FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Similar documents
Available online at ScienceDirect. Procedia Computer Science 58 (2015 )

Minutiae Based Fingerprint Authentication System

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

TOPIC : FINGERPRINT RECOGNITION

Encryption of Text Using Fingerprints

Touchless Fingerprint recognition using MATLAB

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Finger Print Enhancement Using Minutiae Based Algorithm

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

The Design of Fingerprint Biometric Authentication on Smart Card for

Polar Harmonic Transform for Fingerprint Recognition

Fusion of Iris and Retina Using Rank-Level Fusion Approach

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Implementation of Fingerprint Matching Algorithm

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

International Journal of Advanced Research in Computer Science and Software Engineering

Biometric quality for error suppression

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CHAPTER 6 RESULTS AND DISCUSSIONS

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Fingerprint verification by decision-level fusion of optical and capacitive sensors

Biometric Security Roles & Resources

Iris Recognition for Eyelash Detection Using Gabor Filter

A Novel Approach to Improve the Biometric Security using Liveness Detection

Multimodal Biometric Authentication using Face and Fingerprint

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

A Multimodal Biometric Identification System Using Finger Knuckle Print and Iris

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

Development of Biometrics technology in multimode fusion data in various levels

Understanding Fingerprint Biometrics

User Identification by Hierarchical Fingerprint and Palmprint Matching

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

Biometrics Our Past, Present, and Future Identity

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Fingerprint Recognition

Fusion of Hand Geometry and Palmprint Biometrics

Chapter 6. Multibiometrics

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

An Overview of Biometric Image Processing

Biometrics- Fingerprint Recognition

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES

Exploring Similarity Measures for Biometric Databases

Fingerprint Recognition using Fuzzy based image Enhancement

Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System

BIOMETRIC TECHNOLOGY: A REVIEW

A SURVEY ON FINGERPRINT RECOGNITION TECHNIQUES

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

An introduction on several biometric modalities. Yuning Xu

BIOMETRIC PRINTER SECURITY SYSTEM

Biometrics: The Password You ll Never Forget

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Biometrics Technology: Multi-modal (Part 2)

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Online Signature Verification Technique

Authentication: Beyond Passwords

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

6. Multimodal Biometrics

FVC2004: Third Fingerprint Verification Competition

Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering

A Survey on Fusion Techniques for Multimodal Biometric Identification

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

Biometric Cryptosystems: for User Authentication

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Multimodal Biometric System:- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Biometrics Hybrid System Based Verification

Fingerprint Deformation Models Using Minutiae Locations and Orientations

Comparison of ROC-based and likelihood methods for fingerprint verification

Highly Secure Authentication Scheme: A Review

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

Role of Biometrics in Cybersecurity. Sam Youness

Implementation of Multibiometric System Using Iris and Thumb Recognition

Verifying Fingerprint Match by Local Correlation Methods

Interim Report Fingerprint Authentication in an Embedded System

Feature-level Fusion for Effective Palmprint Authentication

Multimodal Biometric System in Secure e- Transaction in Smart Phone

Current Practices in Information Fusion for Multimodal Biometrics

Fingerprint Retrieval Based on Database Clustering

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

Local Correlation-based Fingerprint Matching

1.1 Performances of a Biometric System

FC-QIA: Fingerprint-Classification based Quick Identification Algorithm

Human Identification Using Biometry

CAS Sign On for Windows

Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction

Transcription:

International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION KAWADE SONAM P 1 & V. S. UBALE 2 M.E. Student, Electronics Dept., AVCOE, Sangamner, Ahmednagar, Maharashtra, India Assistant Professor, Electronics Dept., AVCOE, Sangamner, Ahmednagar, Maharashtra, India ABSTRACT Fingerprint Recognition is the reliable, most important and useful biometric technique used for person identification and verification. It uses ridge patterns on fingers which uniquely identify people. Fingerprint Recognition is possibly the most sophisticated method of all biometric techniques for authentication in High Security Systems. Even features such as persons gait, face or signature may change with passage of time and may be fabricated or imitated. However a fingerprint is completely unique to an individual and stayed unchanged for lifetime. KEYWORDS: Fingerprint Recognition, Hybrid Fusion, Serial Fusion, Parallel Fusion, High Security Systems INTRODUCTION Fingerprint Recognition Process In Fingerprint recognition technology, a sensor captures the fingerprint image and then pre-processing of image takes place. After that, image is thinned and its minutiae are extracted. This is compared with the Fingerprint images already stored in the database. Also they are matched using some matching algorithm. If the captured Fingerprint image is matched with Fingerprint image in the database, then Fingerprint image is successfully identified. Figure 1: Fingerprint Recognition Process Among all biometric techniques such as Speech recognition, Signature recognition, Iris Recognition etc., Fingerprint Recognition is most secure and accurate, because we have ten fingerprints as opposed to one voice, one face or two eyes. Each and every one of our ten fingerprints is unique, different from one another and from those of every other person; even identical twins have unique fingerprints. MAIN BODY OF THE PAPER Fingerprint Recognition In Fingerprint Recognition, Ridge patterns on fingers uniquely identify people. There are three major features of Fingerprints: arch, loop, whorl. Each fingerprint has at least one of the major features and many small features.

