Professional Documents
Culture Documents
INTRODUCTION
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to
measure). Automated biometric systems have only become available over the last few
decades, due to significant advances in the field of computer processing. Many of these new
automated techniques, however, are based on ideas that were originally conceived hundreds,
even thousands of years ago.
As a process:
As a characteristic:
1
licenses may be forged, stolen, or lost .Thus biometric systems of identification are enjoying
a renewed interest.
Recognisation requires the system to look through many stored sets of characteristics
and pick the one that matches the unknown individual being presented. Various types of
biometric systems are being used for real–time identification; the most popular are based on
face recognition and fingerprint matching.
Biometric technologies are becoming the foundation of an extensive array of highly secure
identification and personal verification solutions. The basic idea behind biometrics is that our
bodies contain unique properties that can be used to distinguish us from others. A biometric
system is essentially a pattern recognition system, which makes a personal identification by
determining the authenticity of a specific physiological or behavioral characteristics
possessed by the user.
Something which you are - such as biometric data – fingerprints, iris, voice or face
scans.
2
Biometrics is rapidly evolving technology, which is being used in forensics such as criminal
identification and prison security, and has the potential to be used in a large range of civilian
application areas. Biometrics can be used transactions conducted via telephone and Internet
(electronic commerce and electronic banking). In automobiles, biometrics can replace keys
with key -less entry devices.
Biometric systems have been researched and tested for a few decades, but have only recently
entered into the public consciousness because of high profile applications, usage in
entertainment media (though often not realistically) and increased usage by the public in day-
to-day activities. Example deployments within the United States Government include the
FBI’s Integrated Automated Fingerprint Identification System (IAFIS), the US-VISIT
program, the Transportation Workers Identification Credentials (TWIC program, and the
Registered Traveler (RT) program. Many companies are also implementing biometric
technologies to secure areas, maintain time records, and enhance user convenience. For
example, for many years Disney World has employed biometric devices for season ticket
holders to expedite and simplify the process of entering its parks, while ensuring that the
ticket is used only by the individual to whom it was issued. One of the oldest and most basic
examples of a characteristic that is used for recognition by humans is the face. Since the
beginning of civilization, humans have used faces to identify known and unknown
individuals
2. Signal processing algorithms perform quality control activities and develop the biometric
template.
3. A data storage component keeps information that new biometric template will be
compared to.
4. A matching algorithm compares the new biometric template to one or more templates
kept in data storage.
5. Finally, a decision process (either automated or human-assisted) users the results from the
matching components to make a system-level decision.
3
1.3 BIOMETRIC MODALITIES
Commonly implemented or studied biometric modalities include fingerprint, face, iris, voice,
signature and hand geometry. Many other modalities are in various stages of developments
and assessment. There is not one biometric modality that is best for all implementations.
Many factors must be taken in account when implementing a biometric device including
location, security risks, task (identification or verification), expected number of users, user
circumstances, existing data, etc.
It is also important to note that biometric modalities are in varying stages of maturity.
Fingerprint Recognition
Face Recognition
Iris Recognition
Hand/Finger Geometry
Speaker Recognition
Dynamic Signature
Retina Recognition
1.4 HISTORY
When we talk about biometric history, we would realize that since time immemorial
people always tried their best to use some way or the other so that they could identify one
person from another, whether it was through footprints or tattoos or photos. Biometric history
indicates that the science did not originate at a single place. People all over the world were
using the basics for mainly identifying individuals from each other.
The ancient Egyptians and the Chinese played a large role in biometrics' history.
Although biometric technology seems to belong in the twenty-first century, the history of
biometrics goes back thousands of years. Possibly the most primary known instance of
biometrics in practice was a form of finger printing being used in China in the 14th century,
as reported by explorer Joao de Barros.
4
Barros wrote that the Chinese merchants were stamping children's palm prints and footprints
on paper with ink so as to differentiate the young children from one another. This is one of
the most primitive known cases of biometrics in use and is still being used today.
Commercial advancements for biometric devices began in the 1970s when a system
called Identimat which measured the shape of the hand and length of the fingers was used as
part of a time clock at Shearson Hamill, a Wall Street investment firm. Subsequently,
hundreds of Identimat devices were used to establish identity for physical access at secure
facilities run by Western Electric, U.S. Naval Intelligence, the Department of Energy, and
U.S. Naval Intelligence and like organizations.
5
CHAPTER 2
Biometric devices consist of a reader or scanning device, software that converts the gathered
information into digital form, and a database that stores the biometric data for comparison
with previous records. When converting the biometric input, the software identifies specific
points of data as match points. The match points are processed using an algorithm into a
value that can be compared with biometric data in the database.
(b) Uniqueness, two persons should not have the same term or measurement of
Characteristic.
(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in
biometric systems are generally either CCD (charge couple device) or CMOS (combined
metal oxide semiconductor) image sensors. CCD is comparatively more costly than CMOS.
6
The main operations a system can perform are enrollment and test. During the enrollment,
biometric information from an individual is stored. During the test, biometric information is
detected and compared with the stored information. Note that it is crucial that storage and
retrieval of such systems themselves be secure if the biometric system is, robust.
The first block (sensor) is the interface between the real world and the system; it has to
acquire all the necessary data. Most of the times it is an image acquisition system, but it can
change according to the characteristics desired. A sample of the biometric trait is captured,
processed by a computer, and stored for later comparison.
The second block performs all the necessary pre-processing: it has to remove artifacts
from the sensor, to enhance the input (e.g. removing background noise), to use some kind of
normalization, etc.
In the third block features needed are extracted. This step is an important step as the
correct features need to be extracted and the optimal way. A vector of numbers or an image
with particular properties is used to create a template. A template is a synthesis of all the
characteristics extracted from the source, in the optimal size to allow for adequate
identifiability. All Biometric authentications require comparing a registered or enrolled
biometric sample (biometric template or identifier) against a newly captured biometric
sample.
If enrollment is being performed where the biometric system identifies a person from
the entire enrolled population by searching a database for a match based solely on the
biometric. For example, an entire database can be searched to verify a person has not applied
for entitlement benefits under two different names. This is sometimes called “one-to-many”
matching.
7
CHAPTER 3
FINGERPRINT RECOGNITION
Fingerprint identification is one of the most well-known and publicized biometrics. Because
of their uniqueness and consistency over time, fingerprints have been used for identification
for over a century, more recently becoming automated (i.e. a biometric) due to advancements
in computing capabilities. Fingerprint identification is popular because of the inherent ease in
acquisition, the numerous sources (ten fingers) available for collection, and their established
use and collections by law enforcement and immigration.
Humans have used fingerprints for personal identification for many centuries and the
matching accuracy using fingerprints has been shown to be very high. Fingerprinting is
probably the best-known biometric- method of identification used for 100 years. There are a
few variants of image capture technology available for such commercially oriented
fingerprint sensor, including optical, silicon, ultrasound, thermal and hybrid.
When a user places their finger on the terminals scanner the image is electronically
read, analyzed, and compared with a previously recorded image of the same finger which has
been stored in the database. The imaging process is based on digital holography, using an
electro-optical scanner about the size of a thumbprint. The scanner reads three-dimensional
data from the finger such as skin undulations, and ridges and valleys, to create a unique
pattern that is composed into a template file.
8
Figure 3.1: Fingerprint classification of 6 categories (a) arch, (b) tented arch, (c) right loop,
(d) left loop, (e) whorl, and (f) twin loop
A fingerprint usually appears as a series of dark lines that represent the high, peaking portion
of the friction ridge skin, while the valleys between these ridges appears as white space and
are the low, shallow portion of the friction ridge skin.
9
Fingerprint identification is based primarily on the minutiae, or the location and direction of
the ridge endings and bifurcations (splits) along a ridge path.
The image below present examples of fingerprint features: (3.2) two types of minutiae i.e.
ridges ending and ridges bifurcation and (3.3) examples of other detailed characteristics
sometimes used during the automatic classification and minutiae extraction processes.
The types of information that can be collected from a fingerprint’s friction ridge impression
include the flow of the friction ridges (Level 1 Detail), the presence or absence of features
along the individual friction ridge paths and their sequence (Level 2 Detail), and the intricate
detail of a single ridge (Level 3 Detail), Recognition is usually based on the first and second
levels of detail or just the latter.
AFIS technology exploits some of these fingerprint features. Friction ridges do not always
flow continuously throughout a pattern and often result in specific characteristics such as
ending ridges, dividing ridges and dots, or other information. An AFIS is designed to
interpret the flow of the overall ridges to assign a fingerprint classification and then extract
the minutiae detail – a subset of the total amount of information available yet enough
information available to effectively search a large repository of fingerprints.
10
Figure 3.3: Other Fingerprint Characteristics
3.1.1 HARDWARE
A variety of sensor types- optical, capacitive, ultrasound and thermal- are used for collecting
the digital image of a fingerprint surface. Optical sensors take an image of the fingerprint,
and are the most common sensor today. The capacitive sensor determines each pixel value
based on the capacitance measured, made possible because an area of air(valley) has
significantly less capacitance than an area of finger(friction ridge skin).
Other fingerprint sensor capture images by employing high frequency ultrasound or optical
devices that use prisms to detect the change in light reflectance related to the fingerprint.
Thermal scanners require a swipe of a finger across a surface to measure the difference in
temperature over time to create a digital image.
3.1.2 SOFTWARE
The two main categories of fingerprint matching techniques are minutiae-based matching and
pattern matching. Pattern matching simply compares two images to see how similar they are.
Pattern matching is usually used in fingerprint systems to detect duplicates. The most widely
used recognition techniques, minutiae-based matching, relies on the minutiae points
described above, specifically the location and direction of each point.
11
Figure 3.4: Simplified Fingerprint Recognition System
For fingerprint acquisition, optical or semi-conduct sensors are widely used. They have
high efficiency and acceptable accuracy except for some cases that the user’s finger is too
dirty or dry. However, the testing database for my project is from the available fingerprints
provided by FVC2002 (Fingerprint Verification Competition 2002). So no acquisition stage
is implemented.
The minutia extractor and minutia matcher modules are explained in detail in the next part
for algorithm design and other subsequent sections.
12
For the fingerprint image preprocessing stage, Histogram Equalization and Fourier Transform
to do image enhancement. And then the fingerprint image is binarized using the locally
adaptive threshold method. The image segmentation task is fulfilled by a three-step approach:
block direction estimation, segmentation by direction intensity and Region of Interest
extraction by Morphological operations. Most methods used in the preprocessing stage are
developed by other researchers but they form a brand new combination in my project through
trial and error. Also the morphological operations for extraction ROI are introduced to
fingerprint image segmentation.
For minutia extraction stage, three thinning algorithms are tested and the Morphological
thinning operation is finally bid out with high efficiency and pretty good thinning quality.
The minutia marking is a simple task as most literatures reported but one special case is
found during my implementation and an additional check mechanism is enforced to avoid
such kind of oversight.
For the post processing stage, a more rigorous algorithm is developed to remove false minutia
based on. Also a novel representation for bifurcations is proposed to unify terminations and
bifurcations.
The minutia matcher chooses any two minutias as a reference minutia pair and then match
their associated ridges first. If the ridges match well, two fingerprint images are aligned and
matching is conducted for all remaining minutia [Figure 3.6].
Fingerprint Image enhancement is to make the image clearer for easy further operations.
Since the fingerprint images acquired from sensors or other medias are not assured with
perfect quality, those enhancement methods, for increasing the contrast between ridges and
13
furrows and for connecting the false broken points of ridges due to insufficient amount of ink,
are very useful for keep a higher accuracy to fingerprint recognition.
Two Methods are adopted in my fingerprint recognition system: the first one is Histogram
Equalization; the next one is Fourier Transform.
Figure 3.7 the Original histogram Figure 3.8 Histogram after the
of a fingerprint image Histogram Equalization
The right side of the following figure [Figure 3.7] is the output after the histogram
equalization.
14
Figure 3.9: Histogram Enhancement.
Original Image (Left). Enhanced image (Right)
We divide the image into small processing blocks (32 by 32 pixels) and perform the Fourier
transform according to:
(1),
In order to enhance a specific block by its dominant frequencies, we multiply the FFT of
the block by its magnitude a set of times. Where the magnitude of the original FFT =
abs(F(u,v)) = |F(u,v)|.
(2),
15
(3)
The enhanced image after FFT has the improvements to connect some falsely broken
points on ridges and to remove some spurious connections between ridges. The shown image
at the left side of figure 3.10 is also processed with histogram equalization after the FFT
transform. The side effect of each block is obvious but it has no harm to the further
operations because I find the image after consecutive binarization operation is pretty good as
long as the side effect is not too severe.
16
3.5 FINGERPRINT IMAGE BINARIZATION
Fingerprint Image Binarization is to transform the 8-bit Gray fingerprint image to a 1-bit
image with 0-value for ridges and 1-value for furrows. After the operation, ridges in the
fingerprint are highlighted with black color while furrows are white.
A locally adaptive binarization method is performed to binarize the fingerprint image. Such
a named method comes from the mechanism of transforming a pixel value to 1 if the value is
larger than the mean intensity value of the current block (16x16) to which the pixel belongs
[Figure 3.11].
The thinned ridge map is then filtered by other three Morphological operation to remove
some H breaks, isolated point and spikes.
17
3.6.1 Fingerprint Ridge Thinning
Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel
wide uses an iterative, parallel thinning algorithm. In each scan of the full fingerprint image,
the algorithm marks down redundant pixels in each small image window (3x3). And finally
removes all those marked pixels after several scans. In my testing, such an iterative, parallel
thinning algorithm has bad efficiency although it can get an ideal thinned ridge map after
enough scans uses a one-in-all method to extract thinned ridges from gray-level fingerprint
images directly. Their method traces along the ridges having maximum gray intensity value.
However, binarization is implicitly enforced since only pixels with maximum gray intensity
value are remained. Also in my testing, the advancement of each trace step still has large
computation complexity although it does not require the movement of pixel by pixel as in
other thinning algorithms. Thus the third method is bid out which uses the built-in
Morphological thinning function in MATLAB.
18
CHAPTER 4
Palm print recognition inherently implements many of the same matching characteristics that
have allowed fingerprint recognition to be one of the most well-known and best publicized
biometrics. Both palm and finger biometrics are represented by the information presented in a
friction ridge impression. This information combines ridge flow, ridge characteristics, and
ridge structures of the raised portion of the epidermis. The data represented by these friction
ridge impressions allows a determination that corresponding areas of friction ridge
impressions either originated from the same source. Because fingerprints and palms have
both uniqueness and permanence, they have been used for over a century as a trusted form of
identification. However, palm recognition has been slower in becoming automated due to
some restraints in computing capabilities and live-scan technologies.
Palm geometry recognition systems are based on a number of measurements taken from the
human hand, including its shape, size of palm, and lengths and widths of the fingers. The
technique is very simple, relatively easy to use, and inexpensive. Environmental factors such
as dry weather or individual anomalies such as dry skin do not appear to have any negative
effects on the verification accuracy of hand geometry-based systems. The geometry of the
hand is not known to be very distinctive and palm geometry based recognition systems
cannot be scaled up for systems requiring identification of an individual from a large
population. Further, palm geometry information may not be invariant during the growth
period of children. In addition, an individual's jewelry (e.g., rings) or limitations in dexterity
(e.g., from arthritis), may pose further challenges in extracting the correct palm geometry
information. The physical size of a palm geometry-based system is large, and it cannot be
embedded in certain devices like laptops.
19
4.1 PALM PRINT RECOGNITION APPROACH
Figure 4.2: Fingerprint Ridges (Dark Lines) vs. Fingerprint Valleys (White Lines).
Palm recognition technology exploits some of these palm features. Friction ridges do not
always flow continuously throughout a pattern and often result in specific characteristics such
as ending ridges or dividing ridges and dots. A palm recognition system is designed to
interpret the flow of the overall ridges to assign a classification and then extract the minutiae
detail- a subset of the total amount of the information available, yet enough information to
effectively search a large repository of palm prints. Minutiae are limited to the location,
direction, and orientation of the ridge endings and bifurcations (splits) along a ridge path. The
images in Figure 4.3 present a pictorial representation of the regions of the palm, two types of
minutiae, and examples of other detailed characteristics used during the automatic
classification and minutiae extraction processes.
20
Figure 4.3: Palm Print and Close-up Showing Two Types of Minutiae and Other
Characteristic.
4.1.1 HARDWARE
A variety of sensor types- capacitive, optical, ultrasound and thermal - can be used for
collecting the digital image of a palm surface; however, traditional live-scan methodologies
have been slow to adapt to the larger capture areas required for digitizing palm prints.
Challenges for sensors attempting to attain high-resolution palm images are still being dealt
with today. One of the most common approaches, when employs the capacitive sensor,
determines each pixel value based on the capacitance measured, made possible because an
area of palm (ridge). Other palm sensors capture images by employing high frequency
ultrasound or optical devices that use prisms to detect the change in light reflectance related
to the palm. Thermal scanners require a swipe of a palm across a surface to measure the
differences in temperature over time to create a digital image. Capacitive, optical, and
ultrasound sensors require only placement of a palm.
4.1.2 SOFTWARE
Some palm recognition systems scan the entire palm, while others require the palms to be
segmented into smaller areas to optimize performance. Maximizing reliability within either a
fingerprint palm print system can be greatly improved by searching smaller data sets. While
fingerprints systems often partition repositories based upon finger number or pattern
classification, palm systems partition their repositories based upon the location of a friction
ridge area.
21
Latent examiners are very skilled in recognizing the portion of the hand from which a piece
of evidence or latent lift has been acquired. Searching only this region of a palm repository
rather than the entire database maximizes the reliability of a latent palm search.
Like fingerprints, the three main categories of palm matching techniques are minutiae-based
matching, correlation-based matching, and ridge-based matching. Minutiae-based matching,
the most widely used technique, relies on the minutiae points described above, specifically
the location, direction, and orientation of each point. Correlation –based matching involves
simply lining up the palm images and subtracting them to determine if the ridges in the two
palm images correspond. Ridge-based matching uses ridge pattern landmark features such as
sweat pores, spatial attributes and geometric characteristics of the ridges, and/or local texture
analysis, all of which are alternates to minutiae characteristic extraction. This method is a
difficulties associated with extracting minutiae from poor quality images.
The advantages and disadvantages of each approach vary based on the algorithm used and the
sensor implemented. Minutiae-based matching typically attains higher recognition accuracy,
although it performs poorly with low quality images and does not take advantages of textural
or visual features of the palm. Processing using minutiae-based techniques may also be time
consuming because of the time associated with minutiae extraction. Correlation-based
matching is often quicker to process but is less tolerant to elastic, rotational, and translational
variances and noise within the image. Some ridge-based matching characteristics are unstable
or require a high-resolution sensor to obtain quality images. The distinctiveness of the ridge-
based characteristic is significantly lower than the minutiae characteristics.
22
CHAPTER 5
False acceptance rate is also known as Type I error. It measures the percentage of
impostors being incorrectly accepted as genuine user. Since almost all biometric systems aim
to achieve correct identity authentication, this number should be as low as possible.
False rejection rate is also known as Type II error, this measures the percentage of
genuine users being incorrectly rejected. In order to minimize inconveniences (or
embarrassment) to the genuine user, this number should also be low.
FAR and FRR are inversely related and a consolidation of the FAR and FFR is the
point at which accept and reject errors are equal. This is described as the equal error rate
(EER), sometimes also known as the cross-over error rate (CER). Low EER scores generally
indicate high levels of accuracy. This is illustrated in Figure 5.1. FAR and FFR can often be
adjusted by changing system parameters (rejection thresholds) or better control of conditions
under which systems are used (dust free, good lighting and so on).
23
Figure 5.1: System Accuracy Curve
In the above table 5.1, universality indicates how common the biometric is found in
each person; uniqueness indicates how well the biometric separates one person from the
other; permanence indicates how well the biometric resist the effect of aging; while
collectability measures how easy it is to acquire the biometric for processing. Performance
indicates the achievable accuracy, speed and robustness of the biometrics while acceptability
indicates the degree of acceptance of the technology by the public in their daily life and
circumvention indicates the level of difficulty to circumvent or fool the system into accepting
an impostor.
24
CHAPTER 6
6.1 ADVANTAGES
Fingerprints are unique to each finger of each individual and the ridge
arrangement remains permanent during one's lifetime.
PALM RECOGNITION
Easy to capture.
The major advantage is that most people can use it and as such, the acceptance
rate is good.
6.2 DISADVANTAGES
PALM RECOGNITION
Use requires some training.
25
CHAPTER 7
APPLICATIONS
Finger print identification is the most nature and the most extensively used technique in
automatic personal identification based on biostatistics. However, automatic finger print
identification is mainly based on finger print detail. Palm print includes much more
information than the finger print. It is accordingly used to compensate finger print
deficiency.
Using the palm print to diagnose certain diseases is an asset of Chinese traditional
medicine. This method was formed after thousands years of clinical practice. Not only
can it be used to diagnose physical disease, it can also be used for diagnosis of mental
disease.
Past research has demonstrated that the epidermal ridge patterns are under genetic
influence. The hereditary basis of dermal patterns has been studied, which has since been
confirmed by numerous genetic studies. A high degree of similarity of dermatoglyphic
traits has been found between monozygotic twins, whereas considerably less agreement
exits between dizygotic twins. These observations have been utilized diagnostically in
determining zygosity of twins.
Dermatoglyphic studies in the field of sport at home and abroad has proved that
dermatoglyphics can be regarded as a new genetic reference index in selecting athletes.
Many researchers divide athletes into groups according their achievements and compare
between athlete groups and the general population to find differences
26
CHAPTER 8
This chapter is focuses on the aspects common to all the biometric recognition systems,
including the input data (biometrics images, and person meta data) and output (scores) of
these systems. This leads to a focus on user and group level performance.
This brings together aspects of statistics and machine learning to provide a comprehensive
guide to evaluate, interpret and understand biometric data. This professional book naturally
leads to topics including data mining and prediction, widely applied to other fields but not
rigorously to biometrics.
27
Figure 8.2: Binary Thinning
28
Figure 8.4 After Removing Spikes
29
Figure 8.6 Real Minutiae
30
CHAPTER 9
CONCLUSION
Biometric is an emerging area with many opportunities for growth. Biometrics is widely
being used because of its user friendliness, flexibility in specifying required security level and
long term stability. The technology will continue to improve and challenges such as
interoperability solved through standardization. This will lead to increase in the market
adoption rate and the technology will proliferate. Possibly in the near future, you will not
have to remember PINs and passwords and keys in your bags or pockets will be things of the
past.
Friction ridge skin on fingers and palms has been purportedly known to be a unique physical
characteristic of an individual that does not change over time and can be used as a person’s
“seal” or “signature” since ancient times. With the high and growing demand for reliable
person recognition in modern era, fingerprint recognition has become one of the most
successful solutions that achieves high recognition accuracy, ease of use, and high
throughput. Fingerprints are now routinely collected not only from apprehended criminals,
but also for the purpose of border crossing, entrance to amusement parks, and accessing
laptops and mobile phones. Fingerprint recognition technology enables authorities to find
suspect(s) involved in a crime and check the background of government job applicants.
Persistence of fingerprints
Fingerprint modeling
Fingerprint obfuscation
31
CHAPTER 10
FUTURE SCOPE
The future of biometrics holds great promise for law enforcement applications, as well for
private industry uses. Biometrics’ future will include e-commerce applications for extra
security on the checkout page, and biometrics will guard against unauthorized access to cars
and cell phones. In the future, biometric technology will further develop 3-D infrared facial
recognition access control, real-time facial recognition passive surveillance, and visitor
management authentication systems. Already A4Vision, a provider of 3-D facial scanning
and identification software uses specialized algorithms to interpret the traditional 2-D camera
image and transfer it into a 3-D representation of a registered face. This makes it almost
impossible to deceive the biometric system with still photos or other images. Strengthening
existing biometric innovations for future growth all of these security innovations will make
biometric technology more accurate and make its usage more widespread.
32
CHAPTER 11
REFERENCES
2. Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An introduction to
biometric recognition", IEEE Transactions on Circuits and Systems for Video
Technology 14th (1): 4–20, doi:10.1109/TCSVT.2003.818349
8. http:// www.biometrics.org/
33
Note:
34