Você está na página 1de 15

(A New Dimension in Fingerprint Technology)

Presented By
Name Roll No. Branch Semester College : Vishesh Kapoor : 272/09 : Computer Science : 7th : Model Institute of Engineering and Technology, Jammu

Introduction

Biometrics Expectations and Reality Fingerprint Advantages of Biometrics Processes Security Aspects Touch-Based Technology Disadvantages of Touch-Based Technology Touch-less Technology Basics Advantages of Touch-less 3D Technology Markets and Applications

Fingerprints

Touch-less Fingerprint Recognition Technology


INTRODUCTION TO BIOMETRICS

The term Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.

Biometrics is key to solve security challenges of the 21st century #Reality or Fiction?
PRO Makes secure identification possible, eliminates weak identification Unique, constant and always available Flexible, can be adapted to situation and user group Can be combined with other systems to increase security Convenient and User friendly CONTRA Some technologies not mature yet Market consolidation has just started Not deterministic, identification based on probabilities

Biometrics is just one aspect of a sophisticated security concept.

Fingerprint

Most adopted technology Fingerprint is unique, constant and can be captured fast & easily.

Fingerprint still takes more than 50% of the market share. A fingerprint consists of patterns of ridges and valleys on the surface of a fingertip.

Enrollment (User registration)


User data registration and capturing of biometric reference data ('Reference Template') crucial importance for overall system performance

Matching (User identification or verification)


Comparison of live captured sample with reference data Verification (1:1) Requires second token to pre-select user list Comparison against pre-selected biometric data only Lower requirements regarding system accuracy and speed
Identification (1:N) No pre-selection Comparison against reference data of all users High requirements regarding system accuracy and speed

A system is as secure as its weakest part! Biometrics is part of a total security solution Must not limit system security

Risk factors
Data Security Secure data storage Secure data transfer Can biometric data be interpreted and repeated? Can biometric data be revoked? Process Security Is biometric process stable? Is biometric process safe against spoofing?

1. A fingerprint consists of patterns of ridges and alleys on the surface of a finger tip. 2. Each individual has fingerprint which is different from the other.

2. Fingerprint recognition system is an identification system that can be an Automated Fingerprint Identification System (AFIS) or a Non-automated Fingerprint Recognition
System.

Most of the sensors available today use touch method since it is simple and requires little training. These touch sensors acquire fingerprint images as the users fingerprint is contacted on a solid flat sensor. Both the sensor method and ink-technique requires the person to press his/her finger against a flat rigid surface. For this reason they are known as touch-based methods. Conventional fingerprint systems are simple and require less processing as compared to the touch-less fingerprint recognition system, but they suffer from several problems like hygienic user interface, maintenance and latent fingerprints that are invisible from naked eyes and important for law enforcement agencies.

Problem of contamination occurs because of placing the fingertip over the same interface, which is already used by other. This produces a low quality fingerprint image. Due to contact pressure creates physical distortions, which are usually non-linear in arbitrary direction and strength. Moreover, the distortion occurs globally, while its deformation parameters could be different locally in a single fingerprint image.

Figure shows the fingerprint image of one fingertip but with different minutiae because of physical pressure

3 cameras surrounding the finger Finger imaging instead of Finger printing Full-3D and Approx-3D variants, depending on application Full-3D to create rolled equivalent fingerprints Compliant to 2D technology (touch-based) Approx-3D to extend and optimize center image

Superior image quality


- No Failure-to-Enroll - Able to handle critical fingers

Unparallel image stability


Non-intrusive capturing process Almost not affected by finger condition

Larger capture area


Full-3D is able to provide almost nail-to-nail images Approx-3D captures significantly bigger area than touch More indications available than just fingerprint sensors

Build-in user guidance


Self-learning experience Avoids sensor misuse Mature Life Finger Detection

Consequence Better matching performance

Higher Process Security

Access Control and Time & Attendance Early adopter of new technologies Small to medium sized applications Targets mainly on single factor identification Networked environment Biometric (sub)system required, rather than sensors Focus on Process Security Civil, Governmental and Criminal ID Long term business Large sized applications Targets mainly on AFIS infrastructures PC based environment High-Quality biometric sensors required Focus on Data Security

THANK YOU

Você também pode gostar