FINGERPRINT RECOGNITION AND PASSWORD SECURITY SYSTEM

PROJECT SUPERVISOR Dr. SYED WAQAR SHAH PROJECT LEADER AMMAD UDDIN MEMBERS AMEER ULLAH RUMMAN KHAN MUHAMMAD SHAKEEL

1

INTRODUCTION

2

INTRODUCTION

1.1 The era of biometrics
In the 21st century the use of biometric based systems have seen an exponential growth. This is all because of tremendous progress in this field making it possible to bring down their prices, easiness of use and its diversified use in every day life. Biometrics is becoming new state of art method of security systems. Biometrics are used to prevent unauthorized access to ATM, cellular phones , laptops , offices, cars and many other security concerned things. Biometric have brought significant changes in security systems making them more secure then before, efficient and cheap. They have changed the security system from what you remember (such as password) or what you possess (such as car keys) to something you embody (retinal patterns, fingerprints, voice recognition). 1.2 What is biometrics? Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. 1.3 Advantages of Biometrics Biometrics offers several advantages over traditional security measures. Some of them are presented below.

3

1.3.1 Accuracy and Security Biometrics based security systems are far most secure and accurate than traditional password or token based security systems. For example a password based security system has always the threat of being stolen and accessed by the unauthorized user. Further more the traditional security systems are always prone to accuracy as compared to biometrics which is more accurate. 1.3.2 One individual, Multiple IDs Traditional security systems face the problem that they don’t give solution to the problem of individuals having multiple IDs. For examples a person having multiple passports to enter a foreign country. Thanks to biometrics!!! They give us a system in which an individual can’t possess multiple IDs and can’t change his ID through out his life time. Each individual is identified through a unique Biometric identity throughout the world. 1.3.3 One ID, multiple individuals In traditional security systems one ID can be used by multiple individuals. For example in case of a password based security system a single password can be shared among multiple individuals and they can share the resources allotted to a single individual. Biometric based security system doesn’t allow such a crime. Here each individual has a single unique ID and it can’t be shared with any other individual.

1.4 Biometrics categories
Biometrics can be categorized in various categories as follow.

1.4.1 Physical biometrics 4

This biometrics involves measurement of physical characteristics of individuals. The most prominent of these include     Fingerprints Fingerprints recognition has been present for a few hundred years. Due to tremendous research this field has reached such a point where the purchase of fingerprint security system is quite affordable. For this reason these systems are becoming more widespread in a variety of applications. Fingerprints Face Hand geometry Iris scans

Fingerprint image. Face

5

There has been significant achievement in face recognition system in past few years. Due to these advancements this problem appears to be eventually technologically feasible and economically realistic. In addition, current research involves developing more robust approaches that accounts for changes in lighting, expression, and aging, where potential variations for a given person are illustrated in Figure. Also, other problem areas being investigated include dealing with glasses, facial hair, and makeup.

Facial Expression Image

Hand geometry Hand geometry is one of the most basic biometrics in use today. A two-

dimensional system can be implemented with a simple document scanner or digital camera, as these systems only measure the distances between various points on the hand. Meanwhile, a three dimensional system provides more information and greater reliability. These systems, however, require a more expensive collection device than the inexpensive scanners that can be used in a two-dimensional system. An example of a commercial three-dimensional scanner is shown in Figure.

6

Commercial three-dimensional scanner As seen in this image, the physical size of the scanner limits its application in portable devices. The primary advantage of hand geometry systems is that they are simple and inexpensive to use. Also, poor weather and individual anomalies such as dry skin or cuts along the hand do not appear to negatively affect the system. The geometry of the hand, however, is not a very distinctive quality. In addition, wearing jewelry or other items on the fingers may adversely affect the system’s performance. Iris Iris recognition has taken on greater interest in recent years. As this technology advances, purchasing these systems has become more affordable. These systems are attractive because the pattern variability of the iris among different persons is extremely large. Thus, these systems can be used on a larger scale with a small possibility of incorrectly matching an imposter. Also, the iris is well protected from the environment and remains stable over time. In terms of localizing the iris from a face, its distinct shape allows for precise and reliable isolation. Figure shows the unique iris pattern data extracted from a sample input. 7

Iris pattern 1.4.2 Behavioral biometrics This category of biometrics is temporal in nature. They are evolved during the life time of an individual. It involves measuring the way in which an individual performs certain tasks. Behavioral biometrics include     Gait Handwriting Speech Signature

Now let discuss some the behavioral biometrics in a little detail. 8

Gait Gait-based recognition involves identifying a person’s walking style. Although these systems are currently very limited, there is a significant amount of research being conducted in this area. Furthermore, studies have shown that gait changes over time and is also affected by clothes, footwear, walking surfaces, and other conditions. Figure below outlines the various stages of a gait cycle.

Samples recorded from a gait cycle 1.4.3 Chemical biometrics: This is a new emerging field. It involves measuring of chemical or biological composition of an individual different body parts such as   DNA Blood glucose

1.5 Multi-biometric systems Similar to multimodal systems, there are several other techniques aimed at improving the performance of a biometric system, as outlined in Figure below. 1.5.1 Multimodal 9

Multimodal systems employ more than one biometric recognition technique to arrive at a final decision. These systems may be necessary to ensure accurate performance. Combining several biometrics in one system allows for improved performance as each individual biometric has its own strengths and weaknesses. Using more than one biometric also provides more diversity in cases where it is not possible to obtain a particular characteristic for a person at a given time. Although acquiring more measurements increases the cost and computational requirements, the extra data allows for much greater performance.

1.5.2 Multialgorithmic These techniques acquire a single sample from one sensor and process this signal with two or more different algorithms. 1.5.3 Multi-instance These systems use a sensor to obtain data for different instances of the same biometric, such as capturing fingerprints from different fingers of the same person.

1.5.4 Multi-sensorial

10

These systems sample the same biometric trait with two or more different sensors, such as scanning a fingerprint using both optical and capacitance scanners.

Multi-biometric categories

11

FINGERPRINT IENTIFICATION

Finger print

SYSTEM
2.1 A brief history

Identifi cation system

Fingerprints have been scientifically studied for many years in our society. The characteristics of fingerprints were studied as early as 1600s. Meanwhile, using fingerprints as a means of identification first occurred in the mid-1800s. Sir William Herschel, in 1859, discovered that fingerprints do not change over time and that each pattern is unique to an individual. With these findings, he was the first to implement a system using fingerprints and handprints to identify an individual in 1877. By 1896, police forces in India realized the benefit of using fingerprints to identify criminals, and they began collecting the fingerprints of prisoners along with their other measurements.

12

With a growing database of fingerprint images, it soon became desirable to have an efficient manner of classifying the various images. Between 1896 and 1897, Sir Edward Henry developed the Henry Classification System, which quickly found worldwide acceptance within a few years. This system allows for logical categorization of a complete set of the ten fingerprint images for a person. By establishing groupings based on fingerprint pattern types, the Henry System greatly reduces the effort of searching a large database. Until the mid-1990s, many organizations continued to use the Henry Classification System to store their physical files of fingerprint images. As fingerprints began to be utilized in more fields, the number of requests for fingerprint matching began to increase on a daily basis. At the same time, the size of the databases continued to expand with each passing day. Therefore, it soon became difficult for teams of fingerprint experts to provide accurate results in a timely manner. In the early 1960s, the FBI, Home Office in the United Kingdom, and Paris Police Department began to devote a large amount of resources in developing automatic fingerprint identification systems. These systems allowed for an improvement in operational productivity among law enforcement agencies. At the same time, the automated systems reduced funding requirements to hire and train human fingerprint experts. Today, automatic fingerprint recognition technology can be found in a wide range of civilian applications.

2.2 Fingerprint details In this section structure and detail about fingerprint image will be explained. We will emphasize and give greater detail of only those terminologies which are related to our project. 2.2.1 What is a fingerprint? 13

A fingerprint is the feature pattern of one’s finger as shown in figure below. It is believed with strong evidence that these feature patterns are unique for each individual. So each individual has its own fingerprint with permanent uniqueness. That’s why fingerprints have been used for identification and forensic investigation for a long time.

A fingerprint image acquired by a sensor. 2.2.3 Fingerprint features A fingerprint pattern is composed of a sequence of ridges and valleys. In a fingerprint image, the ridges appear as dark lines while the valleys are the light areas between the ridges. A cut or burn to a finger does not affect the underlying ridge structure, and the original pattern will be reproduced when new skin grows. Ridges and valleys generally run parallel to each other, and their patterns can be analyzed on a global and local level. Ridges and valleys generally run parallel to each other, and their patterns can be analyzed on a global and local level. 14

2.2.4 Global level At the global level, the fingerprint image will have one or more regions where the ridge lines have a distinctive shape. 2.2.5 Local level While the global level allows for a general classification of fingerprints, analyzing the image at the local level provides a significant amount of detail. These details are obtained by observing the locations where a ridge becomes discontinuous, known as minutiae points. Our project is also based on the minutiae based recognition. The most common types of minutiae are shown in Figure below.

Ridge Types

15

In general, a ridge can either come to an end, which is called a termination, or it can split into two ridges, which is called a bifurcation. The other types of minutiae are slightly more complicated combinations of terminations and bifurcations. For example, a lake is simply a sequence of two bifurcations in opposing directions, while an independent ridge features two separate terminations within a close distance. In our project we will use only the ridge ending and ridge bifurcation for identification.

Minutiae Types (Terminations and Bifurcations)

2.3 FINGERPRINT MATCHING TECHNIQUES Two main approaches are used for fingerprint matching which are described below. 2.3.1 Minutiae based The first approach, which is minutia-based, represents the fingerprint by its local features, like terminations and bifurcations. This approach has been intensively studied, also is the backbone of the current available fingerprint recognition products. I am also using this approach in my project.

16

2.3.2 Image based The second approach, which uses image-based methods, tries to do matching based on the global features of a whole fingerprint image. It is an advanced and newly emerging method for fingerprint recognition. It is useful to solve some problems of the first approach. But my project does not aim at this method, so further study in this direction is not expanded in my thesis.

17

3 .1

SYSTEM DESIGN
Design

Syst em Lev el

18

A fingerprint recognition system consists of image acquisition, minutiae extractor and minutiae matcher. In our project there is also a password security added so a password acquisition and password matcher is also needed. For fingerprint acquisition, optical or semi-conduct sensors are widely used. But for my project I have used the available fingerprints on the net for testing. So no acquisition stage is implemented. The minutia extractor and minutia matcher modules are explained in detail in the next part for algorithm design and other subsequent sections.

3.2 Algorithmic Level Design To implement our project a four stage approach has been used. These four stages are given in the figure below.

Preprocessing
 Image enhancement  Image Binarization 19  Image segmentation

Minutiae Extraction
 Thinning  Minutiae marking

Post-processing
 False minutiae removal

Minutiae Matching
Figure. Project

System Process flow Chart

Each of these stages will now be explained in detail in the next chapter.

20

FINGERPRINT IMAGE PROCESSINGS

4.1 Fingerprint Image Enhancement The performance a fingerprint recognition system basically depends upon the quality of the input image. Since the images acquired with different kinds of sensors are 21

not of the perfect quality and so they can’t be used directly for the matching. Therefore to ensure the accurate working of the system the image is first enhanced using different algorithms and image processing techniques. I have used histogram equalization in my project for the fingerprint image enhancement. It is explained below.

4.1.1 Histogram Equalization Histogram equalization is used to expand the pixels to all the intensity values from 0 to 255. Some of the original images are very dark i.e. their histogram is such that their intensity values are concentrated towards the origin i.e. near zero intensity value. On the other hand some of the images are very bright i.e. their intensity values are concentrated towards 255 and nearby intensity values. After applying the histogram equalization the pixels are distributed uniformly all over the intensity values from 0 to 255. Due to this process the contrast of the image is increased and so the visual effect of the image is increased.

22

2000 1800 1600 1400 1200 1000 800 600 400 200 0 0 50 100 150 200 250

Histogram of image before enhancement.

3000

2500

2000

1500

1000

500

0 0 50 100 150 200 250

Histogram of image after enhancement.

23

Fingerprint image Before Histogram Equalization

Fingerprint image After Histogram Equalization

24

4.2 Fingerprint Image Binarization Fingerprint Image Binarization is to transform the 8-bit Gray fingerprint image to a 1-bit image with 0-value for ridges and 1-value for furrows. After the operation, ridges in the fingerprint are highlighted with black color while furrows are white. First a threshold value from the image is selected using matlab function ‘graythresh’. A threshold intensity value between 0 and 1 is obtained using the above function. This value is then used to convert the grey image to a black and white image. The value of pixel which is less then the above threshold value calculated is taken as 0 representing the ridge in black color. A value of the pixel in the image which is greater than the threshold value calculated is then converted to 1 representing the white color valley or furrow. The following image shows the image before and after Binarization

Fingerprint image before Binarization.

25

Figure. Fingerprint image after Binarization

Fingerprint image segmentation

In general, only a Region of Interest (ROI) is useful to be recognized for each fingerprint image. The image area without effective ridges and furrows is first discarded since it only holds background information. Then the bound of the remaining effective area is sketched out since the minutia in the bound region is confusing with that spurious minutia that is generated when the ridges are out of the sensor.

4.3 ROI by morphological operations Two Morphological operations called ‘OPEN’ and ‘CLOSE’ are adopted. The ‘OPEN’ operation can expand images and remove peaks introduced by background noise. The ‘CLOSE’ operation can shrink images and eliminate small cavities. 26

4.4 Fingerprint Ridge Thinning Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. For this purpose I have used matlab built in function ‘bwmorph’. This function repeats operation on the ridges until they are one pixel wide and are suitable for minutiae extraction phase.

27

5 .1 Min utia

MINUTIAE MATCHING

Ma rkin g

After the fingerprint ridge thinning, marking minutia points is relatively easy. In general, for each 3x3 window, if the central pixel is 1 and has exactly 3 one-value neighbors, then the central pixel is a ridge branch as shown in figure. If the central pixel is 1 and has only 1 one-value neighbor, then the central pixel is a ridge ending shown in figure below.

0 0 1

1 1 0
Bifurcation

0 0 1
28

0 0 0

0 1 0
Termination

0 0 1

Also the average inter-ridge width D is estimated at this stage. The average interridge width refers to the average distance between two neighboring ridges. The way to approximate the D value is simple. Scan a row of the thinned ridge image and sum up all pixels in the row whose value is one. Then divide the row length with the above summation to get an inter-ridge width. For more accuracy, such kind of row scan is performed upon several other rows and column scans are also conducted, finally all the inter-ridge widths are averaged to get the D.

5.2 Post processing Post processing mainly involves removal of the false minutiae from the fingerprint image. As described earlier, the crossing number algorithm is used again to locate the terminations and bifurcations within the final thinned image. In this process, the locations where the ridges end at the outer boundaries of the image are classified as terminations. In the true sense, however, these locations are not unique termination minutiae. Instead, they only appear as terminations because the dimensions of the image force each ridge to come to an end. Knowing this, these locations should not be recorded as minutiae within the fingerprint. One way to eliminate such locations involves creating an ellipse to only select minutiae points inside the fingerprint image.

The center of the ellipse is established by locating the minimum and maximum rows and columns that contain a ridge pixel, then calculating the row and column that lie halfway between these extremes. 29

5.3 Minutiae Matching

The matching process involves comparing one set of minutiae data to another set. In most cases, this process compares an input data set to a previously stored data set with a known identity, referred to as a template. The template is created during the enrollment process, when a user presents a finger for the system to collect the data from. This information is then stored as the defining characteristics for that particular user. In our project since the whole process is done in matlab so there is no need for database creation. We need to compare only two images. If both the images are from the same fingerprint they are matched otherwise they are unmatched. The following are the steps involved in the matching process. 1. First of all the two fingerprints which are to be matched are load

into the matching function. 2. Minutiae points i.e ridge ending and ridge bifurcation extracted from

both fingerprint images are laoded into the function. 3. A built in matlab function ‘isequal’ is used to compare the two

minutiae points i.e ridge ending and ridge bifurcation of both the images with each other. 4. If both the ridge endings and ridge bifurcations of the two fingerprint

images matches with each other, only then the fingerprint images are matched otherwise they are unmatched.

