Professional Documents
Culture Documents
SCHOOL OF COMPUTER SCIENCES UNIVERSITI SAINS MALAYSIA CST 233 Information Security and Assurance
ASSIGNMENT 3
BIOMETRIC- FINGERPRINT
Table of Contents
1.0 Abstract..3 2.0 Introduction3-4 3.0 Why We Need Fingerprint5 3.1 Uniqueness of Fingerprint.5 3.2 Accuracy of Fingerprint6 3.3 Efficiency/ Speed of Fingerprint For Use In Identification..6 4.0 Types of Fingerprints...7 4.1 Types of Fingerprints Pattern..7 4.1.1 Arch Pattern...7 4.1.2 Loop Pattern..8 4.1.3 Whorl Pattern9 4.2 Types of Lines Found In Fingerprints..10 5.0 How Does Fingerprints Biometric Works11 5.1 Acquisition/ Enrollment Process12 5.2 Preprocessing Process..12 5.3 Feature Extraction Process.13 5.4 Matching Process..13 6.0 The Issues that We Need to Concern About.15 6.1 Security Issues.15 6.2 Privacy Issues16 7.0 Case Study.17 7.1 States Beat Benefit Fraud17 7.2 Bank Services at Your Fingertips18 8.0 Conclusion18 9.0 References20
1.0 Abstract
Authentication by biometric is becoming increasingly common in corporate and public security systems, customer electronics and so on. To prevent identity theft, biometric data is usually encrypted when its gathered. This paper will shows how the biometric verification phase by phase works and the issues that we need to concern about when we are using the biometric devices such as privacy and the security. In addition, the types of fingerprints will further discuss below.
2.0 Introduction
Biometric is a technology used for measuring and analyzing to identify and verify humans characteristic and traits. [6] There are many types of physical biometrics technologies such as fingerprint, iris, retina, hand, palm vein and face. Among all the biometric techniques, fingerprint-based identification is the oldest method and extremely useful biometrics since the last nineteenth century which has been successfully used in numerous applications and recognized as a primary accurate identification method. Even with the recent advancements made in the field of DNA analysis, the biometric fingerprint is still commonly used whether it has been taken in the traditional way using ink and paper as shown in Figure 1 or scanned into a computer database to record peoples unique characteristics.
Figure 1: The example of biometric fingerprint by using the ink & paper method. [2]
As we know that, everyone is known to have unique, immutable fingerprints and consistency for over time, thus the fingerprint identification is one of the well known and publicized biometrics and it has been used for identification for over a century. Besides that, the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcements and immigration. However, recently the biometric fingerprint becoming automated due to the advancements in computer capabilities and computer techniques are now widely used. Hence, the biometric fingerprint always as a front-line security measure for both identity verification and crime detection and also offers an effective crime deterrent. There are a variety of hardware sensors types for biometric fingerprint such as optical, capacitive, ultrasound and thermal are used to collect the digital image of a fingerprint surface. Nowadays the most common sensor is the optical sensors to take an image of the fingerprint. While the software for fingerprint matching techniques can be classified into two which are minutiae-based matching and pattern matching. The most widely used software recognition technique is
minutiae-based matching as it can relies on the minutiae points and specifically the location and direction of each point. Last but not least, biometric fingerprint is one of the most highly used methods for human recognition. This is because fingerprints have been acceptance by the general public, law enforcement, and the forensic science. Therefore, in this white paper will be focus on the reasons and issues related to the fingerprint type of fingerprint, how the fingerprint works and the real cases regarding the biometric fingerprint.
As we know that, all of the fingerprints have a unique combination and arrangement of patterns and ridge characteristics. Hence, no two prints have ever been found to be exactly alike with one another, even those of identical twins print are different. This is because the fingerprints are not inherited, although the general pattern may be the same in families but there are some level of the fingerprint will differ. Due to this reason, the fingerprint technique has been widely used for electronic passport which stores two fingerprints in the database. As such, fingerprint techniques are powerful tools for security and other operations that require authentication or identification of peoples unique fingerprint.
3.2
Accuracy of Fingerprint
The fingerprint recognition technique is the dominant technology in the biometric market due to the high level of accuracy. It is proven that the fingerprint recognition technology may reach recognition rate near 100% in good quality images. Although there are 2% of the populations have poor quality of fingerprint especially the elder people and manual workers. In fact it is very difficult to obtain reliable fingerprints images from these populations. However, the fingerprint technologies are still able to achieve the correct level of security and accuracy of the fingerprint without overly inconveniencing the user. 3.3 Efficiency/Speed of Fingerprint For Use In Identification
The principle of recognition by comparisons of the fingerprints has speed up border crossing through the use of scanners. Many countries have set up the fingerprint technique to confirm the identity of the bearer of the card and to control migration flows to and from their territories. Hence, the fingerprint scanners help to identify the people in a more precise and reliable way as well as increase the efficiency of the process. Nevertheless, the fingerprint technique has the ability to enroll multiple fingers when there are some problems with one finger such as injured then it still can used the other 9 fingers to improve the recognition. Therefore, the successful development effort of the biometric fingerprint enhanced the end user experienced by providing added convenience and faster speed for secure network access and identification fingerprint.
4.1.1
Arch Pattern
Figure 2: The picture of the arch pattern [3] An arch is a pattern of fingerprint where the ridge enters one side of the finger, then rises in the centre forming an arch, and exits on the other side of the finger.
As what we can see from the Figure 2 above, the arch pattern is like a hill starting from one side and stopping on the other. Arch pattern can divided into two groups which are plain arches and tented arches. A plain arch is the simplest while the tented arch is similar to a plain arch except that instead of rising smoothly at the centre, there is a sharp upward thrust or spike, causes the centre of the print to look like a tent. Arch pattern is the least common of fingerprint patterns as it contain no deltas or cores.
4.1.2
Loop Pattern
Figure 3: The picture of the loop pattern [3] The Figure 3 illustrates the loop pattern, with a loop the ridge enters one side of the finger, then forms a curve and then exits on the same side of the finger from which it entered. This results when one core and one delta is present. In fact, by looking at the middle of the fingerprint, we can see that a loop looks like a jump rope turned upside down and each line starts on one side and returns to that side. Eventually, loops are the most common pattern in fingerprints.
4.1.3
Whorl Pattern
Figure 4: The picture of the whorl pattern [1] The last fingerprint pattern is the whorl pattern as shown in the Figure 4; whorls are divided into four groups which are plain whorl, central pocket loop and accidental. All whorls contain one or more cores and a minimum of two deltas. A whorl is the pattern when ridges form circularly around a central point. Somehow, it looks like a pebble thrown in the water. A plain loop and central pocket loop have at least one ridge while the double loop is made up of two loops combined into one fingerprint which looks like S shape. Then, any print classified as an accidental either contains two or more patterns and may consist of a combination loop.
10
11
12
13
Before
After
Figure 6: The picture shows the before and after the image enhancement. [4]
14
However, it is
difficult to extract the minutiae points accurately especially when the fingerprint is low quality. While the correlation-based method able to overcome some of the difficulties of the minutiae-based approach but it require the precise location of a registration point and are affected by image translation and rotation. Finally a verification decision is made with results or percentages of similarity obtained from the matching process. Then, this template will not match with every template in the database but it will matched with the template according to the characteristics in the particular domain.
15
16
17
18
8.0 Conclusion
In this white paper, I have introduced the biometric fingerprint, type of fingerprint, how does the fingerprint identification works, the issues have to taken into our considerations and the real cases regarding the biometric fingerprint. Throughout this white paper, we know that the fingerprint is an effective way to reduce time and achieve higher accuracy during the identification process. The fingerprint technique able to scan the fingerprints that have been found at a crime scene and automatically find and record the ridges, whorls, arches or loops contained within. Hence, the fingerprint technique has been bringing a lot of benefits to the people today and increase the efficiency of the process.
19
Although the better fingerprint matching algorithms are used almost universally today, but no algorithm can compensate for imperfect or missing images. In fact it is extremely difficult or impossible to obtain reliable fingerprint images from a significant percentage of the world population. There are many reasons that fingerprints may be difficult to acquire, including genetic background, damage from manual labor, poor health and age and even the environmental conditions can cause severe problems. However, the ideal fingerprint technique has to achieve the correct level of security without overly inconveniencing the user. Last but not least, the fingerprint biometric is a great way to authenticate users due to the high accuracy, ease of use, uniqueness of the fingerprint and most economical biometric technique. Besides that, the fingerprint technique can be used for dozens of applications outside the scope of computer security and used to find an offender according to traits left on the crime spot. Therefore, fingerprint biometric has been successfully used in authenticating applications.
20
9.0 References
[1]:Fingerprints https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/f orensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+ line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp 5gb_0MTedd2z1NMcYSFWkg6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH 9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg [accessed 9 May 2012] [2]:Fingerprint Identification http://biometrics.cse.msu.edu/fingerprint.html
[accessed 9 May 2012] [3]: Type of fingerprints http://www.senseme.com/scripts/biometrics/fingerprints.htm [Accessed 9 May 2012] [4]:Biometric case http://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asp [Accessed 10 May 2012] [5]: Biometric http://www.biometrics.gov/documents/fingerprintrec.pdf [Accessed 10 May 2012] [6] Biometric http://searchsecurity.techtarget.com/definition/biometrics [Accessed 10 May 2012]