p 1661 Biometric Fingerprint Identification

download p 1661 Biometric Fingerprint Identification

of 23

Transcript of p 1661 Biometric Fingerprint Identification

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    1/23

    Biometric Fingerprint Identification

    1. INTRODUCTION

    Positive identification of individuals is a very basic societal requirement.

    Reliable user authentication is becoming an increasingly important task in the web

    enabled world. The consequences of an insecure authentication system in a

    corporate or enterprise environment can be catastrophic, and may include loss of

    confidential information, denial of service, and compromised data integrity. The value

    of reliable user authentication is not limited to just computer or network access.

    Many other applications in every day life also require user authentication, such as

    banking, e-commerce, and could benefit from enhanced security.

    In fact, as more interactions take electronically, it becomes even more important

    to have an electronic verification of a persons identity. Until recently, electronic

    verification took one of two forms. It was based on something the person had in their

    possession, like a magnetic swipe card, or something they knew, like a password. The

    problem is, these forms of electronic identification are not very secure, because they can

    be given away, taken away, or lost and motivated people have found ways to forge or

    circumvent these credentials.

    The ultimate form of electronic verification of a persons is biometrics.

    Biometrics refers to the automatic identification of a person based on his/her

    physiological or behavioral characteristics such as finger scan, retina, iris, voice scan,

    signature scan etc. By using this technique physiological characteristics of a person can

    be changed into electronic processes that are inexpensive and easy to use. People have

    always used the brains innate ability to recognize a familiar face and it has long been

    known that a persons fingerprints can be used for identification.

    Dept. of EEE MESCE, Kuttippuram1

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    2/23

    Biometric Fingerprint Identification

    2. IDENTIFICATION AND VERIFICATION SYSTEMS

    A persons identity can be resolved in two ways: identification and

    verification. The former involves identifying a person from all biometric measurements

    collected in a database and this involves a one-to-many match also referred to as cold

    search. Do I know who you are? is the inherent question this process seeks to

    answer. Verification involves authenticating a persons claimed identity from his or her

    previously enrolled pattern and this involves a one to one match. The question it seeks

    to answer is, Are you claim to be?

    2.1 VERIFICATION

    Verification involves comparing a persons fingerprint to one that pass

    previously recorded in the system database. The person claiming an identity provided a

    fingerprint, typically by placing on a capacitance scanner or an optical scanner. The

    computer locates the previous fingerprint by looking at the persons identity. This

    process is relatively easy because the computer needs to compare two fingerprint

    records. The verification process is referred as a closed search because the search field

    is limited. The second question is who is this person? This is the identification

    function, which is used to prevent duplicate application or enrollment. In this case a

    newly supplied fingerprint is supplied to all others in the database. A match indicates

    that the person has already enrolled/applied.

    2.2 IDENTIFICATION

    The identification process, also known as an open search, is much more

    technically demanding. It involves many more comparisons and may require

    differentiating among several database fingerprints that are similar to the objects.

    Dept. of EEE MESCE, Kuttippuram2

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    3/23

    Biometric Fingerprint Identification

    3. BIOMETRIC SYSTEMS AND DEVICES

    A biometric system is a combined hardware/software system for biometric

    identification or verification. Main functions of a biometric system are as follows:

    Receive biometric samples from an enroller or candidate.

    Extract biometric feature from the sample.

    Compare the sample of the candidate with stored templates from

    individuals.

    Indicate identification or verification upon the result of the previous

    comparison.

    Biometric devices have three primary components:

    One is an automated mechanism that scans and captures a digital or analog

    image of a living characteristic.

    The second handles comparison of the image with the stored data.

    The third interfaces with application systems.

    These pieces may be configured to suit different situations. A common

    issue is where the stored images reside; on a card presented by the person being verified

    or at host computer. Recognition occurs when an individuals is matched with one of a

    group of stored images.

    Dept. of EEE MESCE, Kuttippuram3

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    4/23

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    5/23

    Biometric Fingerprint Identification

    5. FINGERPRINT VERIFICATION

    Fingerprinting is probably the best-known biometric- method of identification

    used for 100 years. Advances in computer technology and communication networks

    have made even huge fingerprint databases available for instant searches.

