White Paper. Precise BioMatch Fingerprint Technology

Similar documents
Description of Biometric Data Interchange Format Standards

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

May For other information please contact:

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

SWGFAST. Defining Level Three Detail

Embedded and mobile fingerprint. technology. FingerCell EDK

Conformance test specification for BSI-TR Biometrics for public sector applications

PRIME IDENTITY MANAGEMENT CORE

Fingerprint Based Biometric Attendance System

Development of Attendance Management System using Biometrics.

Biometrics for public sector applications

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance

Biometrics for payments. The use of biometrics in banking

22 nd NISS Conference

Biometrics in Physical Access Control Issues, Status and Trends White Paper

De-duplication The Complexity in the Unique ID context

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

Detecting Credit Card Fraud

Personal National Identification System National Population Registry Mexico

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

BehavioSec participation in the DARPA AA Phase 2

SAMAY - Attendance, Access control and Payroll Software

Keywords: fingerprints, attendance, enrollment, authentication, identification

Application-Specific Biometric Templates

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

High Resolution Fingerprint Matching Using Level 3 Features

Biometrics and Cyber Security

Optical Memory Cards in Federal Government

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Abstract. 1. Introduction Methodology

Biometric SSO Authentication Using Java Enterprise System

SCB Access Single Sign-On PC Secure Logon

Modular biometric architecture with secunet biomiddle

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

MegaMatcher Case Study

Product Testing Programs

Procedure for obtaining Biometric Device Certification (Authentication)

Authentication Levels. White Paper April 23, 2014

Biometrics for Public Sector Applications

Extending EMV payment smart cards with biometric on-card verification

Biometric Authentication using Online Signatures

Smart Cards and Biometrics in Physical Access Control Systems

SoMA. Automated testing system of camera algorithms. Sofica Ltd

Biometrics, Tokens, & Public Key Certificates

Biometric Authentication using Online Signature

Multimodal Biometric Recognition Security System

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Seema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire

Best Practice Fingerprint Enrolment Standards European Visa Information System

An Analysis of Keystroke Dynamics Use in User Authentication

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

European Electronic Identity Practices Country Update of Portugal

Opinion and recommendations on challenges raised by biometric developments

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION

Fingerprint-Based Authentication System for Time and Attendance Management

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Examples of Large Scale Biometrics Systems:

The Convergence of IT Security and Physical Access Control

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Fingerprint-Based Authentication System for Time and Attendance Management

SureSense Software Suite Overview

Expertise for biometric solution

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

Understanding The Face Image Format Standards

SURVEILLANCE ENHANCED FACE RECOGNITION

The Convergence of IT Security and Physical Access Control

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

DigitalPersona Pro Enterprise

Fingerprint s Core Point Detection using Gradient Field Mask

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

Biometrics Technology and Standards Overview

"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES

SecuGen USB Fingerprint Reader User Guide

PIV Data Model Test Guidelines

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Alternative authentication what does it really provide?

Required changes to Table 6 2 in FIPS 201

Smart Card in Biometric Authentication

French Justice Portal. Authentication methods and technologies. Page n 1

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

W.A.R.N. Passive Biometric ID Card Solution

Transcription:

Precise BioMatch Fingerprint Technology Ola Svedin, Mårten Öbrink, Jerker Bergenek, April 2004 SCOPE Precise Biometrics core fingerprint technology, Precise BioMatch 1, is an advanced fingerprint-matching algorithm that ensures accuracy and security when used as an authentication method. Precise BioMatch is the foundation for all authentication solutions from Precise Biometrics and operates seamlessly with many third-party security applications, smart cards and biometric readers on the market. This white paper describes the principles and advantages of Precise Biometrics technology. INTRODUCTION Using biometrics to verify identity means using a physical characteristic such as face, voice or fingerprints to authenticate an individual s claimed identity. Fingerprint matching is by far the most successful biometric technology because of its ease of use, non-intrusiveness and reliability. Fingerprints consist of ridges and valleys formed in complex patterns that are unique for every person and thereby provide an optimal verification method. This white paper discusses two main algorithm families commonly used to recognize fingerprints: minutia based and pattern based matching. These two methods evaluate fingerprint images in different ways; minutia matching compares specific details within the fingerprint ridges while pattern matching compares the overall characteristics of the fingerprints. As will be shown in this paper, both methods have advantages and disadvantages. Precise Biometrics continued research and development work has led to a more accurate and robust fingerprint technology, the Precise BioMatch solution. The Precise BioMatch approach uses a hybrid-matching algorithm that combines the benefits of traditional minutia extraction along with advanced pattern matching analysis. This dual algorithm approach optimises the information collected from a fingerprint to subsequently offer a higher degree of analysis potential and assurance for positive authentication. Precise BioMatch is designed for optimal verification of personal identity in logical access, physical access and mobile authentication scenarios and not merely redeveloped from algorithms used for identification of individuals in a large database (as pure AFIS 2 algorithms). The Precise BioMatch algorithm is sensor independent, which means that a user can enroll on one type of sensor and verify on another. This robustness is particularly valuable 1 In this context Precise BioMatch denotes the name of Precise Biometrics fingerprint matching technology portfolio. The different Precise Biometrics products such as Precise BioMatch Pro, Precise BioMatch Std and Precise BioMatch C/J/M include elements of the Precise BioMatch algorithm portfolio but not necessarily all. 2 Automated Fingerprint Identification System

