SlideShare una empresa de Scribd logo
1 de 37
Fingerprint Technology For
Information Security
Joy Dutta
Exam Roll : 97/CSM/130033
M.Tech in CSE
2013 -15
Calcutta University
Protecting Your PC, Privacy and
Self
“The minute you dial in to your Internet service provider or
connect to a DSL or cable modem, you are casting your
computer adrift in a sea of millions of other computers –
all of which are sharing the world's largest computer
network, the Internet. Most of those computers are
cooperative and well behaved, but some are downright
nasty. Only you can make sure your computer is ready
for the experience.”
Daniel Appleman, Always Use Protection, A Teen's
Guide to Safe Computing
2
Agenda
♦ What information security?
♦ Why Biometrics?
♦ Fingerprint Patterns
♦ Advanced Minutiae Based Algorithm
♦ Identification vs. Authentication
♦ Security
♦ Applications
♦ Versus other Biometric Technologies
♦ Industry
3
What is Information Security?
♦ The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal,
inspection, recording or destruction
♦ Process by which digital information assets
are protected
4
Understanding the Importance of
Information Security
♦ Prevents data theft
♦ Avoids legal consequences of not securing
information
♦ Maintains productivity
♦ Foils cyber terrorism
♦ Thwarts identity theft
5
Latest Trends - Identity Theft
♦ Crime of the 21st
century
♦ Involves using someone’s personal
information, such as social security
numbers, to establish bank or credit card
accounts that are then left unpaid, leaving
the victim with the debts and ruining their
credit rating
6
Why Biometrics?
Why Biometrics?
Know Password, PIN
Have Key, Smart Card
Are Fingerprint, Face, Iris
♦ Biometrics is a security solution based on
something you know, have, and are:
8
Why Biometrics?
♦ Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
♦ Protect Sensitive Information
– Banking
– Medical
9
Why Biometrics?
♦ Has been used since 14th
century in China
– Reliable and trusted
♦ Will never leave at home
♦ Fingerprints are unique
– Everyone is born with one
♦ 80% of public has biometric recorded in
China
♦ 50% of public in India is now Biometric
Recorded.
10
Fingerprint Patterns
Fingerprints
♦ A fingerprint in its narrow sense is an impression left by
the friction ridges of a human finger.
♦ Their pattern is permanent and unchangeable on each
finger during the whole life time of an individual.
♦ The probability that fingerprints of two individual are alike
is about 1 in 1.9×1015
.
♦ According to FBI the accuracy and reliability of
fingerprint scans are correct 99.8% of the time.
12
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in the
centre forming an arc, and then exit the other side of the finger.
 Loop- The ridges enter from one side of a finger, form a curve, and
then exit on that same side.
 Whorl- Ridges form circularly around a central point on the
finger.
Arch Loop Whorl
13
The human population has fingerprints in
the following percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
Fingerprint Patterns
14
Fingerprint Patterns
♦ Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore
15
Fingerprint Patterns
♦ Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys
16
Fingerprint matching techniques
Techniques available for Fingerprint matching are :
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points
and then map their relative placement on the finger.
 The correlation-based method is able to overcome
some of the difficulties of the minutiae-based
approach.
17
Advanced Minutiae Based
Algorithm (AMBA)
Advanced Minutiae Based Algo
♦ Advanced Minutiae Based Algorithm
– Developed by Suprema Solutions
– Two processes
• Feature Extractor
• Matcher
19
Advanced Minutiae Based
Algorithm
20
Advanced Minutiae Based Algo
♦ Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction algorithm
– Extract Minutiae
21
Advanced Minutiae Based Algo
♦ Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings
22
Advanced Minutiae Based Algo
♦ Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)
23
Advanced Minutiae Based Algo
♦ Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches
24
Identification vs. Authentication
♦ Identification – Who are you?
– 1 : N comparison
– Slower
– Scan all templates in database
♦ Authentication – Are you John
Smith?
– 1 : 1 comparison
– Faster
– Scan one template
25
Security
♦ Accuracy
– 97% will return correct results
– 100% deny intruders
♦ Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data
26
Security
♦ Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow
27
Advantage of Fingerprint:
♦ Very high accuracy.
♦ Is the most economical biometric PC user authentication
technique.
♦ Easy to use.
♦ Small storage space required for the biometric template,
reducing the size of the database memory required
♦ It is standardized.
28
Disadvantages of Fingerprint:
 For some people it is very intrusive, because is still
related to criminal identification.
 It can make mistakes with the dryness or dirty of the
finger’s skin, as well as with the age (is not appropriate
with children, because the size of their fingerprint changes
quickly).
29
Applications
30
Applications
31
Versus other Biometric
Technologies
Technology Accuracy Convenience Cost Size
Fingerprint 5 5 4 4
Voice 1 5 5 5
Face 2 3 4 3
Hand 3 3 2 2
Iris 5 2 3 3
1 (worst) – 5 (best)
32
Versus other Biometric
Technologies
33
Industry ♦ Hot market
♦ Lots of $$$
34
Conclusion
♦ Want to protect information
♦ Passwords are not reliable; forget
♦ Fingerprints have been used for centuries
♦ next generation of fingerprint recognition devices which are highly
reliable and accurate
♦ Fingerprints are unique; can verify
♦ Very accurate
♦ a broad acceptance with the general public, law enforcement and the
forensic science community a broad acceptance with the general
public, law enforcement and the forensic science community
♦ Lots of applications being developed
♦ Hot market. Lots of $$$
♦ Hence, they will continue to be used for human recognition, for
Information Security & new systems that require a reliable biometric.
35
References
♦ http://spie.org/x108321.xml
♦ http://www.sans.org/reading-room/whitepapers/authentication/biometric-s
36
Thank You!!!

Más contenido relacionado

La actualidad más candente

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 

La actualidad más candente (20)

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 

Similar a Fingerprint Technology

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
biomatrix.ppt
biomatrix.pptbiomatrix.ppt
biomatrix.pptLeojOinam
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Shueh_biometric_finger.ppt
Shueh_biometric_finger.pptShueh_biometric_finger.ppt
Shueh_biometric_finger.pptssuserfa7375
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 

Similar a Fingerprint Technology (20)

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
biomatrix.ppt
biomatrix.pptbiomatrix.ppt
biomatrix.ppt
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Shueh_biometric_finger.ppt
Shueh_biometric_finger.pptShueh_biometric_finger.ppt
Shueh_biometric_finger.ppt
 
Shueh.ppt
Shueh.pptShueh.ppt
Shueh.ppt
 
Shueh.pptx
Shueh.pptxShueh.pptx
Shueh.pptx
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 

Fingerprint Technology

  • 1. Fingerprint Technology For Information Security Joy Dutta Exam Roll : 97/CSM/130033 M.Tech in CSE 2013 -15 Calcutta University
  • 2. Protecting Your PC, Privacy and Self “The minute you dial in to your Internet service provider or connect to a DSL or cable modem, you are casting your computer adrift in a sea of millions of other computers – all of which are sharing the world's largest computer network, the Internet. Most of those computers are cooperative and well behaved, but some are downright nasty. Only you can make sure your computer is ready for the experience.” Daniel Appleman, Always Use Protection, A Teen's Guide to Safe Computing 2
  • 3. Agenda ♦ What information security? ♦ Why Biometrics? ♦ Fingerprint Patterns ♦ Advanced Minutiae Based Algorithm ♦ Identification vs. Authentication ♦ Security ♦ Applications ♦ Versus other Biometric Technologies ♦ Industry 3
  • 4. What is Information Security? ♦ The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction ♦ Process by which digital information assets are protected 4
  • 5. Understanding the Importance of Information Security ♦ Prevents data theft ♦ Avoids legal consequences of not securing information ♦ Maintains productivity ♦ Foils cyber terrorism ♦ Thwarts identity theft 5
  • 6. Latest Trends - Identity Theft ♦ Crime of the 21st century ♦ Involves using someone’s personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating 6
  • 8. Why Biometrics? Know Password, PIN Have Key, Smart Card Are Fingerprint, Face, Iris ♦ Biometrics is a security solution based on something you know, have, and are: 8
  • 9. Why Biometrics? ♦ Passwords are not reliable. – Too many – Can be stolen – Forgotten ♦ Protect Sensitive Information – Banking – Medical 9
  • 10. Why Biometrics? ♦ Has been used since 14th century in China – Reliable and trusted ♦ Will never leave at home ♦ Fingerprints are unique – Everyone is born with one ♦ 80% of public has biometric recorded in China ♦ 50% of public in India is now Biometric Recorded. 10
  • 12. Fingerprints ♦ A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. ♦ Their pattern is permanent and unchangeable on each finger during the whole life time of an individual. ♦ The probability that fingerprints of two individual are alike is about 1 in 1.9×1015 . ♦ According to FBI the accuracy and reliability of fingerprint scans are correct 99.8% of the time. 12
  • 13. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop- The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl- Ridges form circularly around a central point on the finger. Arch Loop Whorl 13
