Your SlideShare is downloading. ×
0
Nishikant P. TaksandeIASRI, New Delhi, India
ContentsIntroductionBiometric RecognitionBiometric SystemsFingerprintsFingerprint Recognition SystemMinutiae ExtractionMin...
Introduction“Biometrics is the science of verifying and  establishing identity of an individual  through     physiological...
Introduction…Biometric has      been   used   since   14thcentury in chinaEveryone have unique physical orbehavioral chara...
Biometric RecognitionBiometric modalities  Physical Biometrics:  Face,    Fingerprints,   Iris-scans,   Hand  geometry  Be...
IrisIris is the area of the eyewhere the pigmented orcoloured     circle, usuallybrown, blue, rings the darkpupil of the e...
Face RecognitionMethod of acquiring faceimages is nonintrusiveFacial disguise is of concernin unattended recognitionapplic...
Hand and Finger              GeometryFeatures related to the humanhand are relatively invariant andpeculiar to an individu...
Hand Vein            RecognitionBack of a clenched fistused to determine handvein structureSystems for vein captureuse ine...
Voice               RecognitionVoice capture is unobtrusive andonly     feasible   applicationsrequiring person recognitio...
SignatureThe way a person signs hisname is known to be acharacteristic of that individualSignature is a behaviouralbiometr...
Biometric SystemsAn important issue in designing a practicalbiometric system is to determine how anindividual is going to ...
Enrolment Subject Identifier                                                      Template                                ...
Verification Subject Identifier                                  Claimed Identity                        Feature          ...
Identification Subject Identifier                        Feature               Pre-selection                       Extract...
Architecture        Biometric sensor   Feature                           extraction                                       ...
Comparison of Biometric                 TraitsComparison of commonly used biometric traits
FingerprintSkin on human fingertips containsridges and valleys which togetherforms distinctive patternsThese patterns are ...
Fingerprint PatternsLeft Loop      Right Loop
Fingerprint Patterns...Whorl     Arch       Twin Loop
Fingerprint Feature         Minutiae Based ApproachMinutiae is the unique, measurable physicalpoint at which ridge bifurca...
Fingerprint Recognition                 System                  Minutiae            Minutiae                  Extractor   ...
Fingerprint Sensing and                StorageOff- line scan or live scanA special kind of off-lineimages,           extre...
Live Scan DevicesFingerprint image acquisition isthe most critical step of anautomated             fingerprintauthenticati...
Optical Sensors   FTIR-based Fingerprint SensorFrustrated Total Internal Reflection (FTIR)
Minutia ExtractionPre-ProcessingFingerprint Image Enhancement  Fingerprint Image enhancement is to  make the image clearer...
Minutia Extraction...Histogram EqualizationHistogram equalization is to expand the pixel valuedistribution of an image so ...
Minutia Extraction...Histogram Equalization Original Image          Enhanced Image after                         Histogram...
Minutia Extraction...Fingerprint           ImageBinarization  8-bit Gray fingerprint image  transform to a 1-bit image  wi...
Minutia Extraction...Fingerprint Image Segmentation Region of Interest (ROI) is useful to be recognized for each fingerpri...
Minutia Extraction...ROI extraction by Morphological operations   Original Image Area         After CLOSE operationAfter O...
Minutia Extraction...Minutia ExtractionFingerprint Ridge Thinning Ridge Thinning is to eliminate the redundant pixels of r...
Minutia Extraction...Minutia MarkingBifurcation        Termination   A fingerprint                                 after m...
Minutia Extraction...Constellation Creation Technique
Minutia Extraction...Constellation Creation Technique
Minutia Extraction...Constellation Creation Technique
Minutia Extraction...Constellation Creation Technique
The Matching ModuleThe matching module use a pre-processed patterncomposed by the fingerprint, it‟s minutia-file andit‟s c...
Constellation MatchingWhen a new fingerprint is scanned it is passedby the feature extraction module, a set ofconstellatio...
Constellation MatchingRejects a fingerprint template No constellation is matched D = 0 A unique constellation that include...
Minutiae MatchingMinutiae matching are performed within aconstellationThe minutiae matching are used as a secondlevel veri...
Minutiae Matching   Flow Chart       Start     Decision=reject    Fingerprint and                         constellation   ...
Applications of Fingerprint Recognition SystemPhysical Access ControlLogical Access ControlTransaction AuthenticationDevic...
LimitationsDirt , grime and woundsPlacement of fingerToo big database to processLiveness importantIn case of permanent fin...
Barriers to AdoptionBusiness value is difficult to quantify in terms ofreturn on investmentFingerprint recognition systems...
ConclusionsMost highly used methods for human recognitionFingerprint system strongly relies on the precisionobtained in th...
References[1]   FBI      Fingerprint      guide.       Available           online   at      http://www.fbi.gov/hq/cjisd/ta...
References...[5]   Human           Fingerprints.      Available        online     at      http://ww.fingerprinting.com/hum...
Fingerprint, seminar at IASRI, New Delhi
Upcoming SlideShare
Loading in...5
×

Fingerprint, seminar at IASRI, New Delhi

3,255

Published on

Published in: Technology

Transcript of "Fingerprint, seminar at IASRI, New Delhi"

  1. 1. Nishikant P. TaksandeIASRI, New Delhi, India
  2. 2. ContentsIntroductionBiometric RecognitionBiometric SystemsFingerprintsFingerprint Recognition SystemMinutiae ExtractionMinutiae MatchingApplicationsLimitationsConclusionsReferences
  3. 3. Introduction“Biometrics is the science of verifying and establishing identity of an individual through physiological features or behavioral traits.” Biometric is more about what you are than what you have or know Password and tokens are not reliable
  4. 4. Introduction…Biometric has been used since 14thcentury in chinaEveryone have unique physical orbehavioral characteristics and so uniqueIdentityEnhanced convenience and augmentedsecurity measure
  5. 5. Biometric RecognitionBiometric modalities Physical Biometrics: Face, Fingerprints, Iris-scans, Hand geometry Behavioral Biometrics: Speech, Signature, and Keystroke dynamics Chemical biometrics: Odor and the chemical composition of human perspiration
  6. 6. IrisIris is the area of the eyewhere the pigmented orcoloured circle, usuallybrown, blue, rings the darkpupil of the eyeImage is typically capturedusing a noncontact imaging Iris portionprocessIris should be at thepredetermined distancefrom the focal plane of thecamera
  7. 7. Face RecognitionMethod of acquiring faceimages is nonintrusiveFacial disguise is of concernin unattended recognitionapplicationsIt is challenging to developtechniques that can toleratethe effects of aging, facialexpression, variations in theimaging environment
  8. 8. Hand and Finger GeometryFeatures related to the humanhand are relatively invariant andpeculiar to an individualSystem requires cooperation ofthe subject to capture frontal andside view images of the palmflatly placed on a panel withoutstretched fingersOnly used for verification
  9. 9. Hand Vein RecognitionBack of a clenched fistused to determine handvein structureSystems for vein captureuse inexpensive infra-redlight emitting diodes
  10. 10. Voice RecognitionVoice capture is unobtrusive andonly feasible applicationsrequiring person recognitionover a telephoneVoice signal available forrecognition is typically degradedin quality by the microphone,communication channelVoice is affected by factors suchas a person‟s health, stress andemotional state
  11. 11. SignatureThe way a person signs hisname is known to be acharacteristic of that individualSignature is a behaviouralbiometric that changes overtimeProfessional forgers canreproduce signatures of othersto fool the unskilled eye
  12. 12. Biometric SystemsAn important issue in designing a practicalbiometric system is to determine how anindividual is going to be recognizedBiometric system Enrolment Verification system Identification system
  13. 13. Enrolment Subject Identifier Template Identifier Feature Template Extraction Data Creation Storage Sample Feature setCapture Enrolment Process
  14. 14. Verification Subject Identifier Claimed Identity Feature Extraction Matching Data Storage Sample Feature set One SubjectsCapture template Match or Non-Match Verification Process
  15. 15. Identification Subject Identifier Feature Pre-selection Extraction and Data Matching Storage Sample Feature set ‘N’ SubjectCapture Templates Subject Identified Or not Identified Identification Process
  16. 16. Architecture Biometric sensor Feature extraction Database Enrolment Biometric sensor Feature extraction Matching Authentication ResultGeneral architecture of a biometric system
  17. 17. Comparison of Biometric TraitsComparison of commonly used biometric traits
  18. 18. FingerprintSkin on human fingertips containsridges and valleys which togetherforms distinctive patternsThese patterns are fully developedunder pregnancy and are permanentthroughout whole lifetimeNo two persons have the samefingerprintsAutomatization of the fingerprintrecognition process turned out to besuccess in forensic applications
  19. 19. Fingerprint PatternsLeft Loop Right Loop
  20. 20. Fingerprint Patterns...Whorl Arch Twin Loop
  21. 21. Fingerprint Feature Minutiae Based ApproachMinutiae is the unique, measurable physicalpoint at which ridge bifurcate or ends Ridge Ending Ridge Bifurcation
  22. 22. Fingerprint Recognition System Minutiae Minutiae Extractor MatcherSensorArchitecture for Fingerprint Recognition System
  23. 23. Fingerprint Sensing and StorageOff- line scan or live scanA special kind of off-lineimages, extremelyimportant in forensicapplications, are the so-called latent fingerprintsfound at crime scenes
  24. 24. Live Scan DevicesFingerprint image acquisition isthe most critical step of anautomated fingerprintauthentication systemIdea behind each captureapproach is to measure in someway the physical differencebetween ridges and valleysPhysical principles likecapacitive, optical and thermalare used
  25. 25. Optical Sensors FTIR-based Fingerprint SensorFrustrated Total Internal Reflection (FTIR)
  26. 26. Minutia ExtractionPre-ProcessingFingerprint Image Enhancement Fingerprint Image enhancement is to make the image clearer for easy further operations Increase the contrast between ridges and furrows and connect the broken points
