Biometric Security Technique: A Review

Similar documents
Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Fingerprint Verification System using Minutiae Extraction Technique

Local Correlation-based Fingerprint Matching

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Encryption of Text Using Fingerprints

Minutiae Based Fingerprint Authentication System

Biometrics- Fingerprint Recognition

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Touchless Fingerprint recognition using MATLAB

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

Verifying Fingerprint Match by Local Correlation Methods

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

A SURVEY ON FINGERPRINT RECOGNITION TECHNIQUES

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

ABSTRACT I. INTRODUCTION II. FINGERPRINT RECONIGATION. Department of Electronics & Instrumentation Engineering, GIET, Gunupur, Odisha, India

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Fingerprint Image Enhancement Algorithm and Performance Evaluation

An introduction on several biometric modalities. Yuning Xu

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

A Full Analytical Review on Fingerprint Recognition using Neural Networks

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation

Implementation of Fingerprint Matching Algorithm

Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

Fingerprint Identification System Based On Neural Network

Biometric Security Roles & Resources

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

International Journal of Advance Engineering and Research Development

An approach for Fingerprint Recognition based on Minutia Points

Finger Print Enhancement Using Minutiae Based Algorithm

Fingerprint Authentication for SIS-based Healthcare Systems

Development of an Automated Fingerprint Verification System

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Verifying Fingerprint Match by Local Correlation Methods

wavelet packet transform

Fingerprint Recognition System for Low Quality Images

The Design of Fingerprint Biometric Authentication on Smart Card for

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

International Journal of Advanced Research in Computer Science and Software Engineering

A Novel Method for Fingerprint Recognition Using Trifurcation, Eye Enclosure

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Multimodal Biometric Authentication using Face and Fingerprint

Fingerprint Recognition using Texture Features

BIOMETRIC TECHNOLOGY: A REVIEW

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

An Overview of Biometric Image Processing

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

User Identification by Hierarchical Fingerprint and Palmprint Matching

Information Security Identification and authentication. Advanced User Authentication II

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

A Novel Approach to Improve the Biometric Security using Liveness Detection

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Overview of Fingerprint Based Biometric System

BIOMETRIC PRINTER SECURITY SYSTEM

FINGERPRINT BIOMETRICS

An Algorithm for Feature Level Fusion in Multimodal Biometric System

Cuckoo Search Optimization for Feature Selection in Face & Fingerprint Nishu Rani 1, Rajan Sachdeva 2 1 Research Fellow 2 Assistant Professor

Keywords Palmprint recognition, patterns, features

Keywords: - Binarization, DWT, Fingerprint, Gaussian Filter, Thinning

A New Approach To Fingerprint Recognition

Fingerprint Recognition System

MINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

Authentication of Fingerprint Recognition Using Natural Language Processing

International Journal of Advanced Research in Computer Science and Software Engineering

Combined Fingerprint Minutiae Template Generation

Development of Biometrics technology in multimode fusion data in various levels

Secure and Private Identification through Biometric Systems

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher

Fingerprint Matching using Gabor Filters

International Journal of Research in Advent Technology, Vol.4, No.6, June 2016 E-ISSN: Available online at

FINGERPRINT RECOGNITION BY MINUTIA MATCHING

Polar Harmonic Transform for Fingerprint Recognition

FC-QIA: Fingerprint-Classification based Quick Identification Algorithm

Distorted Fingerprint Verification System

Synopsis. An Efficient Approach for Partial Fingerprint Recognition Based on Pores and SIFT Features using Fusion Methods

FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD

An FPGA based Minutiae Extraction System for Fingerprint Recognition

International Journal of Informative & Futuristic Research ISSN:

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

Transcription:

ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K. Sandhu and R. Kaur Department of Computer Science, Lovely Professional University, Phagwara 144411, Punjab, India; rupinder.88@outlook.com, navneet_150@yahoo.co.in Abstract The objective of this paper is to present different techniques of the fingerprint recognition. Two significant techniques Minutia based technique and the correlation based technique are reviewed. Both have their own significance. Minutia is working on specific part of the finger image called ridge and bifurcation. Correlation works on the gray level image data that extract from the finger image. Minutia based technique used different algorithm to extract the features and to check the accuracy and reduce the error rate. Ransac (random sample census) algorithm is tries to work on some random transformation and find the good one. Algorithm for local correlation based on the Markov random field modal which is used to smooth the orientation field. The main finding is to get the better authentication system with a better strength. Keywords: Biometric, Fingerprint, Image, Minutia, Ridge 1. Introduction The word biometric is derived from the two Greek words bios and metrikos where bios represents life and metrikos represents measure. Biometrics system identifies the individuals based on the corresponding features thereby providing the authentication when ever needed with better security mechanisms. In addition to this it is used to distinguish the people in a large gathering who are under observation. The biometric techniques are used to measure and analyze the personal characteristics. These characteristics includes both physiological and behavioral. a. Physiological i. Face ii. Fingerprint iii. Hand iv. Iris b. Behavioral i. Keystroke ii. Signature iii. Voice A fingerprint comprises of pattern of ridges and valleys upon the surface of finger of a person. A ridge can be defined as a single curved segment, whereas the region between two adjacent ridges forms a valley. Validation of a person which is based upon biometric check is turning out to be progressively well known in different applications like managing an account, aeronautics, monetary exchanges and so on. There are two functions used by a biometric system, one is identification and the other is verification. Verification system relies on comparing the presented biometric with a biometric reference that is already stored in the system which generates result much faster and accurate than the conventional identifi- *Author for correspondence

Biometric Security Technique: A Review Figure 1. Process involved in fingerprint recognition. Figure 2. Verification process. 2 Indian Journal of Science and Technology

N. K. Sandhu and R. Kaur Figure 3. Identification process. cation systems, even with the increase in the size of the database. Biometric provides better security in every field. There are many biometric techniques (palm, fingerprint, iris, ear, speech etc.) provides more accuracy and more security. Research is still going on in the area of fingerprint identification biometric technique and in the past, different types of work havebeen done. The authors D. Binu and P. Malathi proposed a Multi Model based Biometric Image Retrieval for Enhancing Security. In this work they introduced the multimodel biometric authentication which recognize the human being with the consideration of four models fingerprint, face, palm, irirs and improves the accuracy. The authors Manvjeet Kaur, Mukvinder Singh and Parvinder S. Sindhu presented a Fingerprint Verification System using Minutiae Extraction Technique. This system introduced combined methods to build a minutia extractor and a minutia matcher using two techniques, one is Histogram Equalization and FFT for fingerprint image enhancement and the other is Crossing Number Perception for Minutiae Extraction. For improving thinning process, removal of false minutiae, and for marking of minutia, they used Segmentation with Morphological operations. The authors Karthik Nandakumar and Anil K. Jain proposed Local Correlation based on Fingerprint Matching. This paper describes a correlation-based fingerprint matching which utilizes correlation of regions locally around the minutiae to identify the degree of matching between more than one fingerprint images. 2. Advantages of Biometrics 2.1 Security One of the major advantages of this framework is that they cannot be presumed or stolen. The issues regarding effective watchword frameworks are such that frequently there exists grouping of letters, numbers, images, which makes it hard to recollect every time. The problem with these tokens is they could be effortlessly stolen or missed where both of these expected strategies include the risk of data being shared. However that would not be the situation with the biometric attributes, and does not Indian Journal of Science and Technology 3

Biometric Security Technique: A Review need (it is not required) to handle the risk of sharing, replication, and misrepresentation. 2.2 Accurate Identification Process The traditional security frameworks are based on passwords, radiant cards, it can accomplish an irregular state of precision with biometrics frameworks. On the off chance when we have effectively set up the framework, we can make use of natural attributes such as filters for fingerprints and iris, which offers one of a kind and accurate strategies of recognizable proof. These elements cannot be easily and effortlessly copied that provides safety and security by just approving an authorized individual to get access. 2.3 Ease of use and Safety The privileged thing about the utilization of biometrics for identification is advanced frameworks are assembled and developed to be simple and more over to safe to use. The innovation in biometrics yields accurate results with negligible obtrusiveness as a straightforward output or a photo that is generally required. In addition the product as well as the equipment can be utilized effortlessly and anybody can implement with no requirement of advance preparation. 3. Errors in Biometric System There are two basic types of errors:- 3.1 False Match (FM) A false match error in biometric system is the one which wrongly declares a correct match among the input pattern and the existing stored template pattern. 3.2 False non Match (FNM) It describes the situation where the biometric system wrongly declares as a failure between input pattern and stored template pattern. A false rejection error occurs when a matching pair of biometric data is wrongly rejected by the system. 4. Techniques for Fingerprint Recognition Fingerprint recognition technique is the most commonly used and established biometric method and is the simplest to use for a higher security level. Even it is easy to install and it consumes less time and effort in acquiring one s fingerprint. It is a very secure technique in each and every field where security of data is demanded. 4.1 Minutiae Based Technique The process of scanning minutiae needs to work on gathering specific points in a finger image. Additionally there are two major specifications, ridges and bifurcation. Minutia mean little points of interest, and this to the conduct of the edges discontinuities, for example, Figure 4. Categories of minutia 13. 4 Indian Journal of Science and Technology

N. K. Sandhu and R. Kaur Table 1. Principle categories of minutia are Name Ridge ending Ridge bifurcation Short or independent ridge Island Ridge enclosure Spur Represents end of a ridge single ridge that divides into two ridges a ridge that begins, travels a small distance and then it ends a single small ridge within a short ridge or a ridge ending which is not connected to the remaining ridges A ridge that bifurcates and then reunites later to continue as one ridge Denotes a bifurcation that has a short ridge branching off a bigger ridge Crossover or bridge A short ridge which runs among parallel ridges Delta Core It is a Y-shaped ridge meeting It is a U-shaped ridge pattern Figure 5. Different points in figure image. Indian Journal of Science and Technology 5

Biometric Security Technique: A Review end, bifurcation and trifurcation or different elements, for example, pores (little openings inside the edges), lake (two shut bifurcations), spot (short edges), and so forth. Most frameworks use just the end and bifurcations. With the goal of coordinating the fingerprints we have to extricate the unique finger impression elements, for example, details and peculiarity focuses. 4.2 Correlation-Based Technique To deal with some of the issues of minutiae-based Figure 6. Local correlation based algorithm. Table 2. Comparison of finger identification techniques Technique Parameters Works on Minutiae Length,height and density of fingerprint Correlation Gray-level image Preprocessing More Less Image quality Computation complexity Capable of dealing with good image quality only Less Capable of dealing with bad image quality also High Performance Good Better 6 Indian Journal of Science and Technology

N. K. Sandhu and R. Kaur methodology, one should have to choose an alternative methodology. Correlation-based approach makes use of the gray-level data that is extracted from the fingerprint image. This is a promising approach to fingerprint matching where the new generations of fingerprint sensors are being used. The main limitation of this method is its high complexity of computation as well as low tolerance to nonlinear distortion and contrast variation. Hence there should have been another alternative proposals which are able to compute the correlation locally rather than computing it globally, in which only the regions of interest (for example, minutiae and regions of singularity) are to be selected and matched. Such kind of algorithms use simple approaches for alignment of two images of fingerprints and subtract the input image from the template image to check whether the ridges corresponds. 5. Conclusion In this paper, two fingerprint techniques are compared based on various parameters. Both the techniques have their advantages and disadvantages. Minutiae technique produces best result on good quality images and correlation method produces best result with the richer gray level data of fingerprint identification. This technique is capable of dealing with bad quality images as well as high resolution images. Both have their own significance. 6. References 1. Bazen M, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, Van Der Zwaag BJ, A Correlation-Based Fingerprint Verification System.11th Annual Workshop on Circuits Systems and Signal Processing, Netharlands. 2000 November. p. 1 8. 2. Binu D,Malathi P. Multi Model based Biometric Image Retrieval for Enhancing Security. Indian Journal of Science and Technology. 2015; 8(35):1 10. 3. Gaur S, Shah VA, Thakker M. Biometric Recognition Techniques : A Review. Journal of the International Association of Advanced Technology and Science. 2012 Nov; 15. 4. He Y, Tian J, Luo X, Zhang T. Image enhancement and minutiae matching in fingerprint verification. Pattern Recognition Letters.2003; 24(9,10):1349 60. 5. JainAK, Ross A, Prabhakar S. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology. 2004; 14(1):4 20. 6. Lakkoju PK, Shankar TN. Detection of Fingerprints in Advanced Biometric System Design. Indian Journal of Science and Technology. 2016 9(May). 7. Nandakumar K. Local Correlation-based Fingerprint Matching. 2004 December. 8. Noor, A New Algorithm for Minutiae Extraction and Matching in Fingerprint School of Engineering and Design. 2012; July.. 9. Orság F,Drahanský M. Biometric Security Systems : Fingerprint and Speech Technology Design of Biometric Security System [PhD thesis]. 10. Parra P. Fingerprint minutiae extraction and matching for identification procedure. 11. Pawar S.A Survey of Minutiae Extraction from Various Fingerprint Images. 2016; 6(6):169 73. 12. Thai LH, Tam HN. Fingerprint recognition using standardized fingerprint model. 2010; 7(3).. 13. Finger comparison guide. Indian Journal of Science and Technology 7