when biometrics is used in a large, uncontrolled deployment. A typical example is a national or sub-national ID card, where the template on the ID card will be matched against live fingerprint images from a broad variety of sensors. FINGERPRINT MATCHING METHODS Minutia Matching Every fingerprint consists of a number of ridges and valleys. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points; ridge endings where a ridge ends and ridge bifurcations where a ridge splits. Figure 1: Enrolment of minutia points. At registration enrollment the minutia points are located (figure 1) and the relative positions to each other and their directions are recorded. This data forms the template, the information later used to authenticate a person. At the matching stage (figure 2), the incoming fingerprint image is pre-processed and the minutia points are extracted. The minutia points are compared with the registered template, trying to locate as many similar points as possible within a certain boundary. The result of the matching is usually the number of matching minutiae. A threshold is then applied, determining how large this number needs to be for the fingerprint and the template to match. Figure 2: Verification using minutia points.

Pros: Cons: Used in AFIS applications Well-known and well-researched method Algorithm is well suited for 1-many matching Cannot be used with all fingerprint sensor technologies, since it puts high demands on sensor resolution and sensor size. Gives poor results with fingerprint sensors less specified than AFIS grade. People with no or few minutia points (special skin conditions) cannot enroll or use the system. The number of minutia points can be a limiting factor for security of the algorithm. Can be confused by false minutia points (areas of obfuscation that appear due to low-quality enrollment, imaging, or fingerprint ridge detail). Pattern Matching One intrinsic property of pattern matching algorithms is that overall fingerprint characteristics are taken into account, not only individual points. Fingerprint characteristics can then include sub-areas of certain interest including ridge thickness, curvature, or density. Due to this increased depth of data a pattern-based algorithm is less dependent on the size of the fingerprint sensor and is independent of the number of minutiae points in a fingerprint. Pattern-based algorithms do not, to the same extent as minutia-based methods, suffer from difficulties of recognising a finger with varying fingerprint quality. Precise Pattern Matching algorithm During enrollment, Precise Biometrics patented pattern matching algorithm locates sub-areas of the fingerprint image instead of registering minutia points. Small sections of the fingerprint and their relative distances are extracted from the fingerprint (figure 3) in order to maximize the amount of unique information. Areas of certain interest are for example the area around a minutia point and areas with low curvature radius. The main structure and unusual combinations of ridges are also valuable data. Figure 3: Enrolment with pattern-based algorithm

The verification procedure (figure 4) begins with the pre-processing of the incoming fingerprint image. The registered small images from the template are then compared with the fingerprint image to determine to what degree the template matches the image. A threshold describing the smallest allowable deviation is then used to decide if the finger matches the stored template. Figure 4: Verification using pattern-based algorithm Pros: Works well with all known fingerprint sensor types All fingerprints possible to capture can be enrolled, even those with no or very few minutia points Well suited for implementations with scarce computing resources e.g. a smart card. Cons: Cannot make use of existing AFIS databases (can use raw images though) Not optimized for identification (1 to many searches in a database)

Precise BioMatch Algorithm Both minutiae and pattern matching techniques are used in Precise BioMatch. The hybrid algorithm takes advantage of both discrete minutia points and overall structures in the fingerprint image. The combination of two different techniques makes Precise BioMatch very robust at dealing with all types of images, even fingerprints of low quality. For example, fingerprints with few minutia points or fingerprints with a blurry pattern, that might otherwise stop users from enrolling in a system, will benefit from the hybrid technology used in the Precise BioMatch algorithm. In an information theory context, the two methods use different fingerprint information subsets that can be considered orthogonal to a certain extent. In terms of matching performance, the result is an algorithm with very good receiver operating characteristics. Benefits of the Precise BioMatch algorithm: Fingerprint reader interoperability: A wide range of sensors and readers can be used for acquiring images, from high-end AFIS readers to several standard, off-theshelf fingerprint readers. Works with all known fingerprint sensor technologies. Software application interoperability: Supports a wide range of third-party software applications. Adaptation to any proprietary software application interface is simple using the Precise BioMatch software development toolkits. Platform interoperability: Precise BioMatch can be run on a server, a PC or on a smart card with equally maintained high performance. Low overall FTE, FAR, FRR and EER because of hybrid matching concept. Compatible with AFIS systems. Precise BioMatch can import images from an AFIS database off-line enrollment is possible without user interaction. Any raw image format can be handled as well as B10.8-compatible. Standards compliance. The Precise BioMatch algorithm complies with all relevant industry standards including BioAPI, CBEFF, ISO 7816-11 and JCF. Certified performance. The Precise BioMatch algorithm has been proven to be well suited for inclusion in FIPS 140 certified products. In 2002 a smart card utilizing an authentication method provided by our Precise BioMatch J Java applet - developed by a Precise Biometrics partner - was FIPS 140-1 certified. Flexible template size. Fingerprint template sizes range from 150 bytes (minutia only) to 1700 bytes depending on product and application. ALGORITHM PERFORMANCE Statistical measures such as the false acceptance rate (FAR, also known as False Match Rate), and the false rejection rate (FRR, also known as False Non-Match Rate) are often cited in order to quantify the "classification strength" of the biometric algorithm. However, it is very important not to confuse the FAR measure with the level of security provided by a biometric verification system. A system is never more secure than its weakest link and fingerprint verification systems in general have matured far beyond the biometric algorithm being a weak link.

