You are on page 1of 37

Fingerprint Technology For

Information Security

Joy Dutta
Exam Roll : 97/CSM/130033
M.Tech in CSE
2013 -15
Calcutta University
Protecting Your PC, Privacy and
Self
“The minute you dial in to your Internet service provider or
connect to a DSL or cable modem, you are casting your
computer adrift in a sea of millions of other computers –
all of which are sharing the world's largest computer
network, the Internet. Most of those computers are
cooperative and well behaved, but some are downright
nasty. Only you can make sure your computer is ready
for the experience.”

Daniel Appleman, Always Use Protection, A Teen's


Guide to Safe Computing

2
Agenda
♦ What information security?
♦ Why Biometrics?
♦ Fingerprint Patterns
♦ Advanced Minutiae Based Algorithm
♦ Identification vs. Authentication
♦ Security
♦ Applications
♦ Versus other Biometric Technologies
♦ Industry
3
What is Information Security?
♦ The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal,
inspection, recording or destruction
♦ Process by which digital information assets
are protected

4
Understanding the Importance of
Information Security
♦ Prevents data theft
♦ Avoids legal consequences of not securing
information
♦ Maintains productivity
♦ Foils cyber terrorism
♦ Thwarts identity theft

5
Latest Trends - Identity Theft
♦ Crime of the 21st century
♦ Involves using someone’s personal
information, such as social security
numbers, to establish bank or credit card
accounts that are then left unpaid, leaving
the victim with the debts and ruining their
credit rating

6
Why Biometrics?
Why Biometrics?
♦ Biometrics is a security solution based on
something you know, have, and are:

Know Password, PIN

Have Key, Smart Card

Are Fingerprint, Face, Iris

8
Why Biometrics?
♦ Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
♦ Protect Sensitive Information
– Banking
– Medical

9
Why Biometrics?
♦ Has been used since 14th century in China
– Reliable and trusted
♦ Will never leave at home
♦ Fingerprints are unique
– Everyone is born with one
♦ 80% of public has biometric recorded in
China
♦ 50% of public in India is now Biometric
Recorded.
10
Fingerprint Patterns
Fingerprints
♦ A fingerprint in its narrow sense is an impression left by
the friction ridges of a human finger.

♦ Their pattern is permanent and unchangeable on each


finger during the whole life time of an individual.

♦ The probability that fingerprints of two individual are alike


is about 1 in 1.9×1015.

♦ According to FBI the accuracy and reliability of


fingerprint scans are correct 99.8% of the time.

12
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in the
centre forming an arc, and then exit the other side of the finger.

 Loop- The ridges enter from one side of a finger, form a curve, and
then exit on that same side.

 Whorl- Ridges form circularly around a central point on the


finger.

Arch Loop Whorl

13
Fingerprint Patterns

The human population has fingerprints in


the following percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%

14
Fingerprint Patterns
♦ Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore

15
Fingerprint Patterns
♦ Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys

16
Fingerprint matching techniques

Techniques available for Fingerprint matching are :


1. minutiae-based .
2. correlation based.

 Minutiae-based techniques first find minutiae points


and then map their relative placement on the finger.

 The correlation-based method is able to overcome


some of the difficulties of the minutiae-based
approach.

17
Advanced Minutiae Based
Algorithm (AMBA)
Advanced Minutiae Based Algo
♦ Advanced Minutiae Based Algorithm
– Developed by Suprema Solutions
– Two processes
• Feature Extractor
• Matcher

19
Advanced Minutiae Based
Algorithm

20
Advanced Minutiae Based Algo
♦ Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction algorithm
– Extract Minutiae

21
Advanced Minutiae Based Algo
♦ Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings

22
Advanced Minutiae Based Algo
♦ Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)

23
Advanced Minutiae Based Algo
♦ Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches

24
Identification vs. Authentication

♦ Identification – Who are you?


– 1 : N comparison
– Slower
– Scan all templates in database
♦ Authentication – Are you John
Smith?
– 1 : 1 comparison
– Faster
– Scan one template

25
Security
♦ Accuracy
– 97% will return correct results
– 100% deny intruders
♦ Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data

26
Security
♦ Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow

27
Advantage of Fingerprint:

♦ Very high accuracy.


♦ Is the most economical biometric PC user authentication
technique.
♦ Easy to use.
♦ Small storage space required for the biometric template,
reducing the size of the database memory required
♦ It is standardized.

28
Disadvantages of Fingerprint:

 For some people it is very intrusive, because is still


related to criminal identification.

 It can make mistakes with the dryness or dirty of the


finger’s skin, as well as with the age (is not appropriate
with children, because the size of their fingerprint changes
quickly).

29
Applications

30
Applications

31
Versus other Biometric
Technologies
1 (worst) – 5 (best)

Technology Accuracy Convenience Cost Size

Fingerprint 5 5 4 4
Voice 1 5 5 5
Face 2 3 4 3
Hand 3 3 2 2
Iris 5 2 3 3

32
Versus other Biometric
Technologies

33
Industry ♦ Hot market
♦ Lots of $$$

34
Conclusion
♦ Want to protect information
♦ Passwords are not reliable; forget
♦ Fingerprints have been used for centuries
♦ next generation of fingerprint recognition devices which are highly
reliable and accurate
♦ Fingerprints are unique; can verify
♦ Very accurate
♦ a broad acceptance with the general public, law enforcement and the
forensic science community a broad acceptance with the general
public, law enforcement and the forensic science community
♦ Lots of applications being developed
♦ Hot market. Lots of $$$
♦ Hence, they will continue to be used for human recognition, for
Information Security & new systems that require a reliable biometric.
35
References
♦ http://spie.org/x108321.xml
♦ http://www.sans.org/reading-room/whitepapers/authentication/biometric-s

36
Thank You!!!

You might also like