156 Kawade Sonam P & V. S. Ubale Features of Fingerprints Arch Figure 2: Features of Fingerprints finger. The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the Loop The ridges enter from one side of a finger, form a curve, and then exit on that same side. Whorl Ridges form circularly around a central point on the finger. Classification of Features of Fingerprints Large volumes of fingerprints are being collected in everyday applications. To reduce the search time and computational complexity, classification is necessary. It allows matching of fingerprints to only a subset of those in the database. Numerous algorithms have been developed in this direction. Sensors Used for Image Acquisition

Fingerprint Recognition for High Security Systems Authentication 157 Figure 3: Sensors Used for Image Acquisition Optical Sensor It is the oldest, most widely used technology in which finger is placed on a coated hard plastic plate. Sensor captures image and charged coupled device (CCD) converts the image of the fingerprint, with dark ridges and light valleys, into a digital signal. It having the advantage that it is fairly inexpensive but it is less accurate. Silicon Based Capacitive Sensor Most technology based on DC Capacitance, but some also use AC Capacitance. The silicon sensor acts as one plate of a capacitor, and the finger is the other. The capacitance between the sensing plate and the finger is converted into an 8-bit grayscale digital image. They provides good resolution for the image, hence better image quality, with less surface area, hence cost is low. But, with the reduction in sensor size, careful enrolment and verification problem arises. Ultrasound Sensor This is the most accurate of the fingerprint technologies. It uses transmitted ultrasound waves and measures the distance based on the impedance of the finger, the plate, and air. They are capable of penetrating dirt and residue on the sensing plate and the finger. The quality of the image depends to a great extent on the contact between the finger and the sensor plate which could also be quite hot. Thermal Sensor This sensor is based on Pyro-electric material, which measures the temperature differential between the sensor pixels that are in contact with the ridges and those under the valleys, that are not in contact. This material is able to convert a difference in temperature into a specific voltage. It functions as well in extreme temperature conditions, but image disappears quickly.

158 Kawade Sonam P & V. S. Ubale Fingerprint Pre-Processing a) Original b) Orientation c) Binarised d) Thinned e) Minutiae f) Minutia Graph Figure 4: Fingerprint Pre-Processing Fingerprint Recognition in High Security Systems In high security systems such as ATM, Access control of nuclear power stations, an extremely low false accept rate (FAR) and as low as possible false reject rate (FRR) are desired at the same time, this is called as Double Low problem. Even a fingerprint system with very low equal error rate (EER) cannot achieve such a Double Low goal. Also it is difficult to solve this problem only by improving the performance of individual fingerprint identification algorithm. Hence, a Hybrid Fusion Method of fingerprint identification is proposed to solve Double Low problem. A system with low EER might have a bad performance in high security systems for its FRR will rise acutely when its FAR becomes very low. Hybrid Fusion Method Figure 5: Framework of Hybrid Fusion Method

Fingerprint Recognition for High Security Systems Authentication 159 Hybrid Fusion Method consists of Serial and Parallel Fusion Strategy. Serial Fusion Strategy Minutiae features are extracted after a query fingerprint image is acquired. Minutiae-Based Matching Algorithm It is used to match the query fingerprint with all fingerprints in the template database. In this, multiple matching scores are acquired. Then, Maximum matching score S1 is compared with a threshold T1. Identification is successful if the maximum score S1 is higher than T1, i.e. S1>=T1. Figure 6: Framework of Minutiae-Based Matching Algorithm Otherwise, means if S1<T1, then Ridge-Based Matching Algorithm In the same way, identification is successful if the maximum matching score S2 is higher than another threshold T2, i.e. S2>=T2. Query Fingerprint Template Fingerprint Pre-processing Pre-processing Clear_up Clear_up Dispersing Substructure Substructure Dispersing Substructure Matching Initial Substructure Pair Initial Ridge Pair Ridge Matching Match Score Otherwise, means if S2<T2, then Figure 7: Framework of Ridge-Based Matching Algorithm

