A Method for Fingerprint Authentication for ATM Based Banking Application

8
8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 1/8

Transcript of A Method for Fingerprint Authentication for ATM Based Banking Application

Page 1: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 1/8

Page 2: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 2/8

eexxttr r eemmeellyy eef f f f eeccttiivvee iinn aar r eeaass wwhheer r ee tthhee p pr r oovviissiioonn oof f aa hhiigghh ddeeggr r eeee oof f sseeccuur r iittyy iiss aann iissssuuee.. 

The analysis of fingerprints for 

matching purposes generally requires the

comparison of several features of the print

  pattern. These include patterns, which areaggregate characteristics of ridges, and minutia

  points, which are unique features found within

the patterns. It is also necessary to know thestructure and properties of human skin in order 

to successfully employ some of the imaging

technologies.

1.1Patterns:

The three basic patterns of fingerprint ridges are

the arch, loop, and whorl. An arch is a patternwhere the ridges enter from one side of the

finger, rise in the center forming an arc, and thenexit the other side of the finger. The loop is a

 pattern where the ridges enter from one side of a

finger, form a curve, and tend to exit from the

same side they enter. In the whorl pattern, ridgesform circularly around a central point on the

finger. Scientists have found that family

members often share the same generalfingerprint patterns, leading to the belief that

these patterns are inherited.

Fig1.1: The arch pattern

Fig1.2: The loop pattern

Fig1.3: The whorl pattern 

1.2 Minutia features:

The major features of fingerprint ridges are:

ridge ending, bifurcation, and short ridge (or 

dot). The ridge ending is the point at which a

ridge terminates. Bifurcations are points at which

a single ridge splits into two ridges. Short ridges(or dots) are ridges which are significantly

shorter than the average ridge length on the

fingerprint. Minutiae and patterns are veryimportant in the analysis of fingerprints since no

two fingers have been shown to be identical.

FFiigg11..44:: R R iiddggee eennddiinngg.. 

FFiigg 11..55:: BBiif f uur r ccaattiioonn.. 

Fig 1.6: Short Ridge

AA ssmmooootthhllyy f f lloowwiinngg p paatttteer r nn f f oor r mmeedd b byy 

aalltteer r nnaattiinngg ccr r eessttss ((r r iiddggeess)) aanndd ttr r oouugghhss ((vvaalllleeyyss)) oonn tthhee p paallmmaar r  aass p peecctt oof f  hhaanndd iiss ccaalllleedd aa 

 p paallmm p pr r iinntt.. FFoor r mmaattiioonn oof f  aa p paallmm p pr r iinntt ddee p peennddss oonn 

tthhee iinniittiiaall ccoonnddiittiioonnss oof f tthhee eemm b br r yyoonniicc mmeessooddeer r mm 

f f r r oomm wwhhiicchh tthheeyy ddeevveelloo p p.. TThhee p paatttteer r nn oonn p puull p p oof f  eeaacchh tteer r mmiinnaall p phhaallaannxx iiss ccoonnssiiddeer r eedd aass aann 

iinnddiivviidduuaall p paatttteer r nn aanndd iiss ccoommmmoonnllyy r r eef f eer r r r eedd ttoo aass 

aa  f  f iinnggeer r  p pr r iinnt t .. AA f f iinnggeer r  p pr r iinntt iiss b beelliieevveedd ttoo b bee 

uunniiqquuee ttoo eeaacchh p peer r ssoonn ((aanndd eeaacchh f f iinnggeer r )) 22.. FFiinnggeer r  p pr r iinnttss oof f eevveenn iiddeennttiiccaall ttwwiinnss aar r ee ddiif f f f eer r eenntt.. 

FFiinnggeer r  p pr r iinnttss aar r ee oonnee oof f tthhee mmoosstt mmaattuur r ee 

 b biioommeettr r iicc tteecchhnnoollooggiieess aanndd aar r ee ccoonnssiiddeer r eedd 

lleeggiittiimmaattee p pr r oooof f ss oof f eevviiddeennccee iinn ccoouur r ttss oof f llaaww aallll oovveer r  tthhee wwoor r lldd.. FFiinnggeer r  p pr r iinnttss aar r ee,, tthheer r eef f oor r ee,, uusseedd 

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 9, September 2011

52 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 3: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 3/8

Page 4: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 4/8

given principal (person, computer, smart card

etc.), while authorization is the process of 

verifying that an authenticated subject has the

authority to perform a certain operation.

Authentication, therefore, must precedeauthorization. For example, when you show

 proper identification to a bank teller, you could

 be authenticated by the teller as acting on behalf of a particular account holder, and you would be

authorized to access information about the

accounts of that account holder. You would not

  be authorized to access the accounts of other 

account holders.

Since authorization cannot occur without authentication, the former term is

sometimes used to mean the combination of 

authentication and authorization.

 2 2 . . 2 2 A Auu t t h hee n n t tii c c a a t tii o o n n vv s s . . I  I  d  d ee n n t tii f  f ii c c a a t tii o o n n:: 

In the world of virtual identities we find today

that many applications and web sites allow users

to create virtual identities. Take for example the

Second Life world or any chatting forum such as

ICQ. The real Identity is hidden and notrequired. One may actually hold a number of 

virtual identities. Authentication is still required

in order to verify that the virtual identity entering

is the original registering identity. The

Authentication in this case is of the Login id andnot of the person behind it. That requirement

  poses a problem to most proprietary hardwareauthentication solutions as they identify the real

 person behind the virtual identity at delivery.

III. Method for fingerprint authentication 

Steps for fingerprint Authentication. figure 3.1

shows the flowchart for finger printauthentication

Fig3.1: Flowchart for fingerprint

authentication

SS t tee p p 11:: U U  s see r r R Ree g gii s s t t r r a a t tii o o n n 

IInn aannyy sseeccuur r ee ssyysstteemm,, ttoo eennr r oollll aass aa lleeggiittiimmaattee uusseer r iinn aa sseer r vviiccee,, aa uusseer r mmuusstt b beef f oor r eehhaanndd r r eeggiisstteer r  wwiitthh tthhee sseer r vviiccee p pr r oovviiddeer r  b byy eessttaa b blliisshhiinngg hhiiss//hheer r  

iiddeennttiittyy wwiitthh tthhee p pr r oovviiddeer r .. FFoor r  tthhiiss,, tthhee uusseer r  

 p pr r oovviiddeess hhiiss//hheer r  f f iinnggeer r  p pr r iinntt tthhr r oouugghh aa f f iinnggeer r  ssccaannnneer r .. TThhee f f iinnggeer r  p pr r iinntt iimmaaggee tthhuuss oo b bttaaiinneedd 

uunnddeer r ggooeess aa sseer r iieess oof f eennhhaanncceemmeenntt ssttee p pss.. TThhiiss iiss 

f f oolllloowweedd b byy aa FFiinnggeer r  p pr r iinntt hhaar r ddeenniinngg p pr r oottooccooll 

wwiitthh sseer r vveer r ss ttoo oo b bttaaiinn aa hhaar r ddeenneedd f f iinnggeer r p pr r iinntt FFPP 

wwhhiicchh iiss ssttoor r eedd iinnttoo tthhee sseer r vveer r ’’ss ddaattaa b baassee.. 

SS t tee p p 2 2:: F Fii n n g gee r r p p r rii n n t t E E n n h h a a n n c cee m mee n n t t 

AA f f iinnggeer r  p pr r iinntt iiss mmaaddee oof f  aa sseer r iieess oof f  r r iiddggeess aanndd 

f f uur r r r oowwss oonn tthhee ssuur r f f aaccee oof f  tthhee f f iinnggeer r .. TThhee uunniiqquueenneessss oof f aa f f iinnggeer r  p pr r iinntt ccaann b bee ddeetteer r mmiinneedd b byy 

tthhee p paatttteer r nn oof f  r r iiddggeess aanndd f f uur r r r oowwss.. MMiinnuuttiiaaee  p pooiinnttss aar r ee llooccaall r r iiddggee cchhaar r aacctteer r iissttiiccss tthhaatt ooccccuur r aatt 

eeiitthheer r  aa r r iiddggee b biif f uur r ccaattiioonn oor r  aa r r iiddggee eennddiinngg.. AA 

r r iiddggee tteer r mmiinnaattiioonn iiss ddeef f iinneedd aass tthhee p pooiinntt wwhheer r ee aa 

r r iiddggee eennddss aa b br r uu p pttllyy.. AA r r iiddggee b biif f uur r ccaattiioonn iiss 

ddeef f iinneedd aass tthhee p pooiinntt wwhheer r ee aa r r iiddggee f f oor r k k ss oor r  

ddiivveer r ggeess iinnttoo b br r aanncchh r r iiddggeess aass sshhoowwnn iinn f f iigguur r ee 33..22.. 

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 9, September 2011

54 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 5: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 5/8

TThhee qquuaalliittyy oof f  tthhee r r iiddggee ssttr r uuccttuur r eess iinn aa f f iinnggeer r  p pr r iinntt iimmaaggee iiss aann iimm p poor r ttaanntt cchhaar r aacctteer r iissttiicc,, 

aass tthhee r r iiddggeess ccaar r r r yy tthhee iinnf f oor r mmaattiioonn oof f  

cchhaar r aacctteer r iissttiicc f f eeaattuur r eess r r eeqquuiir r eedd f f oor r  mmiinnuuttiiaaee 

eexxttr r aaccttiioonn.. 

FFiigg 33..22:: EExxaamm p pllee f f oor r r r iiddggee b biif f uur r ccaattiioonn aanndd r r iiddggee 

eennddiinngg 

FFiigg 33..33:: BBlloocck k ddiiaaggr r aamm f f oor r f f iinnggeer r  p pr r iinntt eennhhaanncceemmeenntt 

IInn p pr r aaccttiiccee,, aa f f iinnggeer r  p pr r iinntt iimmaaggee mmaayy nnoott 

aallwwaayyss b bee wweellll ddeef f iinneedd dduuee ttoo eelleemmeennttss oof f nnooiissee tthhaatt ccoor r r r uu p ptt tthhee ccllaar r iittyy oof f  tthhee r r iiddggee ssttr r uuccttuur r eess.. 

TThhuuss,, iimmaaggee eennhhaanncceemmeenntt tteecchhnniiqquueess[[66]]

aar r ee oof f tteenn 

eemm p pllooyyeedd ttoo r r eedduuccee tthhee nnooiissee aanndd eennhhaannccee tthhee 

ddeef f iinniittiioonn oof f  r r iiddggeess aaggaaiinnsstt vvaalllleeyyss.. FFiigguur r ee 33..33 iilllluussttr r aatteess tthhee ddiif f f f eer r eenntt ssttee p pss iinnvvoollvveedd iinn tthhee 

ddeevveelloo p pmmeenntt oof f  tthhee EEnnhhaanncceemmeenntt FFiinnggeer r  p pr r iinntt.. 

TThhee ddeettaaiillss oof f  tthheessee ssttee p pss aar r ee ggiivveenn iinn tthhee 

f f oolllloowwiinngg ssuu b bsseeccttiioonnss.. 

SS t tee p p 3 3:: N  N  o o r r m m a al l ii z z a a t tii o o n n 

 N Noor r mmaalliizzaattiioonn iiss uusseedd ttoo ssttaannddaar r ddiizzee tthhee iinntteennssiittyy vvaalluueess iinn aann iimmaaggee b byy aadd j juussttiinngg tthhee r r aannggee oof f  

ggr r aayy--lleevveell vvaalluueess ssoo tthhaatt iitt lliieess wwiitthhiinn aa ddeessiir r eedd 

r r aannggee oof f  vvaalluueess.. IItt ddooeess nnoott cchhaannggee tthhee r r iiddggee ssttr r uuccttuur r eess iinn aa f f iinnggeer r  p pr r iinntt;; iitt iiss p peer r f f oor r mmeedd ttoo 

ssttaannddaar r ddiizzee tthhee ddyynnaammiicc lleevveellss oof f  vvaar r iiaattiioonn iinn 

ggr r aayy--lleevveell vvaalluueess,, wwhhiicchh f f aacciilliittaatteess tthhee  p pr r oocceessssiinngg oof f  ssuu b bsseeqquueenntt iimmaaggee eennhhaanncceemmeenntt 

ssttaaggeess.. FFiigg.. 33..44((aa && b b)) sshhoowwss tthhee oor r iiggiinnaall 

f f iinnggeer r  p pr r iinntt && tthhee r r eessuullttss oof f  aa nnoor r mmaalliizzeedd 

f f iinnggeer r  p pr r iinntt.. 

Fig 3.4 (a) Original Image (b) Normalized Image

Step 4: Orientation Estimation:

The orientation field of a fingerprint image

defines the local orientation of the ridges

contained in the fingerprint (see Fig.3.5). Theorientation estimation is a fundamental step in

the enhancement process as the subsequent

Gabor filtering stage relies on the local

orientation in order to effectively enhances the

fingerprint image. Fig. 3.6 (a & b) illustrates the

results of orientation estimation & smoothedorientation estimation of the fingerprint image. 

Fig 3.5: The orientation of a ridge pixel in afingerprint

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 9, September 2011

55 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 6: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 6/8

Page 7: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 7/8

Page 8: A Method for Fingerprint Authentication for ATM Based Banking Application

8/3/2019 A Method for Fingerprint Authentication for ATM Based Banking Application

http://slidepdf.com/reader/full/a-method-for-fingerprint-authentication-for-atm-based-banking-application 8/8

[[77]] SS.. K K aassaaeeii,, MM.. DD..,, aanndd BBooaasshhaasshh,, BB.. FFiinnggeer r  p pr r iinntt f f eeaattuur r ee 

eexxttr r aaccttiioonn uussiinngg b blloocck k --ddiir r eeccttiioonn oonn r r eeccoonnssttr r uucctteedd iimmaaggeess.. IInn 

 I  I  E  E  E  E  E  E r r eeggiioonn T T  E  E  N  N C C oonn f  f .. d d iiggiit t aall ssiiggnnaall PPr r oocceessssiinngg 

aa p p p plliiccaat t iioonnss , , T T  E  E  N  N C C OO N  N  ((DDeecceemm b beer r 11999977)).. [[88]] DD.. BBoonneehh,,““TThhee DDeecciissiioonn DDiif f f f iiee--HHeellllmmaann PPr r oo b blleemm,,”” PPr r oocc.. 

TThhiir r dd IInntt”” AAllggoor r iitthhmmiicc N Nuumm b beer r TThheeoor r yy SSyymm p p..,, 

.. 

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 9, September 2011

58 http://sites.google.com/site/ijcsis/

ISSN 1947-5500