The skin on our palms and soles exhibits a FINGERPRINT MATCHING
|
|
|
- Leonard Blankenship
- 10 years ago
- Views:
Transcription
1 COVER FE ATURE FINGERPRINT MATCHING Anil K. Jain, Michigan State University Jianjiang Feng, Tsinghua University, Beijing Karthik Nandakumar, Institute for Infocomm Research Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The authors describe an automated fingerprint recognition system and identify key challenges and research opportunities in the field. The skin on our palms and soles exhibits a flow-like pattern of ridges and valleys. These papillary ridges on the finger, called friction ridges, help the hand to grasp objects by increasing friction and improving the tactile sensing of surface textures. The Friction Ridge Patterns sidebar describes the nature and origin of these characteristics. Another important use of friction ridges is person identification. The pattern of friction ridges on each finger is unique and immutable, enabling its use as a mark of identity. In fact, even identical twins can be differentiated based on their fingerprints. Superficial injuries such as cuts and bruises on the finger surface alter the pattern in the damaged region only temporarily; the ridge structure reappears after the injury heals. Henry Faulds, Francis Galton, and Edward Henry, among others, established the scientific basis for using fingerprints as a method for person identification in the late 19th century. Since then, law enforcement agencies worldwide have employed fingerprint recognition for two main purposes: establish the identity of a suspect (or victim) based on partial prints, or latents, left at a crime scene; and identify repeat offenders based on prints of all of their fingers (using 10 prints improves matching accuracy). 36 Published by the IEEE Computer Society /10/$ IEEE
2 One of the world s largest fingerprint recognition systems is the Integrated Automated Fingerprint Identification System, maintained by the FBI in the US since The IAFIS currently contains fingerprints of more than 60 million persons, with corresponding demographic information, providing both latent-print search for crime scene investigation and 10-print ID for suspect identification and general-population background checks. In 2008, the FBI began updating the IAFIS to the Next Generation Identification (NGI) system, which will support other biometric traits such as palmprint, iris, and face. Due to rising concerns about security and fraud, government 1 and commercial organizations have substantially increased their own deployment of fingerprint-based recognition systems in several nonforensic applications, including physical and logical access control, ATM transactions, border control, and consumer device access. The fingerprint is the dominant biometric trait in these applications compared to other common traits such as face, iris, and voice, and new emerging traits, including gait, ear, and palm-vein. 2 The main reasons for the popularity of fingerprint recognition are its success in various applications in the forensic, government, and civilian domains; the fact that criminals often leave their fingerprints at crime scenes; the existence of large legacy databases; and the availability of compact and relatively inexpensive fingerprint readers. A fingerprint recognition system can be used for both verification and identification. In verification, the system compares an input fingerprint to the enrolled fingerprint of a specific user to determine if they are from the same finger (1:1 match). In identification, the system compares an input fingerprint with the prints of all enrolled users in the database to determine if the person is already known under a duplicate or false identity (1:N match). Detecting multiple enrollments, in which the same person obtains multiple credentials such as a passport under different names, requires the negative identification functionality of fingerprints. The US Department of Homeland Security s US-VISIT program ( provides visa-issuing posts and ports of entry with fingerprint recognition technology that enables the federal government to establish and verify the identity of those visiting the US. This large-scale automated fingerprint recognition system has processed more than 100 million visitors to the US since The system identifies terrorists, FRICTION RIDGE PATTERNS Volar skin derived from vola, an ancient Roman term for the palm of the hand and the sole of the foot is different from the skin covering other parts of the body. Continuously corrugated with narrow ridges, it contains no hairs or oil glands. 