160 Kawade Sonam P & V. S. Ubale PARALLEL FUSION STRATEGY Rank-Level Fusion Results of identification are obtained according to the Rule of rank-level fusion. Fingerprint identification system typically outputs a ranking or a candidate list instead of a match score or a Boolean value. So, the rank 1 template fingerprint is more similar with the query fingerprint than the rank 2 template fingerprint, and so on. The goal of rank-level fusion method is to combine ranks assigned by various fingerprint matchers to derive an integrative rank for each identity.there are three rules usually used to combine ranks assigned by different matchers: Highest Rank rule, Borda Count Rule, and Logistic Regression Rule. They are unsuitable for high security systems because the demand of Double Low is very strict; hence, Double Highest Rank Fusion Rule is used. Double Highest Rank Fusion Rule The query fingerprint is regarded to be successfully identified only when its identities corresponding with the highest rank of different matchers are same. Analysis Two fingerprint databases have selected, namely, FVC2002DB1 and FVC2002DB2. In each selected fingerprint database, there are one hundred fingers and eight hundred fingerprint images, and every finger corresponds to eight fingerprint images. One image of each finger to constitute the template database and the other seven images to constitute the query database for above two databases have selected. Five Methods are Used for Experiment Two individual methods: Minutiae-Based Matching Algorithm Ridge-Based Matching Algorithm Each Known as Individual Method 1 and 2 Respectively. Two fusion methods: Serial Fusion Method Parallel Fusion Method Each Known as Fusion Method 1 and 2 Respectively. Hybrid Fusion Method For the sake of comparing the performance of above five methods, a certain reference value of FAR must be fixed above all. Zero FAR is selected. Table 1: The Performance of Five Methods

Fingerprint Recognition for High Security Systems Authentication 161 Figure 8: The Performance of Five Methods As shown in Table 2.3, using the individual method 1 and 2, 19.1%, 51.8% fingerprints are falsely rejected at zero FAR on the average on FVC2002DB1 and FVC2002DB2, respectively. Using the fusion method 1 and 2, 14.8%, 9.4% fingerprints are falsely rejected at zero FAR respectively. Using the hybrid fusion method, only 6.6% fingerprints are falsely rejected at zero FAR. CONCLUSIONS Double Low problem and its characteristics are analyzed. Hybrid fusion method is proposed and its implementation is described. Experimental results indicate that hybrid fusion method has better performance than existed methods and it can solve Double Low problem to some degree. Also it can be used as a framework to fuse different biometrics to achieve Double Low goal. It has considerable value for high security applications in biometrics field. Future Scope To fuse more different fingerprint algorithms with the proposed hybrid fusion method to solve the Double Low problem more thoroughly for fingerprint identification. To try the proposed hybrid fusion method with different biometrics for high security applications. Applications Banking Security - ATM security, card transaction Physical Access Control (e.g. Airport) Information System Security National ID Systems Passport control Prisoner, prison visitors Voting Identification of Criminals Secure E-Commerce

162 Kawade Sonam P & V. S. Ubale REFERENCES 1. Yilong Yin, Yanbin Ning and Zhiguo Yang, A HYBRID FUSION METHOD OF FINGERPRINT IDENTIFICATION FOR HIGH SECURITY APPLICATIONS, Proceedings of 2010 IEEE 17th International Conference on Image Processing, September 26-29, 2010, Hong Kong. Page No. 3101-3104. 2. Le Hoang Thai and Ha Nhat Tam, Fingerprint recognition using standardized fingerprint model, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May 2010, Page No. 11-17. 3. www.cedar.buffalo.edu/~govind/cse717/presentations/fingerprintsoverview.ppt 4. www.ii.uib.no/~matthew/ic30203pt3.2.ppt 5. http://my.fit.edu/~tgillett/.../an%20overview%20of%20biometrics.ppt.