  27. 27. Minutia Extraction...Histogram EqualizationHistogram equalization is to expand the pixel valuedistribution of an image so as to increase theperceptional information The Original Histogram of a Histogram after histogram fingerprint image equalization
  28. 28. Minutia Extraction...Histogram Equalization Original Image Enhanced Image after Histogram Equalization
  29. 29. Minutia Extraction...Fingerprint ImageBinarization 8-bit Gray fingerprint image transform to a 1-bit image with 0-value for ridges and 1- value for furrows Ridges in the fingerprint are highlighted with black colour while furrows are white
  30. 30. Minutia Extraction...Fingerprint Image Segmentation Region of Interest (ROI) is useful to be recognized for each fingerprint image Two step method is based on Morphological methodsROI extraction by Morphologicaloperations Two Morphological operations called „OPEN‟ and „CLOSE‟ are adopted
  31. 31. Minutia Extraction...ROI extraction by Morphological operations Original Image Area After CLOSE operationAfter OPEN operation ROI + Bound
  32. 32. Minutia Extraction...Minutia ExtractionFingerprint Ridge Thinning Ridge Thinning is to eliminate the redundant pixels of ridgesMinutia Marking If the central pixel is 1 and has exactly 3 one-value neighbours, then the central pixel is a ridge branch If the central pixel is 1 and has only 1 one-value neighbour, then the central pixel is a ridge ending
  33. 33. Minutia Extraction...Minutia MarkingBifurcation Termination A fingerprint after minutiae extraction
  34. 34. Minutia Extraction...Constellation Creation Technique
  35. 35. Minutia Extraction...Constellation Creation Technique
  36. 36. Minutia Extraction...Constellation Creation Technique
  37. 37. Minutia Extraction...Constellation Creation Technique
  38. 38. The Matching ModuleThe matching module use a pre-processed patterncomposed by the fingerprint, it‟s minutia-file andit‟s constellations,These patterns are extracted from enrolledtemplatesFeature extraction is done then its patterns arecompared to the reference onesComparison between the two fingerprints Constellation matching Minutiae matching
  39. 39. Constellation MatchingWhen a new fingerprint is scanned it is passedby the feature extraction module, a set ofconstellations and their respective parametersare createdComparison with the genuine constellations setextracted during system enrolment F1 = {C1.0, C1.1, C1.2, C1.3} F2 = {C2.0, C2.1, C2.3, C2.4, C2.5}Euclidean distance between the point patternsof constellations centres
  40. 40. Constellation MatchingRejects a fingerprint template No constellation is matched D = 0 A unique constellation that includes less than 15 minutiae is matched D = 0 Co1.0 Co2.0 Co2.1 Co1.1 Co2.3 Co2.2 Co1.3 Co1.2 Fingerprint constellation matching
  41. 41. Minutiae MatchingMinutiae matching are performed within aconstellationThe minutiae matching are used as a secondlevel verificationminutiae matching algorithm proceeds asfollow Associate minutiae points Compute distance between minutiae Decide
  42. 42. Minutiae Matching Flow Chart Start Decision=reject Fingerprint and constellation Constellation files MatchingNO D<CTH CTH Minutiae MatchingNO D<MTH MTH Decision=Accept END
  43. 43. Applications of Fingerprint Recognition SystemPhysical Access ControlLogical Access ControlTransaction AuthenticationDevice Access ControlTime and AttendanceCivil IdentificationForensic Identification
  44. 44. LimitationsDirt , grime and woundsPlacement of fingerToo big database to processLiveness importantIn case of permanent finger injury
  45. 45. Barriers to AdoptionBusiness value is difficult to quantify in terms ofreturn on investmentFingerprint recognition systems, being an emergingtechnology, is sometimes confronted with unrealisticperformanceThe quality varies quite dramatically from oneapplication to another and from one vendor toanotherSeveral fingerprint system vendors are notfinancially stable
  46. 46. ConclusionsMost highly used methods for human recognitionFingerprint system strongly relies on the precisionobtained in the minutia extraction processIndustrial commitment led to next generationfingerprint technologyIt has got broad acceptance from forensic tohandheld devicesUsed for securing international borders
  47. 47. References[1] FBI Fingerprint guide. Available online at http://www.fbi.gov/hq/cjisd/takingfps.html[2] Fingerprint. Available online at http://en.wikipedia.org/wiki/Fingerprint[3] Fingerprint recognition. Available online at http://en.wikipedia.org/wiki/Fingerprint recognition[4] Goyal, A., Study of Fingerprints Minutia Extraction and matching Technique. Available online at http://www.advancedcenterpunjabi.org/MTechP/Anjna%20Goyal_ M.Tech(CS).pdf
  48. 48. References...[5] Human Fingerprints. Available online at http://ww.fingerprinting.com/human-fingerprints.php[6] Maltoni, D., Maio, D., Jain, A., Prabhakar, S.,(2009), Handbook of Fingerprint Recognition, second edition, Springer Limited.[7] Murmu, N., Otti, A., Fingerprint recognition. Available online at http://ethesis.nitrkl.ac.in/955/[8] Rokbani, N., Alimi, A., Fingerprint identification using minutiae constellation matching. Avialable online at http://www.regim.org/publications/conferences/2005/2005_MCCSIS_ RA.pdf
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×