TOPIC : FINGERPRINT RECOGNITION

Similar documents
FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Fingerprint Recognition

ABSTRACT I. INTRODUCTION II. FINGERPRINT RECONIGATION. Department of Electronics & Instrumentation Engineering, GIET, Gunupur, Odisha, India

FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD

Graph Theory and Some Applications

A Study on the Neural Network Model for Finger Print Recognition

Genetic Algorithm For Fingerprint Matching

Minutiae Based Fingerprint Authentication System

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Keywords: Fingerprint, Minutia, Thinning, Edge Detection, Ridge, Bifurcation. Classification: GJCST Classification: I.5.4, I.4.6

Fingerprint Recognition using Fuzzy based image Enhancement

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Feature-based Quality Assessment of Spoof Fingerprint Images. Master s thesis in Biomedical Engineering JENNY NILSSON

Implementation of Fingerprint Matching Algorithm

The need for secure biometric devices has been increasing over the past

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Development of an Automated Fingerprint Verification System

Biometrics Our Past, Present, and Future Identity

Fingerprint Verification applying Invariant Moments

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Combined Fingerprint Minutiae Template Generation

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Classification of Fingerprint Images

Computer Security 4/15/18

Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering

Encryption of Text Using Fingerprints

Impact of 3D Printing on Fingerprint Spoofing. July 2015 novetta.com Copyright 2015, Novetta, LLC.

Fingerprint Please...

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation

A Challenge to Analyze and Detect Altered Human Fingerprints

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

A SURVEY ON FINGERPRINT RECOGNITION TECHNIQUES

FINGERPRINT BIOMETRICS

Fingerprint verification based on minutiae features: a review

Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction

Protecting the Privacy of Fingerprint

Interim Report Fingerprint Authentication in an Embedded System

FINGERPRINT BASED LICENSE CHECKING FOR AUTO-MOBILES J.Angeline Rubella, M.Suganya 1, K.Senathipathi, 2 B.Santhosh Kumar, K.R.Gowdham, M.

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY

Multimodal Biometric Authentication using Face and Fingerprint

Fingerprint Retrieval Based on Database Clustering

Security Vulnerabilities of Apple iphone Fingerprint Authentication. Suruchi Devanahalli

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Fingerprint Presentation Attack Detection with OCT

Fingerprint Matching using Gabor Filters

Fingerprint Image Enhancement Algorithm and Performance Evaluation

A wavelet based approach to detecting liveness in fingerprint scanners

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Keywords Fingerprint recognition system, Fingerprint, Identification, Verification, Fingerprint Image Enhancement, FFT, ROI.

Fingerprint Validation and Outlier Detection using Minutiae Approach in Network Security

Touchless Fingerprint recognition using MATLAB

Analysis and Selection of Features for the Fingerprint Vitality Detection

Study of Local Binary Pattern for Partial Fingerprint Identification

IMAGE PROCESSING AND FEATURES EXTRACTION OF FINGERPRINT IMAGES

A Survey On Hough Transform-based fingerprint Alignment Approaches

A Novel Technique in Fingerprint Identification using Relaxation labelling and Gabor Filtering

Final Report Fingerprint Based User Authentication

FC-QIA: Fingerprint-Classification based Quick Identification Algorithm

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Adaptive Fingerprint Pore Model for Fingerprint Pore Extraction

Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud

Secure Authentication for Internet environment using Biometric and One-Time Password

Fingerprint Classification and Matching Using a Filterbank

Image Enhancement Techniques for Fingerprint Identification

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION

An approach for Fingerprint Recognition based on Minutia Points

Fingerprint Recognition System

A Novel Approach for Detecting Fingerprint Liveness

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

Finger Print Enhancement Using Minutiae Based Algorithm

PERFORMANCE MEASURE OF LOCAL OPERATORS IN FINGERPRINT DETECTION ABSTRACT

Finger Print Analysis and Matching Daniel Novák

Find Pretend Biometric Mistreatment Image Quality Assessment for animateness Detection

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

Latent Fingerprint Matching A Survey

Biometrics- Fingerprint Recognition

Deficiencies in NIST Fingerprint Image Quality Algorithm Predicting biometric performance using image quality metrics

On Latent Fingerprint Enhancement

GIVING APPLEPAY THE FINGER

Picture 1. A few example of papillary ridge pattern

Authentication: Beyond Passwords

Information Security Identification and authentication. Advanced User Authentication III

Keywords Fingerprint Recognition, Iris Recognition, Minutiae Extraction, Multi-Biometrics, Unimodal Comparison

Palmprint Indexing Based on Ridge Features

Polar Harmonic Transform for Fingerprint Recognition

CHAPTER 2 LITERATURE REVIEW

AVL Tree an efficient retrieval engine in Classified Fingerprint Database

Preliminary Steps in the Process of Optimization Based on Fingerprint Identification

LivDet 2013 Fingerprint Liveness Detection Competition 2013

Progress Report (July05-Dec05)

Finger Print Recognition System CONTENTS

Understanding Fingerprint Biometrics

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Transcription:

TOPIC : FINGERPRINT RECOGNITION

A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. The recovery of fingerprints from a crime scene is an important method of forensic science. Fingerprints are easily deposited on suitable surfaces, such as glass, metal or any polished stone, by the natural secretions of sweat from the Eccrine glands that are present in epidermal ridges.