1 Volar skin is not unique to humans; all primates have this regular pattern of interweaving ridges and valleys on their palms and soles. Because friction ridges appear on the epidermis layer of the skin, they are also called epidermal ridges. In fact, the inner layer of the epidermis also has a ridge pattern similar to the surface layer. Embryology research has shown that the process of friction ridge pattern formation is preceded by the formation of volar pads at about the sixth week of fetus development. Friction ridges appear in about the fourth month of gestation as a result of the stresses during growth of the fetus; the ridges are not elevated on the skin until about the 18th week. Minutiae are formed as ridges separate and create space for forming new ridges due to the growth of the finger surface. Figure A. Major fingerprint pattern types: (a) arch, (b) loop, and (c) whorl. The overall pattern of the fingerprint is governed by the shape, size, and placement of volar pads. 2 Higher and symmetric volar pads tend to generate whorls, flatter and symmetric volar pads tend to generate arches, and asymmetric volar pads tend to generate loops as Figure A shows. Identification of the pattern type can facilitate faster search in large-scale fingerprint-recognition applications. It is generally understood that friction ridge patterns are influenced not just by genetic factors but also by random physical stresses and tensions during fetal development. These random effects in the formation of fingerprints provide their uniqueness. References 1. H. Cummins and C. Midlo, Finger Prints, Palms and Soles: An Introduction to Dermatoglyphics, Dover, M. Kücken and A.C. Newell, Fingerprint Formation, J. Theoretical Biology, vol. 235, no. 1, 2005, pp criminals, and immigration violators by comparing a visa applicant s fingerprints with those in watch-list databases and also verifies that a visitor at a port of entry is the same person to whom the visa was issued. The growing list of commercial and government applications for fingerprint recognition, coupled with the advent of compact and inexpensive sensors and powerful processors, have increased demand for fully automated, highly accurate, real-time systems. Developing these next-generation systems presents both challenges and opportunities. FEBRUARY
3 COVER FE ATURE Enrollment database Sensor Minutiae extractor Matcher User identity Figure 1. A typical automated fingerprint recognition system. The system determines the user s identity by comparing the match score to a threshold. AUTOMATED FINGERPRINT RECOGNITION Figure 1 outlines a typical automated fingerprint recognition system. During the enrollment phase, the sensor scans the user s fingerprint and converts it into a digital image. The minutiae extractor processes the fingerprint image to identify specific details known as minutia points that are used to distinguish different users. Minutia points represent locations where friction ridges end abruptly or where a ridge branches into two or more ridges. A typical good-quality fingerprint image contains about minutiae points; the actual number depends on the size of the sensor surface and how the user places his or her finger on the sensor. The system stores the minutiae information location and direction along with the user s demographic information as a template in the enrollment database. During the identification phase, the user touches the same sensor, generating a new fingerprint image called a query print. Minutia points are extracted from the query print, and the matcher module compares the query minutia set with the stored minutia templates in the enrollment database to find the number of common minutia points. Due to variations in finger placement and pressure applied on the sensor, the minutia points extracted from the template and query fingerprints must be aligned, or registered, before matching. After aligning the fingerprints, the matcher determines the number of pairs of matching minutiae two minutia points that have similar location and directions. The system determines the user s identity by comparing the match score to a threshold set by the administrator. Sensing Fingerprints can be sensed using numerous technologies. The traditional ink and paper method, still used by many law enforcement agencies, involves applying ink to the finger surface, rolling the finger from one side of the nail to the other on a card, and finally scanning the card to generate a digital image. In the more popular live-scan method, a digital image is directly obtained by placing the finger on the surface of a fingerprint reader as shown in Figure 2. Optical sensors based on the frustrated total internal reflection (FTIR) technique are commonly used to capture live-scan fingerprints in forensic and government applications, while solid-state touch and sweep sensors silicon-based (a) (b) (c) (d) Figure 2. Fingerprint readers: Cross Match ( optical (a) 10-print and (b) single-print scanners; AuthenTec ( solid-state (c) touch and (d) sweep sensors embedded in Privaris plusid ( devices. 38
4 devices that measure the differences in physical properties such as capacitance or conductance of the friction ridges and valleys dominate in commercial applications. Latent fingerprint impressions left at crime scenes require manual lifting techniques like dusting. 