You are on page 1of 21

0

BIOMETRIC- FINGERPRINT WHITE PAPER

SCHOOL OF COMPUTER SCIENCES UNIVERSITI SAINS MALAYSIA CST 233 Information Security and Assurance

ASSIGNMENT 3

BIOMETRIC- FINGERPRINT

LECTURER : DR. AMAN JANTAN NAME : OH YING SAN

BIOMETRIC- FINGERPRINT WHITE PAPER

Table of Contents
1.0 Abstract..3 2.0 Introduction3-4 3.0 Why We Need Fingerprint5 3.1 Uniqueness of Fingerprint.5 3.2 Accuracy of Fingerprint6 3.3 Efficiency/ Speed of Fingerprint For Use In Identification..6 4.0 Types of Fingerprints...7 4.1 Types of Fingerprints Pattern..7 4.1.1 Arch Pattern...7 4.1.2 Loop Pattern..8 4.1.3 Whorl Pattern9 4.2 Types of Lines Found In Fingerprints..10 5.0 How Does Fingerprints Biometric Works11 5.1 Acquisition/ Enrollment Process12 5.2 Preprocessing Process..12 5.3 Feature Extraction Process.13 5.4 Matching Process..13 6.0 The Issues that We Need to Concern About.15 6.1 Security Issues.15 6.2 Privacy Issues16 7.0 Case Study.17 7.1 States Beat Benefit Fraud17 7.2 Bank Services at Your Fingertips18 8.0 Conclusion18 9.0 References20

BIOMETRIC- FINGERPRINT WHITE PAPER

1.0 Abstract
Authentication by biometric is becoming increasingly common in corporate and public security systems, customer electronics and so on. To prevent identity theft, biometric data is usually encrypted when its gathered. This paper will shows how the biometric verification phase by phase works and the issues that we need to concern about when we are using the biometric devices such as privacy and the security. In addition, the types of fingerprints will further discuss below.

2.0 Introduction
Biometric is a technology used for measuring and analyzing to identify and verify humans characteristic and traits. [6] There are many types of physical biometrics technologies such as fingerprint, iris, retina, hand, palm vein and face. Among all the biometric techniques, fingerprint-based identification is the oldest method and extremely useful biometrics since the last nineteenth century which has been successfully used in numerous applications and recognized as a primary accurate identification method. Even with the recent advancements made in the field of DNA analysis, the biometric fingerprint is still commonly used whether it has been taken in the traditional way using ink and paper as shown in Figure 1 or scanned into a computer database to record peoples unique characteristics.

BIOMETRIC- FINGERPRINT WHITE PAPER

Figure 1: The example of biometric fingerprint by using the ink & paper method. [2]

As we know that, everyone is known to have unique, immutable fingerprints and consistency for over time, thus the fingerprint identification is one of the well known and publicized biometrics and it has been used for identification for over a century. Besides that, the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcements and immigration. However, recently the biometric fingerprint becoming automated due to the advancements in computer capabilities and computer techniques are now widely used. Hence, the biometric fingerprint always as a front-line security measure for both identity verification and crime detection and also offers an effective crime deterrent. There are a variety of hardware sensors types for biometric fingerprint such as optical, capacitive, ultrasound and thermal are used to collect the digital image of a fingerprint surface. Nowadays the most common sensor is the optical sensors to take an image of the fingerprint. While the software for fingerprint matching techniques can be classified into two which are minutiae-based matching and pattern matching. The most widely used software recognition technique is

BIOMETRIC- FINGERPRINT WHITE PAPER

minutiae-based matching as it can relies on the minutiae points and specifically the location and direction of each point. Last but not least, biometric fingerprint is one of the most highly used methods for human recognition. This is because fingerprints have been acceptance by the general public, law enforcement, and the forensic science. Therefore, in this white paper will be focus on the reasons and issues related to the fingerprint type of fingerprint, how the fingerprint works and the real cases regarding the biometric fingerprint.

BIOMETRIC- FINGERPRINT WHITE PAPER

3.0 Why we need fingerprint?


Nowadays, we live in an anonymous information society characterized by increasing global mobility. The traditional methods such as PIN or passwords for identifying and verifying peoples characteristics are not enough because it is very difficult to remember the long password and the level of the security is not as high compare to the fingerprint technique. Hence, biometric fingerprint become a necessity for sensitive work processes in the public and private sectors. There are a few main reasons of why we need the fingerprint for identifying peoples characteristics. 3.1 Uniqueness of Fingerprint

As we know that, all of the fingerprints have a unique combination and arrangement of patterns and ridge characteristics. Hence, no two prints have ever been found to be exactly alike with one another, even those of identical twins print are different. This is because the fingerprints are not inherited, although the general pattern may be the same in families but there are some level of the fingerprint will differ. Due to this reason, the fingerprint technique has been widely used for electronic passport which stores two fingerprints in the database. As such, fingerprint techniques are powerful tools for security and other operations that require authentication or identification of peoples unique fingerprint.

BIOMETRIC- FINGERPRINT WHITE PAPER

3.2

Accuracy of Fingerprint

The fingerprint recognition technique is the dominant technology in the biometric market due to the high level of accuracy. It is proven that the fingerprint recognition technology may reach recognition rate near 100% in good quality images. Although there are 2% of the populations have poor quality of fingerprint especially the elder people and manual workers. In fact it is very difficult to obtain reliable fingerprints images from these populations. However, the fingerprint technologies are still able to achieve the correct level of security and accuracy of the fingerprint without overly inconveniencing the user. 3.3 Efficiency/Speed of Fingerprint For Use In Identification

The principle of recognition by comparisons of the fingerprints has speed up border crossing through the use of scanners. Many countries have set up the fingerprint technique to confirm the identity of the bearer of the card and to control migration flows to and from their territories. Hence, the fingerprint scanners help to identify the people in a more precise and reliable way as well as increase the efficiency of the process. Nevertheless, the fingerprint technique has the ability to enroll multiple fingers when there are some problems with one finger such as injured then it still can used the other 9 fingers to improve the recognition. Therefore, the successful development effort of the biometric fingerprint enhanced the end user experienced by providing added convenience and faster speed for secure network access and identification fingerprint.

BIOMETRIC- FINGERPRINT WHITE PAPER

4.0 Types of Fingerprints


The types of fingerprint can be divided into two parts, one is types of fingerprint pattern and another one is types of line found in fingerprints. In order to identify peoples characteristics by using the fingerprint technique, it is necessary to understand and familiar with the types of fingerprint on the finger. This is due to avoid the error occur in identifying and verifying peoples fingerprint.

4.1 Types of Fingerprints Pattern


The fingerprint patterns are divided into three main groups which are arches, loop and whorls. Approximately five percent of all fingerprints are arches, 30% are whorls and 65% are loops.

4.1.1

Arch Pattern

Figure 2: The picture of the arch pattern [3] An arch is a pattern of fingerprint where the ridge enters one side of the finger, then rises in the centre forming an arch, and exits on the other side of the finger.

BIOMETRIC- FINGERPRINT WHITE PAPER

As what we can see from the Figure 2 above, the arch pattern is like a hill starting from one side and stopping on the other. Arch pattern can divided into two groups which are plain arches and tented arches. A plain arch is the simplest while the tented arch is similar to a plain arch except that instead of rising smoothly at the centre, there is a sharp upward thrust or spike, causes the centre of the print to look like a tent. Arch pattern is the least common of fingerprint patterns as it contain no deltas or cores.

4.1.2

Loop Pattern

Figure 3: The picture of the loop pattern [3] The Figure 3 illustrates the loop pattern, with a loop the ridge enters one side of the finger, then forms a curve and then exits on the same side of the finger from which it entered. This results when one core and one delta is present. In fact, by looking at the middle of the fingerprint, we can see that a loop looks like a jump rope turned upside down and each line starts on one side and returns to that side. Eventually, loops are the most common pattern in fingerprints.

BIOMETRIC- FINGERPRINT WHITE PAPER

4.1.3

Whorl Pattern

Figure 4: The picture of the whorl pattern [1] The last fingerprint pattern is the whorl pattern as shown in the Figure 4; whorls are divided into four groups which are plain whorl, central pocket loop and accidental. All whorls contain one or more cores and a minimum of two deltas. A whorl is the pattern when ridges form circularly around a central point. Somehow, it looks like a pebble thrown in the water. A plain loop and central pocket loop have at least one ridge while the double loop is made up of two loops combined into one fingerprint which looks like S shape. Then, any print classified as an accidental either contains two or more patterns and may consist of a combination loop.

10

BIOMETRIC- FINGERPRINT WHITE PAPER

4.2 Types of Lines Found in Fingerprints


In fact, fingerprint patterns are made up of a few types of line which determine the general classification characteristics of the print such as arch, loop or whorl. The fingerprint pattern area is a term used to describe the center area of a print which contains many types of lines. The following examples are typical of the most common types of line found in fingerprint. A rod generally forms a straight line and it has little to no curve features and tends to be found in the center of the ROD fingerprints pattern area. An eclipse is a circular or oval shaped line-type which is generally found in the center of whorl patterns. Eclipse A spiral line is a type of spiral out from the center of the fingerprint and is generally found in whorl patterns. Spiral Bifurcation is the intersection of two or more line and which lines are converge or diverge. Bifurcation This line is quickly raised and falls at a steep angle. They tend to be associated with tented arch pattern Tented A loop is a curve line which enters and leaves from the same side of the fingerprint. Loop Table 1: Types of line found in fingerprint. [3]

11

BIOMETRIC- FINGERPRINT WHITE PAPER

5.0 How Does Fingerprints Biometric Works


Fingerprint is one of the most mature biometric traits and considered legitimate proof of evidence in courts of law all over worldwide. Therefore, fingerprint is used in forensic divisions worldwide for criminal investigations. Hence, we are necessary to understand the way of fingerprint works in identification, matching and the flow of the fingerprint verification system. Among all the biometric techniques, fingerprint-based identification is the oldest method which has been used widely. A fingerprint is made up of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.

Figure 5: The flow of the verification fingerprint system [1]

12

BIOMETRIC- FINGERPRINT WHITE PAPER

5.1 Acquisition/Enrollment Process


In a verification fingerprint system, the template fingerprint image is obtained in the enrollment phase. The live-scan of fingerprints can classify into four technologies such as optical, ultrasound, electric field and thermal. For example, the optical technology-based scanners are based on the image of a fingerprint touching the surface of a prism. After that verification process takes place by a inputting the sample of the users fingerprint at sensor and it will divide in the database which contains the different sets of fingerprint templates according to the classification.

5.2 Preprocessing Process


Since the input fingerprint must be processed in the preprocessing step. The preprocessing step includes image enhancement and gray level adjust. A critical step in automatic fingerprint matching is to automatically and reliably extract minutiae from the input fingerprint images. However, the performance of a minutiae extraction algorithm relies on the quality of the input fingerprint images. Hence, the enhancement algorithm are needed to improve the clarity of ridge and furrow structures of input fingerprint images based on the estimated local ridge orientation and frequency. After that, the image enhancement will be improved based on the goodness index and the verification accuracy.

13

BIOMETRIC- FINGERPRINT WHITE PAPER

Before

After

Figure 6: The picture shows the before and after the image enhancement. [4]

5.3 Feature Extraction Process


After the fingerprint image has been preprocessed, the feature extraction will extracts the relevant information that will be used for matching with the template fingerprint. An automatic recognition of peoples fingerprint requires that the input fingerprint be matched with a large number of fingerprints in a database. Hence, to reduce the search time and computational complexity so it is desirable to classify these fingerprints in an accurate and consistent manner. The fingerprint classification can by the fingerprint patterns such as arch, whorl or loop and the type of lines found in the fingerprint. The fingerprint classifier based on the features such as position and numbers of deltas found in the fingerprint. The classification accuracy is 90% achieved in the feature extraction process.

5.4 Matching Process


Fingerprint matching techniques can be placed into two categories which are minutiae-based and correlation based. The minutiae-based techniques find the minutiae points and map their relative placement on the finger. This is done by comparing neighborhoods of nearby minutiae for similarity and a single

14

BIOMETRIC- FINGERPRINT WHITE PAPER

neighborhood may consist of three or more nearby minutiae.

However, it is

difficult to extract the minutiae points accurately especially when the fingerprint is low quality. While the correlation-based method able to overcome some of the difficulties of the minutiae-based approach but it require the precise location of a registration point and are affected by image translation and rotation. Finally a verification decision is made with results or percentages of similarity obtained from the matching process. Then, this template will not match with every template in the database but it will matched with the template according to the characteristics in the particular domain.

Figure 7: The minutiae-based technique in fingerprint matching process [2]

15

BIOMETRIC- FINGERPRINT WHITE PAPER

6.0 The Issues that We Need to Concern About


One of our highest priorities in the world of information security is confirmation that a person accessing sensitive, confidential or classified information is authorized to do so. The fingerprint biometric can identify users based on their characteristics or traits on their print. Individuals are concerned that security systems be put in place that would prevent unauthorized access to personal data and their identities cannot be stolen by others. Therefore, this section will be discussed about the personal issues of privacy related to the fingerprint.

6.1 Security Issues


We need to understand how vulnerable data are to theft or abuse and how the data are to be retained to optimize the security of the data. Fingerprint recognition proved to be the most secure among the other biometrics and there was no success in any of the efforts made to fool the device. In order to guard against attacks, system that stores the biometric fingerprint database should do encrypted format to protect the authentication information. Finally, security is enhanced to secure server for authentication and decreases the data can be tampered with.

16

BIOMETRIC- FINGERPRINT WHITE PAPER

6.2 Privacy Issues


Although the biometric fingerprint does not make the users feel very uncomfortable when used for the purpose of authentication and this method of authentication is not too intrusive of their personal space. However, the users are concerned with how and where information is stored, how it can be used and who can access as they are not willing to exposure their personal information to criminal and threat to their privacy. For example, someone can stole their fingerprint to commit in crime and at the end the victims have to face the criminal responsibility as the there is no one has the same fingerprint with each other. Hence, if their information can be stored locally which provide easier access and control and the concern about network attack then they are worried the crime case will happen on them. While smart storage data make the users feel more comfortable as the others cannot accessing or take their sample of fingerprint for illegal purpose at the same time the security risks decreases.

17

BIOMETRIC- FINGERPRINT WHITE PAPER

7.0 Case Study 7.1 States Beat Benefit Fraud


Many states are investigating and piloting biometric systems to identify benefit recipients in order to reduce fraud and increase efficiency. One state's high-tech benefit system checks for evidence of wrongdoing and creates identification cards as clients enroll. Applicants place their index fingers on an optical reader which scans the prints to create images for the database. At the same time, the applicant's photo is taken with a digital camera. Next, the client signs his or her name on a tablet that captures the signature electronically. All these files are transmitted to a host computer, where, in minutes, search engines verify that the person has not enrolled in the system under another identity. After a client is accepted into the system, an identification card is created on the spot. A two-dimensional symbol on the card encodes the fingerprint file. The card also carries the client's photo and signature, and a magnetic stripe for future use. Clients present their cards and have their fingerprint scanned for verification when they collect benefits. In this state, 41 percent of General Assistance and 31 percent of AFDC recipients failed to re-enroll in those programs when the new identification cards were issued. This is attributed to the deterrence factor the new system provides. Those who attempt multiple enrollments will be caught; suspected fraud cases are now under investigation.

18

BIOMETRIC- FINGERPRINT WHITE PAPER

7.2 Bank Services at Your Fingertips


An employee credit union has installed several unattended banking kiosks that use fingerprint imaging to identify account holders for access to services. Credit union members can enroll at the kiosks by touch screen input as they answer a series of questions displayed on the screen. They then have to present each finger for enrollment and have their photograph taken by a camera in the kiosk. Once enrolled, members will be able to use the kiosks to make deposits and withdrawals, complete loan applications, and more.

8.0 Conclusion
In this white paper, I have introduced the biometric fingerprint, type of fingerprint, how does the fingerprint identification works, the issues have to taken into our considerations and the real cases regarding the biometric fingerprint. Throughout this white paper, we know that the fingerprint is an effective way to reduce time and achieve higher accuracy during the identification process. The fingerprint technique able to scan the fingerprints that have been found at a crime scene and automatically find and record the ridges, whorls, arches or loops contained within. Hence, the fingerprint technique has been bringing a lot of benefits to the people today and increase the efficiency of the process.

19

BIOMETRIC- FINGERPRINT WHITE PAPER

Although the better fingerprint matching algorithms are used almost universally today, but no algorithm can compensate for imperfect or missing images. In fact it is extremely difficult or impossible to obtain reliable fingerprint images from a significant percentage of the world population. There are many reasons that fingerprints may be difficult to acquire, including genetic background, damage from manual labor, poor health and age and even the environmental conditions can cause severe problems. However, the ideal fingerprint technique has to achieve the correct level of security without overly inconveniencing the user. Last but not least, the fingerprint biometric is a great way to authenticate users due to the high accuracy, ease of use, uniqueness of the fingerprint and most economical biometric technique. Besides that, the fingerprint technique can be used for dozens of applications outside the scope of computer security and used to find an offender according to traits left on the crime spot. Therefore, fingerprint biometric has been successfully used in authenticating applications.

20

BIOMETRIC- FINGERPRINT WHITE PAPER

9.0 References
[1]:Fingerprints https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/f orensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+ line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp 5gb_0MTedd2z1NMcYSFWkg6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH 9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg [accessed 9 May 2012] [2]:Fingerprint Identification http://biometrics.cse.msu.edu/fingerprint.html

[accessed 9 May 2012] [3]: Type of fingerprints http://www.senseme.com/scripts/biometrics/fingerprints.htm [Accessed 9 May 2012] [4]:Biometric case http://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asp [Accessed 10 May 2012] [5]: Biometric http://www.biometrics.gov/documents/fingerprintrec.pdf [Accessed 10 May 2012] [6] Biometric http://searchsecurity.techtarget.com/definition/biometrics [Accessed 10 May 2012]

You might also like