    Among all the biometric techniques, fingerprint-based Identification is the oldest

    method that has been successfully used in numerous applications. Everyone is known to

    have unique, immutable fingerprints. A fingerprint is made of a series of ridges and

    furrows on the surface of the finger. The uniqueness of a fingerprint can be determined

    by the pattern of ridges and furrows as well as minutiae points. Minutiae points are local

    ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

    There are a variety of approaches to fingerprint verification. Some try to emulate

    the traditional police method of matching minutiae, others are straight pattern matching

    devices, and some adopt a unique approach all of their own, including thermal

    properties and ultrasonic. Finger-scan technology is the leading biometric authentication

    technology in use today with the greatest variety of fingerprint devices presently

    available. This is partially due to the historical use of the fingerprint in law enforcement

    as well as the fact that the technology lends itself to a more affordable solution.

    VIEW OF A FINGER PRINT

    Dept. of EEE MESCE, Kuttippuram5

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    6/23

    Biometric Fingerprint Identification

    6. FINGERSCAN

    Fingerscan is an authentication terminal which verifies a persons identity from

    their finger image. When a user places their finger on the terminals scanner the image is

    electronically read, analysed, and compared with a previously recorded image of the

    same finger which has been stored in the fingerscan database. Users call up their finger

    image by keying in an identification number. This ID number does not need to be

    classified as it is not part of the security system it simply retrieves the image that will be

    compared to the users finger scan.

    Fingerscan contains its own database of finger images (called templates), user

    privileges and authorities, and maintains a log of every transaction and message which it

    records. The system can be accessed through a laptop, networked to a PC, or connected

    via a modem to a remote host computer.

    6.1 THE TECHNOLOGY BEHIND FINGERSCAN

    Fingerscan is a biometrics product which involves using some unique biological

    characteristic or physical property of an individual to verify that persons claimed

    identity. Biometrics-based identification replaces systems which rely on something a

    person has in their possession, such as a key or ID card, or something a person knows,

    such as a password or privileged information. The imaging process is based on digital

    holography, using an electro-optical scanner about the size of a thumbprint. The scanner

    reads three-dimensional data from the finger such as skin undulations, and ridges and

    valleys, to create a unique pattern that is composed into a template file and recorded in

    the fingerscan database.

    Dept. of EEE MESCE, Kuttippuram6

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    7/23

    Biometric Fingerprint Identification

    The pattern is not a fingerprint and a fingerprint cannot in any way be created

    from the template. A template can only be compared with a newly presented live finger

    image and not with other templates. One reason for this is that the data capture process

    used to create a template is random. If two templates were created one after another for

    the same finger, each template would be different. This eliminates the possibility of

    database matching and enhances users privacy.

    6.2 THE ALGORITHMS

    Fingerprint classification can be viewed as a coarse level matching of the

    fingerprints. As input fingerprint is matched at a coarse level to one of the prespecified

    types and then, at a finer level, it is compared to the subset of the database containing

    that type of fingerprints only.

    An algorithm is developed to classify fingerprints into five classes, namely,

    whorl, right loop, arch and tented arch. The algorithm separates the number of ridges

    present in four directions (o degree, 45 degree, 90 degree and 135 degree) by filtering

    the central part of a fingerprint with a bank of Gabor filters. This information is

    quantized to generate a finger code which is used for classification. More recently, it

    has become possible to scan a persons fingerprint into virtual storage in a computer

    with the aid of laser technology. In order to prove identification, a persons fingerprint

    will be scanned again in the future by a similar device, and a match of print to name is

    verified through information system.

    Dept. of EEE MESCE, Kuttippuram7

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    8/23

    Biometric Fingerprint Identification

    6.3 SYSTEM FUNCTIONS

    The majorFINGERSCANfunctions are:

    Enrolment

    Verification

    Time Zones

    Door access

    Template management

    Enrolment

    Enrolment is the process of scanning a finger to create an image which is stored

    as a template. Each time the user places his or her finger on the scanner the image is

    compared to the one represented by the template to verify their identity.

    A user with enrolment authority carries out enrolment at designated fingerscan

    units. The process takes approximately 25 seconds and the resultant template may be

    stored in various places: in the unit itself, on a personal computer, in a mainframe

    computer, on a smart card, and so on.

