**5. Applications of biometric systems**

Biometric systems can be used in a large number of applications. For security reasons, biometrics can help make transactions, and everyday life is both safer and more practical. The following domains use biometric solutions to meet their respective needs:

	- Justice and law enforcement: Biometric technology and law enforcement have a very long history, and many very important innovations in identity management have emerged from this beneficial relationship. Today, the biometrics applied by the police force is truly multimodal. Fingerprint, face, and voice recognitions play a unique role in improving public safety and keeping track of the people we are looking for.
	- Border control and airport: A key area of application for biometric technology is at the border. Biometric technology helps to automate the process of border crossing. Reliable and automated passenger screening initiatives and automated SAS help to facilitate international passenger travel experience

**355**

*Biometric Systems and Their Applications DOI: http://dx.doi.org/10.5772/intechopen.84845*

safer than ever before.

• Commercial applications:

while improving the efficiency of government agencies and keeping borders

○ Healthcare: In the field of healthcare, biometrics introduces an enhanced model. Medical records are among the most valuable personal documents; doctors need to be able to access them quickly, and they need to be accurate. A lack of security and good accounting can make the difference between

○ Security: As connectivity continues to spread around the world, it is clear that old security methods are simply not strong enough to protect what is most important. Fortunately, biometric technology is more accessible than ever, ready to provide added security and convenience for everything that

○ Finance: Among the most popular applications of biometric technology, financial identification, verification, and authentication in commerce help make banking, purchasing, and account management safer and more convenient and responsible. In the financial area, biometric solutions help to ensure that a customer is the person he/she claims to be when accessing sensitive financial data by entering his/her unique biometric characteristics and comparing them to a model stored in a device or on a secure server. Banking solutions and the payment technologies available today use a wide range of biometric modalities: fingerprints, iris, voice, face, fingerprint, palm veins, behavior, and other types of biometric recognition are all used alone or combined in a multifactorial

needs to be protected, from a car door to the phone's PIN.

manner as a system, to lock accounts and serve against fraud.

○ Eye movements tracking applications:

○ Mobile: Mobile biometric solutions live at the intersection connectivity and identity. They integrate one or more biometric terms for authentication or identification purposes and take advantage of smartphones, tablets, other types of handhelds, wearable technology, and the Internet of things for versatile deployment capabilities. Thanks to the versatility brought by modern mobile technology, as well as the proliferation of mobile paradigms in the consumer, public, and private world, mobile biometrics is becoming more and more important.

1.Automotive industry: there is an established relationship between eye movement and attention. Thus, tracking the car driver's eye movements can be very helpful in measuring the degree of sleepiness, tiredness, or drowsiness. The sleepiness of the driver can be detected by analyzing either blink duration and amplitude or the level of gaze activity [3].

2.Screen navigation: one of the most important applications for people with disabilities is screen navigation. Using cameras, the application can track a person's eye movements in order to scroll a web page, write text, or perform actions by clicking on buttons on a computer or mobile devices. Therefore, this kind of application is gaining more attention recently due the rapid development and the growing need of new means of screen

navigation especially on mobile devices platforms.

timely and accurate diagnosis and health fraud.

*Visual Impairment and Blindness - What We Know and What We Have to Know*

is-falsely-considered a match, one percent of the genuine attempts would fail) it at least one million impostor attempts (user sticking perfectly to another person's template). It is not difficult to understand that the uncertainty of such an assertion would be rather high. The result depends heavily on how the two most similar samples in the database are scored. When comparing and viewing a DET (detection error trade-off) graph, it is important to understand that the uncertainty is higher on the side of the edges of the image. The number of comparisons made is only an important factor affecting confidence. The key to getting better statistical signifi-

Biometric systems can be used in a large number of applications. For security reasons, biometrics can help make transactions, and everyday life is both safer and more practical. The following domains use biometric solutions to meet their respective needs:

○ Justice and law enforcement: Biometric technology and law enforcement have a very long history, and many very important innovations in identity management have emerged from this beneficial relationship. Today, the biometrics applied by the police force is truly multimodal. Fingerprint, face, and voice recognitions play a unique role in improving public safety and keeping

○ Border control and airport: A key area of application for biometric technology is at the border. Biometric technology helps to automate the process of border crossing. Reliable and automated passenger screening initiatives and automated SAS help to facilitate international passenger travel experience

cance is to make as many uncorrelated attempts as possible.

