“Fingerprint Recognition based on Silicon Chips”.

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
A Portable Device for Optical Recognition of Braille Iain Murray Curtin University of Technology.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Fingerprint Sensing Techniques, Devices and Applications
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Development of Fingerprint and Iris Authentication Systems in Thailand Dr. Sarun Sumriddetchkajorn Electro-Optics Section, NECTEC Dr. Vutipong Areekul.
Submitted by: Rahul Rastogi, CS Department.  Introduction  What is a smart card?  Better than magnetic stripe card.  Technology What’s in a card?
Introduction to Fingerprint Biometrics By Tamar Bar.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Biometrics and Authentication Shivani Kirubanandan.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
VEHICLE NUMBER PLATE RECOGNITION SYSTEM. Information and constraints Character recognition using moments. Character recognition using OCR. Signature.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authentication Approaches over Internet Jia Li
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Computing Hardware Starter.
Group #18 Biometric Padlock. The Biometric Padlock Team Jim Turner Jerry Guzolik Sasant Nuthakki Blaise Kapombe Nathan Harris.
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
CSCI-235 Micro-Computers in Science Hardware Part II.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
WELCOME.
1 Machine Vision. 2 VISION the most powerful sense.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
Unit 3 - Computer Systems. Logical vs Physical A computer system can be represented in either a logical or physical form Both are useful in understanding.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
CONTENTS:  Introduction.  Face recognition task.  Image preprocessing.  Template Extraction and Normalization.  Template Correlation with image database.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Jeopardy-CH 4 System Unit INPUT OUTPUT Storage Processing Q $100
Input Devices.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Welcome To Money pad November 23, 2018 Sample footer.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Presentation transcript:

“Fingerprint Recognition based on Silicon Chips”

Introduction The Fingerprint Recognition system is a new part of biomatrics. The Fingerprint Recognition system is a new part of biomatrics. It provides an exciting look into the future. It provides an exciting look into the future. Basically devided into two types- Basically devided into two types- Enrollment Enrollment Recognition Recognition

Enrollment Enrollment can be further organized into three steps- Enrollment can be further organized into three steps- Image Capture Image Capture Signature Extraction Signature Extraction Storage Storage

Image capture Image capture consists of obtaining an image of the fingerprint. Image capture consists of obtaining an image of the fingerprint. Typically, resolution is 500 dpi which corresponds to a pitch of 50 microns. Typically, resolution is 500 dpi which corresponds to a pitch of 50 microns. In the real world, there are some systems that use only one bit per pixel or binary fingerprint images. In the real world, there are some systems that use only one bit per pixel or binary fingerprint images.

Signature Extraction Storing of images consumes much memory. Storing of images consumes much memory. So the fingerprint image is processed in order to obtain a signature or template. So the fingerprint image is processed in order to obtain a signature or template. A template is a compressed version of fingerprint image,with losses. A template is a compressed version of fingerprint image,with losses. After passing the image through several filters only the relative coordinates of minutiae are stored which are very small in size. After passing the image through several filters only the relative coordinates of minutiae are stored which are very small in size. 30 to 40 minutiae cost around 256 bytes. 30 to 40 minutiae cost around 256 bytes.

A less compact technique from storage point of view is direrct optical correlation. Storage Once the template is obtained,it is stored for further recognition.

Recognition The Recognition Process follows the same steps as Enrollment with the addition of other. The Recognition Process follows the same steps as Enrollment with the addition of other. The process includes The process includes Image Capture Image Capture Signature Extraction Signature Extraction Matching Matching

Matching The Matching can be devided into two types The Matching can be devided into two types One to one(Verification) One to one(Verification) One to many(Identification) One to many(Identification) One to one may be a kind of one to few. One to one may be a kind of one to few. Verification takes less computing time than Identification hence vastly used in commercial application. Verification takes less computing time than Identification hence vastly used in commercial application.

Fingerprint sensing Techniques There are different techniques for sensing the fingureprints such as There are different techniques for sensing the fingureprints such as Optical Optical Ultrasound Ultrasound Silicon chip Silicon chip

Optical Scanners

Silicon sensors compared with others

Silicon:size does matter Cost is very important factor when considering biometric technology. Cost is very important factor when considering biometric technology. As far as Si is concerned lower the area lower is the price. As far as Si is concerned lower the area lower is the price. Moreover lower the area lesser is the probability of defect. Moreover lower the area lesser is the probability of defect.

Sweeping technique Unfortunately fingerprint imaging is very difficult for small Si chips. Unfortunately fingerprint imaging is very difficult for small Si chips. Hence the Sweeping technique has been devloped. Hence the Sweeping technique has been devloped. Here the user have to sweep his/her finger over a thermal rectangular array. Here the user have to sweep his/her finger over a thermal rectangular array. This method uses several lines per slice and search identical pixels between each slice. This method uses several lines per slice and search identical pixels between each slice.

Security The security may be devided into two parts The security may be devided into two parts Living security Living security Electronic security Electronic security

The system on a chip The sensor,processor,associated memory and reference storage may be planted on a single chip. The sensor,processor,associated memory and reference storage may be planted on a single chip. But the limitation is the cost. But the limitation is the cost. We can implement ciphering techniques on the sensors as in smart-cards. We can implement ciphering techniques on the sensors as in smart-cards. But it may effect the security. But it may effect the security.

Authentication We may use a smart card with the fingerprint signature reference and a device able to extract the signature. We may use a smart card with the fingerprint signature reference and a device able to extract the signature. But the processor that performs matching may be corrupted. But the processor that performs matching may be corrupted. Hence the matching software must be written on the smart-card which results uncorrupted matching. Hence the matching software must be written on the smart-card which results uncorrupted matching.

Authentication This kind of smart card may be quite universal and unusable if stolen. This kind of smart card may be quite universal and unusable if stolen. But the only limitation will be the standardization of the software. But the only limitation will be the standardization of the software. It must be able to work with any fingerprint reader and variety of signature extraction softwares. It must be able to work with any fingerprint reader and variety of signature extraction softwares.

Authentication A better system is a smart-card which performs the whole process i.e. image capture,signature extraction,matching with a single chip. A better system is a smart-card which performs the whole process i.e. image capture,signature extraction,matching with a single chip. It may overcome the standardization process but it has some limitations. It may overcome the standardization process but it has some limitations. Required CPU power. Required CPU power. Cost of the card. Cost of the card. Technical difficulties related to thickness of card Technical difficulties related to thickness of card Size of the silicon chip. Size of the silicon chip.

Conclusion Fingerprint sensing silicon chips are the future of inexpensive fingerprint imaging and help to increase security and efficiency. Fingerprint sensing silicon chips are the future of inexpensive fingerprint imaging and help to increase security and efficiency. Use of CMOS components enables further system integration and hence greater security. Use of CMOS components enables further system integration and hence greater security. High initial costs may slow the integration process but we can expect cost reductions and new possibilities with microelectronics. High initial costs may slow the integration process but we can expect cost reductions and new possibilities with microelectronics.

Thank You