it a

match for fingerprint scanning applications because, for a greater percentage

of the time, the processor is in a low-power mode. The peripheral integration

of the C55x DSP includes on-chip LDOs, on-chip memory and a USB Phy

for connectivity. Placing peripherals on-chip lowers the overall system cost

 by simplifying board layout and reducing the total chip count. When

communications peripherals are placed on the same die as the processor it isalso important to protect your device from sources of ESD. Any IOs or 

communication peripherals that could come in contact with human touch or 

other source of ESD should be protected. Devices like the TPD3E001

 provide multichannel ESD protection up 15kV for USB 2.0 interfaces.

The LCD Bridge found on the C55x can be used to display messages or 

Page 7: SURU HANDA

8/2/2019 SURU HANDA

http://slidepdf.com/reader/full/suru-handa 7/7

options menus. Integrating a TSC2003 touch screen controller to the

application provides a way for the user to select options from a displayed

menu. Audio functionality can also be included in this application to provide

user feedback in the form of alerts and pre-recorded voice commands. This

is accomplished using the I2S capability of the C55x to provide a digital

audio stream to an audio DAC. Devices like the DAC3120 Bconvert the

digital audio stream into an analog signal and increase system integration by

including a built in class AB amplifier capable of driving a 2.5 watt mono

speaker.