Biometric Fingerprint

  • Upload
    aurox3d

  • View
    238

  • Download
    0

Embed Size (px)

Citation preview

  • 7/31/2019 Biometric Fingerprint

    1/21

    0 BIOMETRIC- FINGERPRINT WHITE PAPER

    SCHOOL OF COMPUTER SCIENCES

    UNIVERSITI SAINS MALAYSIACST 233 Information Security and Assurance

    ASSIGNMENT 3

    BIOMETRIC- FINGERPRINT

    LECTURER : DR. AMAN JANTAN

    NAME : OH YING SAN

  • 7/31/2019 Biometric Fingerprint

    2/21

    1 BIOMETRIC- FINGERPRINT WHITE PAPER

    Table of Contents

    1.0Abstract..32.0 Introduction3-43.0Why We Need Fingerprint5

    3.1Uniqueness of Fingerprint.5 3.2Accuracy of Fingerprint63.3Efficiency/ Speed of Fingerprint For Use In Identification..6

    4.0Types of Fingerprints...74.1Types of Fingerprints Pattern..7

    4.1.1 Arch Pattern...74.1.2 Loop Pattern..84.1.3 Whorl Pattern9

    4.2Types of Lines Found In Fingerprints..105.0How Does Fingerprints Biometric Works11

    5.1Acquisition/ Enrollment Process125.2Preprocessing Process..125.3Feature Extraction Process.135.4Matching Process..13

    6.0The Issues that We Need to Concern About.156.1Security Issues.156.2Privacy Issues16

    7.0Case Study.177.1States Beat Benefit Fraud177.2Bank Services at Your Fingertips18

    8.0Conclusion18 9.0References20

  • 7/31/2019 Biometric Fingerprint

    3/21

    2 BIOMETRIC- FINGERPRINT WHITE PAPER

    1.0AbstractAuthentication by biometric is becoming increasingly common in corporate and

    public security systems, customer electronics and so on. To prevent identity theft,

    biometric data is usually encrypted when its gathered.

    This paper will shows how the biometric verification phase by phase works and

    the issues that we need to concern about when we are using the biometric

    devices such as privacy and the security. In addition, the types of fingerprints

    will further discuss below.

    2.0IntroductionBiometric is a technology used for measuring and analyzing to identify and verify

    humans characteristic and traits. [6] There are many types of physical

    biometrics technologies such as fingerprint, iris, retina, hand, palm vein and face.

    Among all the biometric techniques, fingerprint-based identification is the oldest

    method and extremely useful biometrics since the last nineteenth century which

    has been successfully used in numerous applications and recognized as a primary

    accurate identification method. Even with the recent advancements made in the

    field of DNA analysis, the biometric fingerprint is still commonly used whether it

    has been taken in the traditional way using ink and paper as shown in Figure 1

    or scanned into a computer database to record peoples unique characteristics.

  • 7/31/2019 Biometric Fingerprint

    4/21

    3 BIOMETRIC- FINGERPRINT WHITE PAPER

    As we know that, everyone is known to have unique, immutable fingerprints and

    consistency for over time, thus the fingerprint identification is one of the well

    known and publicized biometrics and it has been used for identification for over a

    century. Besides that, the inherent ease in acquisition, the numerous sources

    (ten fingers) available for collection, and their established use and collections by

    law enforcements and immigration. However, recently the biometric fingerprint

    becoming automated due to the advancements in computer capabilities and

    computer techniques are now widely used. Hence, the biometric fingerprint

    always as a front-line security measure for both identity verification and crime

    detection and also offers an effective crime deterrent.

    There are a variety of hardware sensors types for biometric fingerprint such as

    optical, capacitive, ultrasound and thermal are used to collect the digital image of

    a fingerprint surface. Nowadays the most common sensor is the optical sensors

    to take an image of the fingerprint. While the software for fingerprint matching

    techniques can be classified into two which are minutiae-based matching and

    pattern matching. The most widely used software recognition technique is

    Figure 1: The example of biometric

    fingerprint by using the ink & paper

    method. [2]

  • 7/31/2019 Biometric Fingerprint

    5/21

    4 BIOMETRIC- FINGERPRINT WHITE PAPER

    minutiae-based matching as it can relies on the minutiae points and specifically

    the location and direction of each point.