3 The most significant characteristics of fingerprint readers are their resolution and capture area. The standard fingerprint image resolution in law enforcement applications is 500 pixels per inch (ppi), but some readers now have dual-resolution capability (500 and 1,000 ppi). The sensing surface of readers used by law enforcement tends to be large so that they can capture palmprints and all four fingers simultaneously such sensors are referred to as 10-print scanners. Low-resolution and small-area readers are preferred in commercial applications so that they can be easily embedded in consumer devices. Sweep sensors are popular in mobile phones, PDAs, and laptops because of their small size (for example, 14 mm 5 mm) and low cost (under $5). However, such sensors require users to sweep their finger across the sensing surface; the reader fuses overlapping image slices obtained during sweeping to form a full fingerprint. Fingerprint sensors embedded in mobile phones or PDAs are also used to support navigation and hotkey functions, with each finger assigned to a specific functionality. Feature extraction Features extracted from a fingerprint image are generally categorized into three levels, as shown in Figure 3a. Level 1 features capture macrodetails such as friction ridge flow, pattern type, and singular points. Level 2 features refer to minutiae such as ridge bifurcations and endings. Level 3 features include all dimensional attributes of the ridge such as ridge path deviation, width, shape, pores, edge contour, and other details, including incipient ridges, creases, and scars. Level 1 features can be used to categorize fingerprints into major pattern types such as arch, loop, or whorl; level 2 and level 3 features can be used to establish a fingerprint s individuality or uniqueness. Higher-level features can usually be extracted only if the fingerprint image resolution is high. For example, level 3 feature extraction requires images with more than 500-ppi resolution. Figure 3b shows the flow chart of a typical minutiae feature extraction algorithm. First, the algorithm estimates the friction ridge orientation and frequency from the image. (a) Grayscale image (b) Orientation field Binary image Minutiae Figure 3. Feature extraction. (a) Feature levels in a fingerprint. Note that the second and third images are magnified versions of the fingerprint regions indicated by green boxes in the corresponding preceding images. (b) Flow chart of a typical minutiae feature extraction algorithm. Based on these values, it then performs contextual filtering to improve the image quality and facilitate ridge extraction. The algorithm then obtains binary ridge skeletons from the enhanced image by tracing the ridge lines. Ridge endings and bifurcation points are obtained from the ridge skeleton and referred to as minutiae. The algorithm employs some heuristic rules to detect and remove spurious minutiae resulting from an imperfect skeleton image. Matching A fingerprint matching module computes a match score between two fingerprints, which should be high for fingerprints from the same finger and low for those from different fingers. Fingerprint matching is a difficult pattern-recognition problem due to large intraclass variations (variations in fingerprint images of the same finger) and large interclass similarity (similarity between fingerprint images from different fingers). Intraclass variations are caused by finger pressure and placement rotation, translation, and contact area with respect to the sensor and condition of the finger such as skin dryness and cuts. Meanwhile, interclass similarity can be large because there are only three types of major fingerprint patterns (arch, loop, and whorl). Most fingerprint-matching algorithms adopt one of four approaches: image correlation, phase matching, skeleton matching, and minutiae matching. Minutiae-based representation is commonly used, primarily because forensic examiners have successfully relied on minutiae to match fingerprints for more than a century, minutiae-based representation is storage efficient, and FEBRUARY
5 COVER FE ATURE Pairwise similarity Alignment expert testimony about suspect identity based on mated minutiae is admissible in courts of law. The current trend in minutiae matching is to use local minutiae structures to quickly find a coarse alignment between two fingerprints and then consolidate the local matching results at a global level. This kind of matching algorithm 4 typically consists of four steps, as Figure 4 shows. First, the algorithm computes pairwise similarity between minutiae of two fingerprints by comparing minutiae descriptors that are invariant to rotation and translation. Next, it aligns two fingerprints according to the most similar minutiae pair. The algorithm then establishes minutiae correspondence minutiae that are close enough both in location and direction are deemed to be corresponding (mated) minutiae. Finally, the algorithm computes a similarity score to reflect the degree of match between two fingerprints based on factors such as the number of matching minutiae, the percentage of matching minutiae in the overlapping area of two fingerprints, and the consistency of ridge count between matching minutiae. Performance A fingerprint matcher can make two types of errors: a false match, in which the matcher declares a match between images from two different fingers, and a false nonmatch, in which it does not identify images from the Correspondence Figure 4. Typical minutiae-matching algorithm. The algorithm first uses local minutiae descriptors to coarsely align two fingerprints and then computes a global match score based on minutiae correspondences. Score Table 1. Sample accuracy results from three fingerprint technology evaluations. Evaluation Data Best reported accuracy NIST FpVTE 2003 (MST) 10,000 plain fingerprints FNMR = 0.6% at FMR = 0.1% FVC fingers 12 images Electric field sensor (250 ppi) Optical sensor (569 ppi) Sweep sensor (500 ppi) NIST ELFT 2008 (Phase II) 835 latent prints, 100,000 rolled fingerprints FNMR = 15% at FMR = 0.1% FNMR = 0.02% at FMR = 0.1% FNMR = 3% at FMR = 0.1% FNIR = 8% at FPIR = 1% same finger as a match. A system s false match rate (FMR) and false nonmatch rate (FNMR) depend on the operating threshold; a large threshold score leads to a small FMR at the expense of a high FNMR. For a given fingerprint matching system, it is impossible to reduce both these errors simultaneously. Fingerprint identification system performance is measured in terms of its false positive identification rate (FPIR) and false negative identification rate (FNIR). A false positive identification occurs when the system finds a hit for a query fingerprint that is not enrolled in the system. A false negative identification occurs when it finds no hit or a wrong hit for a query fingerprint enrolled in the system. The relationship between these rates is defined by FPIR = 1 - (1 - FMR) N, where N is the number of users enrolled in the system. Hence, as the number of enrolled users grows, the fingerprint matcher s FMR needs to be extremely low for the identification system to be effective. For example, if an FPIR of 1 percent is required in a fingerprint identification system with 100 million enrolled users, the FMR of the corresponding fingerprint matcher must be on the order of 1 in 10 billion. Such a stringent FMR requirement can usually be met only when fingerprints from all 10 fingers of a person are used for identification. This explains the need to continuously decrease the error rates of fingerprint matchers employed in large-scale identification systems. The National Institute of Standards and Technology (NIST) has conducted several fingerprint technology evaluations ( such as the Fingerprint Vendor Technology Evaluation (FpVTE), the Minutiae Interoperability Exchange Test (MINEX), Proprietary Fingerprint Template (PFT) testing, and the Evaluation of Latent Fingerprint Technologies (ELFT), which use operational data collected in forensic and government applications. The University of Bologna conducts FVConGoing ( Home.aspx), which is an evolution of the international Fingerprint Verification Competitions (FVCs) organized between 2000 and Table 1 summarizes FpVTE 2003 Medium-Scale Test (MST), FVC2006, and ELFT 2008 (Phase II) results. Clearly, system performance varies widely depending on fingerprint data characteristics used in the evaluation. However, while these evaluations are useful, the performance of 40
6 different biometric systems cannot always be directly compared. In addition, technology evaluations do not always reflect operational performance due to differences in data characteristics, operating environments, and user interactions with the fingerprint reader. A fingerprint recognition system s operational performance is based on several factors, including sensor characteristics, the number and demographic distribution of the population enrolled in the system, and various environmental factors indoor versus outdoor, temperature, humidity, and so on. Moreover, the required FMR and FNMR depend on the specific application for example, Disney World s fingerprint-based entry system operates at a low FNMR, so as not to upset paying customers, at the expense of a higher FMR. On the other hand, an ATM fingerprint verification system may require low FMR at the expense of higher FNMR. In some cases, a fingerprint recognition system may not even successfully capture the user s fingerprint. Failure to enroll (FTE) and failure to acquire (FTA) refer to the fraction of users who cannot be enrolled or processed by a particular system due to the poor quality of their fingerprints for example, people such as manual laborers or the elderly with worn-out fingers. In practice, FTE can be rather high (a few percentage points) depending on the target population and the occupation of users in the population. OPEN RESEARCH OPPORTUNITIES Numerous challenging problems in fingerprint recognition are yet to be solved. The ever-increasing demand for reducing the error and failure rates of automated fingerprint recognition systems and the need for enhancing their security have opened many interesting research opportunities that encompass multiple domains such as image processing, computer vision, statistical modeling, cryptography, and sensor development. New sensors The physical shape of fingers makes it difficult to capture a complete fingerprint pattern using touch-based sensors. In law enforcement applications, multiple impressions of the same finger are often recorded to obtain good-quality complete images of all the fingers. As most touch-based sensors are based on directly measuring the finger surface, they have difficulty sensing the fingerprints of elderly persons, whose fingerprints tend to be flattened, and manual laborers, whose fingerprints may contain many cuts. Rolling and improper pressure while using touch-based sensors also introduce distortion in the sensed images. New sensor technologies are being developed to overcome these drawbacks. For instance, Lumidigm (www. lumidigm.com) has developed readers that use multispec- tral technology to scan a fingerprint pattern directly from just below the skin s surface; this technique may provide better-quality fingerprints from dry, wet, or dirty fingers. Researchers at TBS ( are investigating touchless 2D and 3D fingerprint imaging, which could obtain complete fingerprint information without the distortion introduced by rolling and other pressure variations. However, more work is still needed to improve the quality of acquired images of difficult fingers with as little imaging constraint as possible. Even touchless fingerprint imaging requires users to place their finger(s) within close proximity of the sensor. Existing touchless sensors cannot be used in surveillance applications. The feasibility of acquiring fingerprints from a distance is still an open question, and any solution is likely to revolutionize the field and lead to numerous new applications for fingerprints. The actual problem of estimating the error rate of latent fingerprint identification is not yet solved. Low-quality images Due to nonideal skin conditions, inherently low-quality fingers, and sensor noise, a significant percentage of fingerprint images are of poor quality. Extracting features from and matching low-quality fingerprints, like those shown in Figures 5a and 5b, is a challenging problem that will require significant research. In many government and forensic applications, human experts are available to encode low-quality fingerprints and verify associated hits found by the automated fingerprint recognition systems. In situations where human intervention is expensive or inconvenient, or fingerprints are unusable, a possible solution is multibiometrics 5 the fusion of multiple biometric traits such as fingerprint, palmprint, face, iris, and voice. However, the seamless integration of different biometric traits remains a difficult research problem both at the acquisition stage (how to acquire the multiple traits simultaneously) and processing stage (how to combine the information from multiple traits effectively). Small overlapping area and nonlinear distortion Fingerprint sensors embedded in consumer electronic devices tend to have a smaller sensing area. This factor, combined with users improper placement of their finger on the sensor, results in a limited overlapping area between two impressions of the same finger, as Figure 5c shows. Given the very small number of minutiae in the overlapping area, it is difficult to determine if two fingerprints are from the same finger. FEBRUARY
7 C OV ER F E AT U RE tion as well as the presence of a complex background, as Figure 5e shows. To overcome this challenging problem, current automated fingerprint ID systems require extensive manual intervention in latent encoding (feature extraction) and in verify(a) ing a candidate list returned by the system. (b) With the increase in latent matching transactions for civilian, law enforcement, and homeland security applications, automated latent processing and matching are receiving more attention. Latent fingerprint evidence was accepted (c) (d) as infallibly accurate in US courts of law for almost a century. In recent years, however, it has been repeatedly challenged under the Daubert standard, a rule of evidence regarding the admissibility of scientific testimony largely derived from a 1993 Supreme Court case ( html/ zs.html). The Daubert stan(e) (f) dard has two basic requirements for expert opinions: The underlying scientific basis Figure 5. Challenges in automated fingerprint processing: (a) wet fingerprint (left) and extracted features (right); (b) fingerprint with many should be accepted widely, and the error cuts (left) and extracted features (right); (c) small overlapping area as rate should be known. marked by rectangles; (d) large nonlinear distortion in fingerprint patterns Match/nonmatch decisions are made as indicated by the corresponding triangles; (e) latent fingerprint with subjectively by human experts whose error overlapping letters (left) and the extracted features (right); (f) altered rates are difficult to estimate and can vary fingerprint: a criminal made a Z-shaped incision into each of his fingers (left), switched two triangles, and stitched them back into the finger (right). significantly from person to person. Although many researchers have attempted to estimate the inherent individuality of finone way to alleviate this problem is to utilize level 3 gerprints,6 the actual problem of estimating the error rate features to improve the matching accuracy in cases where of latent fingerprint identification,7 which involves human there is only a small overlapping area between the two factors in many stages latent development, encoding, impressions. However, level 3 features may not be suitmatching is not yet solved. The only viable solution in able for commercial applications because the sensors used the near term may be to keep improving automated fingerin such applications usually provide only low-resolution print systems performance and ultimately replace human images. A more feasible solution may be fingerprint moexperts with automated systems. saicking, which combines multiple smaller images into a larger image, and more ergonomic and intuitive interfaces Altered/fake fingerprints that can guide users to properly place the central (pattern) People may alter their fingerprints in different ways for area of their finger on the sensor. many reasons. For example, an unauthorized user may Pressing soft finger skin on a sensor always introuse a fake finger that imitates a legitimate user s fingerduces some distortion, which is generally not repeatable. print template to access a computer system. Criminals Matched fingerprints may appear very different under may cover their fingers with fake fingerprints made of subsevere distortion, as Figure 5d shows. Ergonomic sensors stances like glue or they may intentionally mutilate their and appropriate feedback to users can alleviate this probfingers to avoid being identified by automated systems or lem. Another option is to match fingerprints locally for even human experts, as Figure 5f shows. example, using local minutiae descriptors4 before agan essential countermeasure to thwart the use of ingregating these local matches globally. animate or fake fingers is liveness detection checking if the finger is live by measuring and analyzing various Latent fingerprints vital signs of the finger such as pulse, perspiration, and Latent fingerprints generally suffer from low image deformation. While software-based liveness detection quality, small overlapping area, and nonlinear distorsolutions that complement existing fingerprint scanners 42
8 may be more cost-effective, they have not yet shown much promise. To deal with mutilated fingers, a mutilation detector should be added, and, once mutilation is detected, effort should be made to identify the subject either by restoring the original fingerprints or using only the unaltered areas of the fingerprint. With the adoption of multiple biometric traits in large-scale identification systems such as the FBI s NGI, multibiometrics will be a powerful tool to handle altered fingerprints. Interoperability Interoperability problems can occur in all three main modules of a fingerprint recognition system: sensor, feature extractor, and matcher. Different sensors may output images that exhibit variations in resolution, size, distortion, contrast, background noise, and so on. Different encoders may extract different features or adopt varying definitions of the same feature. This diversity makes it difficult to build a fingerprint system with principal components sourced from different vendors. To improve interoperability among multiple fingerprint systems, international standardization organizations have established standards for sensors, templates, and system testing for example, image quality specifications for fingerprint sensors and data exchange formats for minutiae templates. 8 However, the superiority in matching accuracy of proprietary templates compared to standard templates in NIST MINEX testing shows that existing standards must be improved by, for example, including extended features. Fingerprint matchers pose a less-noticeable interoperability challenge. Different matchers can have different score distributions, which may pose a problem during the fusion of multiple algorithms or multiple biometrics. Limited work has been done in standardizing the output of matchers. System on device An important security issue in fingerprint recognition systems is the tampering or modification of the hardware/ software components and interception of fingerprint data passing through the communication channels for example, the wireless interface between a passport reader and the chip on a passport that contains the user s fingerprint template. This problem can be overcome by employing system-on-device technology in which the sensor, feature extractor, matcher, and even the templates reside on a tamper-resistant device such as the Privaris plusid product shown in Figure 2d. The advantage of this technology is that the information about a user s fingerprint never leaves the device; it is only the matching result that is securely transmitted. Moreover, well-known cryptographic tools can be leveraged to prevent interception and alteration of fingerprint information. Figure 6. Cancellable fingerprint. Applying a noninvertible mathematical transformation to the fingerprint template on the left produces the template on the right. Even if the transformed template is revealed, the real fingerprint cannot be gleaned easily. Template security While system-on-device technology may be a useful security measure in verification applications, fingerprint ID systems require centralized storage of fingerprint information in large enrollment databases. The unauthorized use or disclosure of fingerprint template information from such databases constitutes a serious security and privacy threat. Not only can a stolen fingerprint template be reverse-engineered to construct a fake finger 9 or replayed into the system, it can be used for cross-matching across different databases to covertly track people without their consent, thereby compromising their privacy. Another issue is that unlike credentials such as passwords or ID cards that can be easily revoked and reissued, people cannot arbitrarily replace their fingerprint template disclosure of fingerprint information results in permanent loss. Merely encrypting the fingerprint is insufficient because the template remains secure only as long as the decryption key is held secretly. Most of the reported attacks on biometric passports issued in European countries have tried to exploit this vulnerability by intelligently sniffing the decryption key. Two strategies have been proposed to secure fingerprint templates. One is to apply a noninvertible mathematical transformation to the fingerprint template and store only the transformed template. In this way, even if the transformed template is revealed, the real fingerprint cannot be gleaned easily. Since the same fingerprint can be used to generate a new template using a different transformation, it is referred to as a cancellable fingerprint, as Figure 6 shows. Another promising solution is to use biometric cryptosystems and generate cryptographic keys based on biometric samples. The problem with both approaches is that there is some loss of information during the transformation/key generation process that adversely affects the fingerprint FEBRUARY
9 COVER FE ATURE recognition system s accuracy. However, researchers are exploring ways to minimize this degradation in accuracy without compromising template security. Automated fingerprint identification systems have been successfully deployed around the globe for both law-enforcement and civilian applications, and new fingerprint-matching applications continue to emerge. The fingerprint will continue to be the dominant biometric trait, and many identity management and access control applications will continue to rely on fingerprint recognition because of its proven performance, the existence of large legacy databases, and the availability of compact and cheap fingerprint readers. Further, fingerprint evidence is acceptable in courts of law to convict criminals. While fingerprint recognition technology has been under development for nearly half a century, new research problems have accompanied the wide deployment of fingerprint technology. These include extraction of level 3 features, liveness detection, and automated latent fingerprint identification. Issues such as fingerprint recognition at a distance, real-time identification in large-scale applications with billions of fingerprint records, developing secure and revocable fingerprint templates that preserve accuracy, and scientifically establishing the uniqueness of fingerprints will likely remain as grand challenges in the near future. Although fingerprint recognition is one of the earliest applications of pattern recognition, the accuracy of state-of-the-art fingerprint-matching systems is still not comparable to human fingerprint experts in many situations, particularly latent print matching. Significant advances require not only a deeper understanding of friction ridge formation, but also adaptation of new developments in sensor technology, image processing, pattern recognition, machine learning, cryptography, and statistical modeling. While successful commercial applications have driven fingerprint-matching technology, more breakthroughs could be achieved with greater investment in fundamental research. 10 Active collaboration among academic and industrial research groups will also stimulate rapid progress in fingerprint matching. References 1. National Science and Technology Council Subcommittee on Biometrics and Identity Management, Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations, Aug. 2008; Reports/Biometrics%20in%20Government%20Post% pdf. 2. A.K. Jain, P. Flynn, and A.A. Ross, eds., Handbook of Biometrics, Springer, H.C. Lee and R.E. Gaensslen, eds., Advances in Fingerprint Technology, 2nd ed., CRC Press, J. Feng, Combining Minutiae Descriptors for Fingerprint Matching, Pattern Recognition, Jan. 2008, pp A.A. Ross, K. Nandakumar, and A.K. Jain, Handbook of Multibiometrics, Springer, S. Pankanti, S. Prabhakar, and A.K. Jain, On the Individuality of Fingerprints, IEEE Trans. Pattern Analysis and Machine Intelligence, Aug. 2002, pp D.R. Ashbaugh, Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology, CRC Press, D. Maltoni et al., Handbook of Fingerprint Recognition, 2nd ed., Springer, R. Cappelli et al., Fingerprint Image Reconstruction from Standard Templates, IEEE Trans. Pattern Analysis and Machine Intelligence, Sept. 2007, pp National Research Council of the National Academies, Strengthening Forensic Science in the United States: A Path Forward, National Academies Press, Anil K. Jain is a University Distinguished Professor in the Department of Computer Science and Engineering and the Department of Electrical and Computer Engineering at Michigan State University. He is also affiliated with the WCU project in the Department of Brain and Cognitive Engineering at Korea University, Seoul, South Korea. His research interests include pattern recognition, computer vision, and biometric recognition. Jain received a PhD in electrical engineering from the Ohio State University. He is a Fellow of the ACM, the IEEE, the American Association for the Advancement of Science, the International Association of Pattern Recognition (IAPR), and SPIE. Contact him at [email protected]. Jianjiang Feng is an assistant professor in the Department of Automation at Tsinghua University, Beijing. His research interests include image processing, pattern recognition, and biometric recognition. Feng received a PhD in communication engineering from Beijing University of Posts & Telecommunications. Contact him at jfeng@tsinghua. edu.cn. Karthik Nandakumar is a research fellow at the Institute for Infocomm Research, A*STAR, Singapore. His research interests include statistical pattern recognition, computer vision, image processing, and biometric recognition. Nandakumar received a PhD in computer science and engineering from Michigan State University. He is a member of the IEEE, the IEEE Computer Society, and IAPR. Contact him at [email protected]. Selected CS articles and columns are available for free at 44
