Biometric Identification Of Persons

نویسندگان

  • Milan Adamek
  • Petr Neumann
  • Dora Lapkova
  • Martin Pospisilik
  • Miroslav Matysek
چکیده

Algorithms used for the identification and verification of individuals through fingerprint recognition technology have long been extensively used in Forensic Science and in the private sector. This work is concerned with the verification of the reliability of biometric systems that use fingerprints for their activities. Further, the eFinger programme is used to study similarities between men, women ́s and family members ́ fingerprints. INTRODUCTION Biometrics has been used since ancient times to recognise/distinguish people. People mutually recognised each other by voice, face or the way they walked. Some characteristics do not change during human life; while others, on the contrary continue to be shaped with increasing age [1]. Differentiating people by their fingerprints is one of the oldest Biometric recognition methods. From the earliest times, this method was used by a lot of civilisations that had some form of knowledge of papillary lines, which are included on human skin. The first provable evidence of the use of modern Biometrics however, dates back to somewhere around the mid-19th Century. This was when fingerprints began to be used in Criminology. William James Herschel was one of the first people to take advantage of Biometrics then. He used railway employees ́ fingerprints to confirm their identity. Using fingerprints was the only possible way to prove the identity of individual workers, because the majority of them could neither read nor write and therefore, one could not expect a signature from them. This fingerprint confirmed their identity when being paid their salary. In 1865, Francis Galton came out with a “Study of the Inheritance of Physical Characteristics.” The study dealt with the issue that newly-born babies take over and inherit some characteristics/properties from their parents. These characteristics can include both physical characteristics, as well as some properties such as, behaviour or conduct. In 1869, Galton became cofounder of the science called Eugenics, which is the Science of Hereditary Diseases and Defects in the Foetus. A year later, Galton became the founder of research into twins. In 1880, he came up with a branch of science called Anthropometry, which deals with the measurement of human body dimensions. In 1892, Galton published his work entitled "Fingerprints", which led to the introduction of fingerprinting into practice in 1900. In the same year, Galton advocated the use of fingerprinting for identification and verification purposes. He demonstrated the permanence and uniqueness, of papillary lines on the fingers. After this, fingerprinting/Dactyloscopy was introduced into police work [1]. BIOMETRICS In Biometrics, several terms exist that are (also) used in Security Technologies. These include identity, identification, authentication, authorisation, verification, and recognition/recognisance. The term Biometrics, is a combination of two words the word “bio” = life, and “metric” = measurement. Overall then, Biometrics can be seen as a science that deals with the measurement and examination of “live” human characteristics [1] [2]. The notion of identity is derived from the word “idem” the same. This term is used when for instance, comparing an object, situation, concept, and such like. One can divide “Identity” into two types; namely, “electronic identity” and “physical identity”. One can have several “Electronic Identities” at the same time – e.g. an identity registered on a Web-site. Conversely, (with regard to) “Physical Identity”, we each have only one, which is unique. Two people, who should have/share the same physical identity, do not exist. It composed of physiological, anatomical and behavioural traits [2][3]. Identification represents the process of discovering and identifying the validity of individuals. To begin with, the person must register such that it passes-on one ́s biometric data into the system, which is stored in a database. In the course of determining the identity of a person, a comparison of the information stored in the database (template) and the currently-scanned information (sample) is carried out. This comparison process for as long as it needs to find compliance with data in the database. The output is either finding the identity ... and authorisation to enter; or to refuse entry because there was no consensus in the data. Proceedings 31st European Conference on Modelling and Simulation ©ECMS Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics (Editors) ISBN: 978-0-9932440-4-9/ ISBN: 978-0-9932440-5-6 (CD) BIOMETRI For Biometri be divided i These inclu leg/foot/feet, purposes, on the table belo

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Personal identification by eyes.

Identification of persons through the eyes is in the field of biometrical science. Many security systems are based on biometric methods of personal identification, to determine whether a person is presenting itself truly. The human eye contains an extremely large number of individual characteristics that make it particularly suitable for the process of identifying a person. Today, the eye is co...

متن کامل

A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects

We introduce a new interpretation for the biometric enrollment and identification paradigms and show how the problem of multiple hypothesis testing (HT) for arbitrarily varying sources (AVS) in a special case relates to it. The traditional studies on biometric systems from communication perspectives assume the noisy channel model. If suppose that the process of the biometric data enrollment for...

متن کامل

Rank Level Fusion Using Fingerprint and Iris Biometrics

Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in few situations. The biometric improves the capability to recognize the persons. A biometric identification system is an automatic recognition system that recognizes a person bas...

متن کامل

Use of Identification Trial Statistics for Combination of Biometric Matchers

Combination functions typically used in biometric identification systems consider as input parameters only those matching scores which are related to a single person in order to derive a combined score for that person. We discuss how such methods can be extended to utilize the matching scores corresponding to all persons. The proposed combination methods account for dependencies between scores ...

متن کامل

Dental X-ray Image Segmentation

Law enforcement agencies have been exploiting biometric identifiers for decades as key tools in forensic identification. With the evolution in information technology and the huge volume of cases that need to be investigated by forensic specialists, it has become important to automate forensic identification systems. While, ante mortem (AM) identification, that is identification prior to death, ...

متن کامل

Rank-Level Fusion of Multimodal Biometric Cryptosystems

In this paper we present an effective scheme that preserves the biometric templates more secured. We present a new algorithm called Enhanced Blind Encryption Algorithm for securing biometric templates between client and server and using that for authentication. There are four phases involved in this process namely, enrollment, identification, matching and fusion. During enrollment, biometric tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017