Professional Documents
Culture Documents
Communication and
information technologies (II)
7
3.4.1 Matching methods [3/3]
• Ridge-feature-based matching:
• Ridge-feature-based matching is used when the qualities
of the fingerprint images are not good (minutiae
extraction is difficult).
Translation
11
12
3.4.2 Minutiae-based matching [5/12]
Average ridge Average ridge
orientation angle Core orientation angle
(a: left side) (b: right side)
Superimposed
fingerprint Images
15
3.4.2 Minutiae-based matching [8/12]
3. Determining the outcome:
• The outcome could be:
• Similarity Value (or Difference Value)
• Or a decision: “Match” or “Non Match”
• Finding a Similarity Value:
16
3.4.2 Minutiae-based matching [9/12]
• 3. Determining the outcome:
• Take a Decision:
• When the outcome of the matching is required to be a decision
(match or no match), a threshold is required.
• The fingerprints are considered as a “match”: If the similarity value
18
3.4.2 Minutiae-based matching [11/12]
• Activity 6.9 (Cont.):
• (a) Assume the threshold is set to 80%, which means that the
two fingerprints will be considered as a match only if the
differences of at least 8 out of the 10 pairs are at or below the
acceptable difference. Also assume the acceptable difference
19
3.4.2 Minutiae-based matching [12/12]
• Activity 6.9 (Sol.):
• (a) The two fingerprints will be considered a match
• Only pair number 1 is greater than the acceptable difference (0.05)
• The differences of the other nine pairs are within the acceptable
level.
34
4.1 Case study: building site access
control and clocking system [1/7]
• A UK construction firm wanted to install a secured and fully
automatic entry system.
• They also wanted to prevent fraudulent attempts by the workers
to clock in for their friends
• A biometric-based system was selected because it would be
37
4.1 Case study: building site access
control and clocking system [4/7]
• Face recognition system for building • The console of the face recognition
site use system
39
4.1 Case study: building site access
control and clocking system [6/7]
• During the matching process:
• When a worker clocked in, he stands directly facing the camera in
the enclosure for their photograph to be taken.
• The worker presents his smart card to the card reader.
• His stored templates is loaded into the system.
41
Session Outline
• Part 6: Biometrics (Cont.)
• Fingerprint recognition systems
• Biometric applications
46
5. Concerns and issues relating to
biometric systems
• Many aspects of our lives may be affected by the
increasing use of biometric systems.
• For Example: How we use ATMs or how we enter our
own or a foreign country.
47
5.1 Reliability [1/2]
• How reliable are current biometric systems?
• Can we really rely on them for authentication?
• Some media reports suggest biometric systems can be
fooled; is this a real concern or has it been exaggerated?
48
5.1 Reliability [2/2]
• Circumvention:
• Some commercial biometric systems are believed to be very difficult
to circumvent (e.g. the Hong Kong e-Channels),
• BUT, their high-tech image should not lead the general public to think
they are infallible!
• Biometric recognition is a complex process and not completely
Combined biometric
Finger Fingerprint biometric Match/Non Match
subsystem
system
Match/