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
SWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
Identity theft is a growing concern
IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,
On the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview
4050-350-39 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1 With the current mindset of
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Forensic Science Lesson 3: Trace Evidence Analysis
Forensic Science Lesson 3: Trace Evidence Analysis History Alphonse Bertillon 1883 Created the first systematic system of individual classification & identification Detailed description of subject, full-length
Review Article Biometric Template Security
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,
Defining AFIS Latent Print Lights-Out
NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Security of Biometric Authentication Systems Parvathi Ambalakat
Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming
Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008
Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Vulnerabilities of Biometric Authentication Threats and Countermeasures
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 947-958 International Research Publications House http://www. irphouse.com Vulnerabilities
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Prof. Davide Maltoni [email protected]. DEIS - University of Bologna - ITALY. Summer School - BIOMETRICS: AUTHENTICATION and RECOGNITION
6XPPHU6FKRROIRU$GYDQFHG6WXGLHVRQ %,20(75,&6 $87+(17,&$7,21DQG5(&2*1,7,21 $OJKHUR,WDO\-XQH² Fingerprint Recognition Sensing, feature extraction and matching Prof. Davide Maltoni [email protected] DEIS
Secured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH
FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINT CLEAN HANDS ONLY DRY HANDS THOROUGHLY ROLL FINGERS FROM NAIL-TO-NAIL NOTE THE CORES AND DELTAS TAKE IMPRESSIONS IN CORRECT ORDER PRODUCE
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS By Karthik Nandakumar A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Fingerprinting Information Sheet
Fingerprinting Information Sheet HISTORY Fingerprints weren t always used as a means to identify criminals. One of the first methods used to compare physical characteristics was developed in 1883 by Alphonse
Department of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)
Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent) 1. Preamble 1.1. When friction ridge detail is examined using the ACE-V methodology, examiners
Reliability of Fingerprint Verification in Ghana
Reliability of Fingerprint Verification in Ghana Osman Yakubu Garden City University College Department of Computer Science Kenyasi, Kumasi, Ghana ABSTRACT Biometric recognition refers to the automatic
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
How To Improve Security Of An Atm
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security
Biometrics: Trading Privacy for Security
Werner 1 Biometrics: Trading Privacy for Security Chris Werner April 23, 2006 Werner 2 Biometric identification has been around for many years, but due to the recent need of tightened security, and the
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco [email protected] Linda Karina Toscano-Medina [email protected] Gualberto
Development of a Networked Thumb Print-Based Staff Attendance Management System
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-03, pp-121-126 www.ajer.org Research Paper Open Access Development of a Networked Thumb Print-Based
MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
A10/X628 Time & Attendance Terminal
A10/X628 Time & Attendance Terminal User Guide About this Guide This guide solely provides instructions on how to use your A10/X628. Any information regarding actual installation can be found in the A10/X628
3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
HUMANS have used body characteristics such as face,
4 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company
3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Guidelines concerning Fingerprint Transmission
Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
Implications of the IDENT/IAFIS Image Quality Study for Visa Fingerprint Processing
Implications of the IDENT/IAFIS Image Quality Study for Visa Fingerprint Processing October 31, 2002 R. Austin Hicklin Christopher L. Reedy, PhD Abstract The purpose of this document is to review the
Is Alice authorized to enter this facility? Is Bob entitled
Biometric Recognition: Security and Privacy Concerns Biometrics Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can
A New Algorithm for Minutiae Extraction and Matching in Fingerprint
A New Algorithm for Minutiae Extraction and Matching in Fingerprint by Azad Noor Dissertation submitted to the School of Engineering and Design at Brunel University, UK in partial fulfilment of the requirements
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India
Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO
Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO Agenda I. Identity Management vs. Biometrics II. Identity Frameworks III. Program/System Integration
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
