Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018
|
|
- Darrell Spencer
- 5 years ago
- Views:
Transcription
1 Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23,
2 Friction Ridge Patterns Dermatoglyphics. Derma: skin; Glyphs: carving Cumins and Midlo, Finger Prints, Palms and Soles, Dover,
3 Fingerprints 0.73 x 0.84 in. Each finger, including those of identical twins, has a different pattern 3
4 75-Class Recognition Problem 7.5 billion x 10 = ~75 billion pattern classes 350 K births/day; no. of classes keeps increasing 4
5 First Encounter with Fingerprints Sun SPARCstation host ~100 MHz CPU; 512 MB RAM 16 Xilinx 4010s as PEs (512 KB memory) Fingerprint matching on Sun SPARC: 70 matches/sec 100-times speedup on Splash 2 MHz clock Ratha, Rover, Jain, "An FPGA-Based Point pattern Matching Processor with application to Fingerprint Matching", CAMP `95, 5
6 Fingerprint Formation Ridge formation starts at 1 or 2 focal points and spreads over the fingertip Localized ridge units merge to form ridges at ~10.5 weeks of gestational age Fingerprints possess genotype & phenotype properties L. S. Penrose and P. T. Ohara. The development of the epidermal ridges. Journal of Medical Genetics M. Okajima. Development of dermal ridges in the fetus. Journal of Medical Genetics
7 Fingerprint Milestones Seventeen classes 9/11 terrorist attacks lead to govt. Whorl loopaadhaar (left and right) mandates to use(double biometrics loop), in What is wanted is a means of regulating travel 99% of fingerprints & archintl. cover Supreme Court upholds Habitual Criminals Act Fingerprint a personal classifying the First records ofuse of the constitutional US Congress authorizes DOJ to collect Identimat: commercial Galton Henryas fingerprint system State/ AFIS mark fingerprints biometrics adopted by Scotland Yard and arrest information State AFIS Pay of Aadhaar habitual criminal, such that as Apple validity State AFIS soon as the particulars of the personality of any prisoner (whether description, measurements, marks, or photographs) are received, it B.C. may be possible to ascertain Other operations Criminal booking readily, and with certainty, Forensics FaceID of Bertillonage First use usedeed of fingerprints AEarly Chinese of sale US-VISIT whether his case is FBIininaugurates the TouchID fingerprints in on fingerprint matchingfull invented for Civil applications with a fingerprint Trauring publishes paper in Nature operation Aadhaar gives dignity to the marginalized. Dignity register, and if so, who he is British criminal case (Bengal, India) Goldstein et al. publish face recognition paper in Proc. IEEE (1971) State AFIS IAFIS of IAFIS 2018 to the marginalized outweighs privacy, Justice FBI Next Generation Identification Sikri Delta Core 7
8 Drivers: Lack of Trust Osmania University (OU) enhanced the exam fee in all the affiliated colleges by Rs. 100 per semester for implementation of biometric attendance system. Times of India, Oct 22, 2018 No end to JNTU-H fake certification verifications. HANS INDIA, Times of India, Oct 12,
9 Enablers: Fingerprint Readers 1892 Juan Vucetich Ink and Paper 1990 Optical sensor 1990 Capacitive sensor 9
10 Enablers: Processors, RAM, Algorithms 1960s K tenprints 15K matches/sec M tenprints 1M matches/sec Courtesy: James Blanchard, Michigan State Police
11 Fingerprint Enhancement Ridge Voting Hong, Wang and Jain, IEEE Trans. PAMI, 1999
12 Fingerprint Representation Level-1 Level-2 Level-3 Ridge flow and pattern type Minutiae Pores and incipient ridges Singular Points Bifurcation Incipient Ridge Cores Ending Pores Deltas Orientation Field Template: A compact representation of fingerprint features 12
13 Minutiae Extraction Input Image Ridge Flow Ridge Filter Extracted Minutiae Postprocessing Ridge Thinning Minutiae Detection 13
14 14 Minutiae Descriptors Ridge Flow-based Descriptor Ridge flow values in the minutiae neighborhood Neighboring minutiae-based Descriptor Set of minutiae in a local neighborhood Minutia Neighborhood Flow-based Descriptor Minutiae-based Descriptor
