BIO-METRIC BASED SPOOFING DETECTION SYSTEM BY USING EMBEDDED SYSTEM B. Chandana M.Tech Student, Dept of ECE, MRIET, Maisammaguda, Dhulapally village, Hakimpet, Medchal Mandal, Ranga Reddy district, Telangana, India. boinichandana7@gmail.com P. Yugender M.Tech, Assistant Professor, Dept of ECE, MRIET, Maisammaguda, Dhulapally village, Hakimpet, Medchal Mandal, Ranga Reddy district, Telangana, India. p.yugender @gmail.com Dr. M Narsing Yadav MS, Ph.D, HOD, Professor Dept of ECE, MRIET, Maisammaguda, Dhulapally village, Hakimpet, Medchal Mandal, Ranga Reddy district, Telangana, India. ecehod.mriet@gmail.com Abstract: In biometrics, Fingerprint is widely used in identification of individual s identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercial applications. This paper presents the brief data about fingerprint spoofing which encompasses misuse caused by the attackers. Fingerprint spoofing detection attributes to the investigation of the finger characteristics to ensure whether the finger is spoofed or live. The various spoofing types are explained and there detection techniques are introduced with three commonly used databases. Keywords: Biometrics, Fingerprint spoofing, Detection, databases. I. INTRODUCTION Biometrics technology is an automated recognition system which enables the authentication of individual based on biological and behavioral characteristics such as face,iris,gait,voice,fingerprints etc. Biometric methods are supposed to be a set of secure methods for identification and authentication of an individual as it has makeable advantages as compared with other methods. But at the same time biometric systems may be vulnerable to attacks, at each level such as biometric sensor level, data communication, database etc. These systems are not totally spoof proof. Recently, some studies summarized the possibility of spoofing recognition systems by artificial biometric samples such as fake fingerprints, artificial iris, facemask etc. Fingerprint Identification system is becoming a commonly used biometric technique with authentication, security, safety and many other vigilance system. Unlike other biometric traits such as iris, face, palm, etc., fingerprint identification is a most commonly used technique due to unique characteristics of fingerprint of every individual. This feature makes it most reliable and preferred method amongst other techniques. Due to its wide spread use, researchers have analyzed, the competitive attacks on the fingerprint identification systems including fingerprint Impersonation. What
is Impersonation?-It is a duplicate artificial fingerprint known as Spoof artifacts and is POWER SUPPLY LCD DISPLAY presented to a fingerprint sensor to fool the recognition system. Spoofing is a method of attacking biometric systems where artificial objects are presented to biometric acquisition system that imitates biological and behavioral characteristics; the EEPROM FINGER PRINT MODULE PC (MATLAB) MICRO CONTROLLER KEYS BUZZER GSM system is designed to measure. This paper focuses on USB CAMERA Fingerprint Spoofing, its types and its identification (FOR IRIS & FACE) techniques. II. HARDWARE SYSTEM Fig 1: Block diagram Micro controller: This section forms the control unit of the whole project. This section basically consists of a Microcontroller with its associated circuitry like Crystal with capacitors, Reset circuitry, Pull up resistors (if needed) and so on. The Microcontroller forms the heart of the project because it controls the devices being interfaced and communicates with the devices according to the program being written. ARM7TDMI: ARM is the abbreviation of Advanced RISC Machines, it is the name of a class of processors, and is the name of a kind technology too. The RISC instruction set, and related decode mechanism are much simpler than those of Complex Instruction Set Computer (CISC) designs. Liquid-crystal display: LCD is a flat panel display, electronic visual display that uses the light modulation properties of liquid crystals. Liquid crystals do not emit light directly. LCDs are available to display arbitrary images or fixed images which can be displayed or hidden, such as preset words, digits, and 7-segment displays as in a digital clock. In the proposed method, we present a novel softwarebased fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and nonintrusive manner, through the use of image quality assessment. Here we are interfacing camera to ARM controller. The camera will capture face image of a person and send to controller. The controller will recognize the face and iris of the particular person from the image. The finger print module will take the finger print from the person and send to controller. The controller will recognize the finger print of particular person from the data base. If they are matched then it will display the data on display unit. Otherwise it will send the message to the police or authorized one about wrong accessing. III. Board hardware system features GSM: Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service.