**5. Applications of biometric systems**

track of the people we are looking for.

• Legal applications:

**Figure 5.** *DET graph sample.*

• Government applications:

**354**

while improving the efficiency of government agencies and keeping borders safer than ever before.

	- Security: As connectivity continues to spread around the world, it is clear that old security methods are simply not strong enough to protect what is most important. Fortunately, biometric technology is more accessible than ever, ready to provide added security and convenience for everything that needs to be protected, from a car door to the phone's PIN.
	- Finance: Among the most popular applications of biometric technology, financial identification, verification, and authentication in commerce help make banking, purchasing, and account management safer and more convenient and responsible. In the financial area, biometric solutions help to ensure that a customer is the person he/she claims to be when accessing sensitive financial data by entering his/her unique biometric characteristics and comparing them to a model stored in a device or on a secure server. Banking solutions and the payment technologies available today use a wide range of biometric modalities: fingerprints, iris, voice, face, fingerprint, palm veins, behavior, and other types of biometric recognition are all used alone or combined in a multifactorial manner as a system, to lock accounts and serve against fraud.
	- Mobile: Mobile biometric solutions live at the intersection connectivity and identity. They integrate one or more biometric terms for authentication or identification purposes and take advantage of smartphones, tablets, other types of handhelds, wearable technology, and the Internet of things for versatile deployment capabilities. Thanks to the versatility brought by modern mobile technology, as well as the proliferation of mobile paradigms in the consumer, public, and private world, mobile biometrics is becoming more and more important.
	- Eye movements tracking applications:
		- 1.Automotive industry: there is an established relationship between eye movement and attention. Thus, tracking the car driver's eye movements can be very helpful in measuring the degree of sleepiness, tiredness, or drowsiness. The sleepiness of the driver can be detected by analyzing either blink duration and amplitude or the level of gaze activity [3].
		- 2.Screen navigation: one of the most important applications for people with disabilities is screen navigation. Using cameras, the application can track a person's eye movements in order to scroll a web page, write text, or perform actions by clicking on buttons on a computer or mobile devices. Therefore, this kind of application is gaining more attention recently due the rapid development and the growing need of new means of screen navigation especially on mobile devices platforms.

3.Aviation: the flight simulators track the pilot eye and head movement in order to analyze the pilot's behavior under realistic circumstances. This simulator is capable of evaluating a pilot's performance based on his eye movements combined with other information. It can be also used as an important training tool for new pilots in order to help them to look at the primary flight display (PFD) more regularly in order to monitor different airplane indicators.

#### **5.1 Detection and recognition of dynamic shapes**

Detection of dynamic forms is a very important research area that is rapidly evolving in the field of image processing. The goal is to recognize the shapes of objects in an image or in a sequence of images from the information relating to their shapes. In fact, shape is one of the most differentiating features in an image. However, the description and representation of an image remain a major challenge to perform the recognition task.

The quality of a descriptor is represented by its intelligence and ability to distinguish the different forms in a reliable manner despite the geometric variations related to translation and rotation.

On the other hand, a reliable descriptor must withstand the various changes that affect the shape of an object such as noise and distortion that can actually alter the shape and make the recognition task more complicated.

