Fingerprint Recognition: Some Biological Principles (Moenssens 1971) Related To Fingerprint Recognition Are As Follows
Fingerprint Recognition: Some Biological Principles (Moenssens 1971) Related To Fingerprint Recognition Are As Follows
Fingerprint Formation
Fingerprints are fully formed at about
seven months of fetus development and
finger ridge configurations do not change
throughout the life of an individual
except due to accidents such as bruises
and cuts on the fingertips (Babler, 1991).
Unrelated persons of the same race have
very little generic similarity in their
fingerprints.
Parent and child have some generic
similarity as they share half the genes.
Siblings have more similarity.
The maximum generic similarity is
observed in monozygotic (identical) twins.
Fingerprint Sensors
Fingerprint Sensors
Optical
Silicon Based Capacitive Sensors
Ultrasound
Thermal
Optical Sensors
Optical Sensors-contd..
Advantages
Disadvantages
Size, the sensing plate must be of sufficient size to achieve a quality image
Residual prints from previous users can cause image degradation, as severe
latent prints can cause two sets of prints to be superimposed.
The coating and CCD arrays can wear with age, reducing accuracy.
A large number of vendors of fingerprint sensing equipment are gradually
shifting towards silicon-based technology.
The Silicon chip comprises of about 200*200 lines on a wafer the size of 1cm*1.5cm,
thus providing a pretty good resolution for the image.
Hence, Silicon generally produces better image quality, with less surface area, than
optical.
Also, the reduced size of the chip means lower costs especially with the dropping
costs in Silicon chip manufacturing.
Miniaturization of Silicon chips also makes it possible for the chips to be integrated
into numerous devices.
Disadvantages
In spite of claims by manufacturers that Silicon is much more durable than optical,
Silicon's durability, especially in sub-optimal conditions, has yet to be proven.
Also, with the reduction in sensor size, it is even more important to ensure that
enrolment and verification are done carefully.
Ultrasound Sensors
Ultrasound technology is perhaps the most
accurate of the fingerprint technologies.
It uses transmitted ultrasound waves and
measures the distance based on the
impedance of the finger, the plate, and air.
Preliminary usage of products indicates that
this is a technology with significant promise.
Ultrasound Sensors-contd..
Advantages
Ultrasound is capable of penetrating dirt and residue on the sensing plate and the
finger.
This overcomes the drawbacks of optical devices which can't make that
distinction.
It combines a strength of optical technology-large platen size and ease of use,
with a strength of silicon technology-the ability to overcome sub-optimal reading
conditions.
It is also virtually impossible to deceive an ultrasound system .
Disadvantages
The quality of the image depends to a great extent on the contact between the
finger and the sensor plate which could also be quite hot .
Thermal Sensors
Uses Pyro Electric material.
Pyro-electric material is able to convert a difference
in temperature into a specific voltage.
This effect is quite large, and is used in infrared
cameras.
A thermal fingerprint sensor based on this material
measures the temperature differential between the
sensor pixels that are in contact with the ridges and
those under the valleys, that are not in contact.
Thermal Sensors-contd..
Advantages
A strong immunity to electrostatic discharge
Thermal imaging functions as well in extreme temperature conditions as at room
temperature.
It is almost impossible to deceive with artificial fingertips.
Disadvantages
Fingerprint Classification
Whorl
Tented Arch
Arch
Classification of Fingerprints
Large volumes of fingerprints are being collected in everyday applications-for e.g.. The FBI database has 70
million of them.
To reduce the search time and computational complexity classification is necessary.
This allows matching of fingerprints to only a subset of those in the database.
An input fingerprint is first matched at a coarse level to one of the pre-specified types and then, at a finer
level, it is compared to the subset of the database containing that type of fingerprints only.
Numerous algorithms have been developed in this direction.
Island: A line-type that stands alone.( i.e. does not touch another line-type)
Ellipse: A circular or oval shaped line-type which is generally found in the center of the fingerprint, it is
generally found in the Whorl print pattern.
Tented Arch: It quickly rises and falls at a steep angle. They are associated with Tented Arch Prints.
Spiral: They spiral out from the center and are generally associated with Whorl Prints.
Rod: It generally forms a straight line. It has little or no recurve feature. They are gennerally found in the
center.
Sweat Gland: The moisture and oils they produce actually allow the fingerprint to be electronically imaged.
Feature Extraction
Feature Enhancement
Original
Enhanced
Feature Extraction-contd..
Minutiae localization is the next step.
Even a very precise image has distortions and false minutiae that need to be filtered out. (e.g.
search and eliminate one of two adjacent minutiae)
Anomalies caused by scars, sweat, or dirt appear as false minutiae, and algorithms locate
any points or patterns that don't make sense, such as a spur on an island (probably false) or a
ridge crossing perpendicular to 2-3 others (probably a scar or dirt).
A large percentage of would-be minutiae are discarded in this process.
The point at which a ridge ends, and the point where a bifurcation begins, are the most
rudimentary minutiae. Once the point has been situated, its location is commonly indicated by
the distance from the core, with the core serving as the 0,0 on an X,Y-axis. In addition to the
placement of the minutia, the angle of the minutia is normally used. When a ridge ends, its
direction at the point of termination establishes the angle. This angle is taken from a horizontal
line extending rightward from the core, and can be up to 359.
