SlideShare a Scribd company logo
1 of 37
Fingerprint Technology For
Information Security
Joy Dutta
Exam Roll : 97/CSM/130033
M.Tech in CSE
2013 -15
Calcutta University
Protecting Your PC, Privacy and
Self
“The minute you dial in to your Internet service provider or
connect to a DSL or cable modem, you are casting your
computer adrift in a sea of millions of other computers –
all of which are sharing the world's largest computer
network, the Internet. Most of those computers are
cooperative and well behaved, but some are downright
nasty. Only you can make sure your computer is ready
for the experience.”
Daniel Appleman, Always Use Protection, A Teen's
Guide to Safe Computing
2
Agenda
♦ What information security?
♦ Why Biometrics?
♦ Fingerprint Patterns
♦ Advanced Minutiae Based Algorithm
♦ Identification vs. Authentication
♦ Security
♦ Applications
♦ Versus other Biometric Technologies
♦ Industry
3
What is Information Security?
♦ The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal,
inspection, recording or destruction
♦ Process by which digital information assets
are protected
4
Understanding the Importance of
Information Security
♦ Prevents data theft
♦ Avoids legal consequences of not securing
information
♦ Maintains productivity
♦ Foils cyber terrorism
♦ Thwarts identity theft
5
Latest Trends - Identity Theft
♦ Crime of the 21st
century
♦ Involves using someone’s personal
information, such as social security
numbers, to establish bank or credit card
accounts that are then left unpaid, leaving
the victim with the debts and ruining their
credit rating
6
Why Biometrics?
Why Biometrics?
Know Password, PIN
Have Key, Smart Card
Are Fingerprint, Face, Iris
♦ Biometrics is a security solution based on
something you know, have, and are:
8
Why Biometrics?
♦ Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
♦ Protect Sensitive Information
– Banking
– Medical
9
Why Biometrics?
♦ Has been used since 14th
century in China
– Reliable and trusted
♦ Will never leave at home
♦ Fingerprints are unique
– Everyone is born with one
♦ 80% of public has biometric recorded in
China
♦ 50% of public in India is now Biometric
Recorded.
10
Fingerprint Patterns
Fingerprints
♦ A fingerprint in its narrow sense is an impression left by
the friction ridges of a human finger.
♦ Their pattern is permanent and unchangeable on each
finger during the whole life time of an individual.
♦ The probability that fingerprints of two individual are alike
is about 1 in 1.9×1015
.
♦ According to FBI the accuracy and reliability of
fingerprint scans are correct 99.8% of the time.
12
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in the
centre forming an arc, and then exit the other side of the finger.
 Loop- The ridges enter from one side of a finger, form a curve, and
then exit on that same side.
 Whorl- Ridges form circularly around a central point on the
finger.
Arch Loop Whorl
13
The human population has fingerprints in
the following percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
Fingerprint Patterns
14
Fingerprint Patterns
♦ Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore
15
Fingerprint Patterns
♦ Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys
16
Fingerprint matching techniques
Techniques available for Fingerprint matching are :
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points
and then map their relative placement on the finger.
 The correlation-based method is able to overcome
some of the difficulties of the minutiae-based
approach.
17
Advanced Minutiae Based
Algorithm (AMBA)
Advanced Minutiae Based Algo
♦ Advanced Minutiae Based Algorithm
– Developed by Suprema Solutions
– Two processes
• Feature Extractor
• Matcher
19
Advanced Minutiae Based
Algorithm
20
Advanced Minutiae Based Algo
♦ Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction algorithm
– Extract Minutiae
21
Advanced Minutiae Based Algo
♦ Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings
22
Advanced Minutiae Based Algo
♦ Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)
23
Advanced Minutiae Based Algo
♦ Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches
24
Identification vs. Authentication
♦ Identification – Who are you?
– 1 : N comparison
– Slower
– Scan all templates in database
♦ Authentication – Are you John
Smith?
– 1 : 1 comparison
– Faster
– Scan one template
25
Security
♦ Accuracy
– 97% will return correct results
– 100% deny intruders
♦ Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data
26
Security
♦ Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow
27
Advantage of Fingerprint:
♦ Very high accuracy.
♦ Is the most economical biometric PC user authentication
technique.
♦ Easy to use.
♦ Small storage space required for the biometric template,
reducing the size of the database memory required
♦ It is standardized.
28
Disadvantages of Fingerprint:
 For some people it is very intrusive, because is still
related to criminal identification.
 It can make mistakes with the dryness or dirty of the
finger’s skin, as well as with the age (is not appropriate
with children, because the size of their fingerprint changes
quickly).
29
Applications
30
Applications
31
Versus other Biometric
Technologies
Technology Accuracy Convenience Cost Size
Fingerprint 5 5 4 4
Voice 1 5 5 5
Face 2 3 4 3
Hand 3 3 2 2
Iris 5 2 3 3
1 (worst) – 5 (best)
32
Versus other Biometric
Technologies
33
Industry ♦ Hot market
♦ Lots of $$$
34
Conclusion
♦ Want to protect information
♦ Passwords are not reliable; forget
♦ Fingerprints have been used for centuries
♦ next generation of fingerprint recognition devices which are highly
reliable and accurate
♦ Fingerprints are unique; can verify
♦ Very accurate
♦ a broad acceptance with the general public, law enforcement and the
forensic science community a broad acceptance with the general
public, law enforcement and the forensic science community
♦ Lots of applications being developed
♦ Hot market. Lots of $$$
♦ Hence, they will continue to be used for human recognition, for
Information Security & new systems that require a reliable biometric.
35
References
♦ http://spie.org/x108321.xml
♦ http://www.sans.org/reading-room/whitepapers/authentication/biometric-s
36
Thank You!!!

