A Seminar on Fingerprint Recognition in Biometrics

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

MONEY PAD THE FUTURE WALLET
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics Authentication Technology
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
WELCOME.
1 Machine Vision. 2 VISION the most powerful sense.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Fingerprint Sensor Market Demands
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Implementation of An Automatic Fingerprint Identification System
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

A Seminar on Fingerprint Recognition in Biometrics

Presentation Outlines Biometrics Method of verification Why Fingerprint Recognition? Fingerprint Recognition Systems Fingerprint Sensors Fingerprint Verification and authentication Technologies used in fingerprint recognition Applications Advantages Limitations Present and Future of Fingerprint Recognition Conclusion

Biometrics Biometrics is an advanced technology for superb security and authentication .The very term "biometric” it represent that "bio" means related to the biological study and "metric " means something, which is related to measurement. In network environment security is a crucial factor.

Method of Verification There are two methods of verification for security. Psychological Verification Verification of the organs of the human being, which will have unique identification. There are five types of verifications. These are: Fingerprint. Handprint. Face measurement. Retinal scans. DNA analysis.

Continues.. Finger print It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot.

Continues.. Handprint It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.

Continues.. Retinal scans. It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it. This energy is absorbed by the blood vessels is different in different individuals.

Continues.. Face measurement Measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database

Continues.. DNA analysis. It involves in checking the DNA pattern of a human used when physical characteristics are unrecognizable This is one Biometric that is judicially accepted. No human have identified similar DNA patterns except in twins.

Continues.. Behavioral Verification This involves in oral thing done by the individual. There are 3 types of behavioral verifications, Typing Signature Voice Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.

Continues.. Signature Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations. Voice It involves in the recognition of the voice of the individual.

Fingerprint Recognition This is a technique used to match and identify unique finger prints that might need to be stored and then accessed in a database.

Why Fingerprint Recognition? Pin's and passwords may be forgotten The fingerprints in twins are not the same. Relies on the concept that no two people have identical fingerprints. More secure. A person's fingerprint will not naturally change structure after about one year after birth

Fingerprint Recognition Systems Fingerprint Recognition System is a free tool that will recognize and verify fingerprints. Fingerprint Identification System is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.  The three main functions of fingerprint Recognition Systems are: Acquisition of fingerprints Derivation of characteristics and Matching

Fingerprint sensors Fingerprint Scanners are security systems of Biometrics. They are now used in police stations, security industries and most recently, on computers. A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a Live Scan.

2. The Ultrasonic Scanner Continues.. There are two types of fingerprint scanners: 1. The optical scanner  Optical fingerprint imaging involves capturing a digital image of the print using visible light. 2. The Ultrasonic Scanner Ultrasonic sensors make use of the principles of medical ultra sonography in order to create visual images of the fingerprint.

Verification and Authentication This refers to the automated method of verifying a match between two human fingerprints. The analysis of fingerprints for matching purposes generally are of two types 1)Patterns The three basic patterns of fingerprint ridges They are: a) Arch b) Loop c) Whorl

Continues.. Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.

Continues.. Loop: The ridges enter from one side of a finger and then exit on that same side.

Continues.. Whorl: Ridges form circularly around a central point on the finger.

The major Minutia features of fingerprint ridges are a) Ridge ending Continues.. 2)Minutia The major Minutia features of fingerprint ridges are a) Ridge ending b) Bifurcation. c) Short Ridge (Dot). The ridge ending is the point at which a ridge terminates Ridge ending.

. Bifurcation Continues.. Bifurcations are points at which a single ridge splits into two ridges. Bifurcation.

Continues.. Short ridges Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Short Ridge (Dot).

Techniques used in Fingerprint The techniques used in fingerprint recognition are: Phase based image matching Minutia score matching Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint

(i) core detection, Continues.. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match The proposed algorithm consists of the four steps (i) core detection, (ii) rotation and displacement alignment, (iii) common region extraction and (iv) fingerprint matching.