### **5.2 Representation and description of planar shapes**

The form representation and description techniques can be generally split into two main classes of methods: contour-based methods and region-based methods. This ranking depends on how the shape features are extracted: from only the outline or the entire region of the shape. For each category, the different approaches are divided into global approaches and local (structural) approaches. This subclassification is based on the representation of the form that depends on the whole form or parts of the form (primitives). These approaches can also be distinguished according to the spatial or transform processing space, in which the shape characteristics are calculated. Global methods are not always robust against occlusions and image noise. In addition, they require an entire and correct segmentation of objects in the images. In general, the segmentation process results in partitioning objects into regions or contour parts that do not necessarily correspond to whole objects.

The contour-based approaches only exploit the boundary of the object for the characterization of the form by ignoring its inner content. The most commonly used representation in contour-based recognition methods is the signature of the form [4]. For a given form, the signature is essentially a representation based on the parameters 1D of the contour of shape. This can be done using a scalar value of the radial distance, angle, curvature, or velocity function. Let us note here that the signature of an entire form (closed curve) is often a periodic function; this will not be the case of a part of form (open curve) for which the two ends are not contiguous. Outline-based descriptors include Fourier descriptors [5, 6], the wavelet descriptors [7, 8], the multi-scale curvature [9], the shape context [10], the contour moments [11], and the symbol chain [12, 13]. Since these descriptors are calculated using only the pixels of the contour, the computational complexity is low, and their characteristic vectors are generally compact.

In region-based approaches, all pixels of the object are considered for characterization of the shape. This type of methods aims to exploit not only the information of the shape boundary but also that of the inner region of the form. The majority of

**357**

**Author details**

Souhail Guennouni1

**Conflict of interest**

provided the original work is properly cited.

\*, Anass Mansouri<sup>2</sup>

We have no conflicts of interest to disclose.

Sciences, Sidi Mohammed Ben Abdellah University, Fez, Morocco

\*Address all correspondence to: mrsouhail@gmail.com

*Biometric Systems and Their Applications DOI: http://dx.doi.org/10.5772/intechopen.84845*

trial world as well as their performances.

were discussed in the last paragraph.

mentation of such systems.

considerable.

**6. Conclusion**

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,

1 Renewable Energy and Smart Systems Laboratory, Faculty of Science and Technology, Sidi Mohammed Ben Abdellah University, Fez, Morocco

2 Renewable Energy and Smart Systems Laboratory, National School of Applied

region-based methods use moment descriptors to describe shapes such as Zernike moments [14], Legendre moments [15], or invariant geometric moments [16]. Other methods include grid descriptors [17] or shape matrix [18]. Since the regionbased descriptor makes use of all the pixels constituting the shape, it can effectively describe various forms in a single descriptor. However, the size of the region-based features is usually large. This descriptor leads to a computing time that remains

It remains to emphasize that the description of the forms based on the contour is considered more relevant than that based on the region because the shape of an object is essentially distinguished by the border. In most cases, the central part of

In this chapter, we presented different biometric techniques used in the indus-

After that, we presented a performance evaluation of different biometric systems given the issues and challenges previously stated. Then we presented an overview of some important biometric elements such as the databases and the degree of confidence. Furthermore, a detailed analysis of different domains of application of several biometric techniques was presented with a focus on eye movement tracking techniques.

Finally, the different approaches of recognition of dynamic and planar shapes

We started with an overview of biometric systems as well as an overview of biometrics. Then we presented the different issues and challenges related to imple-

the object does not contribute much to pattern recognition [13].

and Ali Ahaitouf<sup>1</sup>

#### *Biometric Systems and Their Applications DOI: http://dx.doi.org/10.5772/intechopen.84845*

region-based methods use moment descriptors to describe shapes such as Zernike moments [14], Legendre moments [15], or invariant geometric moments [16]. Other methods include grid descriptors [17] or shape matrix [18]. Since the regionbased descriptor makes use of all the pixels constituting the shape, it can effectively describe various forms in a single descriptor. However, the size of the region-based features is usually large. This descriptor leads to a computing time that remains considerable.

It remains to emphasize that the description of the forms based on the contour is considered more relevant than that based on the region because the shape of an object is essentially distinguished by the border. In most cases, the central part of the object does not contribute much to pattern recognition [13].
