February 22, 20051 Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Fingerprint Sensing Techniques, Devices and Applications
CASS TECHNOLOGY SDN BHD ( X) THE LEADING INNOVATOR OF SECURITY SYSTEM TOTAL SECURITY SOLUTION PRESENTS InnerScan Fingerprint Security Access Control.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Fingerprint Identification -FBI carries 198 million fingerprints on record -Used for unique identification of a person -First gained credibility when.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION.
Introduction to Biometric Systems
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
Speaker Recognition By Afshan Hina.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Authentication: Overview
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Information about Biometrics and its security By Ridham Bhatt.
“Fingerprint Recognition based on Silicon Chips”.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Biometrics Security in Banking Systems Image processing in ATM
Fingerprint Sensor Market Demands
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Computer Security Authentication
BY: Michael Etse and Maverick Fermill
Presentation transcript:

February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett

February 22, Overview Introduction to Biometrics: Fingerprints Often Used Definitions Different Fingerprint Scanners Analysis of Fingerprints Algorithms Simple Program Conclusion

February 22, Basics Used for authentication on keyboards, mice, smart cards, and cellular phones (“Biometric”) Advantages include: no need for password memorization, less passwords (if any) saves time even if the passwords are strong, fingerprints are unique, and scanners are usually small in size Disadvantages include: Unlike passwords, you can not change fingerprint easily, the print can change with age, dirt and oil make for a non-perfect print, false fingerprints can be created that can allow attackers to attack systems Despite the advantages, I believe the disadvantages of biometrics can be outweighed by using more smart cards, encryption and less passwords.

February 22, Often Used Definitions  Ridge – tips of the fingerprint  Valley – concave part of a fingerprint between ridges  Bifurcation – a ridge that divides into two ridges  Minutiae – the features of a fingerprint (ex. bifurcations)  Template – mathematical formulas for fingerprints  False Accept Rate (FAR) – accepts a non-match  False Reject Rate (FRR) – rejects a match

February 22, Different Fingerprint Scanners One estimate of fingerprint scanners is 59.4% market share of all biometric security technology (“Prepared”). Typically, a scanner has a size of 500 pixels x 500 pixels and saved in grayscale format. (“Enhancing”) Optical - Light-emitted diodes known as a CCD (charge coupled device) create the electrical signal and stores the pixels. Light photons react making an electrical signal gives you the image with darker meaning ridges of the fingerprint. It will take another scan if the image is poor (lighting) and will adjust the exposure time. The sharpness of the image (also called the definition) will check for a good print by comparing horizontal and vertical lines and then saves the file. (“Fingerprint”)

February 22, Different Fingerprint Scanners… Capacitance – In this type of scanner, electrical current is used to store the fingerprint. Each cell of a semiconductor chip has three conductor plates (one is the finger – 50um), an insulator layer and an amplifier. The conductors make a charge. The distance between the plates change the capacitance (ridge creates > capacity). (“Fingerprint”) + semiconductors are usually smaller scanner than optical - must use a grounding grid because of electrostatic discharge allowing for > 15kV

February 22, Different Fingerprint Scanners… Ultrasound Refraction – Sends short acoustic signals and receives the echo sound. +Dirt and oil is not a factor for capturing the image - Larger than others and more $ Temperature Differential – Current is created on pyro- electric material. The touch of the ridges make different temperature differential from the valleys. Piezoelectric Effect – Non-conducting dielectric material creates a variable current due to pressure. (“Fingerprint”) - not as sensitive

February 22, Analysis There are several varieties of fingerprints that can be placed into different categories based on the ridges. Galton-Henry classification claim that 95% of the prints are arch, tented arch, right loop, left loop, and whorl. (“Towards”) Although identical twins appear the same in appearance, the fingerprints are different.

February 22, Fingerprint Algorithms Much like there is no one cryptographic algorithm, there are many different algorithms to identify a match. Some are much better than others. There are algorithm challenges to improve the use of Fingerprint Scanners. An example is FVC2002 (Fingerprint Verification Competition) (Biometric). Several considerations: Horizontal Positioning Vertical Positioning Rotation Other consideration is relative measures of the print.

February 22, Simple Fingerprint Program The end of the presentation will show a quick program I created to demonstrate some of the difficulties in creating an algorithm. The program includes: –Console program –A 10 X 10 matrix to represent a scanner –A fingerprint template to be compared to another –Bifurcations are points to identify uniqueness of the fingerprint

February 22, Possible Bifurcations (ridges)

February 22, Program continued… The program does not check for shift in horizontal, vertical, or rotation. Although primitive, the algorithm template can relatively match two prints and giving a basic idea of how one could create an fingerprint algorithm.

February 22, Program Images

February 22, Copyright © 2005 Neurotechnologija, Ltd.

February 22, Thoughts Benchmarking (Testing) – see how the device will work given the same templates and use thousands of prints in the same database Having a person’s fingerprint is having a person’s identification. Therefore, it is probably not wise to have more than one biometric security method. (ex. Facial, Iris or Hand Scan). Instead, a password or other methods can be used. An identification card (a token), smart cards, and/or ID number can help to prove real identity. (Fingerprint)

February 22, References “Biometric systems based on capacitive sensing technology.” TechNews, May “ D=248” “Economist: Prepare to be scanned.” Volume 369, Issue December 6, Academic Search Premier. Harris, Tom. “How Fingerprint Scanners Work.” “

February 22, References Rathy, Connell, Bolle. “Enhancing Securing and Privacy in Biometrics- Based Authentication Systems.” IBM Systems Journal, Volume 40, Issue 3, Ross, Arun and Jain, Anil. “Biometric Sensor Interoperability: A Case Study In Fingerprints.” Proc. Of Int. ECCV Workshop on Biometric Authentication (BioAW), LNCS,Volume 3087, pp May “VeriFinger 4.2: Screen Image.” Neurotechnologija, Ltd, “