    Last but not least, biometric fingerprint is one of the most highly used methods

    for human recognition. This is because fingerprints have been acceptance by the

    general public, law enforcement, and the forensic science. Therefore, in this

    white paper will be focus on the reasons and issues related to the fingerprint

    type of fingerprint, how the fingerprint works and the real cases regarding the

    biometric fingerprint.

  • 7/31/2019 Biometric Fingerprint

    6/21

    5 BIOMETRIC- FINGERPRINT WHITE PAPER

    3.0Why we need fingerprint?Nowadays, we live in an anonymous information society characterized by

    increasing global mobility. The traditional methods such as PIN or passwords for

    identifying and verifying peoples characteristics are not enough because it is

    very difficult to remember the long password and the level of the security is not

    as high compare to the fingerprint technique. Hence, biometric fingerprint

    become a necessity for sensitive work processes in the public and private sectors.

    There are a few main reasons of why we need the fingerprint for identifying

    peoples characteristics.

    3.1 Uniqueness of FingerprintAs we know that, all of the fingerprints have a unique combination and

    arrangement of patterns and ridge characteristics. Hence, no two prints have

    ever been found to be exactly alike with one another, even those of identical

    twins print are different. This is because the fingerprints are not inherited,

    although the general pattern may be the same in families but there are some

    level of the fingerprint will differ. Due to this reason, the fingerprint technique

    has been widely used for electronic passport which stores two fingerprints in the

    database. As such, fingerprint techniques are powerful tools for security and

    other operations that require authentication or identification of peoples unique

    fingerprint.

  • 7/31/2019 Biometric Fingerprint

    7/21

    6 BIOMETRIC- FINGERPRINT WHITE PAPER

    3.2 Accuracy of FingerprintThe fingerprint recognition technique is the dominant technology in the biometric

    market due to the high level of accuracy. It is proven that the fingerprint

    recognition technology may reach recognition rate near 100% in good quality

    images. Although there are 2% of the populations have poor quality of

    fingerprint especially the elder people and manual workers. In fact it is very

    difficult to obtain reliable fingerprints images from these populations. However,

    the fingerprint technologies are still able to achieve the correct level of security

    and accuracy of the fingerprint without overly inconveniencing the user.

    3.3 Efficiency/Speed of Fingerprint For Use In IdentificationThe principle of recognition by comparisons of the fingerprints has speed up

    border crossing through the use of scanners. Many countries have set up the

    fingerprint technique to confirm the identity of the bearer of the card and to

    control migration flows to and from their territories. Hence, the fingerprint

    scanners help to identify the people in a more precise and reliable way as well as

    increase the efficiency of the process. Nevertheless, the fingerprint technique has

    the ability to enroll multiple fingers when there are some problems with one

    finger such as injured then it still can used the other 9 fingers to improve the

    recognition. Therefore, the successful development effort of the biometric

    fingerprint enhanced the end user experienced by providing added convenience

    and faster speed for secure network access and identification fingerprint.

  • 7/31/2019 Biometric Fingerprint

    8/21

    7 BIOMETRIC- FINGERPRINT WHITE PAPER

    4.0Types of FingerprintsThe types of fingerprint can be divided into two parts, one is types of fingerprint

    pattern and another one is types of line found in fingerprints. In order to identify

    peoples characteristics by using the fingerprint technique, it is necessary to

    understand and familiar with the types of fingerprint on the finger. This is due to

    avoid the error occur in identifying and verifying peoples fingerprint.

    4.1Types of Fingerprints PatternThe fingerprint patterns are divided into three main groups which are arches,

    loop and whorls. Approximately five percent of all fingerprints are arches, 30%

    are whorls and 65% are loops.

    4.1.1 Arch Pattern

    Figure 2: The picture of the arch pattern [3]

    An arch is a pattern of fingerprint where the ridge enters one side of the finger,

    then rises in the centre forming an arch, and exits on the other side of the finger.

  • 7/31/2019 Biometric Fingerprint

    9/21

    8 BIOMETRIC- FINGERPRINT WHITE PAPER

    As what we can see from the Figure 2 above, the arch pattern is like a hill

    starting from one side and stopping on the other. Arch pattern can divided into

    two groups which are plain arches and tented arches. A plain arch is the simplest

    while the tented arch is similar to a plain arch except that instead of rising

    smoothly at the centre, there is a sharp upward thrust or spike, causes the

    centre of the print to look like a tent. Arch pattern is the least common of

    fingerprint patterns as it contain no deltas or cores.

