Touch-Less Fingerprint Recognition System
-
Upload
vsverma2013 -
Category
Documents
-
view
127 -
download
3
description
Transcript of Touch-Less Fingerprint Recognition System
(A New Dimension in Fingerprint Technology)
Presented By Name : Vishesh KapoorRoll No. : 272/09Branch : Computer ScienceSemester : 7th
College : Model Institute of Engineering and Technology, Jammu
Introduction Biometrics – Expectations and Reality Fingerprint Advantages of Biometrics Processes Security Aspects
Fingerprints Touch-Based Technology Disadvantages of Touch-Based Technology
Touch-less Fingerprint Recognition Technology Touch-less Technology Basics Advantages of Touch-less 3D Technology Markets and Applications
The term Biometrics refers to the identification of humans by their characteristics or traits.
Biometrics is used in computer science as a form of identification and access control.
Biometrics is key to solve security challenges of the 21st century
#Reality or Fiction?
• PRO– Makes secure identification possible, eliminates weak identification– Unique, constant and always available– Flexible, can be adapted to situation and user group– Can be combined with other systems to increase security– Convenient and User friendly
• CONTRA– Some technologies not mature yet– Market consolidation has just started– Not deterministic, identification based on probabilities
Biometrics is just one aspect of a sophisticated security concept.
Fingerprint Most adopted technology Fingerprint is unique,
constant and can be captured fast & easily.
Fingerprint still takes more than 50% of the market share.
A fingerprint consists ofpatterns of ridges and
valleys on the surface of a fingertip.
Enrollment (User registration)
– User data registration and capturing of biometric reference data ('Reference Template')– crucial importance for overall system performance
Matching (User identification or verification)– Comparison of live captured sample with reference data
– Verification (1:1)• Requires second token to pre-select user list• Comparison against pre-selected biometric data only• Lower requirements regarding system accuracy and speed
– Identification (1:N)• No pre-selection• Comparison against reference data of all users• High requirements regarding system accuracy and speed
A system is as secure as its weakest part!– Biometrics is part of a total security solution– Must not limit system security
Risk factors• Data Security
– Secure data storage– Secure data transfer– Can biometric data be interpreted and repeated?– Can biometric data be revoked?
• Process Security– Is biometric process stable?– Is biometric process safe against spoofing?
1. A fingerprint consists of patterns of ridges and alleys on the surface of a finger
tip.2. Each individual has
fingerprint which is different from the other.
2. Fingerprint recognitionsystem is an identificationsystem that can be anAutomated FingerprintIdentification System (AFIS)or a Non-automatedFingerprint Recognition
System.
Most of the sensors available today use“touch” method since it is simple and requires
little training. These touch sensorsacquire fingerprint images as the user’sfingerprint is contacted on a solid flat sensor.
Both the sensor method and ink-techniquerequires the person to press his/her fingeragainst a flat rigid surface. For this reasonthey are known as touch-based methods. Conventional fingerprint systems are simpleand require less processing as compared tothe touch-less fingerprint recognition system,but they suffer from several problems likehygienic user interface, maintenance andlatent fingerprints that are invisible fromnaked eyes and important for law enforcementagencies.
Problem of contamination occurs because of placing the fingertip over the same interface, which is already used by other. This produces a low quality fingerprint image.
Due to contact pressure creates physical distortions, which are usually non-linear in arbitrary direction and strength. Moreover, the distortion occurs globally, while its deformation parameters could be different locally in a single fingerprint image.
Figure shows the fingerprint image of one fingertipbut with different minutiae because of physical pressure
3 cameras surrounding the finger
Finger imaging instead of Finger printing
Full-3D and Approx-3D variants, depending on application
Full-3D to create rolled equivalent fingerprintsCompliant to 2D technology (touch-based)
Approx-3D to extend and optimize center image
Superior image quality- No Failure-to-Enroll- Able to handle critical fingers
Unparallel image stability– Non-intrusive capturing process– Almost not affected by finger condition
Larger capture area– Full-3D is able to provide almost nail-to-nail images– Approx-3D captures significantly bigger area than
touch sensors– More indications available than just fingerprint
Build-in user guidance– Self-learning experience– Avoids sensor misuse
Mature Life Finger Detection
ConsequenceBetter matching performance Higher Process Security
Access Control and Time & Attendance– Early adopter of new technologies– Small to medium sized applications– Targets mainly on single factor identification– Networked environment
Biometric (sub)system required, rather than sensors Focus on Process Security Civil, Governmental and Criminal ID
– Long term business– Large sized applications– Targets mainly on AFIS infrastructures– PC based environment
High-Quality biometric sensors required Focus on Data Security
THANK YOU