3. INTRODUCTION
Fingerprint authentication refers to the automated method of verifying a match between two
human fingerprint. Fingerprint are one of many forms of biometrics used to identify
individual and verify their identity.
The fingerprints have been used as a mean for identifying individual for a long time because
the fingerprint are unique and stay unchanged through out an individual life time.
This type of identification technology is more reliable, secure and effictive and uses human
physiological processes and behaviours to identifying users’ ID. This biometric-security
system is human-oriented system and is more accurate than the traditional password-based
systems. This authentication is used in many of the online transactions, confidential
financial dealings, industries, offices, institutes, colleges and security access control
systems.
A wide variety of finger print devices are available in the market today that varies in cost
and method of matching fingers mostly involving one or whole five fingers of the hand. There
are various approaches for matching the fingers like matching finger print minutiae,
straight pattern matching and ultrasonic patterns.
4. CONTENT
o Objectives
o What is Fingerprint?
o What is Fingerprint Authentication?
o System Overview
o Hardware
o How it Works?
o Future Scope
o Summary
o Refrence
5. OBJECTIVES
o The aim is to capture an item of biometric data from this person.
o It can be a photo of their or an image of their fingerprint.
o This data is then compared to the biometric data of several other persons kept in a
database.
o It will create profitable growth by assuming a leading position in selected
segments, and being recognized as a supplier of solutions with a very high level of
security.
o In the mobile industry, the most important strategic priority is to expand the
product portfolio to defend and capitalize on the company’s strong position.
6. What is Fingerprint?
The fingerprints are unique, don't change in the time and are different also
in identical twins.
Also this technology has some limits: excessively damp or dry skin can
compromise the systems performances, sometimes fingerprints are not usable
because of cuts or scars, besides they have an ugly impact on the user, for
the association that is done between the figure of the criminal and the
fingerprints.
Such technology is the more common even if it is not easy to be implemented
for big computational cost and request resources.
7. What is Fingerprint Authentication?
Fingerprint Authentication is the act of verifying an individual’s identity based on one or
more of their fingerprints. The concept has been leveraged for decades across various efforts
including digital identity, criminal justice, financial services, and border protections.
Fingerprint authentication or scanning is a form of biometric technology enables users to
access online services using images of their fingerprint. The biometric scan commonly relies
on mobile and other device native sensing technology, as this has all but eclipsed software,
third-party biometric algorithms. Some fingerprint scan solutions are architected in a
decentralized model such as FIDO (Fast Identity Online) that ensures a user’s fingerprint
template is secured on the user’s device. Here, a user’s fingerprint scan is verified locally
against itself, a token is sent to the service provider, and access is granted. The biometric
authentication takes place locally, and the biometric data itself is not stored at the
service provider.
Other fingerprint scan solutions are architected in a legacy centralized scheme in which user
templates are stored at the service provider, and matching is done against a library of all
other users’ biometrics.
These systems are commonplace in criminal justice, border protection, and national security
settings. Lastly, some fingerprint scan systems rely on specialized hardware found at the
point of care, access, or sale.
8. System Overview
The basic fingerprint recognition system consists of four stages:
firstly, the sensor which is used for enrolment & recognition to
capture the biometric data.
Secondly, the pre-processing stage which is used to remove unwanted
data and increase the clarity of ridge structure by using enhancement
technique.
Thirdly, feature extraction stage which take the input from the output
of the pre-processing stage to extract the fingerprint features.
Fourthly, the matching stage is to compare the acquired feature with
the template in the database.
Finally, the database which stores the features for the matching
stags. The aim of this paper is to review various recently work on
fingerprint recognition system and explain fingerprint recognition
stages step by step and give summaries of fingerprint databases with
characteristics.
9. How it Works?
Users can log on, lock, and unlock AccessAgent with fingerprint only. Users must scan
their fingerprint into the fingerprint reader. Users might scan their finger on any of
the following screens:
o Welcome screen
o Log on screen
o Sign up screen
o Reset password screen
This process results to a fingerprint registration template and the template is stored
in the IMS Server database. This registration template can be cached on the computer
running AccessAgent.
When the users scan their registered fingerprints, the fingerprint reference templates
are compared to each cached fingerprint registration templates. If the template is not
found, the users are prompted for their ISAM ESSO username. The username and reference
template are authenticated against the IMS Server database.
10. Essentially, biometric access control systems record biological data
from human beings.
They have scanners equipped to them, which collects all of this data.
For example, there’s a fingerprint scanner that analyzes one of your
fingerprints and keeps them in a data file.
You then choose who you want to have access to whatever’s behind
the access control system, and register their fingerprints.
Now, when you go to open the door, you scan your finger.
The system analyzes the print and sees if it matches one in the
database. If it does, then the access control opens up and lets you in.
If there’s no match, then access is denied.
Of course, fingerprints are just one of many examples in biometric
access control.
However, they’re the most common form of biometrics as it’s easy and
convenient to scan a print.