More Related Content

What's hot

What's hot (20)

How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 

Similar to Fingerprint Technology

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
biomatrix.ppt
biomatrix.pptbiomatrix.ppt
biomatrix.pptLeojOinam
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYsathish sak
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Shueh_biometric_finger.ppt
Shueh_biometric_finger.pptShueh_biometric_finger.ppt
Shueh_biometric_finger.pptssuserfa7375
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 

Similar to Fingerprint Technology (20)

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
biomatrix.ppt
biomatrix.pptbiomatrix.ppt
biomatrix.ppt
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
biometric technology
biometric technologybiometric technology
biometric technology
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Shueh_biometric_finger.ppt
Shueh_biometric_finger.pptShueh_biometric_finger.ppt
Shueh_biometric_finger.ppt
 
Shueh.ppt
Shueh.pptShueh.ppt
Shueh.ppt
 
Shueh.pptx
Shueh.pptxShueh.pptx
Shueh.pptx
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Fingerprint Technology

  • 1. Fingerprint Technology For Information Security Joy Dutta Exam Roll : 97/CSM/130033 M.Tech in CSE 2013 -15 Calcutta University
  • 2. Protecting Your PC, Privacy and Self “The minute you dial in to your Internet service provider or connect to a DSL or cable modem, you are casting your computer adrift in a sea of millions of other computers – all of which are sharing the world's largest computer network, the Internet. Most of those computers are cooperative and well behaved, but some are downright nasty. Only you can make sure your computer is ready for the experience.” Daniel Appleman, Always Use Protection, A Teen's Guide to Safe Computing 2
  • 3. Agenda ♦ What information security? ♦ Why Biometrics? ♦ Fingerprint Patterns ♦ Advanced Minutiae Based Algorithm ♦ Identification vs. Authentication ♦ Security ♦ Applications ♦ Versus other Biometric Technologies ♦ Industry 3
  • 4. What is Information Security? ♦ The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction ♦ Process by which digital information assets are protected 4
  • 5. Understanding the Importance of Information Security ♦ Prevents data theft ♦ Avoids legal consequences of not securing information ♦ Maintains productivity ♦ Foils cyber terrorism ♦ Thwarts identity theft 5
  • 6. Latest Trends - Identity Theft ♦ Crime of the 21st century ♦ Involves using someone’s personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating 6
  • 8. Why Biometrics? Know Password, PIN Have Key, Smart Card Are Fingerprint, Face, Iris ♦ Biometrics is a security solution based on something you know, have, and are: 8
  • 9. Why Biometrics? ♦ Passwords are not reliable. – Too many – Can be stolen – Forgotten ♦ Protect Sensitive Information – Banking – Medical 9
  • 10. Why Biometrics? ♦ Has been used since 14th century in China – Reliable and trusted ♦ Will never leave at home ♦ Fingerprints are unique – Everyone is born with one ♦ 80% of public has biometric recorded in China ♦ 50% of public in India is now Biometric Recorded. 10
  • 12. Fingerprints ♦ A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. ♦ Their pattern is permanent and unchangeable on each finger during the whole life time of an individual. ♦ The probability that fingerprints of two individual are alike is about 1 in 1.9×1015 . ♦ According to FBI the accuracy and reliability of fingerprint scans are correct 99.8% of the time. 12
  • 13. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop- The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl- Ridges form circularly around a central point on the finger. Arch Loop Whorl 13