    4.1.2

    Loop Pattern

    Figure 3: The picture of the loop pattern [3]

    The Figure 3 illustrates the loop pattern, with a loop the ridge enters one side of

    the finger, then forms a curve and then exits on the same side of the finger from

    which it entered. This results when one core and one delta is present. In fact, by

    looking at the middle of the fingerprint, we can see that a loop looks like a jump

    rope turned upside down and each line starts on one side and returns to that

    side. Eventually, loops are the most common pattern in fingerprints.

  • 7/31/2019 Biometric Fingerprint

    10/21

    9 BIOMETRIC- FINGERPRINT WHITE PAPER

    4.1.3 Whorl Pattern

    Figure 4: The picture of the whorl pattern [1]

    The last fingerprint pattern is the whorl pattern as shown in the Figure 4; whorls

    are divided into four groups which are plain whorl, central pocket loop and

    accidental. All whorls contain one or more cores and a minimum of two deltas. A

    whorl is the pattern when ridges form circularly around a central point.

    Somehow, it looks like a pebble thrown in the water. A plain loop and central

    pocket loop have at least one ridge while the double loop is made up of two

    loops combined into one fingerprint which looks like S shape. Then, any print

    classified as an accidental either contains two or more patterns and may consist

    of a combination loop.

  • 7/31/2019 Biometric Fingerprint

    11/21

    10 BIOMETRIC- FINGERPRINT WHITE PAPER

    4.2Types of Lines Found in FingerprintsIn fact, fingerprint patterns are made up of a few types of line which determine

    the general classification characteristics of the print such as arch, loop or whorl.

    The fingerprint pattern area is a term used to describe the center area of a print

    which contains many types of lines. The following examples are typical of the

    most common types of line found in fingerprint.

    ROD

    A rod generally forms a straight line and it has little to no

    curve features and tends to be found in the center of the

    fingerprints pattern area.

    Eclipse

    An eclipse is a circular or oval shaped line-type which is

    generally found in the center of whorl patterns.

    Spiral

    A spiral line is a type of spiral out from the center of the

    fingerprint and is generally found in whorl patterns.

    Bifurcation

    Bifurcation is the intersection of two or more line and

    which lines are converge or diverge.

    Tented

    This line is quickly raised and falls at a steep angle. They

    tend to be associated with tented arch pattern

    Loop

    A loop is a curve line which enters and leaves from the

    same side of the fingerprint.

    Table 1: Types of line found in fingerprint. [3]

  • 7/31/2019 Biometric Fingerprint

    12/21

    11 BIOMETRIC- FINGERPRINT WHITE PAPER

    5.0How Does Fingerprints Biometric WorksFingerprint is one of the most mature biometric traits and considered legitimate

    proof of evidence in courts of law all over worldwide. Therefore, fingerprint is

    used in forensic divisions worldwide for criminal investigations. Hence, we are

    necessary to understand the way of fingerprint works in identification, matching

    and the flow of the fingerprint verification system. Among all the biometric

    techniques, fingerprint-based identification is the oldest method which has been

    used widely. A fingerprint is made up of a series of ridges and furrows on the

    surface of the finger. The uniqueness of a fingerprint can be determined by the

    pattern of ridges and furrows as well as the minutiae points.

    Figure 5: The flow of the verification fingerprint system [1]

  • 7/31/2019 Biometric Fingerprint

    13/21

    12 BIOMETRIC- FINGERPRINT WHITE PAPER

    5.1Acquisition/Enrollment ProcessIn a verification fingerprint system, the template fingerprint image is obtained in

    the enrollment phase. The live-scan of fingerprints can classify into four

    technologies such as optical, ultrasound, electric field and thermal. For example,

    the optical technology-based scanners are based on the image of a fingerprint

    touching the surface of a prism. After that verification process takes place by a

    inputting the sample of the users fingerprint at sensor and it will divide in the

    database which contains the different sets of fingerprint templates according to

    the classification.

    5.2Preprocessing ProcessSince the input fingerprint must be processed in the preprocessing step. The

    preprocessing step includes image enhancement and gray level adjust. A critical

    step in automatic fingerprint matching is to automatically and reliably extract

    minutiae from the input fingerprint images. However, the performance of a

    minutiae extraction algorithm relies on the quality of the input fingerprint images.

