How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

Quick Enroll Dialog Using the Dialog Enrollment Technique: Lock Drop & Hold Suggested Finger and Finger Placement Fingerprint Core Finger Position, Rotation.
FINGERPRINT ANALYSIS Learn about fingerprint patterns that are used for fingerprint identification before analysing your own. First you will analyse your.
Fingerprints EHS BioMed/Forensics.
Fingerprint Recognition Checkpoint Slides Andrew Ackerman Professor Ostrovsky.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
THE FINGERPRINT  The reader acquires the fingerprint image.
Fingerprint Analysis.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Closer Look at Fingerprints
8 th Grade Forensic Science A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
8th Grade Forensic Science
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Warm-up10/5/2011 Which of the following statements is FALSE! a.The hypodermis serves as a shock absorber. b.The UV radiation from the sun and tanning bed.
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometrics Dr. Nermin Hamza
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Fingerprint Sensor Market Demands
A Closer Look at Fingerprints
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
Fingerprints EHS BioMed/Forensics.
Fingerprints Forensic Science.
Fingerprints EHS BioMed/Forensics.
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
A Closer Look at Fingerprints
Fingerprints Forensic Science T. Trimpe
Fingerprints EHS BioMed/Forensics.
A Closer Look at Fingerprints
Fingerprints Forensic Science T. Trimpe
Biometric technology.
Fingerprint Characteristics
Fingerprints Forensic Science T. Trimpe
Hybrid Finger print recognition
A Closer Look at Fingerprints
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
8th Grade Forensic Science
8th Grade Forensic Science
A Closer Look at Fingerprints
A Closer Look at Fingerprints
8th Grade Forensic Science
8th Grade Forensic Science
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
8th Grade Forensic Science
A Closer Look at Fingerprints
Presentation transcript:

How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint image is captured. All the fingerprints contain a number of unique physical characteristics called minutiae which includes certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation (forking) of ridges. Most of the minutiae are found in the core points of fingerprints, and the core points themselves are found near the center of the fingerprint on the fleshy pad. Figure A-1 shows the positions of core points within fingerprints

How it works. Fig. A-1 Core Points on different fingerprint patterns. A core point is defined as the topmost point on the innermost upward recurving ridge line. Core Points

How it works. The user is enrolled, or registered, in the database after a special minutiae based algorithm extracts key minutiae points from a live image at the time of acquisition and converts the data into a unique mathematical template comparable to a 60-digit password. This unique template is then encrypted and stored – it is important to note that no actual image of the fingerprint is stored, only the minutiae- based template. The next time a new fingerprint image for an individual is scanned by the FRD, another template is created and the two templates are compared to verify user’s identity.

Getting good fingerprint images The quality of fingerprint image is relative to the number of minutiae points captured. If the number of locations of the minutiae remain consistent whenever an individual’s fingerprint image is scanned and captured, the fingerprint image is successfully matched to the pre-existing template. Fingerprint images do not possess an adequate number of minutiae points may be unusable. Figure A-2 shows poor-quality fingerprints, characterized by smudged, faded or otherwise distorted areas on the fingerprint. These conditions can be caused by excessive dryness or wetness, or scarring of the skin at the fingertip

Getting good fingerprint images Fig. A-2 Poor- quality fingerprints The Fingerprint matching algorithm is capable of extracting the correct minutiae even without benefit of a perfect print. However, the positioning of the finger and the relative wetness or dryness of the fingerprint when it is placed on the optic window for scanning are both important factors in getting a match.

Correcting wet/dry fingerprint images When the temperature is low, or just after washing hands, the fingerprint is often dry. In this case, the user may moisturize their fingerprint simply by breathing on it before applying it to the optic window. If the fingerprint is too wet, the ridges and valleys are rendered indistinguishable. The lack of minutiae data causes wet fingerprints to be rejected. This can be remedied simply by swiping the fingerprint on a clean towel or cloth.

Position of the Fingerprint Figure A-3 shows the correct positioning of the fingerprint on the input window. Contrast with Figure A-4, which illustrates the most common mistakes made during the initial phase of enrollment. In order to capture the most minutiae, maximize the surface area of the fingerprint on the fingerprint input window.

How much pressure is required for a good-quality fingerprint? If too much pressure is applied to the sensor window, the ridges adhere to each other and are rendered indistinguishable. In this case, the net effect is similar to the hard-to-find minutiae of the wet fingerprint image. On the other hand, if too little pressure is applied the resulting image is similar to the dry fingerprint. Issues related to pressure are easily addressed, however. A little practice is all that is needed for users to get the feel of it.