THE FINGERPRINT  The reader acquires the fingerprint image.

Slides:



Advertisements
Similar presentations
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Beach Park Schools Beach Park, Illinois Introduces.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Fingerprint Recognition Checkpoint Slides Andrew Ackerman Professor Ostrovsky.
Secure Web Fingerprint Transmission (SWFT) SWFT Website:
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
The paper is placed on the glass plate in the scanner and the lid closed over the top. A lamp is used to illuminate the scanned document (eg Cold Cathode.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Fingerprint Identification System Final Project Spring 2006 Bashira Chowdhury Cheryl Texin Teaching Assistant: Theodoros Konstantakopoulos.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Project submitted by: Swaroop Borukar Kinjal Patel Under the guidance of: Prof. K. T. Talele Electronics and Telecommunication Engineering Department.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
INPUT DEVICES. KEYBOARD Most common input device for a computer.
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Juan Ortega 12/15/09 NTS490. Justification/purpose to deploy biometrics: The university decided to come to the 21’st century and upgrade the already implemented.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Pattern Recognition Applications ProblemInputOutput Speech recognitionSpeech waveformsSpoken words, speaker identity Non-destructive testingUltrasound,
PRESENTATION ON BIOMETRICS
SOR Fingerprints “The Submission Process”. Objectives Registration Prints SOR Termination/Mail-In Registrations Charge Field (Reason Fingerprinted) Image.
8th Grade Forensic Science
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
0 Primary Classification The Henry—FBI Classification Each finger is given a point value rightleft.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Face Recognition Technology By Catherine jenni christy.M.sc.
Forensic Fingerprint !! About !! We have a team of qualified Fingerprint Experts, Forensic Experts, Forensic Scientists, Fingerprint Experts, State Police.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
A Seminar on Fingerprint Recognition in Biometrics
Fingerprint Sensor Market Demands
Input Devices.
Fingerprint Lifting Notes 2.5.
Dactylography Fingerprinting!.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
OCR GCSE ICT Data capture methods.
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
How the Biometrics Works
Making a Match.
Fingerprints Minutiae Patterns.
Hybrid Finger print recognition
Ch 14 Fingerprints part 2.
Minutiae.
BY: Michael Etse and Maverick Fermill
Lab 2: Fingerprints CSE 402.
15-5 Automated Fingerprint Identification System
Presentation transcript:

THE FINGERPRINT  The reader acquires the fingerprint image

UNIQUE POINTS IDENTIFIED  Each fingerprint contains unique reference points known as ‘Minutiae’  These are located where a ridge ends, at a dot or a ridge junction (a bifurcation)  A reader can identify and acquire up to 100 points.

PATTERN IS CREATED  These reference points along with their relative positioning create a pattern which is as unique as the fingerprint image itself

THE ALGORITHM ENCRYPTS  The pattern is then converted into a binary code via an algorithm  The binary code is encrypted and transferred onto the ievo board  Note: It is impossible to re-create the original fingerprint image from this code or its pattern

POOR FINGERPRINT REGISTRATION  The reader acquires a poor fingerprint image  This can be due to a number of reasons 1.Incorrect finger placement (refer to end user guide) 2.Damaged collagen ridges under the skin 3.Damaged capillaries under the skin 4.Not enough ridge ends, dots or a ridge junctions (a bifurcation) Damaged collagen

POOR FINGERPRINT REGISTRATION = = Good clear image Poor image Enough points registered Not enough points registered Ievo reader will recognise Ievo reader may recognise

POOR FINGERPRINT REGISTRATION = Tip of finger scanned: not enough points for recognition

POOR FINGERPRINT REGISTRATION = Incomplete finger scanned: Not enough points for recognition Incorrect finger placement on the glass registration plate

GOOD FINGERPRINT REGISTRATION = Complete finger scanned: enough points for recognition Try to ensure centre of fingerprint is in the middle of the glass registration plate

GOOD FINGERPRINT REGISTRATION = Complete finger scanned: enough points for recognition Try to ensure centre of fingerprint is in the middle of the image

GOOD FINGERPRINT REGISTRATION Complete finger scanned: enough points for recognition =

THE TECHNOLOGY  Multi-Spectral Imaging (MSI) – quality of fingerprint image Other Biometric Readers Image I-Evo Reader Image  The image that is captured is encrypted and stored, it can not be reproduced from the database in which it is stored, therefore:-  iEvo does not contravene data protection or human right laws  iEvo is not the same method the Police use when taking fingerprints