The network is structured into a number of discrete sections: Base Station Subsystem the base stations and their controllers explained Network and Switching Subsystem the part of the network most similar to a fixed network, sometimes just called the "core network" GPRS Core Network the optional part which allows packet-based Internet connections Operations support system (OSS) network maintenance SM was intended to be a secure wireless system. It has considered the user authentication using a preshared key and challenge-response, and over-the-air encryption. However, GSM is vulnerable to different class of attacks, each of them aiming a different part of the network. noise that buzzers made when they were electromechanical devices, operated from steppeddown AC line voltage at 50 or 60 cycles. Other sounds commonly used to indicate that a button has been pressed are a ring or a beep. The "Piezoelectric sound components" introduced herein operate on an innovative principle utilizing natural oscillation of piezoelectric ceramics. These buzzers are offered in lightweight compact sizes from the smallest diameter of 12mm to large Piezo electric sounders. Today, piezoelectric sound components are used in many ways such as home appliances, OA equipment, audio equipment telephones, etc. And they are applied widely, for example, in alarms, speakers, telephone ringers, receivers, transmitters, beep sounds, etc. Fig 3: Types of Buzzers Fingerprint module: Fig 2:GSM architecture Buzzer: A buzzer or beeper is a signaling device, usually electronic, typically used in automobiles, household appliances such as a microwave ovens, & game shows. The word "buzzer" comes from the rasping A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. FIM 30 has functions of fingerprint enrollment, identification, partial and entire deletion and reset in a single board, it does not
require connection with a separate PC, thereby offering convenient development environment. Features On-line and off-line fingerprint identification incorporated Identification rate 1:1 and 1:N; FAR: 1/100.000 y FRR: 1/1.000 Algorithm and high hardness optical sensor It provides high recognition ratio even to small size, wet, dry, calloused fingerprint. Fast acquisition of difficult finger types under virtually any condition. Memory capacity for 100 fingerprints Memory events: up to 2,000 authentications Access host can be protected by fingerprint or password It offers convenient development environment. Two communication ports: RS-232 or host ( on-line applications ) ASCII protocol Supply voltage: 5V Small size and robust durability, it has longer life span. WEBCAM: "Webcam" refers to the technology generally; the first part of the term ("web-") is often replaced with a word describing what can be viewed with the camera, such as a netcam or streetcam. Webcams are video capturing devices connected to computers or computer networks, often using USB or, if they connect to networks, Ethernet or Wi-Fi. They are well-known for low manufacturing costs and flexible applications. Video capture is the process of converting an analog video signal such as that produced by a video camera or DVD player to digital form. The resulting digital data are referred to as a digital video stream, or more often, simply video stream. This is in contrast with screen casting, in which previously digitized video is captured while displayed on a digital monitor. Webcams typically include a lens, an image sensor, and some support electronics. Various lenses are available, the most common being a plastic lens that can be screwed in and out to set the camera's focus. Fixed focus lenses, which have no provision for adjustment, are also available. Image sensors can be CMOS or CCD, the former being dominant for lowcost cameras, but CCD cameras do not necessarily outperform CMOS-based cameras in the low cost price range. Consumer webcams are usually VGA resolution with a frame rate of 30 frames per second. Higher resolutions, in mega pixels, are available and higher frame rates are starting to appear. Fig 4: Finger print module Fig 5: Webcam
The video capture process involves several processing steps. First the analog video signal is digitized by an analog-to-digital converter to produce a raw, digital data stream. In the case of composite video, the luminance and chrominance are then separated. Next, the chrominance is demodulated to produce color difference video data. At this point, the data may be modified so as to adjust brightness, contrast, saturation and hue. Finally, the data is transformed by a color space converter to generate data in conformance with any of several color space standards, such as RGB and YCbCr. Together, these steps constituted video decoding, because they "decode" an analog video format such as NTSC or PAL. Support electronics are present to read the image from the sensor and transmit it to the host computer. The camera pictured to the right, for example, uses a Sonix SN9C101 to transmit its image over USB. Some cameras - such as mobile phone cameras - use a CMOS sensor with supporting electronics. FEATURES: Smallest wireless video & audio camera Wireless transmission and reception High sensitivity Easy installation & operation Easy to conceat Light weight Low power consumption Small size SPECIFICATIONS: Output frequency: 900MHZ 1200MHZ Output power: 50mW 200mW Power supply: DC +6~12v Distance covered: 10m IV. CONCLUSION Spoofing is a substantial challenge in fingerprint recognition systems. This paper has presented different spoofing techniques along with various state-of-the-art databases. Spoofing detection and its types are also been reviewed with corresponding databases. A fingerprint spoofing related algorithm needs a potent feature extractor which extracts the salient features from input images. A lot of algorithmic work is needs to be applied for fingerprint spoofing recognition system so as to derive generalized methods that are independent of specifications, requirements and results in increased spoofing recognition rate. V. REFERENCES [1] Luca G, Valerio M, Simona T, Gian M, Fabio R.2013,University of Cagliari -Department of Electrical and Electronic Engineering Italy.LivDet2013. [2] Shahzad M, April 2012,Novel Active Sweat Pores Based Liveness Detection Techniques for Fingerprint Biometrics,Brunel University.School of Engineering and Design. [3] David Y, Luca G, Paolo D, Gian Luca M, Fabio R,2011S Schuckers,Clarkson University -Department of Electrical and Computer Engineering USA. [4] GianM, AaronT, PietroC, Fabio R,Stephanie S, DominicG, Alessandra Tand, LivDet 2009 Group. [5] Mojtaba, WamadevaB, Jan 2010Liveness and Spoofing in Fingerprint Identification Issues and Challenges, School ofengineering & DesignBrunel UniversityUxbridge, oddlesex. [6] Emanuela M, Arun R, 2014. A Survey on Anti- Spoofing Schemes for Fingerprint Recognition Systems ACMComput. Surv.47, 2, Article A,36 pages.
[7] Javier G,,Julian F,,Javier,,Raffaele C,2014,Fingerprint Anti-spoofing in Biometric Systems, Springer London. [8] Maneesh S, July 2014Detection and Prevention of Finger prin taltering /Spoofing Based on Pores (Level-3) with the Help of Multimodal Biometrics, International Journal of Science and Research (IJSR).