  • 14. The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% Fingerprint Patterns 14
  • 15. Fingerprint Patterns ♦ Minutiae – Crossover: two ridges cross each other – Core: center – Bifurcation: ridge separates – Ridge ending: end point – Island: small ridge b/w 2 spaces – Delta: space between ridges – Pore: human pore 15
  • 16. Fingerprint Patterns ♦ Two main technologies used to capture image of the fingerprint – Optical – use light refracted through a prism – Capacitive-based – detect voltage changes in skin between ridges and valleys 16
  • 17. Fingerprint matching techniques Techniques available for Fingerprint matching are : 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. 17
  • 19. Advanced Minutiae Based Algo ♦ Advanced Minutiae Based Algorithm – Developed by Suprema Solutions – Two processes • Feature Extractor • Matcher 19
  • 21. Advanced Minutiae Based Algo ♦ Feature Extractor – Core of fingerprint technology – Capture and enhance image – Remove noise by using noise reduction algorithm – Extract Minutiae 21
  • 22. Advanced Minutiae Based Algo ♦ Feature Extractor – Most frequently used minutiae in applications • Points of bifurcation • Ridge endings 22
  • 23. Advanced Minutiae Based Algo ♦ Feature Extractor – Minutiae Coordinate and Angle are calculated – Core is used as center of reference (0,0) 23
  • 24. Advanced Minutiae Based Algo ♦ Matcher – Used to match fingerprint – Trade-off between speed and performance – Group minutiae and categorize by type • Large number of certain type can result in faster searches 24
  • 25. Identification vs. Authentication ♦ Identification – Who are you? – 1 : N comparison – Slower – Scan all templates in database ♦ Authentication – Are you John Smith? – 1 : 1 comparison – Faster – Scan one template 25
  • 26. Security ♦ Accuracy – 97% will return correct results – 100% deny intruders ♦ Image – Minutiae is retrieved and template created • Encrypted data – Image is discarded • Cannot reconstruct the fingerprint from data 26
  • 27. Security ♦ Several sensors to detect fake fingerprints – Cannot steal from previous user • Latent print residue (will be ignored) – Cannot use cut off finger • Temperature • Pulse • Heartbeat sensors • Blood flow 27
  • 28. Advantage of Fingerprint: ♦ Very high accuracy. ♦ Is the most economical biometric PC user authentication technique. ♦ Easy to use. ♦ Small storage space required for the biometric template, reducing the size of the database memory required ♦ It is standardized. 28
  • 29. Disadvantages of Fingerprint:  For some people it is very intrusive, because is still related to criminal identification.  It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly). 29
  • 32. Versus other Biometric Technologies Technology Accuracy Convenience Cost Size Fingerprint 5 5 4 4 Voice 1 5 5 5 Face 2 3 4 3 Hand 3 3 2 2 Iris 5 2 3 3 1 (worst) – 5 (best) 32
  • 34. Industry ♦ Hot market ♦ Lots of $$$ 34
  • 35. Conclusion ♦ Want to protect information ♦ Passwords are not reliable; forget ♦ Fingerprints have been used for centuries ♦ next generation of fingerprint recognition devices which are highly reliable and accurate ♦ Fingerprints are unique; can verify ♦ Very accurate ♦ a broad acceptance with the general public, law enforcement and the forensic science community a broad acceptance with the general public, law enforcement and the forensic science community ♦ Lots of applications being developed ♦ Hot market. Lots of $$$ ♦ Hence, they will continue to be used for human recognition, for Information Security & new systems that require a reliable biometric. 35