SlideShare une entreprise Scribd logo
1  sur  49
Nishikant P. Taksande
IASRI, New Delhi, India
Contents
Introduction
Biometric Recognition
Biometric Systems
Fingerprints
Fingerprint Recognition System
Minutiae Extraction
Minutiae Matching
Applications
Limitations
Conclusions
References
Introduction
“Biometrics is the science of verifying and
  establishing identity of an individual
  through     physiological   features   or
  behavioral traits.”

  Biometric is more about what you are than
  what you have or know

  Password and tokens are not reliable
Introduction…
Biometric has      been   used   since   14th
century in china

Everyone have unique physical or
behavioral characteristics and so unique
Identity

Enhanced convenience and augmented
security measure
Biometric Recognition
Biometric modalities

  Physical Biometrics:
  Face,    Fingerprints,   Iris-scans,   Hand
  geometry

  Behavioral Biometrics:
  Speech, Signature, and Keystroke dynamics

  Chemical biometrics:
  Odor and the chemical composition of human
  perspiration
Iris
Iris is the area of the eye
where the pigmented or
coloured     circle, usually
brown, blue, rings the dark
pupil of the eye
Image is typically captured
using a noncontact imaging     Iris portion

process
Iris should be at the
predetermined      distance
from the focal plane of the
camera
Face Recognition
Method of acquiring face
images is nonintrusive

Facial disguise is of concern
in unattended recognition
applications

It is challenging to develop
techniques that can tolerate
the effects of aging, facial
expression, variations in the
imaging environment
Hand and Finger
              Geometry
Features related to the human
hand are relatively invariant and
peculiar to an individual

System requires cooperation of
the subject to capture frontal and
side view images of the palm
flatly placed on a panel with
outstretched fingers

Only used for verification
Hand Vein
            Recognition
Back of a clenched fist
used to determine hand
vein structure

Systems for vein capture
use inexpensive infra-red
light emitting diodes
Voice
               Recognition
Voice capture is unobtrusive and
only     feasible   applications
requiring person recognition
over a telephone

Voice signal available for
recognition is typically degraded
in quality by the microphone,
communication channel

Voice is affected by factors such
as a person‟s health, stress and
emotional state
Signature
The way a person signs his
name is known to be a
characteristic of that individual

Signature is a behavioural
biometric that changes over
time

Professional      forgers can
reproduce signatures of others
to fool the unskilled eye
Biometric Systems
An important issue in designing a practical
biometric system is to determine how an
individual is going to be recognized

Biometric system
   Enrolment
   Verification system
   Identification system
Enrolment
 Subject
 Identifier

                                                      Template
                                                      Identifier

                        Feature                   Template
                       Extraction                                   Data
                                                  Creation         Storage
              Sample                Feature set
Capture




                       Enrolment Process
Verification
 Subject
 Identifier                                  Claimed Identity




                        Feature
                       Extraction                 Matching               Data
                                                                        Storage
              Sample                Feature set          One Subjects
Capture
                                                         template
                                           Match or
                                           Non-Match


                          Verification Process
Identification
 Subject
 Identifier




                        Feature               Pre-selection
                       Extraction                  and                 Data
                                               Matching               Storage
              Sample                Feature set             ‘N’ Subject
Capture
                                                            Templates
                                           Subject Identified
                                           Or not Identified


                         Identification Process
Architecture

        Biometric sensor   Feature
                           extraction

                                                Database
       Enrolment

        Biometric sensor   Feature extraction

                               Matching

      Authentication           Result


General architecture of a biometric system
Comparison of Biometric
                 Traits




Comparison of commonly used biometric traits
Fingerprint
Skin on human fingertips contains
ridges and valleys which together
forms distinctive patterns

These patterns are fully developed
under pregnancy and are permanent
throughout whole lifetime

No two persons have the same
fingerprints

Automatization of the fingerprint
recognition process turned out to be
success in forensic applications
Fingerprint Patterns




Left Loop      Right Loop
Fingerprint Patterns...




