Biometric ID System: Design, Architecture, and Applications
VerifiedAdded on  2020/03/01
|28
|2995
|17
Report
AI Summary
This report provides a comprehensive analysis of biometric identification systems, exploring their design, architecture, and real-world applications. It begins with an introduction to biometrics, defining key terms and outlining the basic architecture of these systems. The report then delves into conceptual designs and examples, including biometric ID systems for Israel, door lock systems in Asian countries, and student attendance systems in India. Each case study examines the necessity of the system, its specific design, and the relevant technical parameters. The report covers fingerprint recognition, security protocols, and hardware components. The report concludes with a discussion on the benefits and challenges of implementing biometric systems. Desklib is a platform where students can find this report and other solved assignments.

Running Head: System Science and Engineering
BIOMETRIC ID SYSTEM
BY
SURAJIT DUTTA
1
BIOMETRIC ID SYSTEM
BY
SURAJIT DUTTA
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running Head: System Science and Engineering
Abstract
Correct and automated identification and authentication of customers is an
essential problem in community environments. Shared secrets and
techniques such as pin or passwords and key gadgets like smart playing
cards just aren't sufficient in a few instances. What is needed is something
that could affirm that you are physically the character you declare to be -
biometrics. Biometric identification technologies had been associated
usually with very expensive pinnacle at ease applications. Today the core
technology has developed and the value of the gadget is going down
dramatically due to the mixing and increasing processing strength. Certain
packages of biometric identity technology are actually cost-powerful,
reliable and noticeably accurate
2
Abstract
Correct and automated identification and authentication of customers is an
essential problem in community environments. Shared secrets and
techniques such as pin or passwords and key gadgets like smart playing
cards just aren't sufficient in a few instances. What is needed is something
that could affirm that you are physically the character you declare to be -
biometrics. Biometric identification technologies had been associated
usually with very expensive pinnacle at ease applications. Today the core
technology has developed and the value of the gadget is going down
dramatically due to the mixing and increasing processing strength. Certain
packages of biometric identity technology are actually cost-powerful,
reliable and noticeably accurate
2

Running Head: System Science and Engineering
TABLE OF CONTENTS
TOPICS NO OF PAGES
1. INTRODUCTION 3
2. DEFINITION 4
3. BASIC ARCHITECTURE 5
4. CONCEPTUAL DESIGN 7
5. CONCLUSION 24
6. REFERENCES 26
3
TABLE OF CONTENTS
TOPICS NO OF PAGES
1. INTRODUCTION 3
2. DEFINITION 4
3. BASIC ARCHITECTURE 5
4. CONCEPTUAL DESIGN 7
5. CONCLUSION 24
6. REFERENCES 26
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Running Head: System Science and Engineering
1. Introduction
Earlier than we pass outline precisely ,we talk
about biometric technologies. The time period 'biometrics' refers strictly
speak me to a science related to the statistical evaluation of biological
characteristics. Right here biometrics are used in a context of creating an
evaluation of human characteristics for security functions.. It is frequently
said that with biometric products you are capable of reaching the best degree
of safety. To assist illustrate this factors, a mile-quoted definition is utilized
by the biometrics industry. (A., 1990)Three tiers of protection are:
• The lowest stage of security is described as something you have got in your
possession, inclusive of an identification badge with a photograph on it.
•the second one degree of security is something which you know; along with
a password used with laptop login or pin code to apply your financial
institution account card on atm.
4
1. Introduction
Earlier than we pass outline precisely ,we talk
about biometric technologies. The time period 'biometrics' refers strictly
speak me to a science related to the statistical evaluation of biological
characteristics. Right here biometrics are used in a context of creating an
evaluation of human characteristics for security functions.. It is frequently
said that with biometric products you are capable of reaching the best degree
of safety. To assist illustrate this factors, a mile-quoted definition is utilized
by the biometrics industry. (A., 1990)Three tiers of protection are:
• The lowest stage of security is described as something you have got in your
possession, inclusive of an identification badge with a photograph on it.
•the second one degree of security is something which you know; along with
a password used with laptop login or pin code to apply your financial
institution account card on atm.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running Head: System Science and Engineering
• The very best level of security is something what you're and something that
you do. this is basically what biometric era is all approximately.
It is clean that people see exciting capability in this era.
.
2. Definitions
Biometrics , It is comparing the technique of a
biometric pattern or a code derived from it towards all of the recognized
biometric reference templates on file. If the acquired pattern fits a template
saved inside mistakes marginal the identity of the enrollee is likewise
matched to that of the formerly stored reference. (Cappelli R., 2002) The
saved identification statistics really should no longer reveal the physical
identification of the owner of the biometric, however, rather a position,
which authorizes using a service or get right of entry to. acceptability
which shows the extent to which people are willing to accept the
usage of their unique biometric identifiers (traits) in their day by
day lives the sensed records might be noisy or across the world
5
• The very best level of security is something what you're and something that
you do. this is basically what biometric era is all approximately.
It is clean that people see exciting capability in this era.
.
2. Definitions
Biometrics , It is comparing the technique of a
biometric pattern or a code derived from it towards all of the recognized
biometric reference templates on file. If the acquired pattern fits a template
saved inside mistakes marginal the identity of the enrollee is likewise
matched to that of the formerly stored reference. (Cappelli R., 2002) The
saved identification statistics really should no longer reveal the physical
identification of the owner of the biometric, however, rather a position,
which authorizes using a service or get right of entry to. acceptability
which shows the extent to which people are willing to accept the
usage of their unique biometric identifiers (traits) in their day by
day lives the sensed records might be noisy or across the world
5

