Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018

Size: px
Start display at page:

Download "Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018"

Transcription

1 Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23,

2 Friction Ridge Patterns Dermatoglyphics. Derma: skin; Glyphs: carving Cumins and Midlo, Finger Prints, Palms and Soles, Dover,

3 Fingerprints 0.73 x 0.84 in. Each finger, including those of identical twins, has a different pattern 3

4 75-Class Recognition Problem 7.5 billion x 10 = ~75 billion pattern classes 350 K births/day; no. of classes keeps increasing 4

5 First Encounter with Fingerprints Sun SPARCstation host ~100 MHz CPU; 512 MB RAM 16 Xilinx 4010s as PEs (512 KB memory) Fingerprint matching on Sun SPARC: 70 matches/sec 100-times speedup on Splash 2 MHz clock Ratha, Rover, Jain, "An FPGA-Based Point pattern Matching Processor with application to Fingerprint Matching", CAMP `95, 5

6 Fingerprint Formation Ridge formation starts at 1 or 2 focal points and spreads over the fingertip Localized ridge units merge to form ridges at ~10.5 weeks of gestational age Fingerprints possess genotype & phenotype properties L. S. Penrose and P. T. Ohara. The development of the epidermal ridges. Journal of Medical Genetics M. Okajima. Development of dermal ridges in the fetus. Journal of Medical Genetics

7 Fingerprint Milestones Seventeen classes 9/11 terrorist attacks lead to govt. Whorl loopaadhaar (left and right) mandates to use(double biometrics loop), in What is wanted is a means of regulating travel 99% of fingerprints & archintl. cover Supreme Court upholds Habitual Criminals Act Fingerprint a personal classifying the First records ofuse of the constitutional US Congress authorizes DOJ to collect Identimat: commercial Galton Henryas fingerprint system State/ AFIS mark fingerprints biometrics adopted by Scotland Yard and arrest information State AFIS Pay of Aadhaar habitual criminal, such that as Apple validity State AFIS soon as the particulars of the personality of any prisoner (whether description, measurements, marks, or photographs) are received, it B.C. may be possible to ascertain Other operations Criminal booking readily, and with certainty, Forensics FaceID of Bertillonage First use usedeed of fingerprints AEarly Chinese of sale US-VISIT whether his case is FBIininaugurates the TouchID fingerprints in on fingerprint matchingfull invented for Civil applications with a fingerprint Trauring publishes paper in Nature operation Aadhaar gives dignity to the marginalized. Dignity register, and if so, who he is British criminal case (Bengal, India) Goldstein et al. publish face recognition paper in Proc. IEEE (1971) State AFIS IAFIS of IAFIS 2018 to the marginalized outweighs privacy, Justice FBI Next Generation Identification Sikri Delta Core 7

8 Drivers: Lack of Trust Osmania University (OU) enhanced the exam fee in all the affiliated colleges by Rs. 100 per semester for implementation of biometric attendance system. Times of India, Oct 22, 2018 No end to JNTU-H fake certification verifications. HANS INDIA, Times of India, Oct 12,

9 Enablers: Fingerprint Readers 1892 Juan Vucetich Ink and Paper 1990 Optical sensor 1990 Capacitive sensor 9

10 Enablers: Processors, RAM, Algorithms 1960s K tenprints 15K matches/sec M tenprints 1M matches/sec Courtesy: James Blanchard, Michigan State Police

11 Fingerprint Enhancement Ridge Voting Hong, Wang and Jain, IEEE Trans. PAMI, 1999

12 Fingerprint Representation Level-1 Level-2 Level-3 Ridge flow and pattern type Minutiae Pores and incipient ridges Singular Points Bifurcation Incipient Ridge Cores Ending Pores Deltas Orientation Field Template: A compact representation of fingerprint features 12

13 Minutiae Extraction Input Image Ridge Flow Ridge Filter Extracted Minutiae Postprocessing Ridge Thinning Minutiae Detection 13

14 14 Minutiae Descriptors Ridge Flow-based Descriptor Ridge flow values in the minutiae neighborhood Neighboring minutiae-based Descriptor Set of minutiae in a local neighborhood Minutia Neighborhood Flow-based Descriptor Minutiae-based Descriptor

15 Fingerprint Comparison Query fingerprint Similarity = 0.9 Enrolled fingerprint 15

16 How to Align? Query Fingerprint Gallery Fingerprint Jain, et al. An Identity Authentication System Using Fingerprints, Proc. IEEE,

17 Frequency Recognition Performance ROC curve 1 1 Similarity score Threshold determines tradeoff between FAR & FRR 17

18 System Requirements 100K visitors/day to Disney Park, Orlando Usability Fast verification to maintain throughput Low error rates, especially FRR Day/night operation Robust to finger condition: wet, dry,.. Return on investment Embedded system Template encryption 18

19 Aadhaar: World s Largest Biometric System 121 crore (1.21 billion) individuals have been enrolled 19

20 De-duplication: Limited Capacity of Fingerprints

21 Aadhaar Authentication 21

22 Daily Authentication Transactions 100% successful authentication NOT possible, UIDAI CEO admits in SC

23 State of the Art Performance Rolled prints Plain prints Latent prints Authentication: TAR of = 0.001% Retrieval (search) Plain prints: 99.3% (100K background gallery) Latent prints: 67.2% (70.2% with image + markup) C. Watson, et al.. Fingerprint Vendor Technology Evaluation, NISTIR, 2012 M. Indovina, et al.. ELFT-EFS Evaluation of Latent Fingerprint Technologies: Extended Feature Sets NISTIR,

24 Sources of Error No. of false minutiae = 0 No. of false minutiae = 7 No. of false minutiae = 27 24

25 Sources of Error Genuine comparisons Imposter comparisons Query Intra-finger variations and Inter-finger similarity

26 What s Next? Scale % % Unusable Hard to Use 90% 99.99% Accuracy Easy to Use Transparent to User Usability Fingerprint Recognition is not solved!

27 Scalability Assume one billion users Identification Performance False Negative Identification Rate (FNIR): user is enrolled, but not retrieved False Positive Identification Rate (FPIR): user is not enrolled, but an identity is returned Identification & verification performances are related FPIR = 1 (1 FMR) N ; FNIR = FNMR Suppose for N = 10 9 enrollment, we require FNIR = %; FPIR = 0.001% Require a matcher: FMR %; FNMR = % 27

28 Capacity & Persistence Uniqueness: How many different individuals can we recognize? 6-digit code:10 6 unique PINs Permanence: Does the recognition performance change over time? PINs do not become stale

29 29 Prob. of False Correspondence "Two like fingerprints would be found only once every years (Sc. Am, 1911) Prob. of a fingerprint with n minutiae and another with m minutiae sharing q minutiae (a) M=52 m=n=q=26 P = 2.40 x (b) M=52 m=n=26, q=10 P = 5.49 x 10-4 M = A/C Pankanti, Prabhakar and Jain, On the Individuality of Fingeprints, IEEE PAMI, 2002

30 Persistence Database: fingerprints of 20K convicts with an average of 8 arrests over a span of 12 years Longitudinal model showed: Fingerprint accuracy (i) is stable over 12 years, (ii) accuracy depends more on fingerprint quality than time gap Yoon and Jain, "Longitudinal Study of Fingerprint Recognition", PNAS,

31 Spoof Attacks Requirements: TAR = = 0.2% Chugh, Kai and Jain, "Fingerprint Spoof Buster: Use of Minutiae-centered Patches", IEEE TIFS, 2018

32 Fingerprint Obfuscation Fingerprint of Gus Winkler (1933) before and after alteration 32

33 Template Protection Similarity Reconstructed Original ISO Score Fingerprint = Fingerprint 460 Template (VeriFinger) Image Image 33

34 Fingermarks (Latent Prints) 34

35 Madrid Train Bombing (2004) 35 Partial print on a duffel bag Brandon Mayfield s prints in file

36 Automated Latent AFIS Reference database Feedback Acquisition Cropping Enhancement Minutiae Comparison Kai and Jain, IEEE PAMI, Candidate list 36

37 Successful Match Latent Mated Rolled # Matched minutiae = 2 Similarity score = 3 Enhanced Latent Mated Rolled # Matched minutiae = 13 Similarity score = 38

38 Infant Fingerprints Digital Persona U.are.U (500 ppi) Custom NEC Reader (1270 ppi) MSU Match in Box (1900 ppi) Right thumb of a 3 month old infant captured with 500,1270 & 1900 ppi readers Jain, Arora, Cao, Best-Rowden, Bhatnagar, Fingerprint recognition of young children, IEEE TIFS, 2017 Engelsma, Cao, Jain, Fingerprint Match in Box. IEEE BTAS, 2018 Engelsma, Cao, Jain, Fingerprint Match in Box. IEEE PAMI, 2018

39 Fingerprint Match in Box (a) (b) (c) A low cost ($200), open source, 1900 ppi compact (10 cm cube) fingerprint reader with embedded spoof detector, feature extractor, and matcher with 1:100K search; thumbprint of 3-month-old baby

40 Privacy Concerns 40

41 Security v. Privacy

42 Summary Fingerprint based transactions are used by hundreds of millions of citizens worldwide Applications: mobile phone unlock, social benefits disbursement, border crossing, forensics; new applications are emerging Challenges: sensor design, image quality, robust & accurate solution, privacy, security It s all about lack of TRUST

43

44 Security v. Privacy 44

Research on Friction Ridge Pattern Analysis

Research on Friction Ridge Pattern Analysis Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

Quantitative Assessment of the Individuality of Friction Ridge Patterns

Quantitative Assessment of the Individuality of Friction Ridge Patterns Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information

History of Fingerprinting

History of Fingerprinting Fingerprints History of Fingerprinting People have always wanted a full proof way to identify someone. The first system was created by Alphonse Bertillon (1883) Used a detailed description plus full length

More information

History of Fingerprints

History of Fingerprints Fingerprints History of Fingerprints Johann Christoph Andreas Mayer 1788 First scientist to recognize fingerprints were unique William Herschel 1856 Began the collecting of fingerprints Alphonse Bertillon

More information

From the Edge of Biometrics: What s Next? #

From the Edge of Biometrics: What s Next? # From the Edge of Biometrics: What s Next? # Anil K. Jain Michigan State University http://biometrics.cse.msu.edu Sichuan University August 16, 2018 # Looking at the future where biometrics will be omnipresent

More information

EVER since latent fingerprints (latents or marks 1 ) were

EVER since latent fingerprints (latents or marks 1 ) were 1 Automated Latent Fingerprint Recognition Kai Cao and Anil K. Jain, Fellow, IEEE arxiv:1704.01925v1 [cs.cv] 6 Apr 2017 Abstract Latent fingerprints are one of the most important and widely used evidence

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

Biometrics Technology: Finger Prints

Biometrics Technology: Finger Prints References: Biometrics Technology: Finger Prints [FP1] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms and Performance Evaluation", IEEE Trans. on PAMI, Vol. 20, No. 8, pp.777-789,

More information

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,

More information

Fingerprint Analysis. Bud & Patti Bertino

Fingerprint Analysis. Bud & Patti Bertino Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

A Generative Model for Fingerprint Minutiae

A Generative Model for Fingerprint Minutiae A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University {qjzhao, yi.zhang}@scu.edu.cn Anil K. Jain Michigan State University jain@cse.msu.edu Nicholas G. Paulter Jr., Melissa

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Fingerprint Combination for Privacy Protection

Fingerprint Combination for Privacy Protection Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract

More information

Objectives. You will understand: Fingerprints Fingerprints

Objectives. You will understand: Fingerprints Fingerprints Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Fingerprint Recognition using Minutiae Extraction

Fingerprint Recognition using Minutiae Extraction Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,

More information

Fingerprint Principles

Fingerprint Principles What pattern are you? T. Tomm 2006 http://sciencespot.net 8 th Grade Forensic Science Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Name TRAINING LAB - CLASSIFYING FINGERPRINTS

Name TRAINING LAB - CLASSIFYING FINGERPRINTS TRAINING LAB - CLASSIFYING FINGERPRINTS Name Background: You have some things that are yours and yours alone - and NO ONE else on earth has anything exactly like it! They are your fingerprints. Everyone

More information

Fingerprints. Sierra Kiss

Fingerprints. Sierra Kiss Fingerprints Sierra Kiss Introduction Fingerprints are one of the most commonly known biometrics that play a major role in law enforcement and the criminal justice system in identification of criminals.

More information

Sensors. CSE 666 Lecture Slides SUNY at Buffalo

Sensors. CSE 666 Lecture Slides SUNY at Buffalo Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

FORENSIC SCIENCE Fingerprints

FORENSIC SCIENCE Fingerprints FORENSIC SCIENCE Fingerprints 1 History 3000 years ago: Chinese used fingerprints to sign legal documents 1892 Galton describes loops, whorls, and arches 1897 Sir Edward Henry develops the classification

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable

More information

CHAPTER 4 MINUTIAE EXTRACTION

CHAPTER 4 MINUTIAE EXTRACTION 67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as

More information

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor

More information

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes Read the introduction on page 134 of your text and the scenario below. Answer the questions in pairs. It is your first year at college and there is a break in at the dorm. Fingerprints have been left at

More information

Unit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.

Unit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right. Name: KEY Unit 2 Review-Fingerprints 1. Match the definitions of the word on the right with the vocabulary terms on the right. 1. Fluoresce O 2. Iodine fuming F 3. Latent fingerprint P 4. Livescan A 5.

More information

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image. An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

Modern Biometric Technologies: Technical Issues and Research Opportunities

Modern Biometric Technologies: Technical Issues and Research Opportunities Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric

More information

ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM

ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM A. Vinoth 1 and S. Saravanakumar 2 1 Department of Computer Science, Bharathiar University,

More information

Information hiding in fingerprint image

Information hiding in fingerprint image Information hiding in fingerprint image Abstract Prof. Dr. Tawfiq A. Al-Asadi a, MSC. Student Ali Abdul Azzez Mohammad Baker b a Information Technology collage, Babylon University b Department of computer

More information

T. Trimpe

T. Trimpe T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people

More information

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Shannon Information theory, coding and biometrics. Han Vinck June 2013 Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander

More information

LATENT fingerprints 1 are arguably the most important

LATENT fingerprints 1 are arguably the most important JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 End-to-End Latent Fingerprint Search Kai Cao, Member, IEEE, Dinh-Luan Nguyen, Student Member, IEEE, Cori Tymoszek, Student Member, IEEE,

More information

JY Division I nformation

JY Division I nformation Feature Article JY Division I nformation Forensic Products and Technologies of the Forensic Division Nicolas Vezard The Forensic Division has been focused on Identification Instruments since its beginnings

More information

LATENT fingerprints 1 are arguably the most important

LATENT fingerprints 1 are arguably the most important JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 End-to-End Latent Fingerprint Search Kai Cao, Member, IEEE, Dinh-Luan Nguyen, Student Member, IEEE, Cori Tymoszek, Student Member, IEEE,

More information

The study of fingerprints for identification purposes is known as dactylography or dactyloscopy.

The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. Your fingers, toes, feet, palms, and lips are covered with small ridges that are raised portions of the

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Standard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses

Standard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses Standard Fingerprint Databases Manual Mehmet Kayaoglu, Berkay Topcu, Umut Uludag TUBITAK BILGEM, Informatics and Information Security Research Center, Turkey {mehmet.kayaoglu, berkay.topcu, umut.uludag}@tubitak.gov.tr

More information

JAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION

JAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION Topic Fingerprints Key Question How do our fingerprints compare? Focus Comparisons are made of the fingerprints on all five digits to determine likenesses and differences. Guiding Documents Project 2061

More information

THE word individual has its roots in the word indivisible

THE word individual has its roots in the word indivisible TECHNICAL REPORT, MICHIGAN STATE UNIVERSITY, MSU-CSE-18-2, February 201 1 Global ID: Biometrics for Billions of Identities Anil K. Jain, Life Fellow, IEEE, Sharath Pankanti, Fellow, IEEE, Karthik Nandakumar,

More information

Card IEEE Symposium Series on Computational Intelligence

Card IEEE Symposium Series on Computational Intelligence 2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion

More information

Performance Analysis of Multimodal Biometric System Authentication

Performance Analysis of Multimodal Biometric System Authentication 290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute

More information

Little Fingers. Big Challenges.

