Fingerprint Recognition Checkpoint Slides Andrew Ackerman Professor Ostrovsky.

Slides:



Advertisements
Similar presentations
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Advanced Data Structures
Finger print classification. What is a fingerprint? Finger skin is made of friction ridges, with pores (sweat glands). Friction ridges are created during.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Chapter 17 Design Analysis using Inventor Stress Analysis Module
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
THE FINGERPRINT  The reader acquires the fingerprint image.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
To solve the problem of limited documentation and example code available on the subject of biometrics. Research that is done in this field can not directly.
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Fingerprint Authentication Kevin Amendt David Friend April 26, MIT Course Project Presentations.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Secure Authentication Using Biometric Data Andrew Ackerman Professor Ostrovsky.
Checkpoint PowerPoint Fall Quarter 2007 COM SCI 194 Honors Research Professor Amit Sahai Alexander Liu and Eric Chang.
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 17: Code Mining.
16 December 2004 BioCharge BioCharge Credit Card Fingerprint Verification System Prototype.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
SECURITY IMAGING Prof. Charles A. Bouman Vertical Integrated Projects (VIP) Spring 2011, Call-Out.
Detecting Equality of Variables in Programs Bowen Alpern, Mark N. Wegman, F. Kenneth Zadeck Presented by: Abdulrahman Mahmoud.
Convergence of Model Checking & Program Analysis Philippe Giabbanelli CMPT 894 – Spring 2008.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
CS425: Algorithms for Web Scale Data Most of the slides are from the Mining of Massive Datasets book. These slides have been modified for CS425. The original.
DIRECTED ACYCLIC GRAPHS AND TOPOLOGICAL SORT CS16: Introduction to Data Structures & Algorithms Tuesday, March 10,
8th Grade Forensic Science
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Software Engineering Prof. Dr. Bertrand Meyer March 2007 – June 2007 Chair of Software Engineering Lecture #20: Profiling NetBeans Profiler 6.0.
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
CMPT 120 Topic: Searching – Part 2 and Intro to Time Complexity (Algorithm Analysis)
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Study Plan by : Muhammad Rasyad Safran Ab. Rahim, Katelyn Kasperowicz, Raphael Salas, Ucchishta Sivaguru, Nabilah Farhana Yahya.
CS 2130 Lecture 18 Bottom-Up Parsing or Shift-Reduce Parsing Warning: The precedence table given for the Wff grammar is in error.
Module: Software Engineering of Web Applications Dr. Samer Odeh Hanna 1.
Circle Recognition Using The ‘folding’ method
Implementation of An Automatic Fingerprint Identification System
COGNITIVE APPROACH TO ROBOT SPATIAL MAPPING
Module: Software Engineering of Web Applications
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Project Checkpoint 1 Graph-based Adaptive Diagnosis
CSCI1600: Embedded and Real Time Software
Car Recognition Through SIFT Keypoint Matching
Module: Software Engineering of Web Applications
Analyzing Finger Print Types
Biometric technology.
Topological Ordering Algorithm: Example
Project Checkpoint 2 Graph-based Adaptive Diagnosis
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Module: Software Engineering of Web Applications
Teaching with angr: A Symbolic Execution Curriculum and CTF
Topological Ordering Algorithm: Example
Topological Ordering Algorithm: Example
Your name here Your institution here
GRAPHS Lecture 17 CS2110 Spring 2018.
CS114B Introduction to Computer Science II
CSCI1600: Embedded and Real Time Software
Lab 2: Fingerprints CSE 402.
Topological Ordering Algorithm: Example
Presentation transcript:

Fingerprint Recognition Checkpoint Slides Andrew Ackerman Professor Ostrovsky

Current State Already Done Already Done Research Fingerprint Acquiring Research Fingerprint Acquiring Research Fingerprint Analyzing Research Fingerprint Analyzing Research Fingerprint Recognition Algorithms Research Fingerprint Recognition Algorithms Including Minutiae detection and learned based templates Including Minutiae detection and learned based templates Current State Current State Reduced Fingerprint Recognition to Another Problem Reduced Fingerprint Recognition to Another Problem Solving for algorithm for problem Solving for algorithm for problem

Fingerprint Recognition Taking two fingerprint images and seeing if they come from the same finger Taking two fingerprint images and seeing if they come from the same finger Assumption: no two fingers in the world yield the same fingerprint and that fingerprints do not change in time Assumption: no two fingers in the world yield the same fingerprint and that fingerprints do not change in time Much research has been done to validate these assumptions Much research has been done to validate these assumptions Complex Complex Due to a multitude of conditions the same fingerprint scanned twice can look very different Due to a multitude of conditions the same fingerprint scanned twice can look very different How finger is oriented on scanner How finger is oriented on scanner Condition of finger (wet, dry, scarred, etc) Condition of finger (wet, dry, scarred, etc) No completely accurate method exists No completely accurate method exists Many current recognition techniques can tell with a degree of certainty if two fingerprint images match (i.e. come from same finger) Many current recognition techniques can tell with a degree of certainty if two fingerprint images match (i.e. come from same finger)

Our Method First try First try View the fingerprint edges as a graph structure. View the fingerprint edges as a graph structure. Bifurcation and ending points would become nodes and the edges would be edges Bifurcation and ending points would become nodes and the edges would be edges Abandoned due to complexity involved in matching sub graphs of two different graphs Abandoned due to complexity involved in matching sub graphs of two different graphs Currently Explored Method Currently Explored Method Reduce fingerprint recognition into a problem of topographical equivalence Reduce fingerprint recognition into a problem of topographical equivalence

Reduced Problem Topological Equivalence Topological Equivalence Ridges of the fingerprint are just lines that when leave the frame of view go off to infinity Ridges of the fingerprint are just lines that when leave the frame of view go off to infinity If two fingerprints can be shown to be nearly topologically equivalent then they are most likely the same fingerprint If two fingerprints can be shown to be nearly topologically equivalent then they are most likely the same fingerprint

Topological Equivalence Two images are topologically equivalent if you can somehow deform the lines (without crossing them over) to go from one image to the other Not Topologically Equivalent Topologically Equivalent

Current Goal Come up with an algorithm that can determine topological equivalence for relatively simple cases, then generalize to reach most of the cases required for the fingerprint recognition. Come up with an algorithm that can determine topological equivalence for relatively simple cases, then generalize to reach most of the cases required for the fingerprint recognition. Mainly dealing with shapes that include bifurcations and edges and possibly loops Mainly dealing with shapes that include bifurcations and edges and possibly loops Write software that implements the algorithm Write software that implements the algorithm Will use NIST Special Database 4 (fingerprint database) to test algorithm Will use NIST Special Database 4 (fingerprint database) to test algorithm

Self Assessment I feel that I have not done all the work I could possibly have accomplished in the fall quarter. However, as I noted at the beginning to Professor Sahai, I had a heavy course load with courses such as CS152B and graduate school applications. With these out of the way for next quarter, I will have much more time to dedicate to coding for CS194. That being said, both Professor Ostrovsky and I feel we are on track to receive good results by the end of the spring quarter. The best case scenario being that our algorithm performs faster and/or more accurately then current algorithms used.

Self Assessment Our main project focus has changed. The cryptology part of the project has been dropped for now and the main focus is on fingerprint recognition. I feel a good amount of work has been done on understanding some of the current algorithms for fingerprint recognition. And our current focus is to develop and code our own algorithm to test them. Overall, I feel I have done adequate amount of work for CS 194 during the fall quarter. And I plan to get a good amount of work done over winter break regarding our algorithm and coding it.