In addition to using the location and angle of minutiae, some classify minutia by type and
quality. The advantage of this is that searches can be quicker, as a particularly notable minutia
may be distinctive enough to lead to a match. [6]
Template Selection
The matching accuracy of a biometrics-based authentication system relies
on the stability (permanence) of the biometric data associated with an
individual over time.
The biometric data acquired from an individual is susceptible to changes
introduced due to improper interaction with the sensor (e.g., partial
fingerprints), modifications in sensor characteristics (e.g., optical vs. solidstate fingerprint sensor), variations in environmental factors (e.g.,dry
weather resulting in faint fingerprints) and temporary alterations in the
biometric trait itself (e.g., cuts/scars on fingerprints).
Thus, it is possible for the stored template data to be significantly different
from those obtained during authentication, resulting in an inferior performance
(higher false rejects) of the biometric system. [9]
Variation in fingerprint exhibiting partial overlap.
Template Selection-contd..
(Solutions to variations)
Multiple templates, that best represent the variability
associated with a user's biometric data, should be stored in the
database. (E.g. One could store multiple impressions pertaining
to different portions of a user's fingerprint in order to deal
with the problem of partially overlapping fingerprints.)
There is a tradeoff between the number of templates, and the
storage and computational overheads introduced by multiple
templates.
For an efficient functioning of a biometric system, this selection of
templates should be done automatically.
There are two methods that are discussed in the literature. Please
refer to references [9] for further details.
Matching Algorithm
Automatic Minutiae Detection: Minutiae are essentially terminations and
bifurcations of the ridge lines that constitute a fingerprint pattern.
Automatic minutiae detection is an extremely critical process, especially in lowquality fingerprints where noise and contrast deficiency can originate pixel
configurations similar to minutiae or hide real minutiae.
Algorithm:
The basic idea here is to compare the minutiae on the
two images.
The figure alongside is the input given to the system,
as can be seen from the figure the various details of
this image can be easily detected. Hence, we are in a
position to apply the AMD algorithm.
Matching Algorithm-contd..
Algorithm (contd.)
The next step in the algorithm is to mark all
the minutiae points on the duplicate image of
the input fingerprint with the lines much
clear after feature extraction.
Then this image is superimposed onto the
input image with marked minutiae points as
shown in the figure.
Finally a comparison is made with the
images in the database and a probabilistic
result is given.
Accuracy
FAR - False Accept Probability that an impostor is wrongly accepted by the system.
FRR - False Reject Rate Probability that an authorized user is wrongly rejected by
the system.
EER - Defined as the threshold value where the FAR and FRR are equal.
Lower EER means better performance.
Existing System:
0.01% FAR & 1% FRR (depends on evaluation scheme)
Research Issues
Multibiometrics Systems
Attacks
Artificially
created
Biometrics
Attack at
the
Database
Attacking
Via Input
Port
Attacks-contd..
Spoofing:- The process of defeating a biometric system through the introduction
of fake biometric samples. Examples of spoof attacks on a fingerprint recognition
system are lifted latent fingerprints and artificial fingers.
Attacks-solutions..
Hardware Solution
Temperature sensing, detection of pulsation on fingertip, pulse oximetry, electrical conductivity,
ECG, etc.
Software Solution (Research going on)
Live fingers as opposed to spoofed or cadaverous fingers show some kind of moisture pattern
due to perspiration.
The main idea behind this method is to take two prints after a time frame of say 5 seconds and
the algorithm makes a final decision based on the vitality of the fingerprint. [7]
Once the fingerprint had been acquired it is placed into the digital darkroom
(Image Pro Plus) for processing. Then the following steps are carried out:1. Application of a sobel filter.
2. The image is inverted.
3. Thresholding is applied to the image to remove some of the grey scale values.
The fingerprint is now ready for analysis and can be printed at any size the user
requires.[11]
Applications
Banking Security - ATM security,card transaction
Physical Access Control (e.g. Airport)
Information System Security
National ID Systems
Passport control (INSPASS)
Prisoner, prison visitors, inmate control
Voting
Identification of Criminals
Identification of missing children
Secure E-Commerce (Still under research)
Biometric Comparison
Latest Technologies
Fingerprint Registry Service-Lockheed Martin [10]
Latest Technologies-contd..
Compaq Fingerprint Identification Technology
1)
2)
Biometrica - http://www.biometrika.it/eng/wp_fx3.html
3)
4)
5)
6)
BiometricsInfo.org - http://www.biometricsinfo.org/fingerprintrecognition.htm
7)
Issues for liveliness detection in Biometrics - Stephanie Schuckers, Larry Hornak,Tim Norman, Reza Derakhshani,
Sujan Parthasaradhi
8)
9)
Biometric Template Selection: A Case Study in Fingerprints - Anil Jain, Umut Uludag and Arun Ross
http://biometrics.cse.msu.edu/JainUludagRoss_AVBPA_03.pdf
10)
11)
12)