Whorl     Arch       Twin Loop
Fingerprint Feature
         Minutiae Based Approach
Minutiae is the unique, measurable physical
point at which ridge bifurcate or ends




   Ridge Ending            Ridge Bifurcation
Fingerprint Recognition
                 System




                  Minutiae            Minutiae
                  Extractor           Matcher


Sensor

Architecture for Fingerprint Recognition System
Fingerprint Sensing and
                Storage
Off- line scan or live scan

A special kind of off-line
images,           extremely
important     in    forensic
applications, are the so-
called latent fingerprints
found at crime scenes
Live Scan Devices
Fingerprint image acquisition is
the most critical step of an
automated             fingerprint
authentication system

Idea behind each capture
approach is to measure in some
way the physical difference
between ridges and valleys

Physical      principles    like
capacitive, optical and thermal
are used
Optical Sensors
   FTIR-based Fingerprint Sensor




Frustrated Total Internal Reflection (FTIR)
Minutia Extraction

Pre-Processing
Fingerprint Image Enhancement

  Fingerprint Image enhancement is to
  make the image clearer for easy further
  operations

  Increase the contrast between ridges and
  furrows and connect the broken points
Minutia Extraction...
Histogram Equalization
Histogram equalization is to expand the pixel value
distribution of an image so as to increase the
perceptional information




 The Original Histogram of a   Histogram after histogram
 fingerprint image             equalization
Minutia Extraction...
Histogram Equalization




 Original Image          Enhanced Image after
                         Histogram Equalization
Minutia Extraction...
Fingerprint           Image
Binarization
  8-bit Gray fingerprint image
  transform to a 1-bit image
  with 0-value for ridges and 1-
  value for furrows

  Ridges in the fingerprint are
  highlighted with black colour
  while furrows are white
Minutia Extraction...
Fingerprint Image Segmentation

 Region of Interest (ROI) is useful to be
 recognized for each fingerprint image
 Two step method is based on Morphological
 methods

ROI    extraction      by      Morphological
operations
 Two Morphological operations called „OPEN‟ and
 „CLOSE‟ are adopted
Minutia Extraction...
ROI extraction by Morphological operations




   Original Image Area         After CLOSE operation




After OPEN operation                 ROI + Bound
Minutia Extraction...
Minutia Extraction

Fingerprint Ridge Thinning
 Ridge Thinning is to eliminate the redundant pixels of
 ridges

Minutia Marking
    If the central pixel is 1 and has exactly 3 one-value
    neighbours, then the central pixel is a ridge branch

    If the central pixel is 1 and has only 1 one-value
    neighbour, then the central pixel is a ridge ending
Minutia Extraction...
Minutia Marking




Bifurcation        Termination   A fingerprint
                                 after minutiae
                                 extraction
Minutia Extraction...
Constellation Creation Technique
Minutia Extraction...
Constellation Creation Technique
Minutia Extraction...
Constellation Creation Technique
Minutia Extraction...
Constellation Creation Technique
The Matching Module
The matching module use a pre-processed pattern
composed by the fingerprint, it‟s minutia-file and
it‟s constellations,

These patterns    are   extracted   from   enrolled
templates

Feature extraction is done then its patterns are
compared to the reference ones

Comparison between the two fingerprints
   Constellation matching
   Minutiae matching
Constellation Matching

When a new fingerprint is scanned it is passed
by the feature extraction module, a set of
constellations and their respective parameters
are created

Comparison with the genuine constellations set
extracted during system enrolment

 F1 = {C1.0, C1.1, C1.2, C1.3}
 F2 = {C2.0, C2.1, C2.3, C2.4, C2.5}

Euclidean distance between the point patterns
of constellations centres
Constellation Matching

Rejects a fingerprint template
 No constellation is matched D = 0
 A unique constellation that includes less than 15
 minutiae is matched D = 0