15 Fingerprint Comparison Query fingerprint Similarity = 0.9 Enrolled fingerprint 15
16 How to Align? Query Fingerprint Gallery Fingerprint Jain, et al. An Identity Authentication System Using Fingerprints, Proc. IEEE,
17 Frequency Recognition Performance ROC curve 1 1 Similarity score Threshold determines tradeoff between FAR & FRR 17
18 System Requirements 100K visitors/day to Disney Park, Orlando Usability Fast verification to maintain throughput Low error rates, especially FRR Day/night operation Robust to finger condition: wet, dry,.. Return on investment Embedded system Template encryption 18
19 Aadhaar: World s Largest Biometric System 121 crore (1.21 billion) individuals have been enrolled 19
20 De-duplication: Limited Capacity of Fingerprints
21 Aadhaar Authentication 21
22 Daily Authentication Transactions 100% successful authentication NOT possible, UIDAI CEO admits in SC
23 State of the Art Performance Rolled prints Plain prints Latent prints Authentication: TAR of = 0.001% Retrieval (search) Plain prints: 99.3% (100K background gallery) Latent prints: 67.2% (70.2% with image + markup) C. Watson, et al.. Fingerprint Vendor Technology Evaluation, NISTIR, 2012 M. Indovina, et al.. ELFT-EFS Evaluation of Latent Fingerprint Technologies: Extended Feature Sets NISTIR,
24 Sources of Error No. of false minutiae = 0 No. of false minutiae = 7 No. of false minutiae = 27 24
25 Sources of Error Genuine comparisons Imposter comparisons Query Intra-finger variations and Inter-finger similarity
26 What s Next? Scale % % Unusable Hard to Use 90% 99.99% Accuracy Easy to Use Transparent to User Usability Fingerprint Recognition is not solved!
27 Scalability Assume one billion users Identification Performance False Negative Identification Rate (FNIR): user is enrolled, but not retrieved False Positive Identification Rate (FPIR): user is not enrolled, but an identity is returned Identification & verification performances are related FPIR = 1 (1 FMR) N ; FNIR = FNMR Suppose for N = 10 9 enrollment, we require FNIR = %; FPIR = 0.001% Require a matcher: FMR %; FNMR = % 27
28 Capacity & Persistence Uniqueness: How many different individuals can we recognize? 6-digit code:10 6 unique PINs Permanence: Does the recognition performance change over time? PINs do not become stale
29 29 Prob. of False Correspondence "Two like fingerprints would be found only once every years (Sc. Am, 1911) Prob. of a fingerprint with n minutiae and another with m minutiae sharing q minutiae (a) M=52 m=n=q=26 P = 2.40 x (b) M=52 m=n=26, q=10 P = 5.49 x 10-4 M = A/C Pankanti, Prabhakar and Jain, On the Individuality of Fingeprints, IEEE PAMI, 2002
30 Persistence Database: fingerprints of 20K convicts with an average of 8 arrests over a span of 12 years Longitudinal model showed: Fingerprint accuracy (i) is stable over 12 years, (ii) accuracy depends more on fingerprint quality than time gap Yoon and Jain, "Longitudinal Study of Fingerprint Recognition", PNAS,
31 Spoof Attacks Requirements: TAR = = 0.2% Chugh, Kai and Jain, "Fingerprint Spoof Buster: Use of Minutiae-centered Patches", IEEE TIFS, 2018
32 Fingerprint Obfuscation Fingerprint of Gus Winkler (1933) before and after alteration 32
33 Template Protection Similarity Reconstructed Original ISO Score Fingerprint = Fingerprint 460 Template (VeriFinger) Image Image 33
34 Fingermarks (Latent Prints) 34
35 Madrid Train Bombing (2004) 35 Partial print on a duffel bag Brandon Mayfield s prints in file
36 Automated Latent AFIS Reference database Feedback Acquisition Cropping Enhancement Minutiae Comparison Kai and Jain, IEEE PAMI, Candidate list 36
37 Successful Match Latent Mated Rolled # Matched minutiae = 2 Similarity score = 3 Enhanced Latent Mated Rolled # Matched minutiae = 13 Similarity score = 38
