Biometrics Fingerprint Technology

1–2 minutes

read

Why Biometrics?

Biometrics is a security solution based on something you know, have, and are:

Know Password, PIN
Have Key, Smart Card
Are Fingerprint, Face, Iris

Passwords are not reliable.
–Too many
–Can be stolen
–Forgotten

Protect Sensitive Information
–Banking
–Medical


Has been used since 14th century in China
–Reliable and trusted

Will never leave at home

Fingerprints are unique
–Everyone is born with one

80% of public has biometric recorded

Has been used since 14th century in China
–Reliable and trusted

Will never leave at home

Fingerprints are unique
–Everyone is born with one

80% of public has biometric recorded


6 classes of patterns


Minutiae

–Crossover: two ridges cross each other
–Core: center
–Bifurcation: ridge separates
–Ridge ending: end point
–Island: small ridge b/w 2 spaces
–Delta: space between ridges
–Pore: human pore

Two main technologies used to capture image of the fingerprint

–Optical – use light refracted through a prism

–Capacitive-based – detect voltage changes in skin between ridges and valleys


Advanced Minutiae Based Algo

Advanced Minutiae Based Algorithm

–Developed by Suprema Solutions

–Two processes

  • Feature Extractor
  • Matcher

Feature Extractor

–Core of fingerprint technology

–Capture and enhance image

–Remove noise by using noise reduction algorithm

–Processes image and determines minutiae

  • Most common are ridge endings and points of bifurcation
  • 30-60 minutia

–Capture Image

–Enhance Ridge

–Extract Minutiae

–Most frequently used minutiae in applications

  • Points of bifurcation
  • Ridge endings

–Minutiae Coordinate and Angle are calculated

–Core is used as center of reference (0,0)


Matcher

–Used to match fingerprint

–Trade-off between speed and performance

–Group minutiae and categorize by type

  • Large number of certain type can result in faster searches

Accuracy

–97% will return correct results

–100% deny intruders

Image

–Minutiae is retrieved and template created

  • Encrypted data

–Image is discarded

  • Cannot reconstruct the fingerprint from data

Several sensors to detect fake fingerprints

–Cannot steal from previous user

  • Latent print residue (will be ignored)

–Cannot use cut off finger

  • Temperature
  • Pulse
  • Heartbeat sensors
  • Blood flow

Leave a comment