8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 1/8
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 2/8
eexxttr r eemmeellyy eef f f f eeccttiivvee iinn aar r eeaass wwhheer r ee tthhee p pr r oovviissiioonn oof f aa hhiigghh ddeeggr r eeee oof f sseeccuur r iittyy iiss aann iissssuuee..
The analysis of fingerprints for
matching purposes generally requires the
comparison of several features of the print
pattern. These include patterns, which areaggregate characteristics of ridges, and minutia
points, which are unique features found within
the patterns. It is also necessary to know thestructure and properties of human skin in order
to successfully employ some of the imaging
technologies.
1.1Patterns:
The three basic patterns of fingerprint ridges are
the arch, loop, and whorl. An arch is a patternwhere the ridges enter from one side of the
finger, rise in the center forming an arc, and thenexit the other side of the finger. The loop is a
pattern where the ridges enter from one side of a
finger, form a curve, and tend to exit from the
same side they enter. In the whorl pattern, ridgesform circularly around a central point on the
finger. Scientists have found that family
members often share the same generalfingerprint patterns, leading to the belief that
these patterns are inherited.
Fig1.1: The arch pattern
Fig1.2: The loop pattern
Fig1.3: The whorl pattern
1.2 Minutia features:
The major features of fingerprint ridges are:
ridge ending, bifurcation, and short ridge (or
dot). The ridge ending is the point at which a
ridge terminates. Bifurcations are points at which
a single ridge splits into two ridges. Short ridges(or dots) are ridges which are significantly
shorter than the average ridge length on the
fingerprint. Minutiae and patterns are veryimportant in the analysis of fingerprints since no
two fingers have been shown to be identical.
FFiigg11..44:: R R iiddggee eennddiinngg..
FFiigg 11..55:: BBiif f uur r ccaattiioonn..
Fig 1.6: Short Ridge
AA ssmmooootthhllyy f f lloowwiinngg p paatttteer r nn f f oor r mmeedd b byy
aalltteer r nnaattiinngg ccr r eessttss ((r r iiddggeess)) aanndd ttr r oouugghhss ((vvaalllleeyyss)) oonn tthhee p paallmmaar r aass p peecctt oof f hhaanndd iiss ccaalllleedd aa
p paallmm p pr r iinntt.. FFoor r mmaattiioonn oof f aa p paallmm p pr r iinntt ddee p peennddss oonn
tthhee iinniittiiaall ccoonnddiittiioonnss oof f tthhee eemm b br r yyoonniicc mmeessooddeer r mm
f f r r oomm wwhhiicchh tthheeyy ddeevveelloo p p.. TThhee p paatttteer r nn oonn p puull p p oof f eeaacchh tteer r mmiinnaall p phhaallaannxx iiss ccoonnssiiddeer r eedd aass aann
iinnddiivviidduuaall p paatttteer r nn aanndd iiss ccoommmmoonnllyy r r eef f eer r r r eedd ttoo aass
aa f f iinnggeer r p pr r iinnt t .. AA f f iinnggeer r p pr r iinntt iiss b beelliieevveedd ttoo b bee
uunniiqquuee ttoo eeaacchh p peer r ssoonn ((aanndd eeaacchh f f iinnggeer r )) 22.. FFiinnggeer r p pr r iinnttss oof f eevveenn iiddeennttiiccaall ttwwiinnss aar r ee ddiif f f f eer r eenntt..
FFiinnggeer r p pr r iinnttss aar r ee oonnee oof f tthhee mmoosstt mmaattuur r ee
b biioommeettr r iicc tteecchhnnoollooggiieess aanndd aar r ee ccoonnssiiddeer r eedd
lleeggiittiimmaattee p pr r oooof f ss oof f eevviiddeennccee iinn ccoouur r ttss oof f llaaww aallll oovveer r tthhee wwoor r lldd.. FFiinnggeer r p pr r iinnttss aar r ee,, tthheer r eef f oor r ee,, uusseedd
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 9, September 2011
52 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 3/8
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 4/8
given principal (person, computer, smart card
etc.), while authorization is the process of
verifying that an authenticated subject has the
authority to perform a certain operation.
Authentication, therefore, must precedeauthorization. For example, when you show
proper identification to a bank teller, you could
be authenticated by the teller as acting on behalf of a particular account holder, and you would be
authorized to access information about the
accounts of that account holder. You would not
be authorized to access the accounts of other
account holders.
Since authorization cannot occur without authentication, the former term is
sometimes used to mean the combination of
authentication and authorization.