  • 14. The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% Fingerprint Patterns 14
  • 15. Fingerprint Patterns ♦ Minutiae – Crossover: two ridges cross each other – Core: center – Bifurcation: ridge separates – Ridge ending: end point – Island: small ridge b/w 2 spaces – Delta: space between ridges – Pore: human pore 15
  • 16. Fingerprint Patterns ♦ Two main technologies used to capture image of the fingerprint – Optical – use light refracted through a prism – Capacitive-based – detect voltage changes in skin between ridges and valleys 16
  • 17. Fingerprint matching techniques Techniques available for Fingerprint matching are : 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. 17
  • 19. Advanced Minutiae Based Algo ♦ Advanced Minutiae Based Algorithm – Developed by Suprema Solutions – Two processes • Feature Extractor • Matcher 19
  • 21. Advanced Minutiae Based Algo ♦ Feature Extractor – Core of fingerprint technology – Capture and enhance image – Remove noise by using noise reduction algorithm – Extract Minutiae 21
  • 22. Advanced Minutiae Based Algo ♦ Feature Extractor – Most frequently used minutiae in applications • Points of bifurcation • Ridge endings 22
  • 23. Advanced Minutiae Based Algo ♦ Feature Extractor – Minutiae Coordinate and Angle are calculated – Core is used as center of reference (0,0) 23
  • 24. Advanced Minutiae Based Algo ♦ Matcher – Used to match fingerprint – Trade-off between speed and performance – Group minutiae and categorize by type • Large number of certain type can result in faster searches 24
  • 25. Identification vs. Authentication ♦ Identification – Who are you? – 1 : N comparison – Slower – Scan all templates in database ♦ Authentication – Are you John Smith? – 1 : 1 comparison – Faster – Scan one template 25
  • 26. Security ♦ Accuracy – 97% will return correct results – 100% deny intruders ♦ Image – Minutiae is retrieved and template created • Encrypted data – Image is discarded • Cannot reconstruct the fingerprint from data 26
  • 27. Security ♦ Several sensors to detect fake fingerprints – Cannot steal from previous user • Latent print residue (will be ignored) – Cannot use cut off finger • Temperature • Pulse • Heartbeat sensors • Blood flow 27
  • 28. Advantage of Fingerprint: ♦ Very high accuracy. ♦ Is the most economical biometric PC user authentication technique. ♦ Easy to use. ♦ Small storage space required for the biometric template, reducing the size of the database memory required ♦ It is standardized. 28
  • 29. Disadvantages of Fingerprint:  For some people it is very intrusive, because is still related to criminal identification.  It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly). 29
  • 32. Versus other Biometric Technologies Technology Accuracy Convenience Cost Size Fingerprint 5 5 4 4 Voice 1 5 5 5 Face 2 3 4 3 Hand 3 3 2 2 Iris 5 2 3 3 1 (worst) – 5 (best) 32
  • 34. Industry ♦ Hot market ♦ Lots of $$$ 34
  • 35. Conclusion ♦ Want to protect information ♦ Passwords are not reliable; forget ♦ Fingerprints have been used for centuries ♦ next generation of fingerprint recognition devices which are highly reliable and accurate ♦ Fingerprints are unique; can verify ♦ Very accurate ♦ a broad acceptance with the general public, law enforcement and the forensic science community a broad acceptance with the general public, law enforcement and the forensic science community ♦ Lots of applications being developed ♦ Hot market. Lots of $$$ ♦ Hence, they will continue to be used for human recognition, for Information Security & new systems that require a reliable biometric. 35