Biometric devices are a general term that includes many technologies, including the common fingerprints and faces, as well as uncommon gait, voice, and so on. Now let us check the types of biometric device
Contact biometric devices
Reconnaissance d'empreintes digitales
Fingerprint recognition uses the characteristic data of human fingertips to distinguish and identify. Fingerprint recognition is a relatively mature technology among many biometric technologies and is also the most widely used technology;
Scanner optique d'empreintes digitales
The optical fingerprint scanner forms an image by taking a photo of the fingerprint through an optical sensor;
Scanner d'empreintes digitales capacitif
The capacitive fingerprint sensor forms a command by pressing the capacitive sensor and the voltage value generated by the fingertips of the two capacitive sensors;
Whether it is an optical fingerprint device or a capacitive fingerprint device, you need to pay attention to two points: fingerprint image and fingerprint features;
Fingerprint image:
The original image extracted from the fingerprint scanner device without processing is called a fingerprint image. This image is not processed and carries a large amount of data;
Three parameters need to be paid attention to in the fingerprint image, namely image size, image resolution and image grayscale;
In the fingerprint scanner, different fingerprint sizes are different, and the corresponding image resolution and image grayscale are also different;
The following lists the size, image resolution and image grayscale required from FAP10-FAP60
FAP10 | FAP20 | FAP30 | FAP40 | FAP45 | FAP50 | FAP60 | |
Résolution de l'image | 256*360 | 300*400 | 400*500 | 800*750 | 800*750 | 1600*1000 | 1600*1500 |
Image grayscale | 8 bit | 8 bit | 8 bit | 8 bit | 8 bit | 8 bit | 8 bit |
Fingerprint features:
Fingerprint features refer to a data file of a string of fingerprint features generated by a feature extraction algorithm after an unprocessed fingerprint image is processed by an algorithm. This data file can be used to generate a fingerprint template;
Fingerprint images can be processed to generate fingerprint features, but fingerprint features cannot be restored to fingerprint images;
How do fingerprint scanner work?
Fingerprint registration:
Fingerprint registration is also called fingerprint registration. Fingerprint registration requires extracting features from fingerprint images to form feature value templates, and then binding these feature value templates with the user’s personal information;
Fingerprint verification:
Fingerprint verification determines whether the user’s information is consistent with the fingerprint feature template stored in the database. It is a 1:1 comparison technology. This process is used to determine whether you are you;
Fingerprint identification:
Fingerprint identification is a 1:N process. The fingerprint collected on site is searched in a huge database to see if it is the same database as the fingerprint collected on site. This process is used to determine who you are;
Fingerprint Recognition Pro & Cons
Stability:
Everyone’s fingerprints are fixed since birth. Although the fingerprint lines will only increase with age, the type, structure, and detailed features of the fingerprint will not change.
Uniqueness:
The generation of fingerprints is determined by each person’s DNA, because fingerprints are unique;
Wear:
For those who often do manual work, fingerprints are seriously worn. It affects both identification and verification;
Hygiene:
Fingerprint recognition is a contact recognition, which is prone to cross-hygiene infection;
Application
- Police Department
- Presidential Election
- Border Identification
Signature Recognition
Signature recognition has been updated from traditional paper signatures to using a stylus to sign your name on an electronic screen;
Signature recognition determines whether your name is yours by the weight of your pen strokes, handwriting, and stroke weight;
The naked eye cannot distinguish the weight of the strokes, pen strokes, but the electronic screen can sense the changes in your handwriting.
This is why traditional paper signatures are easy to imitate, but electronic signatures cannot be imitated;
Pros&Cons
- Commodité:
Electronic signatures speed up the signing and verification process, and there is no need to pass paper documents back and forth;
- Anti-counterfeiting:
Electronic signatures are mainly used to verify personal identity information. Before using electronic signatures, cryptography and digital certificates are already compatible, and the anti-counterfeiting level is high;
- Commodité:
Electronic signatures speed up the signing and verification process, and there is no need to pass paper documents back and forth;
- Anti-counterfeiting:
Electronic signatures are mainly used to verify personal identity information. Before using electronic signatures, cryptography and digital certificates are already compatible, and the anti-counterfeiting level is high;
- Hardware:
Signature recognition mainly uses products with special professional signature screen functions;
- Network:
Signature recognition requires the use of information from the database for comparison. In the absence of a network environment, the overall recognition process will not be smooth;
Application:
- Financial industry:
- Legal industry
Gait behavior
Gait behavior determines your relevant information by obtaining footprints; gait information includes body posture, walking speed, walking amplitude and frequency, etc.
For example, for people who use their left shoulder for a long time, the spine will tilt to the left, and the gravity of the left foot will be higher than that of the right foot;
The gait data of people with prosthetic limbs will be different from that of ordinary people;
Contactless biometric devices
Facial recognition terminals
Face recognition is a technology that identifies facial information. It uses a camera to obtain images or video streams of faces, and uses face recognition algorithms to analyze and store the acquired information. It is mainly used in smart security, personnel screening, etc.