History of fingerprints Fingerprints have been found on ancient Babylonian clay tablets, seals and pottery. They have also been found on the walls of Egyptian tombs and on Minoan, Greek and Chinese pottery, as well as on bricks and tiles from ancient Babylon Rome. Some of these fingerprints were deposited unintentionally by the potters and masons as a natural consequence of their work and others were made in the process of adding decoration. By 246 BCE, Chinese officials were impressing their fingerprints into the clay seals used to seal documents. The Persian physician Rashid-al-Din Hamadani refers to the Chinese practice of identifying people via their fingerprints, commenting : Experience shows that no two individuals have fingers exactly alike.

Fingerprint Formation Fingerprints are fully formed at about seven months of fetus development and finger ridge configurations do not change throughout the life of an individual except due to accidents such as bruises and cuts on the fingertips (Babler, 1991). Parent and child have some generic similarity as they share half the genes. Siblings have more similarity. The maximum generic similarity is observed in monozygotic (identical) twins.

Fingerprint Sensors

Fingerprint Classification Whorl Right Loop Left Loop Tented Arch Arch Classification of Fingerprints Large volumes of fingerprints are being collected in everyday applications-for e.g.. The FBI database has 70 million of them. To reduce the search time and computational complexity classification is necessary. This allows matching of fingerprints to only a subset of those in the database. An input fingerprint is first matched at a coarse level to one of the pre-specified types and then, at a finer level, it is compared to the subset of the database containing that type of fingerprints only. Numerous algorithms have been developed in this direction.

Line Types Classification Bifurcation: It is the intersection of two or more line-types which converge or diverge. Arch: They are found in most patterns, fingerprints made up primarily of them are called Arch Prints. Loop: A recursive line-type that enters and leaves from the same side of the fingerprint. Island: A line-type that stands alone.( i.e. does not touch another line-type) Ellipse: A circular or oval shaped line-type which is generally found in the center of the fingerprint, it is generally found in the Whorl print pattern. Tented Arch: It quickly rises and falls at a steep angle. They are associated with Tented Arch Prints. Spiral: They spiral out from the center and are generally associated with Whorl Prints. Rod: It generally forms a straight line. It has little or no recurve feature. They are gennerally found in the center. Sweat Gland: The moisture and oils they produce actually allow the fingerprint to be electronically imaged.

Automatic Verification System

Feature Extraction The human fingerprint is comprised of various types of ridge patterns. Traditionally classified according to the decades-old Henry system: left loop, right loop, arch, whorl, and tented arch. Loops make up nearly 2/3 of all fingerprints, whorls are nearly 1/3, and perhaps 5-10% are arches. These classifications are relevant in many large-scale forensic applications, but are rarely used in biometric authentication.

Feature Enhancement Original Enhanced The first step is to obtain a clear image of the fingerprint. Enhancement is carried out so as to improve the clarity of ridge and furrow structures of input fingerprint images based on the estimated local ridge orientation and frequency. For grayscale images, areas lighter than a particular threshold are discarded, and those darker are made black. The ridges are then thinned from 5-8 pixels in width down to one pixel, for precise location of endings and bifurcations.

Variation in fingerprint exhibiting partial overlap.

Matching Algorithm Automatic Minutiae Detection: Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern. Automatic minutiae detection is an extremely critical process, especially in lowquality fingerprints where noise and contrast deficiency can originate pixel configurations similar to minutiae or hide real minutiae. Algorithm: The basic idea here is to compare the minutiae on the two images. The figure alongside is the input given to the system, as can be seen from the figure the various details of this image can be easily detected. Hence, we are in a position to apply the AMD algorithm.

Matching Algorithm-contd.. Algorithm (contd.) The next step in the algorithm is to mark all the minutiae points on the duplicate image of the input fingerprint with the lines much clear after feature extraction. Then this image is superimposed onto the input image with marked minutiae points as shown in the figure. Finally a comparison is made with the images in the database and a probabilistic result is given.

Attacks Artificially created Biometrics Attack at the Database Attacking Via Input Port

Attacks-contd.. Spoofing:- The process of defeating a biometric system through the introduction of fake biometric samples. Examples of spoof attacks on a fingerprint recognition system are lifted latent fingerprints and artificial fingers. Examples of spoofed fingers. Put subject s finger in impression material and create a mold. Molds can also be created from latent fingerprints by photographic etching techniques. Use play-doh, gelatin, or other suitable material to cast a fake finger. Worst-case scenario: dead fingers.[7]

Attacks-solutions.. Hardware Solution Temperature sensing, detection of pulsation on fingertip, electrical conductivity, etc. Software Solution (Research going on) Live fingers as opposed to spoofed show some kind of moisture pattern due to perspiration.

Applications Banking Security - ATM security,card transaction Physical Access Control (e.g. Airport) Information System Security National ID Systems Passport control (INSPASS) Prisoner, prison visitors, inmate control Voting Identification of Criminals Identification of missing children Secure E-Commerce (Still under research)