19
Finger Print Technology

Finger Print Technology

  • Upload
    kueng

  • View
    106

  • Download
    1

Embed Size (px)

DESCRIPTION

Finger Print Technology. Abstract. Every person is believed to have unique fingerprints. This makes fingerprint matching one of the most reliable methods for identifying people. In this diploma work shall be examined if and how the identification can be done automatically by a software system. - PowerPoint PPT Presentation

Citation preview

Page 1: Finger Print Technology

Finger Print Technology

Page 2: Finger Print Technology

AbstractAbstractEvery person is believed to have unique fingerprints. This makes

fingerprint matching one of the most reliable methods for identifying

people. In this diploma work shall be examined if and how the

identification can be done automatically by a software system.

Examples of use: Criminal identification, control for high security

installations, credit card usage verification, and employee

identification.

The program to be developed should extract the minutiae (ridge

endings, bifurcation points, etc.) from a fingerprint bitmap file and

create a compact, unique dataset.

Page 3: Finger Print Technology

This dataset is then stored in a database or compared with one of the

database. The goal is to recognize if the person whom the fingerprint

belongs to is present in the database.

The fingerprints are present in the form of Windows-Bitmap-Files, which The fingerprints are present in the form of Windows-Bitmap-Files, which

are created with a scanner from printed pictures. The software should have are created with a scanner from printed pictures. The software should have

the following properties:the following properties:

• Reading a bitmap file and show it on the screen. • Reading a bitmap file and show it on the screen.

• Building a dataset by extracting the minutiae. • Building a dataset by extracting the minutiae.

• Showing the original bitmap with the marked minutiae on the screen. • Showing the original bitmap with the marked minutiae on the screen.

• Storing the dataset in the database. • Storing the dataset in the database.

• Comparing a dataset with those in the database. • Comparing a dataset with those in the database.

• Giving out the search result. • Giving out the search result.

If there is a match, showing the stored fingerprint on the screen for optical comparison.If there is a match, showing the stored fingerprint on the screen for optical comparison.

AbstractAbstract

Page 4: Finger Print Technology

  Why Fingerprints?Why Fingerprints?With increasingly urgent need for reliable security, biometrics is being With increasingly urgent need for reliable security, biometrics is being

spotlighted as the authentication method for the next generation. spotlighted as the authentication method for the next generation.

Among numerous biometric technologies, fingerprint authentication has been Among numerous biometric technologies, fingerprint authentication has been

in use for the longest time and bears more advantages than other biometric in use for the longest time and bears more advantages than other biometric

technologies do.technologies do.

Fingerprint authentication is possibly the most sophisticated method of all Fingerprint authentication is possibly the most sophisticated method of all

biometric technologies and has been thoroughly verified through various biometric technologies and has been thoroughly verified through various

applications.applications.

Fingerprint authentication has particularly proved its high efficiency and Fingerprint authentication has particularly proved its high efficiency and

further enhanced the technology in criminal investigation for more than a further enhanced the technology in criminal investigation for more than a

century. century.

Page 5: Finger Print Technology

Even features such as a person’s gait, face, or signature may change with

passage of time and may be fabricated or imitated. However, a fingerprint

is completely unique to an individual and stayed unchanged for lifetime.

This exclusivity demonstrates that fingerprint authentication is far more

accurate and efficient than any other methods of authentication.

Also, a fingerprint may be taken and digitalized by relatively compact and

cheap devices and takes only a small capacity to store a large database of

information.

With these strengths, fingerprint authentication has long been a major part

of the security market and continues to be more competitive than others in

today’s world.

  Why Fingerprints?Why Fingerprints?

Page 6: Finger Print Technology

History of Fingerprint TechnologyHistory of Fingerprint Technology

The beginning of fingerprints goes back to as early as the ancient times.

According to historical findings, fingerprints were used on clay tablets for

business transactions in ancient Babylon. In China, thumb prints were

found on clay seals.

But it was in the 19th century that the results of scientific studies were

published and fingerprint technology began to be considered more

seriously.

Using the1800’s scientific studies as a foundation, fingerprint technology

was already in use by the beginning of the 20th century. In 1924,

FBI(Federal Bureau of Investigation) is already known to have maintained

more than 250 million civil files of fingerprints for the purpose of criminal

investigation and the identification of unknown casualties.

Page 7: Finger Print Technology

HistoryIn the late 1960's, fingerprint technology met a great turning point when it gave birth to

'live-scan,' a method to obtain a fingertip image without the use of print ink.

When the FBI announced that it planned to stop using paper fingerprint cards inside

their new Integrated AFIS (IAFIS) site, it was actually announcing the remarkable

breakthrough of today's live scan technology.

But fingerprint identification technology did not stop as a forensic method only. It was

officially used for business purposes in 1968 at one security corporation in Wall Street.

Fingerprints are now being used as a secure and effective authentication method in

numerous fields, including financial, medical, e-commerce and entrance control

applications.

Modern applications of fingerprint technology rely in large part on the development of

exceptionally compact fingerprint sensors.

Page 8: Finger Print Technology

The first year for the first known systematic use of fingerprint identification

began in the United States is 1902.

The New York state prison system began to use fingerprints for the

identification of criminals in 1903.

During the first quarter of the 20th century, more and more local police

identification bureaus established fingerprint systems.

In 1924 the Identification Division of the Federal Bureau of Investigation

(FBI) was established to provide one central repository of fingerprints.

In 1992 the Identification Division was re-established as the Criminal

Justice Information Services Division (CJIS).

History

Page 9: Finger Print Technology

Human fingerprints have been discovered on a large number of archaeological artifacts and historical items

In 1684, the English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure

In 1788, a detailed description of the anatomical formations of fingerprints was made by Mayer.

In 1823, Purkinji proposed the first fingerprint classification, which classified into nine categories

Sir Francis Galton introduced the minutae features for fingerprint matching in late 19th century

History

Page 10: Finger Print Technology

History of fingerprintsHistory of fingerprints

Page 11: Finger Print Technology

Formation of fingerprintsFormation of fingerprints

Fingerprints are fully formed at about seven months of fetus Fingerprints are fully formed at about seven months of fetus

developmentdevelopment

General characteristics of the fingerprint emerge as the skin on General characteristics of the fingerprint emerge as the skin on

the fingertip begins to differentiate.the fingertip begins to differentiate.

flow of amniotic fluids around the fetus and its position in the flow of amniotic fluids around the fetus and its position in the

uterus change during the differentiation processuterus change during the differentiation process

Thus the cells on the fingertip grow in a microenvironment that Thus the cells on the fingertip grow in a microenvironment that

is slightly different from hand to hand and finger to finger.is slightly different from hand to hand and finger to finger.

Page 12: Finger Print Technology

Fingerprint Identification Process Fingerprint Identification Process Fingerprint identification process consists of two essential

procedures: enrollment and authentication. Taking the following steps completes each

procedure:

As shown in the diagram above, fingerprint identification system compares the input fingerprint

image and previously registered data to determine the genuineness of a fingerprint. All the steps

described above affect the efficiency of the entire system, but the computational load of the

following steps can be reduced to a great extent by acquiring a good-quality fingerprint image in

the first step.

Page 13: Finger Print Technology

Classification of FingerprintsClassification of Fingerprints

Human fingerprint patterns fall into three main groups: whorls, loops, and arches.

LoopsLoops the most common type, the most common type,

accounting for about 65% of accounting for about 65% of all fingerprints.all fingerprints.Whorls

account for 30% of fingerprints.

Arches account for 5%

Page 14: Finger Print Technology

The three major groups are also subcategorized based upon smaller differences existing between the patterns within the specific group.

Page 15: Finger Print Technology

Advantages:Advantages:Compared to the other biometric authentication technologies, fingerprint scanners are:

The most widely available device.

Relatively low cost

Small size (easily integrated into keyboards) and

Easy to integrate

Fingerprint verification may be a good choice for in-house systems where adequate explanation and training can be provided to users and where the system is operated within a controlled environment.

Page 16: Finger Print Technology

Disadvantages

Fingerprint verification can suffer under large-scale

usage. In a large population, poorly trained users

cause higher usage errors and hence higher instances

of false rejection. Also, the user interface (scanning

module) can become damaged or dirty by large-scale

usage.

Page 17: Finger Print Technology

Fingerprint ApplicationsFingerprint Applications

Commercial Government Forensic

Computer Network Logon,Electronic Data Security,E-Commerce,Internet Access,ATM, Credit Card,Physical Access Control,Cellular PhonesPersonal Digital Assistant,Medical Records,Distance Leaning, etc.

National ID card,Correctional Facilities,Driver’s License,Social Security,Welfare Disbursement,Border Control,Passport Control, etc.

Corpse IdentificationCriminal Investigation,Terrorist Identification,Parenthood determination,Missing Children, etc.

Page 19: Finger Print Technology

ENDEND