     Co1.0                    Co2.0

                             Co2.1
      Co1.1
                                      Co2.3
                           Co2.2
             Co1.3
  Co1.2


               Fingerprint constellation matching
Minutiae Matching
Minutiae matching are performed within a
constellation

The minutiae matching are used as a second
level verification

minutiae matching algorithm proceeds as
follow
    Associate minutiae points
    Compute distance between minutiae
    Decide
Minutiae Matching
   Flow Chart
       Start

     Decision=reject    Fingerprint and
                         constellation
      Constellation          files
       Matching
NO
       D<CTH                CTH

       Minutiae
       Matching
NO
         D<MTH               MTH

      Decision=Accept

          END
Applications of Fingerprint Recognition System

Physical Access Control
Logical Access Control
Transaction Authentication
Device Access Control
Time and Attendance
Civil Identification
Forensic Identification
Limitations

Dirt , grime and wounds

Placement of finger

Too big database to process

Liveness important

In case of permanent finger injury
Barriers to Adoption
Business value is difficult to quantify in terms of
return on investment

Fingerprint recognition systems, being an emerging
technology, is sometimes confronted with unrealistic
performance

The quality varies quite dramatically from one
application to another and from one vendor to
another

Several fingerprint    system   vendors   are   not
financially stable
Conclusions

Most highly used methods for human recognition
Fingerprint system strongly relies on the precision
obtained in the minutia extraction process
Industrial commitment led to next generation
fingerprint technology
It has got broad acceptance from forensic to
handheld devices
Used for securing international borders
References
[1]   FBI      Fingerprint      guide.       Available           online   at
      http://www.fbi.gov/hq/cjisd/takingfps.html
[2]   Fingerprint.                     Available           online         at
      http://en.wikipedia.org/wiki/Fingerprint
[3]   Fingerprint       recognition.        Available            online   at
      http://en.wikipedia.org/wiki/Fingerprint recognition
[4]   Goyal, A., Study of Fingerprints Minutia Extraction and matching
      Technique.             Available                  online            at
      http://www.advancedcenterpunjabi.org/MTechP/Anjna%20Goyal_
      M.Tech(CS).pdf
References...
[5]   Human           Fingerprints.      Available        online     at
      http://ww.fingerprinting.com/human-fingerprints.php
[6]   Maltoni, D., Maio, D., Jain, A., Prabhakar, S.,(2009), Handbook of
      Fingerprint Recognition, second edition, Springer Limited.
[7]   Murmu, N., Otti, A., Fingerprint recognition. Available online at
      http://ethesis.nitrkl.ac.in/955/
[8]   Rokbani, N., Alimi, A., Fingerprint identification using minutiae
      constellation        matching.      Avialable        online    at
      http://www.regim.org/publications/conferences/2005/2005_MCCSIS_
      RA.pdf
Fingerprint, seminar at IASRI, New Delhi

Contenu connexe

Tendances

Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 

Tendances (20)

Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 

En vedette

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Biometric thumb recognition
Biometric thumb recognitionBiometric thumb recognition
Biometric thumb recognitionAJAL A J
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationIAEME Publication
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
finger print pore extraction methods
finger print pore extraction methodsfinger print pore extraction methods
finger print pore extraction methodsARVIND SARDAR
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Speech Reognition Using FPGA Technology
Speech Reognition Using FPGA TechnologySpeech Reognition Using FPGA Technology
Speech Reognition Using FPGA TechnologyCarlos
 
Object Detection Classification, tracking and Counting
Object Detection Classification, tracking and CountingObject Detection Classification, tracking and Counting
Object Detection Classification, tracking and CountingShounak Mitra
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an imageHarsukh Chandak
 

En vedette (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Biometric thumb recognition
Biometric thumb recognitionBiometric thumb recognition
Biometric thumb recognition
 
Tele immersion
Tele immersionTele immersion
Tele immersion
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint application
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
finger print pore extraction methods
finger print pore extraction methodsfinger print pore extraction methods
finger print pore extraction methods
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
K0167683
K0167683K0167683
K0167683
 