38 Infant Fingerprints Digital Persona U.are.U (500 ppi) Custom NEC Reader (1270 ppi) MSU Match in Box (1900 ppi) Right thumb of a 3 month old infant captured with 500,1270 & 1900 ppi readers Jain, Arora, Cao, Best-Rowden, Bhatnagar, Fingerprint recognition of young children, IEEE TIFS, 2017 Engelsma, Cao, Jain, Fingerprint Match in Box. IEEE BTAS, 2018 Engelsma, Cao, Jain, Fingerprint Match in Box. IEEE PAMI, 2018
39 Fingerprint Match in Box (a) (b) (c) A low cost ($200), open source, 1900 ppi compact (10 cm cube) fingerprint reader with embedded spoof detector, feature extractor, and matcher with 1:100K search; thumbprint of 3-month-old baby
40 Privacy Concerns 40
41 Security v. Privacy
42 Summary Fingerprint based transactions are used by hundreds of millions of citizens worldwide Applications: mobile phone unlock, social benefits disbursement, border crossing, forensics; new applications are emerging Challenges: sensor design, image quality, robust & accurate solution, privacy, security It s all about lack of TRUST
43
44 Security v. Privacy 44
Research on Friction Ridge Pattern Analysis
Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationQuantitative Assessment of the Individuality of Friction Ridge Patterns
Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationHistory of Fingerprinting
Fingerprints History of Fingerprinting People have always wanted a full proof way to identify someone. The first system was created by Alphonse Bertillon (1883) Used a detailed description plus full length
More informationHistory of Fingerprints
Fingerprints History of Fingerprints Johann Christoph Andreas Mayer 1788 First scientist to recognize fingerprints were unique William Herschel 1856 Began the collecting of fingerprints Alphonse Bertillon
More informationFrom the Edge of Biometrics: What s Next? #
From the Edge of Biometrics: What s Next? # Anil K. Jain Michigan State University http://biometrics.cse.msu.edu Sichuan University August 16, 2018 # Looking at the future where biometrics will be omnipresent
More informationEVER since latent fingerprints (latents or marks 1 ) were
1 Automated Latent Fingerprint Recognition Kai Cao and Anil K. Jain, Fellow, IEEE arxiv:1704.01925v1 [cs.cv] 6 Apr 2017 Abstract Latent fingerprints are one of the most important and widely used evidence
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationBiometrics Technology: Finger Prints
References: Biometrics Technology: Finger Prints [FP1] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms and Performance Evaluation", IEEE Trans. on PAMI, Vol. 20, No. 8, pp.777-789,
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationFingerprint Analysis. Bud & Patti Bertino
Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationA Generative Model for Fingerprint Minutiae
A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University {qjzhao, yi.zhang}@scu.edu.cn Anil K. Jain Michigan State University jain@cse.msu.edu Nicholas G. Paulter Jr., Melissa
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationFingerprint Combination for Privacy Protection
Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract
More informationObjectives. You will understand: Fingerprints Fingerprints
Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationFingerprint Recognition using Minutiae Extraction
Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationFingerprint Principles
What pattern are you? T. Tomm 2006 http://sciencespot.net 8 th Grade Forensic Science Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationName TRAINING LAB - CLASSIFYING FINGERPRINTS
TRAINING LAB - CLASSIFYING FINGERPRINTS Name Background: You have some things that are yours and yours alone - and NO ONE else on earth has anything exactly like it! They are your fingerprints. Everyone
More informationFingerprints. Sierra Kiss
Fingerprints Sierra Kiss Introduction Fingerprints are one of the most commonly known biometrics that play a major role in law enforcement and the criminal justice system in identification of criminals.