Little Fingers. Big Challenges. Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

Noise Elimination in Fingerprint Image Using Median Filter

Noise Elimination in Fingerprint Image Using Median Filter Int. J. Advanced Networking and Applications 950 Noise Elimination in Fingerprint Image Using Median Filter Dr.E.Chandra Director, Department of Computer Science, DJ Academy for Managerial Excellence,

More information

Fingerprinting. Forensic Science

Fingerprinting. Forensic Science Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether

More information

Feature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits

Feature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits 1 Biological and Applied Sciences Vol.59: e16161074, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161074 ISSN 1678-4324 Online Edition BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY A N

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy Finger print Recognization By M R Rahul Raj K Muralidhar A Papi Reddy Introduction Finger print recognization system is under biometric application used to increase the user security. Generally the biometric

More information

FingerDOS: A Fingerprint Database Based on Optical Sensor

FingerDOS: A Fingerprint Database Based on Optical Sensor FingerDOS: A Fingerprint Database Based on Optical Sensor FLORENCE FRANCIS-LOTHAI 1, DAVID B. L. BONG 2 1, 2 Faculty of Engineering Universiti Malaysia Sarawak 94300 Kota Samarahan MALAYSIA 1 francislothaiflorence@gmail.com,

More information

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:

More information

Segmentation of Fingerprint Images Using Linear Classifier

Segmentation of Fingerprint Images Using Linear Classifier EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation

More information

50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities

50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities To Appear in Pattern Recognition Letters 2016 1 Pattern Recognition Letters journal homepage: www.elsevier.com 50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities Anil K. Jain

More information

Thoughts on Fingerprint Image Quality and Its Evaluation

Thoughts on Fingerprint Image Quality and Its Evaluation Thoughts on Fingerprint Image Quality and Its Evaluation NIST November 7-8, 2007 Masanori Hara Recap from NEC s Presentation at Previous Workshop (2006) n Positioning quality: a key factor to guarantee

More information

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Thank you for your purchase!

Thank you for your purchase! TM Thank you for your purchase! Please be sure to save a copy of this document to your local computer. This activity is copyrighted by the AIMS Education Foundation. All rights reserved. No part of this

More information

On the Individuality of Fingerprints

On the Individuality of Fingerprints 1010 IEEE TRNSCTIONS ON PTTERN NLYSIS ND MCHINE INTELLIGENCE, VOL. 24, NO. 8, UGUST 2002 On the Individuality of Fingerprints Sharath Pankanti, Senior Member, IEEE, Salil Prabhakar, Member, IEEE, and nil

More information

BIOMETRIC IDENTIFICATION

BIOMETRIC IDENTIFICATION BIOMETRIC IDENTIFICATION When it comes to working biometric identification technologies, it s not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature

More information

IT and SRINIVAS. nology. 1 Research Scholar, Type of Type of. Google. How to Cite this. Paper: Studies in. the work.

IT and SRINIVAS. nology. 1 Research Scholar, Type of Type of. Google. How to Cite this. Paper: Studies in. the work. International Journal of Case Studies in Business, IT and A Critical Study on Fingerprint Image Sensing and Acquisition Techn nology Krishna Prasad K. 1 & Dr. P. S. Aithal 2 1 Research Scholar, College

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

Fingerprints (Unit 4)

Fingerprints (Unit 4) 21 Fingerprints (Unit 4) Fingerprints have long been a mainstay in the area of forensic science. Since the nineteenth century, authorities have used fingerprints to prove a person handled an object or

More information

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the

More information

MorphoTrust TM Iris Recognition

MorphoTrust TM Iris Recognition WHITE PAPER Iris Recognition The state of the art in Algorithms, Fast Identification Solutions and Forensic Applications Kirsten R. Nobel, PhD Principal Solution Engineer Contents 2 table OF CONTENTS 3

More information

When You Think You Are Done

When You Think You Are Done When You Think You Are Done - More Fingerprint and Face Steps for Success Presented 28 April 2016 Illinois Division, IAI by Ed German Macon County Sheriff s Office Alternate Title for This Presentation:

More information

From the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match.

From the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match. Do you see the island, the bifurcation, the ending ridge in this fingerprint? Name: These are actual crime-scene fingerprints and some scenarios. Solve the crime! 1. Which person held up the couple at

More information

All-in-One Scanner VF1

All-in-One Scanner VF1 All-in-One VF1 for fingerprints, epassports, ID Cards, signatures, flight tickets, barcodes, photos etc. Passport Fingerprint ID Card Signature Pad Flight Ticket Photo Barcode Reader Document Key Benefits

More information

Advances in Iris Recognition Interoperable Iris Recognition systems

Advances in Iris Recognition Interoperable Iris Recognition systems Advances in Iris Recognition Interoperable Iris Recognition systems Date 5/5/09 Agenda How best to meet operational requirements Historical Overview of iris technology The current standard Market and Technological

More information