Running Head: System Science and Engineering
distorted fingerprint with a scar or a voice altered with the aid of
cold are examples of noisy records.
3. Basic Architecture of Biometric Identification
6
distorted fingerprint with a scar or a voice altered with the aid of
cold are examples of noisy records.
3. Basic Architecture of Biometric Identification
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Running Head: System Science and Engineering
4.CONCEPTUAL DESIGN AND EXAMPLES
4.1 BIOMETRIC ID SYSTEM FOR ISREAL
4.1.1 NECESSICITY
In the present social-financial surroundings, human beings are
increasingly more and more dependent on electronic method of
charging, communiqué, verification and interactions. In turn, this
pressure political and governmental structures to increasingly
offer more sorts of electronic verification and authentication.
Without identity documents, people often cannot exercising
simple rights and get entry to offerings essential for economic and
bodily safety, formal employment, or democratic participation.
donors can't efficaciously make certain the simple reach meant
beneficiaries. As a state under interminable risk, Israel was one of
the main nations to embrace biometric distinguishing proof
methods. Lately, the Israeli government built up an extraordinary
7
4.CONCEPTUAL DESIGN AND EXAMPLES
4.1 BIOMETRIC ID SYSTEM FOR ISREAL
4.1.1 NECESSICITY
In the present social-financial surroundings, human beings are
increasingly more and more dependent on electronic method of
charging, communiqué, verification and interactions. In turn, this
pressure political and governmental structures to increasingly
offer more sorts of electronic verification and authentication.
Without identity documents, people often cannot exercising
simple rights and get entry to offerings essential for economic and
bodily safety, formal employment, or democratic participation.
donors can't efficaciously make certain the simple reach meant
beneficiaries. As a state under interminable risk, Israel was one of
the main nations to embrace biometric distinguishing proof
methods. Lately, the Israeli government built up an extraordinary
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running Head: System Science and Engineering
between pastoral advisory group, led by the Chief of the Interior
Ministry, and included individuals from the Ministries of the
Interior, Internal Security, and Justice, the Prime Ministers Offce,
the Israeli Police, the Israeli Defense Force, (S., 2003)and the
Israel Airports Authority. In spite of the fact that it served in a to a
great extent administrative part, the board's objective was to
hurry the improvement, enactment, and institutionalization of
biometric identification in Israel.
4.1.2 Design of the system
8
between pastoral advisory group, led by the Chief of the Interior
Ministry, and included individuals from the Ministries of the
Interior, Internal Security, and Justice, the Prime Ministers Offce,
the Israeli Police, the Israeli Defense Force, (S., 2003)and the
Israel Airports Authority. In spite of the fact that it served in a to a
great extent administrative part, the board's objective was to
hurry the improvement, enactment, and institutionalization of
biometric identification in Israel.
4.1.2 Design of the system
8

