Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics and Sensors
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
CUBS, University at Buffalo
Good quality Fingerprint Image Minutiae Feature Extraction
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Venu Govindaraju University at Buffalo
A Framework for Feature Extraction Algorithms for Automatic Fingerprint Recognition Systems Chaohong Wu Center for Unified.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
A Systematic Approach For Feature Extraction in Fingerprint Images Sharat Chikkerur, Chaohang Wu, Venu Govindaraju
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Fingerprint Identification
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Seminar Presentation on Biometrics
Biometric technology.
Fingerprint Recognition
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
Presentation transcript:

Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur

Conventional Security Measures  Token Based  Smart cards  Swipe cards  Knowledge Based  Username/password  PIN  Disadvantages of Conventional Measures  Tokens can be lost or misused  Passwords can be forgotten  Multiple tokens and passwords difficult to manage

Biometrics  Definition  Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.  Examples  Physical Biometrics  Fingerprint  Hand Geometry  Iris patterns  Behavioral Biometrics  Handwriting  Signature  Speech  Gait

Fingerprints as biometrics  Established Science  Forensic institutions have used fingerprints to establish individual identity for over a century.  High Universality  Every person possesses the biometric  High Distinctiveness  Even identical twins have different fingerprints though they have the same DNA.  High Permanence  Fingerprints are formed in the foetal stage and remain structurally unchanged through out life.  High Acceptability  Fingerprint acquisition is non intrusive. Requires no training.

Introduction to Fingerprints Fingerprints can be classified based on the ridge flow pattern Fingerprints can be distinguished based on the ridge characteristics

Fingerprint Verification System Good quality Image Good quality Fingerprint Image Authentication Fingeprint Image Fingerprint Image Enhancement Minutiae Feature Extraction Matching methods Database Minutiae features Image Preprocessing Research at CUBS Includes Fingerprint Image Enhancement Minutiae Feature Extraction Point pattern matching

Fingerprint Image Enhancement Preprocessing Enhancement Feature Extraction Matching High contrast printTypical dry print Low contrast printTypical Wet Print

Traditional Approach Preprocessing Enhancement Feature Extraction Matching Local Ridge Spacing F(x,y) Projection Based Method Enhancement Frequency/Spatial Local Orientation (x,y) Gradient Method

Fourier Analysis Approach Preprocessing Enhancement Feature Extraction Matching FFT Analysis Energy Map E(x,y) Orientation Map O(x,y) Ridge Spacing Map F(x,y) FFT Enhancement

Fourier Analysis Fingerprint ridges can be modeled as an oriented wave Local ridge orientation Local ridge frequency

Fourier Analysis –Energy Map Preprocessing Enhancement Feature Extraction Matching Original ImageEnergy Map

Preprocessing Enhancement Feature Extraction Matching Original ImageLocal Ridge Frequency Map Fourier Analysis – Frequency Map

Preprocessing Enhancement Feature Extraction Matching Original ImageLocal Ridge Orientation Map Fourier Analysis-Orientation Map

Preprocessing Enhancement Feature Extraction Matching Original ImageEnhanced Image Fourier Domain Based Enhancement

Enhancement Results

Feature Extraction Methods Preprocessing Enhancement Feature Extraction Matching Thinning-based Method Thinning produces artifacts Shifting of Minutiae coordinates Direct Gray-Scale Extraction Method Difficult to determine location and orientation Binarized Image is noisy.

Chaincoded Ridge Following Method Preprocessing Enhancement Feature Extraction Matching

Minutiae Detection  Several points in each turn are detected as potential minutiae candidate  One of each group is selected as detected minutiae.  Minutiae Orientation is detected by considering the angle subtended by two extreme points on the ridge at the middle point. Preprocessing Enhancement Feature Extraction Matching

Pruning Detected Minutiae  Ending minutiae in the boundary of fingerprint images need to be removed with help of FFT Energy Map  Closest minutiae with similar orientation need to be removed Preprocessing Enhancement Feature Extraction Matching

 Pure localized feature  Derived from minutiae representation  Orientation invariant  Denote as (r 0, r 1, δ 0, δ 1, )  r 0, r 1 : lengths of MN 0 and MN 1  δ 0, δ 1 : relative minutiae orientation w.r.t. M  : angle of N 0 MN 1 Secondary Features Preprocessing Enhancement Feature Extraction Matching

Dynamic Tolerance Areas  Tolerance Area is dynamically decided w.r.t. the length of the leg.  Longer leg: Tolerates more distortion in length than the angle.  Shorter leg: tolerates less distortion in length than the angle. A B O Preprocessing Enhancement Feature Extraction Matching Dynamic tolerance Dynamic Windows

Feature Matching Preprocessing Enhancement Feature Extraction Matching 1.For each triangle, generate a list of candidate matching triangles 2.To recover the rotation between the prints. Find the most probable orientation difference 3.Apply the results of the pruning and match the rest of the points based on the reference points established.

OD=0.7865° Validation Preprocessing Enhancement Feature Extraction Matching 1.For each triangle, generate a list of candidate matching triangles 2.To recover the rotation between the prints. Find the most probable orientation difference 3.Apply the results of the pruning and match the rest of the points based on the reference points established.

Minutia Matching Preprocessing Enhancement Feature Extraction Matching 1.For each triangle, generate a list of candidate matching triangles 2.To recover the rotation between the prints. Find the most probable orientation difference 3.Apply the results of the pruning and match the rest of the points based on the reference points established

Data Sets Fig(a) Sensors and technology used in acquisition Fig(b) Paired fingerprintsFig(c) Database sets

Preliminary Results Min Total Error = 0.00% EER = 0.0% FRR at 0 FAR = 0.0% FAR FRR Threshold

Thank You