11. The frequent usage of weak passwords such as “changename",“123abc”, and “Pa$$w0rd” are a
strong indicator that enterprise organizations might be well-advised to consider a shift to
new mechanisms for secure authentication that are more resistant to subversion by careless
end-users.
Weak passwords are a problem because they are easy to guess – and they are certainly no
match for brute-force password attacks by criminals using automated password cracking
software such as John the Ripper.
One way to beef up the security of your authentication process is to force users to create
long, complex passwords, but such enforcement comes at the risk of employees writing the
passwords down – thereby defeating the attempt to increase security.
12. Fingerprint image systems today use different technology—optical, ultrasonic, capacitive, or
thermal—to measure the physical difference between ridges and valleys. The machinery can be
grouped into two major families: solid-state fingerprint readers and optical fingerprint
readers. The real problem is that people are soft, so each image is distorted by pressure,
skin condition, temperature, and other sampling noises.To overcome these problems we now use
noncontact three-dimensional fingerprint scanners. The images are now digital. We are very
good at high-resolution image processing today that can be adjusted by comparing the distances
between ridges to get a scale, and distorted back to the original shape.Since fingerprints are
used for security and access, these systems typically use a template that was previously
stored and a candidate fingerprint.The algorithm finds one or more points in the fingerprint
image and aligns the candidate fingerprint image to it. This information is local to the
hardware and it is not meant for data exchange. Big Data databases take time for matching, so
we try to optimize things with algorithms and database hardware; current hardware matches
around 1,000 fingerprints per second.
Hardware
13. o Security – security-wise, it is a vast improvement on passwords and identity
cards. Fingerprints are much harder to fake, they also change very little
over a lifetime, so the data remains current for much longer than photos and
passwords.
o Ease of use – for the user they are simple and easy to use. No more
struggling to remember your last password or being locked out due to leaving
your photo ID at home. Your fingerprints are always with you.
o Non-transferable – fingerprints are non-transferrable, ruling out the sharing
of passwords or ‘clocking in’ on behalf of another colleague. This allows for
more accurate tracking of workforce and provides additional security against
the theft of sensitive materials.
o Cost effective – from a technology management perspective, fingerprint
recognition is now a cost-effective security solution. Small hand-held
scanners are easy to set up and benefit from a high level of accuracy.
Advantages
14. o System failures – Scanners are subject to the same technical failures and
limitations as all other electronic identification systems such as power
outages, errors and environmental factors.
o Cost – It is true that fingerprint recognition systems are more cost
effective than ever, but for smaller organisations the cost of
implementation and maintenance can still be a barrier to
implementation. This disadvantage is lessening as devices become more cost
effective and affordable.
o Exclusions – while fingerprints remain relatively stable over
a person’s lifetime there are sections of the population that will be
excluded from using the system. For example, older people with a history of
manual work may struggle to register worn prints into a system or people
who have suffered the loss of fingers or hands would be excluded.
•
Disadvantages
15. Future Scope
The Global Fingerprint Sensor Market is projected to grow at a healthy growth
rate from 2020 to 2024 according to new research. The study focuses on market
trends, leading players, supply chain trends, technological innovations, key
developments, and future strategies.BusinessIndustryReports have new report
spread across 96 pages is an overview of the Global Fingerprint Sensor Market
Report 2020.
Biometric verification is gaining a lot of popularity among the public security
systems as well as in the commercial market.
In our daily life, we witness the use of biometric in so many places such as the
digital attendance system at offices, security checkpoints at airports, Wearable
Tech Gadgets retrieving our biological information, and even our national ID
cards aka Aadhaar cards are created using biometrics technology.
In fact, this national ID program holds the largest biometric database in the
world.
16. Biometric authentication regimes can solve important problems within your company's
SCADA (Supervisory control and data acquisition) security system, but they are not
helpful in all situations, and they present the system administrator with unique issues
and risks. In a SCADA security network, biometric components are useful only at the
edges of the network where people interact with the SCADA security and where secure
facilities and equipment need authorized access. The variety of biometric readings, both
invasive and remote, demonstrates that biometric security can meet a wide array of
priorities within your overall security program.
However, each biometric authentication capture device provides its own set of choices,
such as whether it is more important to your company to allow ready access in an
emergency or whether it is more important take extreme steps to exclude any unauthorized
people from accessing secure facilities.
These devices are not foolproof and can be beaten at a number of different points of
vulnerability, including tricking the scanners or reworking the system software. Storage
and protection of biometric samples can also be hazardous. Finally, biometric systems
are not yet so widespread that the law and regulations for biometric capture can be
expected to remain constant over the several years of your company's investment in these
systems.
SUMMARY
17. • Fingerprint Authentication
• How Does Biometric Authentication Work?
• Biometric fingerprint scanners
• Biometric Sensors
• How Fingerprinting Works
• Fingerprint Security
• Fingerprint Security Future Scope
Refrence