    Hence, the enhancement algorithm are needed to improve the clarity of ridge

    and furrow structures of input fingerprint images based on the estimated local

    ridge orientation and frequency. After that, the image enhancement will be

    improved based on the goodness index and the verification accuracy.

  • 7/31/2019 Biometric Fingerprint

    14/21

    13 BIOMETRIC- FINGERPRINT WHITE PAPER

    Figure 6: The picture shows the before and after the image enhancement. [4]

    5.3Feature Extraction ProcessAfter the fingerprint image has been preprocessed, the feature extraction will

    extracts the relevant information that will be used for matching with the

    template fingerprint. An automatic recognition of peoples fingerprint requires

    that the input fingerprint be matched with a large number of fingerprints in a

    database. Hence, to reduce the search time and computational complexity so it is

    desirable to classify these fingerprints in an accurate and consistent manner. The

    fingerprint classification can by the fingerprint patterns such as arch, whorl or

    loop and the type of lines found in the fingerprint. The fingerprint classifier based

    on the features such as position and numbers of deltas found in the fingerprint.

    The classification accuracy is 90% achieved in the feature extraction process.

    5.4Matching ProcessFingerprint matching techniques can be placed into two categories which are

    minutiae-based and correlation based. The minutiae-based techniques find the

    minutiae points and map their relative placement on the finger. This is done by

    comparing neighborhoods of nearby minutiae for similarity and a single

    Before After

  • 7/31/2019 Biometric Fingerprint

    15/21

    14 BIOMETRIC- FINGERPRINT WHITE PAPER

    neighborhood may consist of three or more nearby minutiae. However, it is

    difficult to extract the minutiae points accurately especially when the fingerprint

    is low quality. While the correlation-based method able to overcome some of the

    difficulties of the minutiae-based approach but it require the precise location of a

    registration point and are affected by image translation and rotation. Finally a

    verification decision is made with results or percentages of similarity obtained

    from the matching process. Then, this template will not match with every

    template in the database but it will matched with the template according to the

    characteristics in the particular domain.

    Figure 7: The minutiae-based technique in fingerprint matching process [2]

  • 7/31/2019 Biometric Fingerprint

    16/21

    15 BIOMETRIC- FINGERPRINT WHITE PAPER

    6.0The Issues that We Need to Concern AboutOne of our highest priorities in the world of information security is confirmation

    that a person accessing sensitive, confidential or classified information is

    authorized to do so. The fingerprint biometric can identify users based on their

    characteristics or traits on their print. Individuals are concerned that security

    systems be put in place that would prevent unauthorized access to personal data

    and their identities cannot be stolen by others. Therefore, this section will be

    discussed about the personal issues of privacy related to the fingerprint.

    6.1Security IssuesWe need to understand how vulnerable data are to theft or abuse and how the

    data are to be retained to optimize the security of the data. Fingerprint

    recognition proved to be the most secure among the other biometrics and there

    was no success in any of the efforts made to fool the device. In order to guard

    against attacks, system that stores the biometric fingerprint database should do

    encrypted format to protect the authentication information. Finally, security is

    enhanced to secure server for authentication and decreases the data can be

    tampered with.

  • 7/31/2019 Biometric Fingerprint

    17/21

    16 BIOMETRIC- FINGERPRINT WHITE PAPER

    6.2Privacy IssuesAlthough the biometric fingerprint does not make the users feel very

    uncomfortable when used for the purpose of authentication and this method of

    authentication is not too intrusive of their personal space. However, the users

    are concerned with how and where information is stored, how it can be used and

    who can access as they are not willing to exposure their personal information to

    criminal and threat to their privacy. For example, someone can stole their

    fingerprint to commit in crime and at the end the victims have to face the

    criminal responsibility as the there is no one has the same fingerprint with each

    other. Hence, if their information can be stored locally which provide easier

    access and control and the concern about network attack then they are worried

    the crime case will happen on them. While smart storage data make the users

    feel more comfortable as the others cannot accessing or take their sample of

    fingerprint for illegal purpose at the same time the security risks decreases.

