Biometrics Technology: Finger Prints
|
|
- Terence Townsend
- 5 years ago
- Views:
Transcription
1 References: Biometrics Technology: Finger Prints [FP1] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms and Performance Evaluation", IEEE Trans. on PAMI, Vol. 20, No. 8, pp , August [FP2] A.K. Jain, L. Hong and R. Bolle, "On-line Fingerprint Verification", IEEE Trans. on PAMI, Vol. 19, No. 4, pp , [FP3] A. K. Jain, S. Prabhakar, L. Hong and S. Pankanti, "Filterbank-based Fingerprint Matching", IEEE Transactions on Image Processing, Vol. 9, No.5, pp , May [FP4] A.K. Jain, S. Pankanti, A Touch of Money, IEEE Spectrum, July [FP5] Davide Maltoni, Dario Maio, Anil K. Jain and Salil Prabhakar, Handbook of Fingerprint Recognition, Springer, (ISBN ). [FP6] Lawrence O Gorman, FingerPrint Verification, Chapter 2, Bometrics: Personal Identification in Networked Society, Anil Jain, Ruud Bolle, Sharath Pankanti, Ed. Kluwer Academic Publishers, w05-fingerprints Biometrics - Summer
2 Biometrics Technology: Finger Prints Outline: History (ref.[fp6]) Acquisition Devices (Ref.[FP6]) Raw data Features, representation (Ref.[FP1, FP2, FP3]) Matching (Ref.[FP1, FP2, FP3]) Application (Ref.[FP4]) w05-fingerprints Biometrics - Summer
3 Why Fingerprints? Fingerprint-based identification has a long history. Different fingers have different ridge characteristics (minute details). Minute details are permanent. Fingerprint identification is acceptable in a court of law. Fingerprint on Palestinian lamp (400 A.D.) Bewick s trademark w05-fingerprints Biometrics - Summer
4 History The oldest form of biometrics. There is archaeological evidence that ancient Assyrians and Chinese had used fingerprints as a form of identification. Many impressions of fingers are found on ancient pottery, as on Roman tiles Clay pottery from these times contain fingerprint impression to signify the potter. Clay seals marked by thumbprints are found in Chinese documents. In the mid 1800 s, scientific studies established two critical characteristics of fingerprints: 1. No two fingerprints from different fingers have been found to have the same ridge pattern; and 2. Fingerprint ridge patterns do not change throughout life. w05-fingerprints Biometrics - Summer
5 History Use of fingerprints for criminal identification: 1896 Argintina, South America 1901 Scotland Yard, UK 1900 s to todate other countries Computer processing of fingerprints began in the early In 1980, personal computers and optical scanners enabled the capturing of fingerprint practical in a non-criminal setting. w05-fingerprints Biometrics - Summer
6 History Grew (1684) published the first scientific paper on ridges, furrows and pore structures Mayer (1788) gave a detailed description of the anatomical formation of fingerprints Bewick (1809) began to use his fingerprint as his trademark Purkinje (1823) classified fingerprints into nine categories based on ridge configurations Herschel (1858) started using fingerprints instead of signatures on legal contracts in Bengal Henry Fauld (1880) suggested "scientific identification of criminals" using fingerprints Galton(1888) introduced the minutiae features for fingerprint matching. w05-fingerprints Biometrics - Summer
7 History 1899, Edward Henry established the well-known Henry system of fingerprint classification. The biological principles of fingerprints are summarized: (p.23-24, of [FP5]) 1. Individual epidermal ridges and furrows have different characteristics for different fingerprints established the foundation of fingerprint recognition 2. The configuration types are individually variable, but they vary within limits that allow for a systematic classification established the foundation of fingerprint classification 3. The configurations and minute details fo individual ridges and furrows are permanent and unchanging. FBI (1924) set up a fingerprint identification division with a database of 810,000 fingerprints w05-fingerprints Biometrics - Summer
8 Formation of Fingerprints ref.[fp5] They are fully formed at about 7 months of fetus development. Finger ridge configurations do not change throughout the life of an individual except due to accidents. Appearance and fingerprints are a part of an individual s phenotype (genetic and environment) The general characteristics of the fingerprint emerge as the skin on the fingertip begins to differentiate. The differentiation process is triggered by the growth in size of the volar pads on the palms, fingers, soles and toes. However, the flow of the amniotic fluids around the fetus and its position in the uterus change during the differentiation process. w05-fingerprints Biometrics - Summer
9 Formation of Fingerprints ref.[fp5] Thus the cells on the fingertips grow in a microenvironment that is slightly different from hand to hand and finger to finger.... A small difference in micro-environment is amplified by the differentiation process of the cells. There are so many variations during the formation of fingerprints that it would be virtually impossible for two fingerprints to be exactly the same. But, because the fingerprints are differentiated from the same genes, they are not totally random patterns either. By definition, identical twins cannot be differentiated based on DNA. Typically, most of the physical characteristics such as body type, voice and face are very similar for identical twins. w05-fingerprints Biometrics - Summer
10 Formation of Fingerprints ref.[fp5] Although minute details in the fingerprints of identical twins are different, a number of studies have shown significant correlation in the fingerprint class of identical twin fingers. In dermatoglyphics studies, the maximum generic difference between fingerprints has been found among individuals of different races. Unrelated persons of the same race have very little generic similarity in their fingerprints, Parent and child have some generic similarity as they share half the genes, Siblings have more similarity, and the maximum generic similarity is observed in identical twins. w05-fingerprints Biometrics - Summer
11 The main parameters: Acquisition Devices Resolution the no. of pixels per inch (dpi). FBI requires 500 dpi. Area the larger the area, more patterns can be captured. Typically, an area of 1x1 square inch is sufficient. Number of pixels simply the product of resolution and area, e.g. 400x300 is not uncommon. Dynamic range (or depth) the intensity of each pixel, 8 bits (256 gray levels) is common. (no need of color) Geometric accuracy depending on the relative positions between the finger and the sensor, how much distortion is introduced and/or recovered. Image quality depends very much on the intrinsic finger quality of the user. For example, the patterns may be very light, fingers may be too wet, or too dry. w05-fingerprints Biometrics - Summer
12 Fingerprint sensors w05-fingerprints Biometrics - Summer
13 Finger Print Patterns w05-fingerprints Biometrics - Summer
14 Inking - (Off-line) Acquisition Device traditional mode of criminal fingerprint capture before advances in electronic H/W inconvenient for automatic verification due to the inconveniences involved, i.e. ink and subsequent digitization of the imprint. Connotation of inking fingerprints implies criminal activities not too welcome!! Quality is not good usually. w05-fingerprints Biometrics - Summer
15 Optical sensors Life Scan Devices Ref.[FP5] Frustrated Total Internal Reflection (FTIR) (Fig. 2.6) FTIR with a sheet prism (Fig. 2.7) Optical Fibers (Fig. 2.8) Electro-optical (Fig. 2.9) Direct reading uses a high-quality camera. No contact. But obtaining well-focused and good quality image is very difficult. Solid-state sensors (Silicon Sensors) Capacitive (Fig.2.10) Thermal Electric field Piezoeletric Ultrasound sensors (Fig. 2.11) Sweep Types (section 2.5) Images are constructed from the slices captured by the sensors. Initially as necessary in the thermal device. w05-fingerprints Biometrics - Summer
16 Optical Sensor Frustrated Total Internal Reflection Features Finger touches the top of the glass prism, i.e. ridges in contact with the glass Left side of the prism is illuminated The light entering the prism is reflected at the valleys The light rays exit from the right side of the prism and are captured via CCD or CMOS image sensor Fig.2.6 FTIR-based fingerprint sensing [FP5] Limitation: Trapezoidal distortion w05-fingerprints Biometrics - Summer
17 Optical Sensor FTIR with a sheet prism Features An array of microprisms is mounted upon an elastic surface. When a fingerprint is applied to the surface, the different ridge and valley pressures alter the planar surfaces of the micro-prisms. This image is captured optically via the reflected light (or the absence of it) from the micro-prisms. Fig.2.7 FTIR-based with sheet prism [FP5] Limitation: Image quality is lower than glass prism w05-fingerprints Biometrics - Summer
18 Optical Sensor Optical Fibers Fig.2.8 Based on Optical Fibers [FP5] Limitation: Higher cost Features Substituting prisms with fiber-optic platen, significant reduction in packaging can be achieved A bundle of optical fibers is aimed perpendicularly to the fingerprint surface. These illuminate the fingerprint and detect reflection from it to construct the image. The CCD/CMOS is in direct contact with the platen w05-fingerprints Biometrics - Summer
19 Optical Sensor Electro-optical Fig.2.9 Electro-optical sensor [FP5] Limitation: Quality of image is lower than that from FITR Features consists of 2 layers: Polymer layer when polarized with proper voltage, emits light that depends on the potential applied on one side. As ridges touch polymer while valleys do not, the potential is different, the amount of light emitted also varies a luminous representation of the fingerprint pattern to be generated 2 nd layer - photodiode array embedded in glass captures the pattern as image. w05-fingerprints Biometrics - Summer
20 Life Scan Devices Ref.[FP5] Solid-state sensors (Silicon Sensors) Attempt to reduce the size and cost of optically based sensor. However, the cost of silicon sensors is not less because a smaller area of sensing is not acceptable. Consist of arrays of pixels of sensors. The user touches directly the surface of the silicon surface Neither optical components or external CCD/CMOS image sensors are needed. Electrical signals are generated to capture the ridges and valleys of the finger. Four main types to convert physical information to electrical signals: Capacitive (Fig.2.10) Thermal Electric field Piezoeletric w05-fingerprints Biometrics - Summer
21 Solid-state sensors - Capacitive Fig.2.10 Capacitive Sensing [FP5] Limitation: The need to clean the surface frequently to prevent grease and dirt on the surface. Features A 2-D array of microcapacitor plates embedded in a chip. The other plate is the finger skin itself. Small electrical charges when the finger is in contact with the plate. Critical component is the surface coating as thin as possible but able to be resistant to physical abrasion. need to reduce the sensitivity to electrostatic discharges, chemical corrosion, etc. w05-fingerprints Biometrics - Summer
22 Life Scan Devices Ref.[FP5] Solid-state sensors (Silicon Sensors) Thermal: Made of pyro-electro material that generates current based on the temperature differentials. Ridges and valleys on fingerprints produce different temperatures. Advantage: not sensitive to ESD, can accept a thick protective coating. Electric field: Sensor consists of a drive ring and a matrix of active antennas. The finger must be in contact with the sensor such that the analogue response of each element in the sensor matrix is amplified, integrated and digitized. Piezoelectric: The surface is made of non-conducting dielectric material which on encountering pressure will generate electric current. Ridges and valleys generate different amounts of current due to pressure applied. Limitations: materials not sensitive to produce sufficient current to detect differences use of micro-switches; coating is still a problem also produces a binary image; w05-fingerprints Biometrics - Summer
23 Life Scan Devices - Ultrasound Sensor Fig Basic principle of ultrasound sensing [FP5] Limitation: scanner is large in size; expensive; takes a few seconds to capture an image. Features Based on acoustic signals (echography): Acoustic signals are sent towards the finger and the echo signals are captured. The echo signal is used to compute the image of the ridges and valleys. Two components: transmitter and receiver. Advantages: resilient to dirt and grease on the fingers; works even when user wears thin gloves w05-fingerprints Biometrics - Summer
24 Table 2.1 [FP5] w05-fingerprints Biometrics - Summer
25 Raw Data - Fingerprint Images A rolled inked fingerprint Digital Biometrics sensor (508x480) Fidelica sensor (256x256) Veridicom sensor (300x300) w05-fingerprints Biometrics - Summer
26 Raw Data - Fingerprint Images Arch (A) Tented Arch (T) Right Loop (R) Left Loop (L) Double Loop (W) Whorl (W) w05-fingerprints Biometrics - Summer
27 Raw Data - Fingerprint Images Fingerprints from two different fingers Fingerprints from the same finger w05-fingerprints Biometrics - Summer
28 Finger Print Image Enhancement ([FP1]) In general, due to skin conditions (e.g. dry, wet, bruise, etc.), sensor noise, incorrect finger pressure, and inherent low quality fingers, many fingerprints acquired are of low quality. Enhancement is necessary [FP1] Pre-processing the images to binary form, directional, etc. are also necessary. Enhanced w05-fingerprints Biometrics - Summer
29 FingerPrint - Features The most evident structural characteristics of a fingerprint is a pattern of interleaved Ridges lines that flow in various patterns (dark) Vary in width from 100 μm (very thin) to 300 μm (very thick) Valleys spaces between the ridges (white) Ridges and Valleys usually run in parallel, with a cycle period of about 500 μm They bifurcate or terminate Ref.[FP4], Chapter 3 w05-fingerprints Biometrics - Summer
30 FingerPrints Feature Extraction At the global level, ridge lines assumes distinctive shapes within regions. These regions (singularities) are typically classified into 2 topologies: core and delta core delta Whorl (W) Tented Arch (T) w05-fingerprints Biometrics - Summer
31 FingerPrint - Features delta delta Arch (A) core Tented Arch (T) core Right Loop (R) delta? core Left Loop (L) core Double Loop (W) Whorl (W) w05-fingerprints Biometrics - Summer
32 FingerPrint - Features At the local level behavior of the ridges provides more details. Different ways that the ridges becomes discontinuous is referred to as minutia (small details). A ridge can suddenly come to an end, i.e. terminate, or A ridge can divide into two ridges, i.e. bifurcate. (Figure 1 of [FP1]) Ridge Bifurcation Ridge Ending w05-fingerprints Biometrics - Summer
33 w05-fingerprints Biometrics - Summer
34 Minutiae Extraction 1. Input Image 2. Orientation Estimation 3. Ridge Filter 5. Postprocessing 4. Ridge Thinning 6. Minutiae Extraction w05-fingerprints Biometrics - Summer
35 Estimation of Orientation Field Ref. FP[1] Orientation is estimated in within windows, e.g. 16x16 Refined using local orientation consistency Directional image Before refinement After refinement w05-fingerprints Biometrics - Summer
36 Ridge Extraction Input image Extracted ridges w05-fingerprints Biometrics - Summer
37 Post-Processing - Ridge w05-fingerprints Biometrics - Summer
38 Minutiae Detection [FP2] Input live-scan image Extracted minutiae: Position (x,y) Direction (θ) w05-fingerprints Biometrics - Summer
39 Minutiae Verification and Classification Minutia detection without pruning Results of minutia verification (rejected=yellow) Minutia classification (bifurcation=green; ending=red) w05-fingerprints Biometrics - Summer
40 Fingerprint Matching Ref.[chapter 4, FP5] This is an extremely difficult problem, due to the large variability in the different images of the same finger, i.e. large intra-class variation. Factors causing the difficulty include Displacement Rotation Partial overlap Non-linear distortion Pressure and skin condition Noise Feature extraction errors w05-fingerprints Biometrics - Summer
41 Fingerprint Matching Ref.[chapter 4, FP5] In general, there are three categories of matching methods: 1. Correlation-based two images are superimposed. The correlation between corresponding pixel taken as the matching score. 2. Minutiae-based [FP2] most popular and widely used technique. Alignment between the template and input minutiae set indicates the matching score 3. Ridge feature-based minutiae features are difficult to extract in poor quality images. This approach compares features extracted from the ridge patterns, e.g. delta, core, furrow, etc. or texture features [FP3] w05-fingerprints Biometrics - Summer
42 Correlation-based Fingerprint Matching Ref. [Section 4.2, FP5] Let T and I the template and input fingerprint image respectively, then the intuitive measure of their diversity (distance) is the sum of the squared differences (SSD) between the intensities of the corresponding pixels, i.e. SSD ( T, I ) = T I 2 = ( T I ) T ( T I ) = T 2 + I 2 2T T I. The terms T 2 and I 2 are constants, the diversity between the two images is minimized when the cross-correlation (CC) between T and I is maximized, CC T ( T, I ) = T I. Note that the quantity (-2) CC(T,I) appears as the third term in SSD. Thus, CC is a similarity measure!! w05-fingerprints Biometrics - Summer
43 Correlation-based Fingerprint Matching Ref. [Section 4.2, FP5] Unfortunately, due to displacement and rotation, their similarity cannot be simply the CC!! Rotational and displacement effect must be incorporated in the similarity measure. Let θ be the rotation and (Δ x, Δ y ) be the displacement of the input image I repsectively, then the similarity between the two images can be measured as S ( T, I ) = max Δ x, Δ y, θ CC ( T, I ( Δ x, Δ y, θ ) ). Due to the non-linear distortion, skin condition and finger pressure, it s rarely good result can be obtained from the direct application of the equation. In addition, direct application of the equation is computationally costly. There are much research activities in this type of matching. w05-fingerprints Biometrics - Summer
44 Correlation-based Fingerprint Matching Ref. [Section 4.2, FP5] Fig. 4.3 (p.139) 2 Impressions of same finger, and the best alignment (max. correlation) a) Very similar, correlates well. b) High distortion, c) Bad skin condition w05-fingerprints Biometrics - Summer
45 w05-fingerprints Biometrics - Summer Minutiae-based Fingerprint Matching Ref.[FP2, chapter 4, FP5] Most well-known and widely used method todate. In this approach, the fingerprint representation is a feature vector (of variable length) of minutiae. Most minutia is represented by a triplet, m={x,y,θ } where (x,y) gives the location of the minutia, and the angle. Thus, template, T and input, I of two fingerprints are represented by. 1,..., }, ', ', ' { ' }, ',..., ', ' {. 1,..., },,, { },,...,, { n j y x m m m m I m i y x m m m m T j j j j n i i i i m = = = = = = θ θ Two minutiae considered to be matched, if the spatial distance (sd) and the directional difference (dd) are smaller than some threshold values, i.e.. ) ',360 ' min( ), ' (, ) ' ( ) ' ( ), ' ( θ θ θ θ θ = + = i j i j i j i j i j i j m m dd r y y x x m m sd
46 Minutiae-based Fingerprint Matching Ref.[FP2, chapter 4, FP5] Based upon this idea, many researchers have developed different algorithms to optimize the matching. Pictorially, The o are the T minutiae, and The x are the I minutiae. w05-fingerprints Biometrics - Summer
47 Another Minutiae Matching Algorithm Ref.[FP2] Generate Alignment Hypothesis Find Similarity Using Elastic String Matching Matching score w05-fingerprints Biometrics - Summer
48 Minutiae Matching Result w05-fingerprints Biometrics - Summer
49 Ridge Feature-based Matching Ref.[FP3] Reference point(x), the region of interest and 80 sectors superimposed on a fingerprint. w05-fingerprints Biometrics - Summer
50 w05-fingerprints Biometrics - Summer
51 Decomposition using Gabor Filters 45 o orientation filter 90 o orientation filter 45 o filtered image 90 o filtered image w05-fingerprints Biometrics - Summer
52 640-dimensional FingerCode Finger 1, Impression 1 Finger 1, Impression 2 Finger 2, Impression 1 Finger 2, Impression 2 FingerCode FingerCode FingerCode FingerCode w05-fingerprints Biometrics - Summer
53 New Approach - Fingerprint as a range image (a) Input Image (b) Median filtered Image (c) Segmented Image (d) Range image w05-fingerprints Biometrics - Summer
54 Another matching algorithm - Mosaicking Algorithm First image Mosaicked image Second image Final alignment of images Augmented minutiae set w05-fingerprints Biometrics - Summer
55 Fingerprint Alignment T1-1 T1 T2 ο T1-1 T2 T1, T2: transformations that fit the (same) kernel to each impression. Bring top kernel onto the bottom kernel Overlapped impressions. Green: common ridges. w05-fingerprints Biometrics - Summer
56 Mosaicking Minutiae matching w05-fingerprints Biometrics - Summer
57 Mosaicking Performance w05-fingerprints Biometrics - Summer
58 Company(web site) Sensor FAR(%) FRR(%) Biolink USA (biolinkusa.com) BiometricId (biometricid.com) Performance Claims by Vendors Optical Optical Startek (startek.com.tw) Optical IOSoftware (iosoftware.com) Optical Identix (identix.com) Optical NEC (nectech.com) Solid-State 2x10-4 5x 10-2 Biometrix Int (biometrix.at) Solid-State Pollex (pollex.ch) Solid-State Sony (sony.com) Solid-State Performance discrepancy between lab systems and deployed systems is due to difference in acquisition conditions w05-fingerprints Biometrics - Summer
59 Application: Credit Card A Touch of Money [FP4] The credit card has a sensor which will scan, extract features from a finger Need to register your finger print to the credit card company When you present your card to the point-of-sale terminal, secure communication will be established Verification of the validity of the card will be done You have to present your finger to the sensor on the card. Verification of your finger print with that from the data base will be performed. If verified, a digital signature will be sent to the point-of-sale terminal. You will be charged with the purchase. Only the vendor and your account information will be sent to the credit card company. Your finger print remains in the card. w05-fingerprints Biometrics - Summer
Biometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationFingerprint Recognition using Minutiae Extraction
Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationInformation hiding in fingerprint image
Information hiding in fingerprint image Abstract Prof. Dr. Tawfiq A. Al-Asadi a, MSC. Student Ali Abdul Azzez Mohammad Baker b a Information Technology collage, Babylon University b Department of computer
More informationSensors. CSE 666 Lecture Slides SUNY at Buffalo
Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various
More informationFinger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy
Finger print Recognization By M R Rahul Raj K Muralidhar A Papi Reddy Introduction Finger print recognization system is under biometric application used to increase the user security. Generally the biometric
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationObjectives. You will understand: Fingerprints Fingerprints
Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.
More informationUnit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.
Name: KEY Unit 2 Review-Fingerprints 1. Match the definitions of the word on the right with the vocabulary terms on the right. 1. Fluoresce O 2. Iodine fuming F 3. Latent fingerprint P 4. Livescan A 5.
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationAdaptive Fingerprint Binarization by Frequency Domain Analysis
Adaptive Fingerprint Binarization by Frequency Domain Analysis Josef Ström Bartůněk, Mikael Nilsson, Jörgen Nordberg, Ingvar Claesson Department of Signal Processing, School of Engineering, Blekinge Institute
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationHistory of Fingerprints
Fingerprints History of Fingerprints Johann Christoph Andreas Mayer 1788 First scientist to recognize fingerprints were unique William Herschel 1856 Began the collecting of fingerprints Alphonse Bertillon
More informationFingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs
Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies
More informationChallenges and Potential Research Areas In Biometrics
Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationName TRAINING LAB - CLASSIFYING FINGERPRINTS
TRAINING LAB - CLASSIFYING FINGERPRINTS Name Background: You have some things that are yours and yours alone - and NO ONE else on earth has anything exactly like it! They are your fingerprints. Everyone
More informationAutomation of Fingerprint Recognition Using OCT Fingerprint Images
Journal of Signal and Information Processing, 2012, 3, 117-121 http://dx.doi.org/10.4236/jsip.2012.31015 Published Online February 2012 (http://www.scirp.org/journal/jsip) 117 Automation of Fingerprint
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationT. Trimpe
T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationDNA Station. 3. Extract DNA from your own cheek. (see Wind your way around your own DNA)
DNA Station 1. Identify yourself! DNA (deoxyribonucleic acid) is the genetic material that identifies all of us as unique unless you're an identical twin. Even between identical twins, fingerprints are
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationWhose Fingerprints Were Left Behind
Edvo-Kit #S-91 Whose Fingerprints Were Left Behind Experiment Objective: The objective of this experiment is to familiarize students with the use of various fingerprinting dusting powders and to match
More informationThe study of fingerprints for identification purposes is known as dactylography or dactyloscopy.
The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. Your fingers, toes, feet, palms, and lips are covered with small ridges that are raised portions of the
More informationQuantitative Assessment of the Individuality of Friction Ridge Patterns
Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University
More informationFeature Extraction of Human Lip Prints
Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationINTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION
More informationResearch on Friction Ridge Pattern Analysis
Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute
More informationImage Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP, Faridabad, Haryana,121001, India
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 45 Image Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP,
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint
More informationT. Trimpe 2006
T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people
More informationNoise Elimination in Fingerprint Image Using Median Filter
Int. J. Advanced Networking and Applications 950 Noise Elimination in Fingerprint Image Using Median Filter Dr.E.Chandra Director, Department of Computer Science, DJ Academy for Managerial Excellence,
More informationCity Research Online. Permanent City Research Online URL:
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable
More informationFingerprint Analysis. Bud & Patti Bertino
Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationI. Introduction. Fingerprint Pattern Types 1. Loop, Whorl, Arch. III. Fingerprint Impression Types 1. Rolled, Plain
Section I. Introduction The purpose of this program is to provide information regarding the nature of fingerprints and outline techniques for taking legible fingerprints. Fingerprints can be recorded on
More informationHistory of Fingerprinting
Fingerprints History of Fingerprinting People have always wanted a full proof way to identify someone. The first system was created by Alphonse Bertillon (1883) Used a detailed description plus full length
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationFingerprint Principles
What pattern are you? T. Tomm 2006 http://sciencespot.net 8 th Grade Forensic Science Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint
More informationThe Integument Laboratory
Name Period Ms. Pfeil A# Activity: 1 Visualizing Changes in Skin Color Due to Continuous External Pressure Go to the supply area and obtain a small glass plate. Press the heel of your hand firmly against
More informationA Generative Model for Fingerprint Minutiae
A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University {qjzhao, yi.zhang}@scu.edu.cn Anil K. Jain Michigan State University jain@cse.msu.edu Nicholas G. Paulter Jr., Melissa
More informationFingerprints. Fingerprints. Dusan Po/Shutterstock.com
Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal
More informationArches are the simplest type of fingerprints that are formed by ridges that enter on one of the print and exit on the. No are present.
Name: 1. Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: 1. A fingerprint is an characteristic; no two people have been found with the same fingerprint
More informationFORENSIC SCIENCE Fingerprints
FORENSIC SCIENCE Fingerprints 1 History 3000 years ago: Chinese used fingerprints to sign legal documents 1892 Galton describes loops, whorls, and arches 1897 Sir Edward Henry develops the classification
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationROBOT VISION. Dr.M.Madhavi, MED, MVSREC
ROBOT VISION Dr.M.Madhavi, MED, MVSREC Robotic vision may be defined as the process of acquiring and extracting information from images of 3-D world. Robotic vision is primarily targeted at manipulation
More informationVein pattern recognition. Image enhancement and feature extraction algorithms. Septimiu Crisan, Ioan Gavril Tarnovan, Titus Eduard Crisan.
Vein pattern recognition. Image enhancement and feature extraction algorithms Septimiu Crisan, Ioan Gavril Tarnovan, Titus Eduard Crisan. Department of Electrical Measurement, Faculty of Electrical Engineering,
More informationUnit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)
Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor
More informationStudy of 3D Barcode with Steganography for Data Hiding
Study of 3D Barcode with Steganography for Data Hiding Megha S M 1, Chethana C 2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationFingerprints. Sierra Kiss
Fingerprints Sierra Kiss Introduction Fingerprints are one of the most commonly known biometrics that play a major role in law enforcement and the criminal justice system in identification of criminals.
