Albahrainsoft Company
Introducing fingerprint system biometrics.
Fingerprint systems analyze the locations of “minutiae” – the endings and bifurcations of the friction ridges on the pad of your finger. Often, additional information, such as the number of ridges between minutiae points, is also used.
A number of methods exist to capture fingerprints: optical capture uses visible light, capacitive sensors use electrical current conducted through the finger, and ultrasound uses high frequency sound waves.
Contact sensors capture an image of the ridge pattern in contact with the sensor, while contactless sensors effectively take an image (2D or 3D, depending on the system) of the ridge pattern while the finger is held a distance away from the sensor.
More determined attackers may attempt to produce an artefact – a false fingerprint – which matches the finger of an enrolled user.
Once a high quality artefact has been produced, the probability of defeating the system increases significantly. Instructions for making artefacts of reasonable quality can be readily found on the internet. This does not make an attacker’s life easy, but this is a vulnerability particular to fingerprint biometrics.
Obviously, the specific artefact must be recognisable by the type of fingerprint capture sensor it is used against. For example, a capacitive system will require the artefact to have similar conductivity properties to human skin in order to be detected.
It is clearly easy to obtain a fingerprint image with the co-operation of an enrolled data subject but it is also possible to obtain such an image covertly. This is because one major vulnerability of fingerprint biometrics is that latent fingerprints are sometimes left when a finger comes into contact with a surface (indeed, this is the whole point of forensic applications of fingerprinting). Sometimes, this makes it possible to obtain a fingerprint image from which an artefact can be produced.
A fingerprint is the representation of the dermal ridges of a finger. Dermal ridges form through a combination of genetic and environmental factors; the genetic code in DNA gives general instructions on the way skin should form in a developing fetus, but the specific way it forms is a result of random events such as the exact position of the fetus in the womb at a particular moment. This is the reason why even the fingerprints of identical twins are different [2]. Fingerprints are fully formed at about 7 months of fetus development and finger ridge configurations do not change throughout the life of an individual,…
Fingerprint recognition is the procedure of comparing known and unknown fingerprints to prove that the it is from the same person or not. Today, many approaches, techniques, and systems are used to match fingerprints and solve related problems. This section is focused on analyzing and categorizing different author’s work in the fingerprint recognition area. Table 1 provides a summary of various papers in the current literature. First column determines the Reference of the papers by author names and year of publication. Second column gives the summary of the work in the corresponding paper, and the third column describes the implemented approaches used to solve fingerprint recognition issues. The author names and the year of publication will be used as an identifier for the rest of the tables in the chapter showing other details of the referred literature.
This section analyses the fingerprint recognition data resulting from the literature survey in Section 2. In general, fingerprint recognition processes can be done using multiple procedures. First, decompose raw human fingerprint sample to create digit presentation of the same sample. On the next step, preprocessing is done for the raw input image by filtering and improving fingerprint image to produce suitable output image for feature extraction which extracts the unique features of the fingerprint from the digital representation sample. These extracted features are saved in the fingerprint database as features. Final step is to match the input fingerprint with fingerprint template stored in the database to find the similarities. The outcome of these procedures is deciding if the person is identified or not. Figure 2 describes the sequence of biometric or fingerprint system. The fingerprint procedures involve many different approaches and algorithms that are used to enhance and improve the low quality of fingerprint images. If the fingerprint image is on good quality, then there are no issues and will appear while matching. Table 1 presents the approaches that are used by different authors. Figure 3 presents the most used approaches. Different matching approaches are used in 15 papers which can be considered as the commonly used approaches. Then minutiae extraction techniques are used in around 10 papers. Post processing and histogram equalization are used in 2 papers. There are some other approaches used only once in some of the papers.
Unconstrained capturing systems, which do not have a finger guidance based on dedicated hardware or an on-screen guidance, require a finger detection. Such an algorithm detects the position and orientation of the finger and forms the basis for an automatic capturing system. The image is then segmented and cut to the fingerprint containing area. Four different approaches can be distinguished, whereas in practice implementations often apply a combination of them: