You are on page 1of 17

SEMINAR ON

Biometrics Based Authentication using fingerprint recognition


Presented bySANJEEV MISHRA B.Tech(CSE), 7th Semester Regd. No.-0811012026 SEMINAR GUIDE: Dr. Alok kumar Jagadev (CSE)

OVERVIEW
What is Biometrics?

Why Biometrics and where is it

needed? Fingerprint Authentication. Concept of ARCH,LOOP AND WHORLS. Pattern-based matching algoritm. Concept of decision-threshold. Conclusion

What is Biometrics?
Biometrics (or biometric

authentication)consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science biometrics is used as a form of identity access management and access control. Biometric characteristics can be divided in two main classes: Physiological(fingerprint, face recognition, iris recognition,etc) and Behavioral (voice, vocal tract,etc).

Why biometrics?
Automatic measurement of biological or behavioral

features that identify a person


Biometrics are unique human feature such as

finger prints, hand geometry, face and iris or retinal patterns, DNA and voice. Being the intrinsic properties of an individual, these are difficult to surreptitiously duplicate and nearly impossible to share.

Where it is needed?
Reliable user authentication is becoming an

increasingly important task in the Web-enabled world. Many other applications in everyday life also require user authentication, such as banking, e-commerce, and physical access control to computer resources. India is undertaking an ambitious mega project to provide a unique identification number to each of its 1.25 billion people. The Identification number will be stored in central databases. consisting the biometric information of the individual. This would be the biggest implementation of the Biometrics in the world.

Human traits used for authentication


TRAITS
Fingerprints Face

METHOD
The patterns of friction ridges and valleys on an individuals fingerprints. An image of the persons face is captured in the visible spectrum using the infrared patterns of the facial heat emission. An acoustics of speech differ between individual. Iris of the eye is the colored area surrounding the pupil. it is unique and are obtained through a video based image acquisition system. Physical characteristics such as the length, width, thickness, and surface area of the hands are measured using a system. This involves the dynamic analysis of a signature to authenticate a person. The measured parameters are speed, pressure, and angle used by a person when

Speech Iris pattern

Hand and finger geometry Signature

Finger print authentication


Fingerprint recognition or fingerprint

authentication refers to the automated method of verifying a match between two human fingerprints.
Fingerprints are a distinctive feature and remain

invariant over the lifetime of a subject, except for cuts and bruises. The digital image of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae.
A fingerprint sensor is an electronic device used to capture

a digital image of the fingerprint pattern.


The three basic patterns of fingerprint ridges are the arch,

loop, and whorl.

Advantages of using Finger Recognition


Fairly small storage space is required for the

biometric template, reducing the size of the database required. It is one of the most developed biometrics. Each and every fingerprint including all fingers are unique, even identical twins have different fingerprints. Sound potential for forensic use as most of the countries have existing fingerprint databases. Relatively inexpensive and offers high levels of accuracy.

Fingerprint Recognition
Finger Print is: not easily borrowed lost stolen forgotten falsified or guessed.

ARCH,LOOP AND WHORLS


An arch is a pattern where the ridges enter from

one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger.

Fingerprint

Biometric Finger Scanners


It consists of : o A reader or scanning device o Software that converts the scanned information into Digital form and compares match points o A Database that stores the Biometric data for comparison

Finger print authentication


Matching algorithms are used to compare

previously stored templates of fingerprints against candidate fingerprints for authentication purposes. The next step is to locate these features in the fingerprint image, using an automatic feature extraction algorithm. Each feature is commonly represented by its location (x, y) and the ridge direction at that location ().

Pattern-based algorithms
Pattern based algorithms compare the basic

fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. To do this, the algorithm finds a central point in the fingerprint image and centers on that. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.

Finger print authentication


In the final stage, the matcher subsystem attempts to arrive

at a degree of similarity between the two sets of features after compensating for the rotation, translation, and scale. This similarity is often expressed as a score. Based on this score, a final decision of match or no-match is made. A decision threshold is first selected. If the score is below the threshold, the fingerprints are determined not to match; if the score is above the threshold, a correct match is declared. Often the score is simply a count of the number of the minutiae that are in correspondence.

CONCLUSION
Fingerprint is the cheapest, fastest, most convenient

and most reliable way to identify someone.


Fingerprint authentication has many usability

advantages over traditional systems such as passwords.


The greatest strength of Fingerprint

recognition,

the fact that the Fingerprint does not change over time.

FINALLY

THANK YOU EVERYBODY!

You might also like