More informationLearning ngerprint minutiae location and type
Pattern Recognition 36 (3) 1847 1857 www.elsevier.com/locate/patcog Learning ngerprint minutiae location and type Salil Prabhakar a;, Anil K. Jain b, Sharath Pankanti c a Digital Persona Inc., 805 Veterans
More informationHistorical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes
Read the introduction on page 134 of your text and the scenario below. Answer the questions in pairs. It is your first year at college and there is a break in at the dorm. Fingerprints have been left at
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationBackground. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image
Background Computer Vision & Digital Image Processing Introduction to Digital Image Processing Interest comes from two primary backgrounds Improvement of pictorial information for human perception How
More informationCHAPTER 4 MINUTIAE EXTRACTION
67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM
ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM A. Vinoth 1 and S. Saravanakumar 2 1 Department of Computer Science, Bharathiar University,
More informationPreprocessing and postprocessing for skeleton-based fingerprint minutiae extraction
Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,
More informationSensors and Sensing Cameras and Camera Calibration
Sensors and Sensing Cameras and Camera Calibration Todor Stoyanov Mobile Robotics and Olfaction Lab Center for Applied Autonomous Sensor Systems Örebro University, Sweden todor.stoyanov@oru.se 20.11.2014
More informationThe future of the broadloom inspection
Contact image sensors realize efficient and economic on-line analysis The future of the broadloom inspection In the printing industry the demands regarding the product quality are constantly increasing.
More informationIntelligent Identification System Research
2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationIT and SRINIVAS. nology. 1 Research Scholar, Type of Type of. Google. How to Cite this. Paper: Studies in. the work.
International Journal of Case Studies in Business, IT and A Critical Study on Fingerprint Image Sensing and Acquisition Techn nology Krishna Prasad K. 1 & Dr. P. S. Aithal 2 1 Research Scholar, College
More informationFingerprint Combination for Privacy Protection
Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract
More informationLittle Fingers. Big Challenges.
Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationJAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION
Topic Fingerprints Key Question How do our fingerprints compare? Focus Comparisons are made of the fingerprints on all five digits to determine likenesses and differences. Guiding Documents Project 2061
More informationFingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018
Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018 http://biometrics.cse.msu.edu/ Friction Ridge Patterns Dermatoglyphics. Derma: skin; Glyphs: carving
More informationSegmentation of Fingerprint Images Using Linear Classifier
EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems
More informationFingerprinting. Forensic Science
Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether
More information8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and
8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More informationBIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the
More informationStudy Guide Chapters 3 & 4 Forensic Science Name
Chapter 3 Body of the Crime 1. Corpus Delicti means. Money 2. Top 3 reasons for committing a crime. Revenge Emotion-love,hate, anger. Body 3. 3 sources of evidence: Primary or secondary crime scene Suspects
More informationFrom the industry leaders in live scan, comes a higher level in image quality... TouchPrint Enhanced Definition Live Scan Series
From the industry leaders in live scan, comes a higher level in image quality... TouchPrint Enhanced Definition 3000 Live Scan Series Higher Quality Images = Enhanced AFIS Performance With 20 years experience
More information1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.
a Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
More informationRobust Hand Gesture Recognition for Robotic Hand Control
Robust Hand Gesture Recognition for Robotic Hand Control Ankit Chaudhary Robust Hand Gesture Recognition for Robotic Hand Control 123 Ankit Chaudhary Department of Computer Science Northwest Missouri State
More informationFiberio. Fiberio. A Touchscreen that Senses Fingerprints. A Touchscreen that Senses Fingerprints
Fiberio A Touchscreen that Senses Fingerprints Christian Holz Patrick Baudisch Hasso Plattner Institute Fiberio A Touchscreen that Senses Fingerprints related work user identification on multitouch systems
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More information