2 2 . . 2 2 A Auu t t h hee n n t tii c c a a t tii o o n n vv s s . . I I d d ee n n t tii f f ii c c a a t tii o o n n::
In the world of virtual identities we find today
that many applications and web sites allow users
to create virtual identities. Take for example the
Second Life world or any chatting forum such as
ICQ. The real Identity is hidden and notrequired. One may actually hold a number of
virtual identities. Authentication is still required
in order to verify that the virtual identity entering
is the original registering identity. The
Authentication in this case is of the Login id andnot of the person behind it. That requirement
poses a problem to most proprietary hardwareauthentication solutions as they identify the real
person behind the virtual identity at delivery.
III. Method for fingerprint authentication
Steps for fingerprint Authentication. figure 3.1
shows the flowchart for finger printauthentication
Fig3.1: Flowchart for fingerprint
authentication
SS t tee p p 11:: U U s see r r R Ree g gii s s t t r r a a t tii o o n n
IInn aannyy sseeccuur r ee ssyysstteemm,, ttoo eennr r oollll aass aa lleeggiittiimmaattee uusseer r iinn aa sseer r vviiccee,, aa uusseer r mmuusstt b beef f oor r eehhaanndd r r eeggiisstteer r wwiitthh tthhee sseer r vviiccee p pr r oovviiddeer r b byy eessttaa b blliisshhiinngg hhiiss//hheer r
iiddeennttiittyy wwiitthh tthhee p pr r oovviiddeer r .. FFoor r tthhiiss,, tthhee uusseer r
p pr r oovviiddeess hhiiss//hheer r f f iinnggeer r p pr r iinntt tthhr r oouugghh aa f f iinnggeer r ssccaannnneer r .. TThhee f f iinnggeer r p pr r iinntt iimmaaggee tthhuuss oo b bttaaiinneedd
uunnddeer r ggooeess aa sseer r iieess oof f eennhhaanncceemmeenntt ssttee p pss.. TThhiiss iiss
f f oolllloowweedd b byy aa FFiinnggeer r p pr r iinntt hhaar r ddeenniinngg p pr r oottooccooll
wwiitthh sseer r vveer r ss ttoo oo b bttaaiinn aa hhaar r ddeenneedd f f iinnggeer r p pr r iinntt FFPP
wwhhiicchh iiss ssttoor r eedd iinnttoo tthhee sseer r vveer r ’’ss ddaattaa b baassee..
SS t tee p p 2 2:: F Fii n n g gee r r p p r rii n n t t E E n n h h a a n n c cee m mee n n t t
AA f f iinnggeer r p pr r iinntt iiss mmaaddee oof f aa sseer r iieess oof f r r iiddggeess aanndd
f f uur r r r oowwss oonn tthhee ssuur r f f aaccee oof f tthhee f f iinnggeer r .. TThhee uunniiqquueenneessss oof f aa f f iinnggeer r p pr r iinntt ccaann b bee ddeetteer r mmiinneedd b byy
tthhee p paatttteer r nn oof f r r iiddggeess aanndd f f uur r r r oowwss.. MMiinnuuttiiaaee p pooiinnttss aar r ee llooccaall r r iiddggee cchhaar r aacctteer r iissttiiccss tthhaatt ooccccuur r aatt
eeiitthheer r aa r r iiddggee b biif f uur r ccaattiioonn oor r aa r r iiddggee eennddiinngg.. AA
r r iiddggee tteer r mmiinnaattiioonn iiss ddeef f iinneedd aass tthhee p pooiinntt wwhheer r ee aa
r r iiddggee eennddss aa b br r uu p pttllyy.. AA r r iiddggee b biif f uur r ccaattiioonn iiss
ddeef f iinneedd aass tthhee p pooiinntt wwhheer r ee aa r r iiddggee f f oor r k k ss oor r
ddiivveer r ggeess iinnttoo b br r aanncchh r r iiddggeess aass sshhoowwnn iinn f f iigguur r ee 33..22..
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 9, September 2011
54 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 5/8
TThhee qquuaalliittyy oof f tthhee r r iiddggee ssttr r uuccttuur r eess iinn aa f f iinnggeer r p pr r iinntt iimmaaggee iiss aann iimm p poor r ttaanntt cchhaar r aacctteer r iissttiicc,,
aass tthhee r r iiddggeess ccaar r r r yy tthhee iinnf f oor r mmaattiioonn oof f
cchhaar r aacctteer r iissttiicc f f eeaattuur r eess r r eeqquuiir r eedd f f oor r mmiinnuuttiiaaee
eexxttr r aaccttiioonn..