(ii) rotation and displacement alignment Continues.. (i) core detection, The core is defined as a singular point in a fingerprint image that exhibits the maximum ridge line curvature (ii) rotation and displacement alignment We need to normalize the displacement and the rotation between the registered fingerprint and the input fingerprint in order to perform the high-accuracy fingerprint matching

Continues.. (iii) Common region extraction Next step is to extract the overlapped region (intersection) of the two images we examine the n1-axis projection and the n2-axis projection of pixel values. Only the common effective image areas, with the same size are extracted (iv) Fingerprint matching We calculate the BLPOC function between the two extracted images and, and evaluate the matching score. The BLPOC function may give multiple correlation peaks due to elastic fingerprint deformation. Thus, we define the matching score between the two images as the sum of the highest two peaks of the BLPOC function.

Minute score matching A good quality fingerprint contains 25 to 80 minutiae depending on sensor resolution and finger placement on the sensor. The false minutiae are the false ridge breaks due to insufficient amount of ink and cross-connections due to over inking. It is difficult to extract reliably minutia from poor quality fingerprint impressions arising from very dry fingers and fingers mutilated by scars, scratches due to accidents, injuries.

Continues.. Minutia based fingerprint recognition consists of Thinning, Minutiae extraction, Minutiae matching and Computing matching score.

Continues.. Binarization: Binarization converts gray scale image into binary image by fixing the threshold value. The pixel values above and below the threshold are set to ‘1’ and ‘0’ respectively.

Continues.. Block Filter: The binarized image is thinned using Block Filter to reduce the thickness of all ridge lines to a single pixel width to extract minutiae points effectively. Dilation and erosion are used to thin the ridges.

Continues.. Minutiae Extraction The minutiae location and the minutiae angles are derived after minutiae extraction. The terminations which lie at the outer boundaries are not considered as minutiae points, and Crossing Number is used to locate the minutiae points in fingerprint image. Crossing Number is defined as half of the sum of differences between intensity values of two adjacent pixels. If crossing Number is 1, 2 and 3 or greater than 3 then minutiae points are classified as Termination, Normal ridge and Bifurcation respectively

Continues.. Minutiae Matching To compare the input fingerprint data with the template data Minutiae matching is used. For efficient matching process, the extracted data is stored in the matrix format. The data matrix is as follows. Number of rows: Number of minutiae points. Number of columns: 4 Column 1: Row index of each minutia point. Column 2: Column index of each minutia point. Column 3: Orientation angle of each minutia point. Column 4: Type of minutia. (A value of ‘1’ is assigned for termination, and ‘3’ is assigned for bifurcation).

Applications Fingerprint based biometrics has primarily been used to secure entry devices for building door locks and computer network access. A small number of banks use fingerprint readers for authorization at ATMs. Grocery stores are experimenting with a fingerprint scan checkout that automatically recognizes and bills a registered user’s credit card or debit account. More recent applications of finger recognition include use of fingerprints for voter registration.

Advantages It provide good security mechanism than all other security methods It never fails in security constraints. In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition systems attached to video surveillance systems are supposed to help catch them. Fairly small storage space is required for the biometric template, reducing the size of the database required.

Relatively inexpensive and offers high levels of accuracy Continues.. It is one of the most developed biometrics, with more history, research, and design. Each and every fingerprint including all the figures are unique, even identical twins have different finger prints. Sound potential for enrich use as most of the countries have existing fingerprint databases. Relatively inexpensive and offers high levels of accuracy

Limitations It needs high memory space in the back end. Collect data for security is difficult Some times fails the security with right users Any time data loose in database high effect for security mechanism. So many equipments are needed for provide this technology. It highly expensive

Present and Future of Fingerprint Recognition Today, fingerprint recognition technology is used for security purposes, to restrict assess or to protect computers.  As fingerprint recognition technology develops, it is expected that more affordable and more portable fingerprint recognition devices will become available, and finger-print recognition will be considered a safe and convenient personal identification system. Eventually, fingerprint recognition will be used to secure the safety and reliability of a variety of businesses in the industrial sector, including the personal devices and financial industry.

Conclusion Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut. Each one can be individually fooled, but the comparison makes the system more secure as a whole. Biometrics are have its own advantages and disadvantages. It high expensive but it provide good security. Money is not important than security. It is more useful for confidential maters.