30

PASSWORD SECURITY
31

Password Security Password? A password is a secret word or string of characters that is used to prove identity or gain access to a resource. The password must be kept secret from those not allowed access. Fingerprint is the state of art security measure as compared to password and other conventional security methods. But in our project we have summed up both the fingerprint and password security in order to design a more secure and efficient security system. Since our project design and simulation is in matlab so we have used matlab coding to implement this task. The steps used in method are as follow. 1. First of all an array of passwords is saved in m file of matlab. 2. When a user wants to enter the system he must enter the password to get access.

32

3. When the password is entered it is matched with the already stored passwords in the m file. 4. If the entered password matches with any of the passwords in the array stored in the m file then the password matches dialogue box appears. 5. If the password does not matches with any of the passwords stored in the array then an unmatched messages is displayed and access is not granted to the user. In our project the Password security works and is presented in the following way as shown in different figures. 6.2 Password GUI a). when the user enters the Enter Password button a dialogue box appears asking the user to enter password.

33

Password GUI 1

b). when the user enters the password and presses OK on the dialogue box another dialogue box appears showing whether the password is matched or not.

Password GUI 2

34

SYSTEM GUI AND ITS USER MANUAL

35

7.1 GUI User Manual We have presented our project in matlab GUI. Following are different steps showing its operation. 1. 2. Open the matlab 6.0 or above. In the matlab command window type fig1 and press enter.

36

Matlab Command Window

The following window will appear when we press enter in the above figure.

Main GUI Window

37

There are three main panels in the main window as shown in the above figure. There is a control panel, view panel and exit panel. Control panel have two buttons of which match images is of main importance. The view panel shows different buttons used for performing different operations on the two images. 3. below. From the file menu click open and load two images as show in the figure

38

GUI Loading Images

4.

After loading the two images we can view the images by clicking on the

view images button in the view panel as show below.

39

GUI View Images

5.

By clicking on the View Transform button in the View Panel we can view

the transformed image after different image preprocessing and post processing algorithms applied as show below.

40

Transformed Images

6. When we click the histograms button in the view panel, the histograms of the two images are shown as in the figure below.

41

Histogram of Original Images

42

7.

Click on the Hist Equalization to view the equalized histogram of the two

images as shown below.

Histogram Of Images After Equalization

43

8.

when we click the match images, it compares the two images

and displays the result. If the two fingerprint images match then a message box is shown showing “Fingerprint matched”, otherwise the message box displays “Fingerprint don’t match” as shown below.

Fingerprint Matching Result

44

9.

In the Control Panel click on Enter Password to enter password for

authentication. When we click on this button user is asked to enter password in the matlab command window. If the password is matched a message box appears showing that the password is matched otherwise the message box shows that the password did not match.

Password Matching Result

45

CONCLUSION

46

Conclusion In our project we have combined biometric i.e. fingerprint and conventional security i.e. password security system. The conventional password security has several advantages as well as disadvantages. Those disadvantages have been overcome by using it with fingerprint security system. So overall system has both the advantages of the state of art biometric and conventional security system which makes it more powerful than either of the two security measures. The efficiency of the fingerprint security system mainly depends upon the accuracy and the response time. Keeping these two things in mind we have used robust algorithms giving us fast response time and accuracy.

Future work

Following are the some of the recommendations and future work that can be done in order to enhance the system further. 1. There is a need in fingerprint security system to detect whether the

fingerprint is from a living user or not. Experiments have shown that fingerprint security systems can be fooled by using copy of the fingerprint from a user.

2.

Several biometric may be combined i.e. multi biometric security

system may be used in order further increase the security and efficiency. 3. It is obvious that biometric systems will govern the security domain

in future electronic world. So due increase in usage the identification speed and accuracy will be the crucial factors. Therefore the algorithms may be optimized in such a way in order to meet these demands.

47

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.