Professional Documents
Culture Documents
New Microsoft Word Document
New Microsoft Word Document
INDEX
Content Page
Introduction..
6
Biometrics
7Finger
print authentication...
8Pattern-based and Minutia-based algorithms
...
10
Advantages of using Finger Recognition
.
11PATTERNS
..
13IMPLEMENTATION
INTRODUCTION
Biometrics
(or
biometric authentication
) consists of methods for uniquelyrecognizing humans based upon one or more intrinsic,
physical or behavioral Intraits computer science, in particular, biometrics is used as
access control. It is alsoused to identify individuals in groups that are
undersurveillance.Biometriccharacteristics can be divided in two main classes:
Physiological
(fingerprint, facerecognition, iris recognition,etc) and
Behavioral
(voice, vocal tract,etc)
.
A biometric system can operate in the following two modes.In
verification
mode the system performs a one-to-one comparison of a capturedbiometric with a specific
template stored in a biometric database in order to verifythe individual is the person they
claim to be. In
Identification
mode the systemperforms a one-to-many comparison against a biometric database in attempt
toestablish the identity of an unknown individual.Fingerprint recognition identifies people by
using the impressions made bythe minute ridge formations or patterns found on the fingertips.
Finger printingtakes an image of a person's fingertips and records its characteristics
- whorls,arches, and loops are recorded along with patterns of ridges, furrows, and
minutiae.Information is processed as an image and further encoded as a computer
algorithm.Fingerprint based biometrics has primarily been used to secure entry devices
forbuilding door locks and computer network access. A small number of banks usefingerprint
readers for authorization at ATMs. Grocery stores are experimentingwith a fingerprint scan
checkout that automatically recognizes and bills a registereduser's credit card or debit
fingerprint authentication
refers tothe automated method of verifying a match between twohuman
fingerprints.Fingerprints are a distinctive feature and remain invariant over thelifetime of a
subject, except for cuts and bruises. A fingerprint impression isacquired, typically using an
inkless scanner. The digital image of thefingerprint includes several unique features in terms
of ridge bifurcationsand ridge endings, collectively referred to as minutiae.A fingerprint
sensor is an electronic device used to capture a digitalimage of the fingerprint pattern. The
analysis of fingerprints for matchingpurposes generally requires the comparison of several
features of the printpattern. These include patterns, which are aggregate characteristics of
ridges,and minutia points, which are unique features found within the patterns.
PATTERNS
The three basic patterns of fingerprint ridges are the arch, loop,and whorl.An arch is a pattern
where the ridges enter from one side of thefinger, rise in the center forming an arc, and then
exit the other side of thefinger. The loop is a pattern where the ridges enter from one side of a
finger,form a curve, and tend to exit from the same side they enter. In the whorlpattern, ridges
form circularly around a central point on the finger.
Minutia features
The majorMinutiafeatures of fingerprint ridges are: ridge ending,bifurcation, and short ridge
(or dot). The ridge ending is the point at which aridge terminates. Bifurcations are points at
which a single ridge splits intotwo ridges. Short ridges (or dots) are ridges which are
significantly shorterthan the average ridge length on the fingerprint. Minutiae and patterns
arevery important in the analysis of fingerprints since no two fingers have beenshown to be
identical.
Fingerprint Sensors
A fingerprintsensoris anelectronic deviceused to capture adigitalimageof the fingerprint
pattern. The captured image is called a live scan.This live scan isdigitally processedto create a
biometric template (acollection of extracted features)which is stored and used for matching.
Algorithms
Matchingalgorithmsare used to compare previously stored templatesof fingerprints against
candidate fingerprints forauthenticationpurposes. Inorder to do this either the original image
must be directly compared with thecandidate image or certain features must be compared.
Pattern based algorithms compare the basic fingerprint patterns (arch, whorl,and loop)
between a previously stored template and a candidate fingerprint. Thisrequires that the
images be aligned in the same orientation. To do this, thealgorithm finds a central point in the
fingerprint image and centers on that. In apattern-based algorithm, the template contains the
type, size, and orientation of patterns within the aligned fingerprint image. The candidate
fingerprint image isgraphically compared with the template to determine the degree to which
theymatch.
Minutia-based algorithms
Minutia based algorithms compare several minutia points (ridge ending