How do face recognition work
The main processes of face recognition work include: face collection and inspection, image processing, image feature extraction, image matching and recognition;
- Face collection:
Collect the user’s face information in different states through the camera, such as different expressions, dynamic and static effects, different positions, different clothes, etc.;
The main factors affecting the face image are
Image size, image resolution, lighting environment, blur, occlusion, collection angle
- Image processing
Mark the face information in the image and find useful data, such as expression, position, eyebrow size, etc.
- Extraction de caractéristiques:
Based on the useful information marked in image processing, the facial algorithm is used to export the image feature template for the final step of matching and comparison;
- Matching and comparison:
Matching is to compare the collected information with the information in the database to find the user information of this feature value, which is a 1:N match;
Comparison is to compare the data collected on site with the user information stored in the database to determine whether the two information are consistent, which is a 1:1 comparison.
Pros & Cons:
- Non-contact:
Face recognition is a non-contact recognition technology, and there is no risk of health infection;
- Fast recognition speed:
Face recognition can be completed in a few seconds, and the recognition speed is very fast;
- External environment:
Face recognition is greatly affected by external factors, and the surrounding light, installation angle, etc. will affect the recognition effect
- Privacy data:
The data collected by face recognition involves personal sensitive information, which needs to be considered for users who care about user privacy
Application:
- Access control application:
- Smart security:
IRIS Recognition:
Iris recognition uses a camera to obtain an iris image, and then uses an iris algorithm to analyze the collected image to form an iris feature template. Subsequent registration and comparison can be done by calling this iris feature template in a timely manner.
How do iris recognitioon work?
- Collect images; collect iris images through the camera;
- Locate the iris: locate the position of the iris in the unprocessed image and mark the iris data;
- Feature template: apply the iris algorithm to the marked iris data to generate a unique iris feature template;
- Compare: compare and verify the generated iris feature template in the database;
Pros & Cons:
- High accuracy:
Compared with face recognition, the accuracy of iris recognition is much higher, and it is not affected by the external environment;
- Prix:
The more accurate the equipment, the more expensive the technology level and price;
Application:
- Hospital operating room:
- Mine
Fingerprint Vein Recognition;
Finger vein recognition is a type of vein recognition. It uses a camera to obtain an image of the finger vein, and then uses an algorithm to extract features from the image to form a feature template for comparison. However, the use of finger vein recognition is relatively rare at present.
How do fingerprint veins work;
Since the use of finger veins has gradually become less and less, you only need four steps: image acquisition, image preprocessing, generating feature templates, and comparison and recognition;
Pros & Cons
- Liveness recognition:
The image features of human finger veins obtained by finger vein detection must be detected live;
- Prix:
Due to technical issues, the price of finger vein scanning is not yet suitable for the market;
Palm print scanners
Palmprint recognition is different from palm vein recognition. After introducing palmprint recognition, you can continue to understand the concept of palm vein recognition; Palmprint recognition is to extract palmprint feature information (lines visible to the naked eye), extract feature points through algorithms, and generate feature images.
How do palm print scanner work?
The basic process of palmprint recognition is divided into: palmprint image acquisition, image preprocessing, feature template generation, comparison and matching;
Pros & Cons:
- Non-contact:
Palmprint recognition is a non-contact technology that can be matched with a wave of the hand
- External factors:
Palmprint recognition is easily affected by stains, occlusions, etc., and cannot fully extract information
Palm Vein Scanner
Palm vein analysis is done by extracting vein feature information (blood flow signals in the palm), extracting feature points through algorithms, and generating feature images.
How do palm print scanner work?
The basic process of palm vein recognition is divided into: vein image acquisition, image preprocessing, feature template generation, comparison and matching;
In image preprocessing, a specific image processing method ROI extraction algorithm will be used.
Pros & Cons:
- Fast speed:
Palm vein can complete identification and registration in 1 second
- High price:
Palm vein market is currently a blue ocean market, and the entry of technical level requires a threshold, and the overall price will be expensive
Application:
- Payment
- Access control identification
Multimodal Biometric devices
the last types of biometric device is Multimodal
Multimodal recognition means that two or more biometrics can be used together to complete multiple authentications;
On hardware devices, it can be compatible with handheld terminal devices and access control terminals;
You can refer to the following table for selection
Module | Face | Fingerprint | Veine de la paume | Iris | Digital Signature |
√ | √ | √ | √ | √ | |
√ | √ | ||||
√ | √ | ||||
√ | √ | ||||
√ | √ |
Multimodal biometric devices refer to the combination of the above types. In the process of identification and registration, two or more algorithm processes are required.
It can be divided into multimodal handheld biometric terminal devices and multimodal access control identification devices;
The former is mainly used for personal information authentication, and the latter is mainly used for smart security and permission access;
Summary:
Understanding different types of biometrics will help you make better decisions in your business; choosing the right type can improve your economic price, safe registration, and enhance your competitiveness in the market.
HFSECURITY can fully provide the above biometric types to meet your different needs