Upload
sumit-kumar
View
72
Download
14
Tags:
Embed Size (px)
DESCRIPTION
Biometric
Citation preview
Click to edit Master subtitle style
FINGERPRINT RECOGNITION
Presented By :-
Sumit Kr. Jha (1061)Riddhi Kumari (1020)
Image Processing Assignment
CONTENTS Introduction Method of Verification Why we Need Fingerprint Recognition? Fingerprint Recognition Systems Fingerprint Sensors Verification and Authentication Technologies Used Applications Advantages DisAdvantages Conclusion References
INTRODUCTION Biometrics
It is an advanced technology for security and authentication.
The term “biometric” represents "bio" means related to the biological study and "metric " means something, which is related to measurement.
Why we need Fingerprint Recognition ?
Pin's and passwords may be forgotten.
The fingerprints in twins are not same.
Relies on the concept that no two people have identical fingerprints.
It is more secure.
A person's fingerprint will not naturally change structure after about one year after birth.
Fingerprint Formation• Ridge ending :– the abrupt end of a ridge.
• Bifurcation :– a single ridge that divides into two ridges.
• Island :– a single small ridge inside a short ridge or ridge ending that is not connected to all other ridges.
• Ridge enclosure :– a single ridge that bifurcates and reunites shortly afterward to continue as a single ridge.
• Crossover :– a short ridge that runs between two parallel ridges.
• Delta :– a Y-shaped ridge meeting.
• Core :– a U-turn in the ridge pattern.
Fingerprint Recognition
This is a technique used to match and
identify unique finger prints that might
need to be stored in the database for
secure personal identification.
Fingerprint Recognition Systems
Fingerprint Identification System is a biometric identification methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
Most approaches to recognizing a fingerprint involve 5 basic stages :-
i. Acquisition
ii. Pre-Processing
iii. Structural Extraction
iv. Post Processing
v. Matching
1.Acquisition :- Image is obtained from a hardware or a file.
2.Pre-Processing :- Conversion to grayscale.
Image Enhancements.
Thinning
3.Structural Extraction :- Structures/Patterns are found from the image.
4.Post Processing :- Data is converted into more useful format.
5.Matching :- Fingerprints are matched against a database.
Stages
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
The captured image is called a LIVE SCAN.
This Live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.
Fingerprint Sensors
Continue…
There are two types of fingerprint scanners:
1. Optical Scanner Optical fingerprint imaging involves capturing a digital image of the print
using visible light.
2. Ultrasonic Scanner Ultrasonic sensors make use of the principles of medical ultra sonography
in order to create visual images of the fingerprint.
Verification and Authentication
The analysis of fingerprints for matching purposes generally are of two types :-
1. Patterns
• The three basic patterns of fingerprint ridges are :-
a) Arch
b) Loop
c) Whorl
a) Arch :- The ridges enter from one side of the finger,
rise in the center forming an arc, and
then exit the other side of the finger.
a) Loop :- The ridges enter from one side of a finger
and then exit on that same side.
a) Whorl :- Ridges form circularly around a central
point on the finger.
2. Minutia
The major Minutia features of fingerprint ridges are
a) Ridge ending :- The ridge ending is the point at which a ridge
terminates.
a) Bifurcation :- Bifurcations are points at which a single ridge
splits into two ridges.
c) Short Ridge (Dot) :-– Short ridges (or dots) are ridges which are
significantly shorter than the average ridge length
on the fingerprint.
Technologies Used
The techniques used in fingerprint recognition are:
1. Pattern based image matching :- Pattern based algorithms compare the basic fingerprint patterns
(arch, whorl, and loop) between a previously stored template and a candidate fingerprint.
2. Minutia matching :- Minutiae are essentially terminations and bifurcations of the
ridge lines that constitute a fingerprint pattern.
Applications
Banking Security - ATM security, card transaction
Physical Access Control (e.g. Airport)
Information System Security
National ID Systems
Passport control
Prisoner, prison visitors, inmate control
Voting
Identification of Criminals
Identification of missing children
Secure E-Commerce (Still under research)
Advantages It provide good security mechanism than all other security
methods.
It never fails in security constraints.
Fairly small storage space is required for the biometric template, reducing the size of the database required.
It is one of the most developed biometrics, with more history, research, and design.
Each and every fingerprint including all the figures are unique, even identical twins have different finger prints.
Relatively inexpensive and offers high levels of accuracy.
Disadvantage It needs high memory space in the back end.
Collection of data for security is difficult.
Some times fails with right users.
Any time data loose in database high effect for security mechanism.
It highly expensive.
Conclusion
“Security is not just about putting big locks on the front door ,it also involves making sure all the windows are shut”.
Each one can be individually fooled, but the comparison makes the system more secure as a whole.
Biometrics are having its own advantages and disadvantages.
It is highly expensive but it provide good security.
Money is not important than security , It is more useful for confidential maters.
References
[1] Fingerprint Recognition : http://en.wikipedia.org/wiki/Fingerprint_recognition
[2] Biometrics : http://en.wikipedia.org/wiki/Biometrics
[3] Stages of Fingerprint Recognition : http://www.ee.ryerson.ca/opr/research_projects/graph_fingerprint.html
[4] Minutia : http://en.wikipedia.org/wiki/Minutiae