A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual making them suitable as long-term markers of human identity and may be employed by police or other authorities to identify individuals who wish to conceal their identity, or to identify people are incapacitated or deceased and thus unable to identify themselves, as in the aftermath of a natural disaster. When this fact is integrated for authentication purpose ,it creates an amazing lock system for Security purpose.Here we discuss what is Information Security ,how it is enhanced with the help of Fingerprint , its advantages, disadvantages.You will get a overall end to end scenario infront of you after going through all the slides. I have presented this topic in the Seminar presentation for completion of my M.Tech in Computer Science & Engineering.
2. Protecting Your PC, Privacy and
Self
“The minute you dial in to your Internet service provider or
connect to a DSL or cable modem, you are casting your
computer adrift in a sea of millions of other computers –
all of which are sharing the world's largest computer
network, the Internet. Most of those computers are
cooperative and well behaved, but some are downright
nasty. Only you can make sure your computer is ready
for the experience.”
Daniel Appleman, Always Use Protection, A Teen's
Guide to Safe Computing
2
3. Agenda
♦ What information security?
♦ Why Biometrics?
♦ Fingerprint Patterns
♦ Advanced Minutiae Based Algorithm
♦ Identification vs. Authentication
♦ Security
♦ Applications
♦ Versus other Biometric Technologies
♦ Industry
3
4. What is Information Security?
♦ The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal,
inspection, recording or destruction
♦ Process by which digital information assets
are protected
4
5. Understanding the Importance of
Information Security
♦ Prevents data theft
♦ Avoids legal consequences of not securing
information
♦ Maintains productivity
♦ Foils cyber terrorism
♦ Thwarts identity theft
5
6. Latest Trends - Identity Theft
♦ Crime of the 21st
century
♦ Involves using someone’s personal
information, such as social security
numbers, to establish bank or credit card
accounts that are then left unpaid, leaving
the victim with the debts and ruining their
credit rating
6
8. Why Biometrics?
Know Password, PIN
Have Key, Smart Card
Are Fingerprint, Face, Iris
♦ Biometrics is a security solution based on
something you know, have, and are:
8
9. Why Biometrics?
♦ Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
♦ Protect Sensitive Information
– Banking
– Medical
9
10. Why Biometrics?
♦ Has been used since 14th
century in China
– Reliable and trusted
♦ Will never leave at home
♦ Fingerprints are unique
– Everyone is born with one
♦ 80% of public has biometric recorded in
China
♦ 50% of public in India is now Biometric
Recorded.
10
12. Fingerprints
♦ A fingerprint in its narrow sense is an impression left by
the friction ridges of a human finger.
♦ Their pattern is permanent and unchangeable on each
finger during the whole life time of an individual.
♦ The probability that fingerprints of two individual are alike
is about 1 in 1.9×1015
.
♦ According to FBI the accuracy and reliability of
fingerprint scans are correct 99.8% of the time.
12
13. Fingerprint Patterns
Arch- The ridges enter from one side of the finger, rise in the
centre forming an arc, and then exit the other side of the finger.
Loop- The ridges enter from one side of a finger, form a curve, and
then exit on that same side.
Whorl- Ridges form circularly around a central point on the
finger.
Arch Loop Whorl
13
14. The human population has fingerprints in
the following percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
Fingerprint Patterns
14
15. Fingerprint Patterns
♦ Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore
15
16. Fingerprint Patterns
♦ Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys
16
17. Fingerprint matching techniques
Techniques available for Fingerprint matching are :
1. minutiae-based .
2. correlation based.
Minutiae-based techniques first find minutiae points
and then map their relative placement on the finger.
The correlation-based method is able to overcome
some of the difficulties of the minutiae-based
approach.
17
21. Advanced Minutiae Based Algo
♦ Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction algorithm
– Extract Minutiae
21
22. Advanced Minutiae Based Algo
♦ Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings
22
23. Advanced Minutiae Based Algo
♦ Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)
23
24. Advanced Minutiae Based Algo
♦ Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches
24
25. Identification vs. Authentication
♦ Identification – Who are you?
– 1 : N comparison
– Slower
– Scan all templates in database
♦ Authentication – Are you John
Smith?
– 1 : 1 comparison
– Faster
– Scan one template
25
26. Security
♦ Accuracy
– 97% will return correct results
– 100% deny intruders
♦ Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data
26
27. Security
♦ Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow
27
28. Advantage of Fingerprint:
♦ Very high accuracy.
♦ Is the most economical biometric PC user authentication
technique.
♦ Easy to use.
♦ Small storage space required for the biometric template,
reducing the size of the database memory required
♦ It is standardized.
28
29. Disadvantages of Fingerprint:
For some people it is very intrusive, because is still
related to criminal identification.
It can make mistakes with the dryness or dirty of the
finger’s skin, as well as with the age (is not appropriate
with children, because the size of their fingerprint changes
quickly).
29
35. Conclusion
♦ Want to protect information
♦ Passwords are not reliable; forget
♦ Fingerprints have been used for centuries
♦ next generation of fingerprint recognition devices which are highly
reliable and accurate
♦ Fingerprints are unique; can verify
♦ Very accurate
♦ a broad acceptance with the general public, law enforcement and the
forensic science community a broad acceptance with the general
public, law enforcement and the forensic science community
♦ Lots of applications being developed
♦ Hot market. Lots of $$$
♦ Hence, they will continue to be used for human recognition, for
Information Security & new systems that require a reliable biometric.
35