Running Head: System Science and Engineering
The above plan ensures security for a few reasons. To start with,
there is no immediate connection between a specific bit of
individual data also, relating bit of biometric data. Second,
regardless of the possibility that an enemy is accessing the
biometric data and can discover a connection between an
individual data and a biometric data, he or she would not have
the capacity to utilize the biometric data in light of the fact that it
was hashed. With a specific end goal to keep our new outline
secure, we propose a two-layer conspire to shield the
correspondence channel against both dynamic and detached
assailants (W, 2009). To begin with, we will require all
9
The above plan ensures security for a few reasons. To start with,
there is no immediate connection between a specific bit of
individual data also, relating bit of biometric data. Second,
regardless of the possibility that an enemy is accessing the
biometric data and can discover a connection between an
individual data and a biometric data, he or she would not have
the capacity to utilize the biometric data in light of the fact that it
was hashed. With a specific end goal to keep our new outline
secure, we propose a two-layer conspire to shield the
correspondence channel against both dynamic and detached
assailants (W, 2009). To begin with, we will require all
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Running Head: System Science and Engineering
correspondence between the servers be marked with an RSA
mark. At whatever point a server gets any type of correspondence
from another, he should approve the computerized signature
marked in the message to learn if the message comes from a
substantial server. This keep the dynamic assailant from being
capable question a database server and constantly send "fake
solicitations" point that one of those solicitations coordinate with
a substantial client put away on the database server (the way he
did before). Rather, the assailant will likewise need to build a
substantial mark for each demand he creates, which will it
considerably harder for him to send fake solicitations to the serve
(that will be prepared by the server).
4.1.3 TPM
10
correspondence between the servers be marked with an RSA
mark. At whatever point a server gets any type of correspondence
from another, he should approve the computerized signature
marked in the message to learn if the message comes from a
substantial server. This keep the dynamic assailant from being
capable question a database server and constantly send "fake
solicitations" point that one of those solicitations coordinate with
a substantial client put away on the database server (the way he
did before). Rather, the assailant will likewise need to build a
substantial mark for each demand he creates, which will it
considerably harder for him to send fake solicitations to the serve
(that will be prepared by the server).
4.1.3 TPM
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running Head: System Science and Engineering
In this paper, precision is given by records assessed utilizing the
idea of blunder: this definition is ordinarily utilized as a part of
biometric frameworks. Perusers frequently befuddle this measure
of precision prepared on a standard database with the exactness
of the system. In any case, no less than a moment wellspring of
instability - (Anil Jaina, 2005)which it impacts the general
exactness ought to be considered: the vulnerability presented by
the estimation process due to, for instance, weight, dampness,
finger position, electronic commotion, quantization, and so forth.
11
In this paper, precision is given by records assessed utilizing the
idea of blunder: this definition is ordinarily utilized as a part of
biometric frameworks. Perusers frequently befuddle this measure
of precision prepared on a standard database with the exactness
of the system. In any case, no less than a moment wellspring of
instability - (Anil Jaina, 2005)which it impacts the general
exactness ought to be considered: the vulnerability presented by
the estimation process due to, for instance, weight, dampness,
finger position, electronic commotion, quantization, and so forth.
11

Running Head: System Science and Engineering
12
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 28

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.