    Each user enrolled is allocated a unique ID number, which they use to call up

    their template before scanning their finger. No ID number is required where the

    template is stored on a smart card. Up to three fingers can be enrolled against the same

    ID number to provide users with more than one verification option. Ideally, one finger

    on each hand should be enrolled so that if the user injures the finger they usually use for

    verification an alternate image is available.

    Dept. of EEE MESCE, Kuttippuram8

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    9/23

    Biometric Fingerprint Identification

    This feature also provides for multi-person control, for example, if verification

    from two users is required to open a safe. In this situation fingerscan can be

    programmed to require up to four fingers with different ID numbers to be verified

    before access is granted.

    Verification

    Verification is carried out when a user either enters their ID number, or inserts

    their smart card in a smart card reader, and then immediately places their finger on the

    reader platen. Verification takes about .5 of a second.

    Verification for individual users can be set at various threshold levels to account

    for users who may have very fine, worn, or damaged fingers. In this event reducing their

    verification threshold can enhance the ease of use.

    The overall system verification threshold can be lowered in situations where

    little or no security is required, for example, time and attendance applications. In this

    situation it may be more acceptable to give a false acceptance than a false rejection.

    Time zones

    Up to thirty global or individual time zones can be defined in fingerscan. Each

    user can have up to two active time zones at any time. Users are allocated a default time

    zone at enrolment, which can be changed by the system supervisor or from the host

    computer.

    Dept. of EEE MESCE, Kuttippuram9

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    10/23

    Biometric Fingerprint Identification

    Door Access

    A door access list defines which users have access to the facilities controlled by

    the fingerscan unit. The list can be used in conjunction with time zones to restrict access

    at certain times. The host computer system can control and manage the door access list

    and the distribution of templates to each fingerscan unit.

    Template Management

    Templates can be stored in the fingerscan unit, and/or a host computer, and/or a

    smart card. Each fingerscan unit has 512Kbytes of non-volatile memory which stores up

    to 300 templates. The memory can be expanded to 1.5Mbytes which will store more

    than 1100 templates. Templates are stored with a last used date status. If the memory

    becomes full, the last used templates will be held locally in the fingerscan unit and the

    main template database will be held in the host computer. The host will transmit

    templates to individual units if the requested template is not found locally.

    Templates can be deleted by user with Manager or Supervisor status either from

    the host computer or locally at each fingerscan unit. Templates can be exchanged

    between a fingerscan unit and the host computer over fixed communications or modem

    links, or locally to and from a laptop. A template created by the fingerscan unit can be

    used on any other unit when loaded.

    6.4 MANAGEMENT CONTROL

    Fingerscan has four levels of management control:

    User

    A user submits a finger for verification after entering an ID number

    Dept. of EEE MESCE, Kuttippuram10

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    11/23

    Biometric Fingerprint Identification

    Enroller

    An enroller has user status and can also enrol users onto the system.

    Supervisor

    A supervisor has enroller status and can also perform initial system set up

    procedures, set time zones, set alarm codes, and add and delete templates.

    Manager

    A manager has supervisor status and can also perform a total system reset, and

    disable the supervisors ability to change the setup.

    Transaction Log

    A transaction log records every use of a fingerscan unit, the time it was used,

    and the result. The log will hold at least the last 1000 transactions and will wrap around

    when it becomes full. The transaction log cannot be erased except on a total system

    reset by a user with Manager authority. Each transaction is allocated a consecutive audit

    number that does not wrap around. The number will only be reset to 1 on a total system

    reset.

    6.5 SECURITY

    Fingerscan provides an audit trail of the date and time a user accessed the unit,

    the reason for access, and the result. With a 0.0001% probability of a false acceptance

    fingerscan provides a level of security which cannot be achieved by any knowledge or

    token based system.

    Template security

    Before a user can do any action on a template such as enrol, delete, or transfer,

    they must first have their identity verified by FINGERSCAN in the usual way. In doing

    Dept. of EEE MESCE, Kuttippuram11

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    12/23

    Biometric Fingerprint Identification

    this, a record is added to the transaction log. Only users with Supervisor or Manager

    authority levels can access the template database.

    Software Security Control

    A password option in the communications setup secures the data flow to a host

    computer. When each fingerscan unit is initialised by the remote host, the host will

    generate and download to the unit a unique Computer Generated Access Code (CGAC)

    of at least six digits. For all subsequent communications the host will check the CGAC

    before starting the session and then change the CGAC immediately prior to logging off.

    The CGAC can always be overridden by a Manager or Supervisor finger verification.

    This is only likely to be required if the fingerscan unit is being accessed via a laptop PC.

    Hardware security control

    The processor board in the processor unit is located inside a metal box which

    can be fitted with a tamper alarm if required. The processor unit should always be

    located inside the secure area in locations where fingerscan is providing access or other

    security control. Fingerscan controls the activation of electric locks or strikes from the

    processor board so the unit cannot be hot-wired from outside.

    Alarms Control

    Send an alarm directly to a monitoring company, dialer, modem, siren, and so

    on, and allow authenticated users to cancel and reset zone alarms and activate

    and deactivate building services such as air conditioning and lighting.

    Record alarms in the fingerscan transaction log.

    Dept. of EEE MESCE, Kuttippuram12

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    13/23

    Biometric Fingerprint Identification

    Support a request to exit (REX) verification which allows users to open a door

    from the inside. This can be used to monitor door forced alarms.

    Door Lock Control

    Fingerscan can directly control a door lock strike after verification of a user.

    Real Time Clock

    Fingerscans real time clock is protected by a lithium battery, and features a day-

    of-week register and leap year correction.

    6.6 AN OVERVIEW OF FINGERSCAN TECHNOLOGIES

    The fundamental limiting factor for Finger-scan technology has been the process

    by which the devices capture an image of the finger. The most common technologies

    are: Optical, Silicon, Ultrasound and Touchless. Optical Scanner relies on an image of

    ridges and valleys of the print. The process, referred to as Frustrated Total Internal

    Reflection, a form of spectroscopy, essentially takes a picture of finger. Silicon or

    Capacitance Fingerprint scanners often great potential because if utilizes higher image

    quality than optical surface contamination found on the finger. Thermal Fingerprint

    scanners uses infrared to sense the temperature differences between the ridges and

    valleys of the finger to create a fingerprint image. Ultrasonic Fingerprint scanner scans

    the finger ultrasonically, using high frequency sound waves, to capture an image of the

    finger.

    6.7 CAPACITANCE SCANNER

    Capacitive fingerprint scanners generate an image of the ridges and furrows that

    make up a fingerprint. This type of scanner senses the print using electric current.

    Dept. of EEE MESCE, Kuttippuram13

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    14/23

    Biometric Fingerprint Identification

    CAPACITANCE SCANNER

    The diagram shown a simple capacitive sensor, The sensor is made up of one or

    more semiconductor chips containing an array of tiny cells. Each cell includes two

    conductor plates, covered with an insulating layer. The cells are tiny smaller than the

    width of one ridge on a finger.

    The sensor is connected to an integrator, an electric circuit built around an

    inverting operation amplifier. The inverting amplifier is a complex semiconductor

    device, made of a number of transistors, resistors and capacitors.

    Like any amplifier an inverting amplifier alters one current based on

    flucturations in another current. Specifically, the inverting amplifier has the inverting

    terminal and the non/inverting terminal. In this case the non-inverting terminal is

    connected to ground, and the inverting terminal is connected to a reference voltage

    supply and a feed back loop. The feed back loop, which is also connected to the

    amplifier output, includes the two conductor plates.

    Dept. of EEE MESCE, Kuttippuram14

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    15/23

    Biometric Fingerprint Identification

    The two conductor plates form a basic capacitor, an electric component that

    can store up charge. The surface of the finger acts as a third capacitor plate, separated

    by the insulating layers in the cell structure and, in the case of the fingerprint valleys, a

    pocket of air. Varying the distance between the capacitor plates (by mainly the finger

    closer or farther away from the conducting plates) changes the total capacitance (ability

    to store charge) of the capacitor. Because of this quality, the capacitor in a cell under a

    ridge will have a greater capacitance than the capacitor in a cell under a valley.

    To scan the finger, the processor first closes the reset switch for each cell,

    which shorts each amplifier input and output to balance the integrator circuit. When the

    switch is opened again, and the processor applies a fixed charge to the integrator circuit,

    the capacitors charge up. The capacitance of the feedback loops capacitor affects the

    voltage at the amplifiers input, which affects the amplifiers output. Since the distance

    to the finger alters capacitance, a finger ridge will result in a different voltage output

    than a finger valley.

    The scanner processor reads this voltage output and determines whether it is

    characteristic of a ridge or an valley. By reading very cell in the sensor array, the

    processor can put together an overall picture of the fingerprint, similar to the image

    captured by an optical scanner.

    The main advantage of a capacitive scanner is that it requires a real fingerprint

    type shape rather than the pattern of light and dark that make up the visual impression

    of a fingerprint. This makes the system harder to trick. Additionally since they use a

    semiconductor chip rather than a CCD (charge coupled device) unit as in case of Optical

    scanner, capacitive scanners tend to be more compact than Optical devices.

    Dept. of EEE MESCE, Kuttippuram15

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    16/23

    Biometric Fingerprint Identification

    6.8 ADVANTAGES OF FINGERPRINT SCANNERS

    Compared to the other biometric authentication technologies, fingerprint

    scanners are:

    The most widely available device.

    Relatively low cost

    Small size (easily integrated into keyboards) and

    Easy to integrate

    Fingerprint verification may be a good choice for in-house systems where

    adequate explanation and training can be provided to users and where the system is

    operated within a controlled environment.

    6.9 DISADVANTAGES

    Fingerprint verification can suffer under large-scale usage. In a large

    population, poorly trained users cause higher usage errors and hence higher instances of

    false rejection. Also, the user interface (scanning module) can become damaged or dirty

    by large-scale usage.

    Dept. of EEE MESCE, Kuttippuram16

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    17/23

    Biometric Fingerprint Identification

    7. FUTURE APPLICATIONS

    There are many concerning potential fingerprint applications, some popular

    examples being:

    7.1 ATM MACHINE USE

    Most of the leading banks have been experimenting with biometrics of ATM

    Machines use and as general means of combining card fraud. It is estimated that lesser

    due to identity fraud in welfare disbursements, credit card transactions, cellular

    telephone calls, and ATM withdrawals total over $ 6 billion every year. At present an

    ATM identifier a person as a client after the person inserts an ATM card into the

    machine and enters a personal identification number (PIN). This method of

    identification has its drawbacks. According to researchers, about one-fourth of bank

    customers apparently write their PIN on their ATM card, thus defeating the protection

    offered by a PIN when an ATM card is stolen.

    7.2 INTERNET TRANSACTIONS

    Security for information systems and computer networks is another important

    area for fingerprint applications. Access to databases by means of remote login is

    another application. Some experts anticipate that more and more information systems,

    computer networks, and world wide web sites will use fingerprint identification

    techniques to control access and for other security purposes.

    Dept. of EEE MESCE, Kuttippuram17

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    18/23

    Biometric Fingerprint Identification

    7.3 PERSONAL TRANSPORTATION

    Several leading automobile manufacturers are exploring the use for fingerprint

    identification to enable an authorized driver to enter and start a car without using a key.

    7.4 USE IN PUBLIC SECTOR

    Various government agencies have considered using biometric fingerprint

    identification. In benefits distribution programs such as welfare disbursement,

    fingerprint identification techniques could bring about substantial savings by deterring

    the same person from filing multiple claims. Fingerprint based voter registration can be

    used to verify identity at the polls to prevent fraudulent voting. In

    Academics/certifications it can be used to verify persons identity prior to taking an

    exam.

    Dept. of EEE MESCE, Kuttippuram18

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    19/23

    Biometric Fingerprint Identification

    8. CONCLUSION

    Biometric fingerprint identification has many usability advantages over

    traditional systems such as passwords. Specifically, users can never lose their

    fingerprints, and the fingerprint is difficult to steal or forge. The intrinsic bit strength of

    a fingerprint is quite good when compared to conventional passwords. Finger scanners

    are getting smaller, cheaper, and more accurate, and can be used in mobile gadgets

    without sprucing up the size, cost, and power consumption. By using this technology

    theft can be prevented and can also eliminate fraudulent transactions. Mobile

    manufacturers and wireless operators are incorporating voice and fingerprint scanning

    techniques in their devices. Fingerprint is a very strong desktop solution, and it is

    anticipated that the desktop will become a device for biometric revenue derived from

    product sales and transactional authentication. Most middleware solutions leverage a

    variety of fingerprint solutions for desktop authentication.

    Fingerprint is a proven technology capable of high levels of accuracy. Strong

    fingerprint solutions are capable of processing thousands of users without allowing a

    false match, and can verify nearly 100% of users with one or two placements of a

    finger. Because of this, many fingerprint technologies can be deployed in application

    where either security or convenience is the primary driver. Reduced size and power

    requirements, along with fingerprints resistance to environmental changes such as

    background light and temperature, allow the technology to be deployed in a range of

    logical and physical access environments. Fingerprint acquisition devices have grown

    quite small sensors slightly thicker than a coin, and smaller than 1.5 cm x 1.5 cm, are

    capable of acquiring and processing images. Thus fingerprint has emerged as a highly

    distinctive identifier, and classification, analysis and study of fingerprints has existed

    for decades.

    Dept. of EEE MESCE, Kuttippuram19

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    20/23

    Biometric Fingerprint Identification

    9. REFERENCES

    1. Electronics for you June 2002

    2. RSA Securitys official guide to CRYPTOGRAPHY BY Steve Burnett and

    Stephen Paine.

    3. Infokairali December 2001.

    4. http://www. biometricgroup.com.

    5. Encarta Encyclopedia 2002.

    6. http://www. howstuffworks.com.

    7. http: //www. BiometricID.org.

    Dept. of EEE MESCE, Kuttippuram20

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    21/23

    Biometric Fingerprint Identification

    ABSTRACT

    Identification of individuals is a very basic societal requirement. Electronic

    verification of a persons identity is of great importance as more interactions take

    place electronically. Biometric fingerprint identification is a technique used to

    change the physical attribute of a person ie; his finger print into electronic

    processes. Until recently electronic verification was based on something the

    person had in their possession like a password. But the problem is that these

    forms arent very secure because passwords can be forgotten or taken away. In

    biometric finger print identification a scanner is used to get the image of the

    finger. When a user places his or her finger on the terminals of scanner the

    image is electronically read, analysed and compared with a previously recorded

    image of the same finger, which has been stored in finger scan data base.

    Finger print is a proven technology capable of high levels of accuracy.

    Dept. of EEE MESCE, Kuttippuram21

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    22/23

    Biometric Fingerprint Identification

    ACKNOWLEDGEMENT

    I express my sincere gratitude to Dr.Nambissan, Prof. & Head,

    Department of Electrical and Electronics Engineering, MES College of

    Engineering, Kuttippuram, for his cooperation and encouragement.

    I would also like to thank my seminar guide Mrs. Renuka.T.K.

    (Lecturer, Department of EEE), Asst. Prof. Gylson Thomas. (Staff in-charge,

    Department of EEE) for their invaluable advice and wholehearted cooperation

    without which this seminar would not have seen the light of day.

    Gracious gratitude to all the faculty of the department of EEE &

    friends for their valuable advice and encouragement.

    Dept. of EEE MESCE, Kuttippuram22

  • 8/6/2019 p 1661 Biometric Fingerprint Identification

    23/23

    Biometric Fingerprint Identification

    CONTENTS

    1. INTRODUCTION 1

    2. IDENTIFICATION AND VERIFICATION SYSTEMS 2

    3. BIOMETRIC SYSTEMS AND DEVICES 3

    4. BIOMETRIC ACCURACY 4

    5. FINGERPRINT VERIFICATION 5

    6. FINGERSCAN 6

    6.1 THE TECHNOLOGY BEHIND FINGERSCAN 6

    6.2 THE ALGORITHMS 7

    6.3 SYSTEM FUNCTIONS 8

    6.4 MANAGEMENT CONTROL 10

    6.5 SECURITY 11

    6.6 AN OVERVIEW OF FINGERSCAN TECHNOLOGIES 13

    6.7 CAPACITANCE SCANNER 13

    6.8 ADVANTAGES OF FINGERPRINT SCANNERS 16

    6.9 DISADVANTAGES 16

    7. FUTURE APPLICATIONS 17

    8. CONCLUSION 19

    9. REFERENCES 20