FFiigg 33..22:: EExxaamm p pllee f f oor r r r iiddggee b biif f uur r ccaattiioonn aanndd r r iiddggee
eennddiinngg
FFiigg 33..33:: BBlloocck k ddiiaaggr r aamm f f oor r f f iinnggeer r p pr r iinntt eennhhaanncceemmeenntt
IInn p pr r aaccttiiccee,, aa f f iinnggeer r p pr r iinntt iimmaaggee mmaayy nnoott
aallwwaayyss b bee wweellll ddeef f iinneedd dduuee ttoo eelleemmeennttss oof f nnooiissee tthhaatt ccoor r r r uu p ptt tthhee ccllaar r iittyy oof f tthhee r r iiddggee ssttr r uuccttuur r eess..
TThhuuss,, iimmaaggee eennhhaanncceemmeenntt tteecchhnniiqquueess[[66]]
aar r ee oof f tteenn
eemm p pllooyyeedd ttoo r r eedduuccee tthhee nnooiissee aanndd eennhhaannccee tthhee
ddeef f iinniittiioonn oof f r r iiddggeess aaggaaiinnsstt vvaalllleeyyss.. FFiigguur r ee 33..33 iilllluussttr r aatteess tthhee ddiif f f f eer r eenntt ssttee p pss iinnvvoollvveedd iinn tthhee
ddeevveelloo p pmmeenntt oof f tthhee EEnnhhaanncceemmeenntt FFiinnggeer r p pr r iinntt..
TThhee ddeettaaiillss oof f tthheessee ssttee p pss aar r ee ggiivveenn iinn tthhee
f f oolllloowwiinngg ssuu b bsseeccttiioonnss..
SS t tee p p 3 3:: N N o o r r m m a al l ii z z a a t tii o o n n
N Noor r mmaalliizzaattiioonn iiss uusseedd ttoo ssttaannddaar r ddiizzee tthhee iinntteennssiittyy vvaalluueess iinn aann iimmaaggee b byy aadd j juussttiinngg tthhee r r aannggee oof f
ggr r aayy--lleevveell vvaalluueess ssoo tthhaatt iitt lliieess wwiitthhiinn aa ddeessiir r eedd
r r aannggee oof f vvaalluueess.. IItt ddooeess nnoott cchhaannggee tthhee r r iiddggee ssttr r uuccttuur r eess iinn aa f f iinnggeer r p pr r iinntt;; iitt iiss p peer r f f oor r mmeedd ttoo
ssttaannddaar r ddiizzee tthhee ddyynnaammiicc lleevveellss oof f vvaar r iiaattiioonn iinn
ggr r aayy--lleevveell vvaalluueess,, wwhhiicchh f f aacciilliittaatteess tthhee p pr r oocceessssiinngg oof f ssuu b bsseeqquueenntt iimmaaggee eennhhaanncceemmeenntt
ssttaaggeess.. FFiigg.. 33..44((aa && b b)) sshhoowwss tthhee oor r iiggiinnaall
f f iinnggeer r p pr r iinntt && tthhee r r eessuullttss oof f aa nnoor r mmaalliizzeedd
f f iinnggeer r p pr r iinntt..
Fig 3.4 (a) Original Image (b) Normalized Image
Step 4: Orientation Estimation:
The orientation field of a fingerprint image
defines the local orientation of the ridges
contained in the fingerprint (see Fig.3.5). Theorientation estimation is a fundamental step in
the enhancement process as the subsequent
Gabor filtering stage relies on the local
orientation in order to effectively enhances the
fingerprint image. Fig. 3.6 (a & b) illustrates the
results of orientation estimation & smoothedorientation estimation of the fingerprint image.
Fig 3.5: The orientation of a ridge pixel in afingerprint
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 9, September 2011
55 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 6/8
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 7/8
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application
http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 8/8
[[77]] SS.. K K aassaaeeii,, MM.. DD..,, aanndd BBooaasshhaasshh,, BB.. FFiinnggeer r p pr r iinntt f f eeaattuur r ee
eexxttr r aaccttiioonn uussiinngg b blloocck k --ddiir r eeccttiioonn oonn r r eeccoonnssttr r uucctteedd iimmaaggeess.. IInn
I I E E E E E E r r eeggiioonn T T E E N N C C oonn f f .. d d iiggiit t aall ssiiggnnaall PPr r oocceessssiinngg
aa p p p plliiccaat t iioonnss , , T T E E N N C C OO N N ((DDeecceemm b beer r 11999977)).. [[88]] DD.. BBoonneehh,,““TThhee DDeecciissiioonn DDiif f f f iiee--HHeellllmmaann PPr r oo b blleemm,,”” PPr r oocc..
TThhiir r dd IInntt”” AAllggoor r iitthhmmiicc N Nuumm b beer r TThheeoor r yy SSyymm p p..,,
..
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 9, September 2011
58 http://sites.google.com/site/ijcsis/
ISSN 1947-5500