Fingerprint Identification

advertisement
Introduction to Fingerprint
Biometrics
By Tamar Bar
Why use biometrics?
· Biometric templates are unique to an
individual.
· Unlike password, pin number, or smart
card, they cannot be forgotten,
misplaced lost or stolen.
· The person trying to access is
recognized by his ID- represented by
his unique biometric signature.
Why use Fingerprint as a
biometric?
 Fingerprint scanning has a high accuracy rate.
 Fingerprint authentication is a good choice for
in-house systems.
 scanners are small, ease of integration - can
be easily adapted to keyboards.
 Relatively low costs make it an affordable,
simple choice for workplace access security.
 The most common and oldest biometric used.
 Fingerprints are credited as reliable in a court
of law.
Fingerprint basic terms
•
•
•
•
•
•
Ridges
Furrows
Minutiae Points
Whorl
Arch
Loop
Samples of Minutiae points
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Identification Vs. Verification
• one-to-one comparison - Identification and recognition
are, essentially synonymous terms. In both processes, a sample
is presented to the biometric system during enrollment. The
system then attempts to find out who the sample belongs to, by
comparing the sample with a database of samples in the hope
of finding a match.
• one-to-many comparison - Verification process is when
the biometric system attempts to verify an individual's identity.
Identification and recognition involve matching a sample against
a database of many, whereas verification involves matching a
sample against a database of one.
Fingerprint Processing Stages
• Scanning: (acquisition, capture)
- Optical Method
- Semiconductor generated electric field
• Processing:
-Specific image enhancing algorithms – improving the image.
-Using Image processing operators to recognize patterns in the image.
- all the “patterns” recognized by the operators and constructing a new entity representing the sample
this entity can be a collection of the objects from the image.
• Matching: comparing of the 2 samples
two well known matching techniques are Minutiae Point comparison and Correlation (of the grayscale
component values).
- Minutiae Point - has problem with global pattern of ridges and furrows.
- Correlation - requires precise location and affected by image translation and rotation.
• Decision - match/ non-match result
Search Methods for Fingerprint Identification
Using Classification
• Tree Structure
• Hashing
Accuracy and Integrity
• false negatives are more likely to occur than
false positives – good for highly secure system
less for a costumer serving type of system.
• presenting a fake sample – has solutions like
measuring temperature, blood-oxygen level,
pulse, blood flow, humidity heart rate & temp.
• Technical problems - dirty scanner.
Discussion Point
• What types of systems really need
biometrics as a security systems
• Dangers in using personal bodily assets:
- harming people to get hold of that assets.
- forging profs that are court admissable
- privacy issues.
Download