Speech Reognition Using FPGA Technology
Speech Reognition Using FPGA TechnologySpeech Reognition Using FPGA Technology
Speech Reognition Using FPGA Technology
 
Object Detection Classification, tracking and Counting
Object Detection Classification, tracking and CountingObject Detection Classification, tracking and Counting
Object Detection Classification, tracking and Counting
 
Biometric
BiometricBiometric
Biometric
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an image
 

Similaire à Fingerprint, seminar at IASRI, New Delhi

13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessmentijsrd.com
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 

Similaire à Fingerprint, seminar at IASRI, New Delhi (20)

13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Biometrics
Biometrics Biometrics
Biometrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
A04820104
A04820104A04820104
A04820104
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 

Plus de Nishikant Taksande

VoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiVoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiNishikant Taksande
 
Web service- Guest Lecture at National Wokshop
Web service- Guest Lecture at National WokshopWeb service- Guest Lecture at National Wokshop
Web service- Guest Lecture at National WokshopNishikant Taksande
 
Microformats nishikant-taksande
Microformats nishikant-taksandeMicroformats nishikant-taksande
Microformats nishikant-taksandeNishikant Taksande
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyNishikant Taksande
 
Thesis Seminar: webPDC, online application for calculation of PDC crosses
Thesis Seminar: webPDC, online application for calculation of PDC crossesThesis Seminar: webPDC, online application for calculation of PDC crosses
Thesis Seminar: webPDC, online application for calculation of PDC crossesNishikant Taksande
 

Plus de Nishikant Taksande (7)

AngularJS - Part 1
AngularJS - Part 1AngularJS - Part 1
AngularJS - Part 1
 
AngularJs - Part 3
AngularJs - Part 3AngularJs - Part 3
AngularJs - Part 3
 
VoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiVoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New Delhi
 
Web service- Guest Lecture at National Wokshop
Web service- Guest Lecture at National WokshopWeb service- Guest Lecture at National Wokshop
Web service- Guest Lecture at National Wokshop
 
Microformats nishikant-taksande
Microformats nishikant-taksandeMicroformats nishikant-taksande
Microformats nishikant-taksande
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and Technology
 
Thesis Seminar: webPDC, online application for calculation of PDC crosses
Thesis Seminar: webPDC, online application for calculation of PDC crossesThesis Seminar: webPDC, online application for calculation of PDC crosses
Thesis Seminar: webPDC, online application for calculation of PDC crosses
 

Dernier

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Dernier (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Fingerprint, seminar at IASRI, New Delhi

  • 1. Nishikant P. Taksande IASRI, New Delhi, India
  • 2. Contents Introduction Biometric Recognition Biometric Systems Fingerprints Fingerprint Recognition System Minutiae Extraction Minutiae Matching Applications Limitations Conclusions References
  • 3. Introduction “Biometrics is the science of verifying and establishing identity of an individual through physiological features or behavioral traits.” Biometric is more about what you are than what you have or know Password and tokens are not reliable
  • 4. Introduction… Biometric has been used since 14th century in china Everyone have unique physical or behavioral characteristics and so unique Identity Enhanced convenience and augmented security measure
  • 5. Biometric Recognition Biometric modalities Physical Biometrics: Face, Fingerprints, Iris-scans, Hand geometry Behavioral Biometrics: Speech, Signature, and Keystroke dynamics Chemical biometrics: Odor and the chemical composition of human perspiration
  • 6. Iris Iris is the area of the eye where the pigmented or coloured circle, usually brown, blue, rings the dark pupil of the eye Image is typically captured using a noncontact imaging Iris portion process Iris should be at the predetermined distance from the focal plane of the camera
  • 7. Face Recognition Method of acquiring face images is nonintrusive Facial disguise is of concern in unattended recognition applications It is challenging to develop techniques that can tolerate the effects of aging, facial expression, variations in the imaging environment
  • 8. Hand and Finger Geometry Features related to the human hand are relatively invariant and peculiar to an individual System requires cooperation of the subject to capture frontal and side view images of the palm flatly placed on a panel with outstretched fingers Only used for verification
  • 9. Hand Vein Recognition Back of a clenched fist used to determine hand vein structure Systems for vein capture use inexpensive infra-red light emitting diodes
  • 10. Voice Recognition Voice capture is unobtrusive and only feasible applications requiring person recognition over a telephone Voice signal available for recognition is typically degraded in quality by the microphone, communication channel Voice is affected by factors such as a person‟s health, stress and emotional state
  • 11. Signature The way a person signs his name is known to be a characteristic of that individual Signature is a behavioural biometric that changes over time Professional forgers can reproduce signatures of others to fool the unskilled eye
  • 12. Biometric Systems An important issue in designing a practical biometric system is to determine how an individual is going to be recognized Biometric system Enrolment Verification system Identification system
  • 13. Enrolment Subject Identifier Template Identifier Feature Template Extraction Data Creation Storage Sample Feature set Capture Enrolment Process
  • 14. Verification Subject Identifier Claimed Identity Feature Extraction Matching Data Storage Sample Feature set One Subjects Capture template Match or Non-Match Verification Process
  • 15. Identification Subject Identifier Feature Pre-selection Extraction and Data Matching Storage Sample Feature set ‘N’ Subject Capture Templates Subject Identified Or not Identified Identification Process
  • 16. Architecture Biometric sensor Feature extraction Database Enrolment Biometric sensor Feature extraction Matching Authentication Result General architecture of a biometric system
  • 17. Comparison of Biometric Traits Comparison of commonly used biometric traits
  • 18. Fingerprint Skin on human fingertips contains ridges and valleys which together forms distinctive patterns These patterns are fully developed under pregnancy and are permanent throughout whole lifetime No two persons have the same fingerprints Automatization of the fingerprint recognition process turned out to be success in forensic applications
  • 21. Fingerprint Feature Minutiae Based Approach Minutiae is the unique, measurable physical point at which ridge bifurcate or ends Ridge Ending Ridge Bifurcation
  • 22. Fingerprint Recognition System Minutiae Minutiae Extractor Matcher Sensor Architecture for Fingerprint Recognition System
  • 23. Fingerprint Sensing and Storage Off- line scan or live scan A special kind of off-line images, extremely important in forensic applications, are the so- called latent fingerprints found at crime scenes
  • 24. Live Scan Devices Fingerprint image acquisition is the most critical step of an automated fingerprint authentication system Idea behind each capture approach is to measure in some way the physical difference between ridges and valleys Physical principles like capacitive, optical and thermal are used
  • 25. Optical Sensors FTIR-based Fingerprint Sensor Frustrated Total Internal Reflection (FTIR)
  • 26. Minutia Extraction Pre-Processing Fingerprint Image Enhancement Fingerprint Image enhancement is to make the image clearer for easy further operations Increase the contrast between ridges and furrows and connect the broken points
