fingerprint recognition

Post on 20-Jan-2016

67 Views

Category:

Documents

14 Downloads

Preview:

Click to see full reader

DESCRIPTION

Biometric

TRANSCRIPT

Click to edit Master subtitle style

FINGERPRINT RECOGNITION

Presented By :-

Sumit Kr. Jha (1061)Riddhi Kumari (1020)

Image Processing Assignment

CONTENTS Introduction Method of Verification Why we Need Fingerprint Recognition? Fingerprint Recognition Systems Fingerprint Sensors Verification and Authentication Technologies Used Applications Advantages DisAdvantages Conclusion References

INTRODUCTION Biometrics

It is an advanced technology for security and authentication.

The term “biometric” represents "bio" means related to the biological study and "metric " means something, which is related to measurement.

Why we need Fingerprint Recognition ?

Pin's and passwords may be forgotten.

The fingerprints in twins are not same.

Relies on the concept that no two people have identical fingerprints.

It is more secure.

A person's fingerprint will not naturally change structure after about one year after birth.

Fingerprint Formation• Ridge ending :– the abrupt end of a ridge.

• Bifurcation :– a single ridge that divides into two ridges.

• Island :– a single small ridge inside a short ridge or ridge ending that is not connected to all other ridges.

• Ridge enclosure :– a single ridge that bifurcates and reunites shortly afterward to continue as a single ridge.

• Crossover :– a short ridge that runs between two parallel ridges.

• Delta :– a Y-shaped ridge meeting.

• Core :– a U-turn in the ridge pattern.

Fingerprint Recognition

This is a technique used to match and

identify unique finger prints that might

need to be stored in the database for

secure personal identification.

Fingerprint Recognition Systems

Fingerprint Identification System is a biometric identification methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.

Most approaches to recognizing a fingerprint involve 5 basic stages :-

i. Acquisition

ii. Pre-Processing

iii. Structural Extraction

iv. Post Processing

v. Matching

1.Acquisition :- Image is obtained from a hardware or a file.

2.Pre-Processing :- Conversion to grayscale.

Image Enhancements.

Thinning

3.Structural Extraction :- Structures/Patterns are found from the image.

4.Post Processing :- Data is converted into more useful format.

5.Matching :- Fingerprints are matched against a database.

Stages

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.

The captured image is called a LIVE SCAN.

This Live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.

Fingerprint Sensors

Continue…

There are two types of fingerprint scanners:

1. Optical Scanner Optical fingerprint imaging involves capturing a digital image of the print

using visible light.

2. Ultrasonic Scanner Ultrasonic sensors make use of the principles of medical ultra sonography

in order to create visual images of the fingerprint.

Verification and Authentication

The analysis of fingerprints for matching purposes generally are of two types :-

1. Patterns

• The three basic patterns of fingerprint ridges are :-

a) Arch

b) Loop

c) Whorl

a) Arch :- The ridges enter from one side of the finger,

rise in the center forming an arc, and

then exit the other side of the finger.

a) Loop :- The ridges enter from one side of a finger

and then exit on that same side.

a) Whorl :- Ridges form circularly around a central

point on the finger.

2. Minutia

The major Minutia features of fingerprint ridges are

a) Ridge ending :- The ridge ending is the point at which a ridge

terminates.

a) Bifurcation :- Bifurcations are points at which a single ridge

splits into two ridges.

c) Short Ridge (Dot) :-– Short ridges (or dots) are ridges which are

significantly shorter than the average ridge length

on the fingerprint.

Technologies Used

The techniques used in fingerprint recognition are:

1. Pattern based image matching :- Pattern based algorithms compare the basic fingerprint patterns

(arch, whorl, and loop) between a previously stored template and a candidate fingerprint.

2. Minutia matching :- Minutiae are essentially terminations and bifurcations of the

ridge lines that constitute a fingerprint pattern.

Applications

Banking Security - ATM security, card transaction

Physical Access Control (e.g. Airport)

Information System Security

National ID Systems

Passport control

Prisoner, prison visitors, inmate control

Voting

Identification of Criminals

Identification of missing children

Secure E-Commerce (Still under research)

Advantages It provide good security mechanism than all other security

methods.

It never fails in security constraints.

Fairly small storage space is required for the biometric template, reducing the size of the database required.

It is one of the most developed biometrics, with more history, research, and design.

Each and every fingerprint including all the figures are unique, even identical twins have different finger prints.

Relatively inexpensive and offers high levels of accuracy.

Disadvantage It needs high memory space in the back end.

Collection of data for security is difficult.

Some times fails with right users.

Any time data loose in database high effect for security mechanism.

It highly expensive.

Conclusion

“Security is not just about putting big locks on the front door ,it also involves making sure all the windows are shut”.

Each one can be individually fooled, but the comparison makes the system more secure as a whole.

Biometrics are having its own advantages and disadvantages.

It is highly expensive but it provide good security.

Money is not important than security , It is more useful for confidential maters.

References

[1] Fingerprint Recognition : http://en.wikipedia.org/wiki/Fingerprint_recognition

[2] Biometrics : http://en.wikipedia.org/wiki/Biometrics

[3] Stages of Fingerprint Recognition : http://www.ee.ryerson.ca/opr/research_projects/graph_fingerprint.html

[4] Minutia : http://en.wikipedia.org/wiki/Minutiae

top related