12
Fingerprint Authentication Kevin Amendt David Friend April 26, 2006 - MIT Course 6.111 Project Presentations

Fingerprint Authentication

Embed Size (px)

DESCRIPTION

PPT download for ECE engineering presentation on Fingerprint Authentication

Citation preview

Page 1: Fingerprint Authentication

Fingerprint Authentication

Kevin AmendtDavid Friend

April 26, 2006 - MIT Course 6.111 Project Presentations

Page 2: Fingerprint Authentication

Authentication Nontransferable (possession based)

Keycard Fingerprint

Transferable (knowledge based) Password Certificate

Page 3: Fingerprint Authentication

Overview of System

Two operation modes Add to database Validate a user

Page 4: Fingerprint Authentication

System Operation(Database Entry)

Page 5: Fingerprint Authentication

System Operation(Validation)

Page 6: Fingerprint Authentication

Validation The same fingerprint differs between

images: Translation Rotation Scaling Noise

Page 7: Fingerprint Authentication

Validation How to match two fingerprint images?

Two Methods: Feature Matching Pattern Matching

Page 8: Fingerprint Authentication

Feature Matching Locate specific characteristics of the

fingerprint (minutiae), where ridges end or branch

Match minutiae between images Considered the more accurate algorithm Usually implemented through software, and

difficult to implement with digital logic

Page 9: Fingerprint Authentication

Pattern Matching Simple idea (maybe better for 6.111):

overlay images and see if they match Problems…

Noise: Set a threshold. If it’s “close” Translation: Use convolution Rotation: User training Scaling: Will consider this a noise problem

Page 10: Fingerprint Authentication

Conclusion Fingerprint ID Pattern matching validation Compute convolution sum and compare

to threshold

Page 11: Fingerprint Authentication

How Convolution Works

Page 12: Fingerprint Authentication

Detailed Block Diagram