Precise BioMatch has different security levels corresponding to different expected False Acceptance Rate values. For Precise BioMatch, the security level thresholds have been determined using a database of fingerprints and verified in field tests. Using a database for determining nominal FAR levels is the standard methodology within the biometrics industry. It is a robust method that maps well to the real-life usage of the system. The FAR statistics for Precise BioMatch have been calculated from data of slightly more than 2,500,000 impostors. The database used is a rough database that was collected using a commercial grade fingerprint reader from users with no or few instructions on finger placement etc. A typical FAR value is 1:10,000, but with Precise BioMatch it can be set from 1:2,500,000 to 1:100. FAR and FRR are diametrically opposed, increasing FAR will lower FRR and vice-versa. For any biometric system, user training will in general have a positive impact on the FRR and failure to enroll (FTE) rate, as captured biometric data will present high variability. Therefore, it is necessary to train user-knowledge and skills to reach optimum performance. With such training, which per definition will take place in any fielded deployment of verification units, third-party tests show that FRR converges to sub-one-percent levels for Precise BioMatch among other fingerprint matching technologies. In particular, care must be taken to optimise the enrolment process to get the best possible fingerprint template by user feedback and advanced image processing to determine fingerprint quality. The enrollment process is by far the most important step in the usage of a biometric recognition system. This is because the biometric template, which is the result of the enrolment process, is what the system will use to compare against all subsequent live fingerprint samples. Another term of interest is EER Equal Error rate. This is a figure describing at what probability FAR and FRR is equal; the risk of accepting an impostor is equally as small as the risk of rejecting a legitimate user. As an example of algorithm performance, FAR and FRR figures will be presented for the version of the Precise BioMatch that is performed on a smart card: Precise Match-on- Card. Precise Match-on-Card FAR, FRR, EER and FTE In a third party field test evaluation (performed according to best practice by Mansfield/Wayman), the Precise Match-on-Card algorithm yields less than 0,5% false rejection rate at an immeasurable (0%) false acceptance rate. The corresponding FTE was also 0%. The Equal Error Rate (where FAR=FRR) was determined to sub 0,1% in this field test.

Using a database for determining FRR is however not obviously a method that in all situations correlates to field usage of the system. One of the reasons for this is that fingerprints in a database are static, so for instance user feedback cannot be simulated. Precise continuously runs field tests of the complete system to get statistics for continued improvement of the matching performance. CONCLUSION Integrators and customers of fingerprint verification products need to use a fingerprint technology that fine-tunes the required parameters and provides an algorithm toolbox optimized according to the needs of the application. As shown in this paper, Precise BioMatch, Precise Biometrics fingerprint technology, covers a wide range of possible configurations, with legacy minutia matching capability alongside high-performance pattern matching to provide substantial benefits including: Interoperability between fingerprint readers, software applications and platforms Possibility to run algorithm on a low-cost smart card - Match-On-Card capability High performance fingerprint matching algorithm, EER<0,1% Possibility to re-use existing base of minutia templates or images (AFIS) Compatibility with existing and emerging standards Flexible template size Pure pattern matching algorithms and algorithms relying only on minutia matching are not able to fulfill all these requirements. For instance, a pure minutia algorithm is not flexible enough to work reliably with a small sensor and gives poor system performance for individuals with few fingerprint minutiae. On the other hand, pure pattern matching algorithms cannot make use of standardized minutia. Combining the strengths of both legacy algorithms, the Precise BioMatch solution offers developers and end-users the best of both methodologies and provides a highly functional and flexible solution across the most diverse range of images and security requirements.

STANDARDS Precise BioMatch complies with the following standards and standard drafts: ANSI B10.8 NISTIR 6529 / ISO/IEC 19785 ANSI X9.84 ISO/IEC 7816-11 Finger Minutiae Extraction and Format Standard for Oneto-One Matching Common Biometric Exchange File Format (CBEFF) Biometric Information Management and Security Personal Verification Through Biometric Methods ISO/IEC 19784 BioAPI 2.0 ANSI/INCITS 358 BioAPI 1.1 ISO/IEC 19794-2, ISO/IEC 19794-4, Finger Minutiae Data Finger Image Data ANSI/1-2000/NIST-ITL Java Card Forum ICAO Data format for the Interchange of Fingerprint, Facial & Scar mark & Tattoo (SMT) Information Java Card 2.2 Biometry API Fingerprint Image format for interoperable data interchange REFERENCES BioAPI Consortium Java Card Forum Precise Biometrics white papers http://www.bioapi.org/ http://www.javacardforum.org/ http://www.precisebiometrics.com/