SlideShare une entreprise Scribd logo
1  sur  29
Biometrics:
Fingerprint Technology
Calvin Shueh
Professor Stamp
CS265
Agenda
 Why Biometrics?
 Fingerprint Patterns
 Advanced Minutiae Based Algorithm
 Identification vs. Authentication
 Security
 Applications
 Versus other Biometric Technologies
 Industry
Why Biometrics?
Why Biometrics?
Know Password, PIN
Have Key, Smart Card
Are Fingerprint, Face, Iris
 Biometrics is a security solution based on
something you know, have, and are:
Why Biometrics?
 Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
 Protect Sensitive Information
– Banking
– Medical
Why Biometrics?
 Has been used since 14th century in China
– Reliable and trusted
 Will never leave at home
 Fingerprints are unique
– Everyone is born with one
 80% of public has biometric recorded
Fingerprint Patterns
Fingerprint Patterns
 6 classes of patterns
Fingerprint Patterns
 Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore
Fingerprint Patterns
Fingerprint Patterns
 Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys
Advanced Minutiae Based
Algorithm (AMBA)
Advanced Minutiae Based Algo
 Advanced Minutiae Based Algorithm
– Developed by Suprema Solutions
– Two processes
• Feature Extractor
• Matcher
Advanced Minutiae Based
Algorithm
Advanced Minutiae Based Algo
 Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction
algorithm
– Processes image and determines minutiae
• Most common are ridge endings and points of
bifurcation
• 30-60 minutia
Advanced Minutiae Based Algo
 Feature Extractor
– Capture Image
– Enhance Ridge
– Extract Minutiae
Advanced Minutiae Based Algo
 Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings
Advanced Minutiae Based Algo
 Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)
Advanced Minutiae Based Algo
 Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches
Identification vs. Authentication
 Identification – Who are you?
– 1 : N comparison
– Slower
– Scan all templates in database
 Authentication – Are you John
Smith?
– 1 : 1 comparison
– Faster
– Scan one template
Security
 Accuracy
– 97% will return correct results
– 100% deny intruders
 Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data
Security
 Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow
Applications
Applications
Versus other Biometric
Technologies
Technology Accuracy Convenience Cost Size
Fingerprint 5 5 4 4
Voice 1 5 5 5
Face 2 3 4 3
Hand 3 3 2 2
Iris 5 2 3 3
1 (worst) – 5 (best)
Versus other Biometric
Technologies
Industry  Hot market
 Lots of $$$
Conclusion
 Want to protect information
 Passwords are not reliable; forget
 Fingerprints have been used for centuries
 Fingerprints are unique; can verify
 Very accurate
 Lots of applications being developed
 Hot market. Lots of $$$
Biometrics:
Fingerprint Technology
THE END!

Contenu connexe

Similaire à Shueh.ppt

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 

Similaire à Shueh.ppt (20)

Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
fingerprint_ information _technology.ppt
fingerprint_ information _technology.pptfingerprint_ information _technology.ppt
fingerprint_ information _technology.ppt
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Authentication
AuthenticationAuthentication
Authentication
 
OWASP AppSec USA 2015, San Francisco
OWASP AppSec USA 2015, San FranciscoOWASP AppSec USA 2015, San Francisco
OWASP AppSec USA 2015, San Francisco
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Shueh.ppt