  • 27. Minutia Extraction... Histogram Equalization Histogram equalization is to expand the pixel value distribution of an image so as to increase the perceptional information The Original Histogram of a Histogram after histogram fingerprint image equalization
  • 28. Minutia Extraction... Histogram Equalization Original Image Enhanced Image after Histogram Equalization
  • 29. Minutia Extraction... Fingerprint Image Binarization 8-bit Gray fingerprint image transform to a 1-bit image with 0-value for ridges and 1- value for furrows Ridges in the fingerprint are highlighted with black colour while furrows are white
  • 30. Minutia Extraction... Fingerprint Image Segmentation Region of Interest (ROI) is useful to be recognized for each fingerprint image Two step method is based on Morphological methods ROI extraction by Morphological operations Two Morphological operations called „OPEN‟ and „CLOSE‟ are adopted
  • 31. Minutia Extraction... ROI extraction by Morphological operations Original Image Area After CLOSE operation After OPEN operation ROI + Bound
  • 32. Minutia Extraction... Minutia Extraction Fingerprint Ridge Thinning Ridge Thinning is to eliminate the redundant pixels of ridges Minutia Marking If the central pixel is 1 and has exactly 3 one-value neighbours, then the central pixel is a ridge branch If the central pixel is 1 and has only 1 one-value neighbour, then the central pixel is a ridge ending
  • 33. Minutia Extraction... Minutia Marking Bifurcation Termination A fingerprint after minutiae extraction
  • 38. The Matching Module The matching module use a pre-processed pattern composed by the fingerprint, it‟s minutia-file and it‟s constellations, These patterns are extracted from enrolled templates Feature extraction is done then its patterns are compared to the reference ones Comparison between the two fingerprints Constellation matching Minutiae matching
  • 39. Constellation Matching When a new fingerprint is scanned it is passed by the feature extraction module, a set of constellations and their respective parameters are created Comparison with the genuine constellations set extracted during system enrolment F1 = {C1.0, C1.1, C1.2, C1.3} F2 = {C2.0, C2.1, C2.3, C2.4, C2.5} Euclidean distance between the point patterns of constellations centres
  • 40. Constellation Matching Rejects a fingerprint template No constellation is matched D = 0 A unique constellation that includes less than 15 minutiae is matched D = 0 Co1.0 Co2.0 Co2.1 Co1.1 Co2.3 Co2.2 Co1.3 Co1.2 Fingerprint constellation matching
  • 41. Minutiae Matching Minutiae matching are performed within a constellation The minutiae matching are used as a second level verification minutiae matching algorithm proceeds as follow Associate minutiae points Compute distance between minutiae Decide
  • 42. Minutiae Matching Flow Chart Start Decision=reject Fingerprint and constellation Constellation files Matching NO D<CTH CTH Minutiae Matching NO D<MTH MTH Decision=Accept END
  • 43. Applications of Fingerprint Recognition System Physical Access Control Logical Access Control Transaction Authentication Device Access Control Time and Attendance Civil Identification Forensic Identification
  • 44. Limitations Dirt , grime and wounds Placement of finger Too big database to process Liveness important In case of permanent finger injury
  • 45. Barriers to Adoption Business value is difficult to quantify in terms of return on investment Fingerprint recognition systems, being an emerging technology, is sometimes confronted with unrealistic performance The quality varies quite dramatically from one application to another and from one vendor to another Several fingerprint system vendors are not financially stable
  • 46. Conclusions Most highly used methods for human recognition Fingerprint system strongly relies on the precision obtained in the minutia extraction process Industrial commitment led to next generation fingerprint technology It has got broad acceptance from forensic to handheld devices Used for securing international borders
  • 47. References [1] FBI Fingerprint guide. Available online at http://www.fbi.gov/hq/cjisd/takingfps.html [2] Fingerprint. Available online at http://en.wikipedia.org/wiki/Fingerprint [3] Fingerprint recognition. Available online at http://en.wikipedia.org/wiki/Fingerprint recognition [4] Goyal, A., Study of Fingerprints Minutia Extraction and matching Technique. Available online at http://www.advancedcenterpunjabi.org/MTechP/Anjna%20Goyal_ M.Tech(CS).pdf
  • 48. References... [5] Human Fingerprints. Available online at http://ww.fingerprinting.com/human-fingerprints.php [6] Maltoni, D., Maio, D., Jain, A., Prabhakar, S.,(2009), Handbook of Fingerprint Recognition, second edition, Springer Limited. [7] Murmu, N., Otti, A., Fingerprint recognition. Available online at http://ethesis.nitrkl.ac.in/955/ [8] Rokbani, N., Alimi, A., Fingerprint identification using minutiae constellation matching. Avialable online at http://www.regim.org/publications/conferences/2005/2005_MCCSIS_ RA.pdf