1. INTRODUCTION In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become …show more content…
[pic]
Fig.1 Fingerprint-based personal Authentication
“SecureFinger”, some actual examples of fingerprint-based personal identification systems and large-scale fingerprint identification systems(AFIS). Fingerprint User Interface (FpUI), a new type of application of this technology used to enhance human-machine interactions will also be considered.
3. FINGERPRINT SENSING TECHNOLOGY:
A Fingerprint is a pattern of fine ridges and valleys (spaces between ridges) on the surface of a finger and fingerprint sensor makes a digitized image of it. The sensing resolution is 500ppi (pixel per inch; also known as 500dpi, i.e., dots per inch) in most cases, which is equivalent to 20 pixels in 1 millimeter. The obtained image size is typically in the range of between 300*300 and 512*512 pixels, which makes the area covering the fingerprint between 15 to 25 millimeters square.
FINGERPRINT SENSING TYPES:
a. Conventional prism-Type Optical Sensor
Optical sensors using a prism have long been used as a common (and formerly the only) capture device. In them, the light from an LED illuminates a finger placed on a prism and its reflected image is captured by a small, optical sensing device (e.g., a CCD or CMOS imager chip), as in Fig.2. This device operates basically on the principle of
During the identification phase, the user puts the finger on the same sensor, generating a new fingerprint image or template called query print. Minutiae points are carried out from the query print, and the matcher module compares the set of query minutia with the stored minutia templates or image in the enrollment database to find the number of similar minutia points. Because of variations present in finger placement and pressure applied to the sensor, the minutia points take out from the template and query fingerprints must be lined up, or submitted before matching. After line up the fingerprints, the matcher decides the number of pairs of matching minutiae-two minutiae points that have similar location and directions. The system decides the user's identity by comparing the match score to a
Lee, H. (2001). Advances in Fingerprint Technology, Second Edition, 2nd Edition. Retrieved January 26, 2015, from Vital Source: http://online.vitalsource.com/books/9781420041347
This report started with a motivational empirical study of the usability, security, and privacy of enhanced fingerprint authentication as compared to password-based authentication. This study revealed that the password-based authentication lacks usability and security, while the privacy-enhanced fingerprint authentication is more usable than password-based authentication. However fingerprint data on the cloud poses a greater likelihood for attacks. A risk assessment was conducted to evaluate the adequacy of controls available to mitigate the risks. Based on a threshold set for the residual risk, a roadmap was established to close the gap on the lack of controls.
About 2 % of the population have poor quality of fingerprint, especially the elder people and manual worker. For these cases one need to consider other biometrics or any other solution.
In July of 1999 the fingerprint was introduced into the IAFIS. The FBI had so many fingerprints on file that in order to convict someone it would take years for them to be able to match a fingerprint. This database created a way for it to be completed faster and more efficient. The data is taken first with directly indefinable characteristics (name, social security, address, telephone number, email, biometric identifiers, photography) and then entered in the with non-indefinable characteristics (gender, race, birthdate, license number) to create personal file. The database is maintained by the FBI to keep all of the fingerprints in line. But, many agencies (federal, state, local and foreign) can use the database on order to make sure a suspect isn't linked with any other crimes and to identify the
The automated Fingerprint Identification System is also known as the AFIS within the law enforcement division (FBI, 2010). This system is an important element in the criminal justice system as some of its features encompass the storing of data, encoding, and fingerprint and facial comparison through graphics and other techniques. Law officials many centuries ago in the pursuit of positively identifying someone suspected of guilt have long used fingerprints techniques. Fingerprinting is also used in branches of our government, and in the Pentagon, the authentication method of fingerprints is used permit access to specified zones inside the building. Fingerprints are an effective and very precise method of identification purposes that does not pose
Fingerprints are the world’s oldest means of a person’s identification. The first know fingerprint was on clay tablets in ancient Babylon around 1000-2000 B.C. In the 3rd Century B.C., thumbprints were used on clay seals in China to sign documents. However, fingerprints were not used as a method for identifying criminals or individuals until the 19th century. A professor named John Evangelist Purkinje published his thesis on the nine fingerprint patterns in 1823.
When looking at two pairs of hands it is hard to notice anything different between the two. However, there are remarkable differences between the individual’s fingerprints. Fingerprint analysts have formulated three basic principles of fingerprints that hold the prints uniqueness, stability, and appropriateness as a mean of identification. Before being able to
Fingerprint patterns are classified into three main categories: loops, whorls, and arches. Loops make up sixty percent of the prints that are left behind, and their patterns trace back onto themselves, pointing either towards the thumb or the pinky. Whorls make up thirty-five percent of prints left behind, and they are circular in nature. These have many classifications and patterns: they can be concentric circles, or plain whorls; they can be loops with whorls at
Fingerprints are characterised by their individual detailing and patterns. They are formed and individualized during the growth of the foetus in the womb, the process in which this happens is unclear, however it is clear that once the fingerprints have matured they stay the same throughout a person’s life, they do not alter unless the person has an incident resulting in a permanent scar, this scar will then still appear in the fingerprint as the skin sheds and regenerates. Fingerprints are left behind when the pad of the finger comes into contact with different surfaces. The details left behind are caused by secretions of sweat from the eccrine glands
Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.
One of the most important ways that biometric technology is impacting security lies within the confines of computer information systems. The government, the military, and large corporations need to have complete assurance that the data and information stored on their networks and databases are only available to users who have been authorized to view such material.
The technology is many years away from development. Blood pulses on a finger can be measured by new biometric systems. This technology is currently under development. Nail bed identification is based on identifying distinct spatial arrangement beneath the fingernail. Gait recognition is another technology which is under development. This recognizes individuals by their distinctive walk and captures a sequence of images to derive and analyze motion characteristics. The technology is currently under development and its complete potential and limitations can be fully assessed. Many biometric identification systems are being developed and tested (Woodward, 2005).
The final main biometric technology used is fingerprint recognition. This is definitely the most widely used biometric technology. This type of biometric has been used for many, many years. Because of this, fingerprint recognition has been known as the most primary and accurate identification method used to identify a person. The modern fingerprint recognition is all done electronically. There are two main ways of analyzing fingerprints electronically. The first plots points on the ridges of a person’s fingers that enable the computer to compare to different fingerprints. The second method uses patterns of a fingerprint
Biometrics is a method of identifying an individual based on characteristics that they possess, typically physiological features such as a fingerprint, hand, iris, retina, face, voice, and even DNA. Some methods of biometrics security even use multiple physiological features or multimodal biometrics to provide superior security than a single form of biometrics can provide. Why are biometrics important in the field of information security? Biometrics provide a remarkable amount of security for information because biometrics are unique to each person, and thus cannot be lost, copied, or shared with another individual. This security allows for biometrics to provide a means to reliability authenticate personnel. The importance of biometrics can be further divided into the history of biometrics and why it was devised, past implementations of biometrics, current implementations of biometrics, and future implementations of biometrics.