More informationSensors. CSE 666 Lecture Slides SUNY at Buffalo
Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationFORENSIC SCIENCE Fingerprints
FORENSIC SCIENCE Fingerprints 1 History 3000 years ago: Chinese used fingerprints to sign legal documents 1892 Galton describes loops, whorls, and arches 1897 Sir Edward Henry develops the classification
More informationCity Research Online. Permanent City Research Online URL:
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable
More informationCHAPTER 4 MINUTIAE EXTRACTION
67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as
More informationUnit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)
Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor
More informationFingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs
Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationMINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.
MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION
More informationHistorical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes
Read the introduction on page 134 of your text and the scenario below. Answer the questions in pairs. It is your first year at college and there is a break in at the dorm. Fingerprints have been left at
More informationUnit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.
Name: KEY Unit 2 Review-Fingerprints 1. Match the definitions of the word on the right with the vocabulary terms on the right. 1. Fluoresce O 2. Iodine fuming F 3. Latent fingerprint P 4. Livescan A 5.
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique
TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationModern Biometric Technologies: Technical Issues and Research Opportunities
Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric
More informationACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM
ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM A. Vinoth 1 and S. Saravanakumar 2 1 Department of Computer Science, Bharathiar University,
More informationInformation hiding in fingerprint image
Information hiding in fingerprint image Abstract Prof. Dr. Tawfiq A. Al-Asadi a, MSC. Student Ali Abdul Azzez Mohammad Baker b a Information Technology collage, Babylon University b Department of computer
More informationT. Trimpe
T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationFingerprints. Fingerprints. Dusan Po/Shutterstock.com
Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationAn Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander
More informationLATENT fingerprints 1 are arguably the most important
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 End-to-End Latent Fingerprint Search Kai Cao, Member, IEEE, Dinh-Luan Nguyen, Student Member, IEEE, Cori Tymoszek, Student Member, IEEE,
More informationJY Division I nformation
Feature Article JY Division I nformation Forensic Products and Technologies of the Forensic Division Nicolas Vezard The Forensic Division has been focused on Identification Instruments since its beginnings
More informationLATENT fingerprints 1 are arguably the most important
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 End-to-End Latent Fingerprint Search Kai Cao, Member, IEEE, Dinh-Luan Nguyen, Student Member, IEEE, Cori Tymoszek, Student Member, IEEE,
More informationThe study of fingerprints for identification purposes is known as dactylography or dactyloscopy.
The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. Your fingers, toes, feet, palms, and lips are covered with small ridges that are raised portions of the
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationStandard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses
Standard Fingerprint Databases Manual Mehmet Kayaoglu, Berkay Topcu, Umut Uludag TUBITAK BILGEM, Informatics and Information Security Research Center, Turkey {mehmet.kayaoglu, berkay.topcu, umut.uludag}@tubitak.gov.tr
More informationJAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION
Topic Fingerprints Key Question How do our fingerprints compare? Focus Comparisons are made of the fingerprints on all five digits to determine likenesses and differences. Guiding Documents Project 2061
More informationTHE word individual has its roots in the word indivisible
TECHNICAL REPORT, MICHIGAN STATE UNIVERSITY, MSU-CSE-18-2, February 201 1 Global ID: Biometrics for Billions of Identities Anil K. Jain, Life Fellow, IEEE, Sharath Pankanti, Fellow, IEEE, Karthik Nandakumar,
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationPerformance Analysis of Multimodal Biometric System Authentication
290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute
More informationLittle Fingers. Big Challenges.
Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationNoise Elimination in Fingerprint Image Using Median Filter
Int. J. Advanced Networking and Applications 950 Noise Elimination in Fingerprint Image Using Median Filter Dr.E.Chandra Director, Department of Computer Science, DJ Academy for Managerial Excellence,
More informationFingerprinting. Forensic Science
Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether
More informationFeature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits
1 Biological and Applied Sciences Vol.59: e16161074, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161074 ISSN 1678-4324 Online Edition BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY A N
More informationNon-Contact Vein Recognition Biometrics
Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationFinger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy
Finger print Recognization By M R Rahul Raj K Muralidhar A Papi Reddy Introduction Finger print recognization system is under biometric application used to increase the user security. Generally the biometric
More informationFingerDOS: A Fingerprint Database Based on Optical Sensor
FingerDOS: A Fingerprint Database Based on Optical Sensor FLORENCE FRANCIS-LOTHAI 1, DAVID B. L. BONG 2 1, 2 Faculty of Engineering Universiti Malaysia Sarawak 94300 Kota Samarahan MALAYSIA 1 francislothaiflorence@gmail.com,
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationSegmentation of Fingerprint Images Using Linear Classifier
EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation
More information50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities
To Appear in Pattern Recognition Letters 2016 1 Pattern Recognition Letters journal homepage: www.elsevier.com 50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities Anil K. Jain
More informationThoughts on Fingerprint Image Quality and Its Evaluation
Thoughts on Fingerprint Image Quality and Its Evaluation NIST November 7-8, 2007 Masanori Hara Recap from NEC s Presentation at Previous Workshop (2006) n Positioning quality: a key factor to guarantee
More informationPreprocessing and postprocessing for skeleton-based fingerprint minutiae extraction
Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationThank you for your purchase!
TM Thank you for your purchase! Please be sure to save a copy of this document to your local computer. This activity is copyrighted by the AIMS Education Foundation. All rights reserved. No part of this
More informationOn the Individuality of Fingerprints
1010 IEEE TRNSCTIONS ON PTTERN NLYSIS ND MCHINE INTELLIGENCE, VOL. 24, NO. 8, UGUST 2002 On the Individuality of Fingerprints Sharath Pankanti, Senior Member, IEEE, Salil Prabhakar, Member, IEEE, and nil
More informationBIOMETRIC IDENTIFICATION
BIOMETRIC IDENTIFICATION When it comes to working biometric identification technologies, it s not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature
More informationIT and SRINIVAS. nology. 1 Research Scholar, Type of Type of. Google. How to Cite this. Paper: Studies in. the work.
International Journal of Case Studies in Business, IT and A Critical Study on Fingerprint Image Sensing and Acquisition Techn nology Krishna Prasad K. 1 & Dr. P. S. Aithal 2 1 Research Scholar, College
More informationChallenges and Potential Research Areas In Biometrics
Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la
More informationFingerprints (Unit 4)
21 Fingerprints (Unit 4) Fingerprints have long been a mainstay in the area of forensic science. Since the nineteenth century, authorities have used fingerprints to prove a person handled an object or
More informationBIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the
More informationMorphoTrust TM Iris Recognition
WHITE PAPER Iris Recognition The state of the art in Algorithms, Fast Identification Solutions and Forensic Applications Kirsten R. Nobel, PhD Principal Solution Engineer Contents 2 table OF CONTENTS 3
More informationWhen You Think You Are Done
When You Think You Are Done - More Fingerprint and Face Steps for Success Presented 28 April 2016 Illinois Division, IAI by Ed German Macon County Sheriff s Office Alternate Title for This Presentation:
More informationFrom the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match.
Do you see the island, the bifurcation, the ending ridge in this fingerprint? Name: These are actual crime-scene fingerprints and some scenarios. Solve the crime! 1. Which person held up the couple at
More informationAll-in-One Scanner VF1
All-in-One VF1 for fingerprints, epassports, ID Cards, signatures, flight tickets, barcodes, photos etc. Passport Fingerprint ID Card Signature Pad Flight Ticket Photo Barcode Reader Document Key Benefits
More informationAdvances in Iris Recognition Interoperable Iris Recognition systems
Advances in Iris Recognition Interoperable Iris Recognition systems Date 5/5/09 Agenda How best to meet operational requirements Historical Overview of iris technology The current standard Market and Technological
More information