Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.

Slides:



Advertisements
Similar presentations
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Beach Park Schools Beach Park, Illinois Introduces.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
PALM VEIN TECHNOLOGY.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Closer Look at Fingerprints
8 th Grade Forensic Science A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Fingerprint Sensor Market Demands
Multimodal Biometric Security
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
A Closer Look at Fingerprints
A Closer Look at Fingerprints
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
Presentation transcript:

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265

Agenda Why Biometrics? Fingerprint Patterns Advanced Minutiae Based Algorithm Identification vs. Authentication Security Applications Versus other Biometric Technologies Industry

Why Biometrics?

KnowPassword, PIN HaveKey, Smart Card AreFingerprint, Face, Iris Biometrics is a security solution based on something you know, have, and are:

Why Biometrics? Passwords are not reliable. –Too many –Can be stolen –Forgotten Protect Sensitive Information –Banking –Medical

Why Biometrics? Has been used since 14 th century in China –Reliable and trusted Will never leave at home Fingerprints are unique –Everyone is born with one 80% of public has biometric recorded

Fingerprint Patterns

6 classes of patterns

Fingerprint Patterns Minutiae –Crossover: two ridges cross each other –Core: center –Bifurcation: ridge separates –Ridge ending: end point –Island: small ridge b/w 2 spaces –Delta: space between ridges –Pore: human pore

Fingerprint Patterns

Two main technologies used to capture image of the fingerprint –Optical – use light refracted through a prism –Capacitive-based – detect voltage changes in skin between ridges and valleys

Advanced Minutiae Based Algorithm (AMBA)

Advanced Minutiae Based Algo Advanced Minutiae Based Algorithm –Developed by Suprema Solutions –Two processes Feature Extractor Matcher

Advanced Minutiae Based Algorithm

Advanced Minutiae Based Algo Feature Extractor –Core of fingerprint technology –Capture and enhance image –Remove noise by using noise reduction algorithm –Processes image and determines minutiae Most common are ridge endings and points of bifurcation minutia

Advanced Minutiae Based Algo Feature Extractor –Capture Image –Enhance Ridge –Extract Minutiae

Advanced Minutiae Based Algo Feature Extractor –Most frequently used minutiae in applications Points of bifurcation Ridge endings

Advanced Minutiae Based Algo Feature Extractor –Minutiae Coordinate and Angle are calculated –Core is used as center of reference (0,0)

Advanced Minutiae Based Algo Matcher –Used to match fingerprint –Trade-off between speed and performance –Group minutiae and categorize by type Large number of certain type can result in faster searches

Identification vs. Authentication Identification – Who are you? –1 : N comparison –Slower –Scan all templates in database Authentication – Are you John Smith? –1 : 1 comparison –Faster –Scan one template

Security Accuracy –97% will return correct results –100% deny intruders Image –Minutiae is retrieved and template created Encrypted data –Image is discarded Cannot reconstruct the fingerprint from data

Security Several sensors to detect fake fingerprints –Cannot steal from previous user Latent print residue (will be ignored) –Cannot use cut off finger Temperature Pulse Heartbeat sensors Blood flow

Applications

Versus other Biometric Technologies TechnologyAccuracyConvenienceCostSize Fingerprint5544 Voice1555 Face2343 Hand3322 Iris (worst) – 5 (best)

Versus other Biometric Technologies

Industry Hot market Lots of $$$

Conclusion Want to protect information Passwords are not reliable; forget Fingerprints have been used for centuries Fingerprints are unique; can verify Very accurate Lots of applications being developed Hot market. Lots of $$$

Biometrics: Fingerprint Technology THE END!