  • 7/31/2019 Biometric Fingerprint

    18/21

    17 BIOMETRIC- FINGERPRINT WHITE PAPER

    7.0Case Study7.1States Beat Benefit FraudMany states are investigating and piloting biometric systems to identify benefit

    recipients in order to reduce fraud and increase efficiency. One state's high-tech

    benefit system checks for evidence of wrongdoing and creates identification

    cards as clients enroll. Applicants place their index fingers on an optical reader

    which scans the prints to create images for the database. At the same time, the

    applicant's photo is taken with a digital camera. Next, the client signs his or her

    name on a tablet that captures the signature electronically. All these files are

    transmitted to a host computer, where, in minutes, search engines verify that

    the person has not enrolled in the system under another identity.

    After a client is accepted into the system, an identification card is created on the

    spot. A two-dimensional symbol on the card encodes the fingerprint file. The

    card also carries the client's photo and signature, and a magnetic stripe for

    future use. Clients present their cards and have their fingerprint scanned for

    verification when they collect benefits. In this state, 41 percent of General

    Assistance and 31 percent of AFDC recipients failed to re-enroll in those

    programs when the new identification cards were issued. This is attributed to the

    deterrence factor the new system provides. Those who attempt multiple

    enrollments will be caught; suspected fraud cases are now under investigation.

  • 7/31/2019 Biometric Fingerprint

    19/21

    18 BIOMETRIC- FINGERPRINT WHITE PAPER

    7.2Bank Services at Your FingertipsAn employee credit union has installed several unattended banking kiosks that

    use fingerprint imaging to identify account holders for access to services. Credit

    union members can enroll at the kiosks by touch screen input as they answer a

    series of questions displayed on the screen. They then have to present each

    finger for enrollment and have their photograph taken by a camera in the kiosk.

    Once enrolled, members will be able to use the kiosks to make deposits and

    withdrawals, complete loan applications, and more.

    8.0ConclusionIn this white paper, I have introduced the biometric fingerprint, type of

    fingerprint, how does the fingerprint identification works, the issues have to

    taken into our considerations and the real cases regarding the biometric

    fingerprint. Throughout this white paper, we know that the fingerprint is an

    effective way to reduce time and achieve higher accuracy during the

    identification process. The fingerprint technique able to scan the fingerprints that

    have been found at a crime scene and automatically find and record the ridges,

    whorls, arches or loops contained within. Hence, the fingerprint technique has

    been bringing a lot of benefits to the people today and increase the efficiency of

    the process.

  • 7/31/2019 Biometric Fingerprint

    20/21

    19 BIOMETRIC- FINGERPRINT WHITE PAPER

    Although the better fingerprint matching algorithms are used almost universally

    today, but no algorithm can compensate for imperfect or missing images. In fact

    it is extremely difficult or impossible to obtain reliable fingerprint images from a

    significant percentage of the world population. There are many reasons that

    fingerprints may be difficult to acquire, including genetic background, damagefrom manual labor, poor health and age and even the environmental conditions

    can cause severe problems. However, the ideal fingerprint technique has to

    achieve the correct level of security without overly inconveniencing the user.

    Last but not least, the fingerprint biometric is a great way to authenticate users

    due to the high accuracy, ease of use, uniqueness of the fingerprint and most

    economical biometric technique. Besides that, the fingerprint technique can be

    used for dozens of applications outside the scope of computer security and used

    to find an offender according to traits left on the crime spot. Therefore,

    fingerprint biometric has been successfully used in authenticating applications.

  • 7/31/2019 Biometric Fingerprint

    21/21

    20 BIOMETRIC- FINGERPRINT WHITE PAPER

    9.0References[1]:Fingerprints

    https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/f

    orensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+

    line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp

    5gb_0MTedd2z1NMcYSFWkg-

    6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH

    9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg

    [accessed 9 May 2012]

    [2]:Fingerprint Identification http://biometrics.cse.msu.edu/fingerprint.html

    [accessed 9 May 2012]

    [3]: Type of fingerprints

    http://www.senseme.com/scripts/biometrics/fingerprints.htm

    [Accessed 9 May 2012]

    [4]:Biometric case

    http://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asp

    [Accessed 10 May 2012]

    [5]: Biometrichttp://www.biometrics.gov/documents/fingerprintrec.pdf

    [Accessed 10 May 2012]

    [6] Biometrichttp://searchsecurity.techtarget.com/definition/biometrics

    [Accessed 10 May 2012]

    https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttp://biometrics.cse.msu.edu/fingerprint.htmlhttp://biometrics.cse.msu.edu/fingerprint.htmlhttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://biometrics.cse.msu.edu/fingerprint.htmlhttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg