BIOMETRICS – FINGER PRINT TECHNOLOGY

Embed Size (px)

Citation preview

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    1/17

    BIOMETRICS FINGER PRINT

    TECHNOLOGY

    BY:

    E.V.R.DEEPAK VARMA

    07L31A0420

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    2/17

    BIOMETRICS

    CONTENTS

    Abstract

    History of biometrics

    Beginning of finger print technology

    The Necessity Finger print identification

    Functions

    Applications

    Limitations

    Conclusion

    References

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    3/17

    ABSTRACT

    This Paper is regarding biometrics which is an interesting topic now in regard to

    computer and network security, however the ideas of biometrics have been around for

    many years. Today we have the technology to realize the aims, and to refine the accuracyof biometric identification, and therefore the possibility of making it a viable field.

    This paper presents the overall views of fingerprint technology which plays a vital

    role in todays technical world for security as well as for identification in several cases.

    Advantages of these biometric technologies also give a greater impact on the of todaysWorld market. Biometrics increases security which provides a convenient and low-cost

    additional tier of security. It eliminates problems caused by lost IDs or forgotten

    passwords by using physiological attributes. Any biometric access control system willconsists of a biometric control reader or scanner. This unit will capture the raw data in the

    form of fingerprint or information from voice recognizer, etc. This data is then analyzedand compared to the persons characteristics against the previously enrolled record. If the

    two records match, the person is authenticated. And if the time is within the authorizedperiod for entry, the device will signal and release the electric door lock.

    The most common aspect of biometrics being used for access control is

    fingerprints. Though in more secure areas like defence areas and airports, government

    areas, etc.The best solution for a small business is to opt for a fingerprint access controlsystem.

    Finger print technology is one of the most developed biometrics with morehistory, research and design than any other form. Traditional use of finger prints was first

    used in 14th century, in China. In the later half of the 19 th century, Richard Edward Henry

    of Scotland yard developed a method of categorizing and identifying marks infingerprints. An advanced version of this method was brought by Francis Galton in 1892.

    Biometric fingerprint method became the method of choice for police around the

    world till date. Another classification of systems was created almost concurrently in 1891

    by Juan Vucetich which is still use in most of the Spanish countries. International

    Organizations such as InterPol now use both the methods. It is still choice for most of thelaw agencies .Highly effective and relatively simple, the use of fingerprints as a viable

    biometric seems to be here for the long run.

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    4/17

    The crossover accuracy of digital biometrics fingerprint technology has been

    calculated to be 1:500 for a single finger. Use of multiple fingers increases the accuracy

    exponentially. Because of the large amount of data that can be drawn from thefingerprints, as systems become more accurate and powerful, this accuracy should

    increase even more. Given the amount of information contained in a fingerprint, it is

    highly unlikely (estimated at 1 in 64 billion) that any two fingerprints would be identicaland therefore impossible to tell apart. Using fingerprint technology is the fairly small

    storage space required for the biometric template, reducing the size of the database

    memory required. Also, it is one of the most developed biometrics, with more history,research, and design than any other form. The traditional use of fingerprints on criminals

    has given it a public stigma that is slowly being overcome, but often overshadows its

    usefulness. For those concerned with how easy it is to fool a fingerprint reader,

    companies have been quickly progressing in creating "human-sensing" devices that candifferentiate between living human fingers and even some of the best replicas. And since

    the information in the database is encoded with a mathematical algorithm, recreation of a

    biometrics fingerprint is extremely difficult on even a limited scale with most modern

    systems.

    History of Biometrics

    The term biometrics is derived from the Greek words bio (life) and metric (to

    measure).

    Biometrics is becoming an interesting topic now in regards to computer andnetwork security, however the ideas of biometrics have been around for many years.

    Possibly the first known example of biometrics in practice was a form of finger printing

    being used in China in the 14th century, as reported by explorer Joao de Barros. He wrotethat the Chinese merchants were stamping children's palm prints and footprints on paper

    with ink to distinguish the young children from one another. This is one of the earliest

    known cases of biometrics in use and is still being used today.

    In the 1890s, an anthropologist named Alphonse Bertillion sought to fix the

    problem of identifying convicted criminals and turned biometrics into a distinct field of

    study. He developed 'Bertillonage', a method of bodily measurement which got namedafter him.

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    5/17

    The problem with identifying repeated offenders was that the criminals often gavedifferent aliases each time they were arrested. Bertillion realized that even if names

    changed, even if a person cut his hair or put on weight, certain elements of the body

    remained fixed, such as the size of the skull or the length of their fingers. His system wasused by police authorities throughout the world, until it quickly faded when it was

    discovered that some people shared the same measurements and based on the

    measurements alone, two people could get treated as one.

    After this, the police used finger printing, which was developed by RichardEdward Henry of Scotland Yard, instead. . Essentially reverting to the same methods

    used by the Chinese for years. However the idea of biometrics as a field of study with

    useful identification applications, was there and interest in it has grown

    This Paper discusses the Finger print technology to realize the aims, and to

    refine the accuracy of biometric identification, and therefore the possibility of making it a

    viable field.

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    6/17

    Beginning of Fingerprint Technology

    The beginning of fingerprints goes back to as early as the ancient times.

    According to historical findings, fingerprints were used on clay tablets for business

    transactions in ancient Babylon. In China, thumb prints were found on clay seals. But itwas in the 19th century that the results of scientific studies were published and fingerprint

    technology began to be considered more seriously.

    Using the1800s scientific studies as a foundation, fingerprint technology was

    already in use by the beginning of the 20th century. In 1924, FBI(Federal Bureau of

    Investigation) is already known to have maintained more than 250 million civil files offingerprints for the purpose of criminal investigation and the identification of unknown

    The NecessityWith increasingly urgent need for reliable security, biometrics is being spotlighted

    as the authentication method for the next generation. Among numerous biometric

    technologies, fingerprint authentication has been in use for the longest time and bears

    more advantages than other biometric technologies do.

    Fingerprint authentication is possibly the most sophisticated method of all

    biometric technologies and has been thoroughly verified through various applications.

    Fingerprint authentication has particularly proved its high efficiency and furtherenhanced the technology in criminal investigation for more than a century.

    Even features such as a persons gait, face, or signature may change with passageof time and may be fabricated or imitated. However, a fingerprint is completely unique to

    an individual and stayed unchanged for lifetime. This exclusivity demonstrates that

    fingerprint authentication is far more accurate and efficient than any other methods ofauthentication.

    Also, a fingerprint may be taken and digitalized by relatively compact and cheapdevices and takes only a small capacity to store a large database of information. With

    these strengths, fingerprint authentication has long been a major part of the security

    market and continues to be more competitive than others in todays world.

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    7/17

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    8/17

    Strength

    highly-stable performance

    physical/electrical durability

    high-quality image

    low cost with mass production compact

    size integrated with low-power application

    Weakness

    relatively high costlimit to size-reduction

    relatively easy to fool with a

    finger trace or fake finger

    physical/electrical weaknessperformance sensitive to the outer

    environment(temperature, dryness of a

    finger)

    Application

    entrance, time, andattendance control

    banking service

    PC security

    PC security

    e-commerce authentication

    mobile devices & smart cards

    Step 2. Feature Extraction

    There are two main ways to compare an input fingerprint image and registered fingerprint

    data. One is to compare an image with another image directly. The other is to compare

    the so-called 'features' extracted from each fingerprint image. The latter is called feature-based/minutia-based matching. Every finger has a unique pattern formed by a flow of

    embossed lines called ridges and hollow regions between them called valleys. As

    seen in the Picture 2 below, ridges are represented as dark lines, while valleys are bright.

    Step 3. Matching

    The matching step is classified into 1:1 and 1:N matching according to its purpose and/or

    the number of reference templates. 1:1 matching is also called personal identification or

    verification. It is a procedure in which a user claims his/her identity by means of an ID

    and proves it with a fingerprint. The comparison occurs only once between the inputfingerprint image and the selected one from the database following the claim by the user.

    On the contrary, 1:N matching denotes a procedure where the system determines the

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    9/17

    user's identity by comparing the input fingerprint with the information in the database

    without asking for the user's claim. A good example of this is AFIS (Automated

    Fingerprint Identification System) frequently used in criminal investigation.

    The output result of the matching step is whether or not the input fingerprint is identical

    to the one being compared in the database. Then how could the accuracy of the matchingprocedure be represented in number? The simplest measures are FRR (False Reject Rate)

    and FAR (False Accept Rate). The former is the rate of genuine user's rejection and the

    latter is the rate of impostor's acceptance.

    Background

    The analysis of fingerprints for matching purposes generally requires thecomparison of several features of the print pattern. These include patterns, which are

    aggregate characteristics of ridges, and minutia points, which are unique features found

    within the patterns. It is also necessary to know the structure and properties of humanskin in order to successfully employ some of the imaging technologies.

    Patterns

    The three basic patterns of fingerprint ridges are the arch, loop, and whorl. Anarch is a pattern where the ridges enter from one side of the finger, rise in the center

    forming an arc, and then exit the other side of the finger. The loop is a pattern where the

    ridges enter from one side of a finger, form a curve, and tend to exit from the same side

    they enter. In the whorl pattern, ridges form circularly around a central point on thefinger. Scientists have found that family members often share the same general

    fingerprint patterns, leading to the belief that these patterns are inherited.

    The arch pattern.

    The loop pattern.

    The whorl pattern.

    http://en.wikipedia.org/wiki/Skinhttp://en.wikipedia.org/wiki/Whorlhttp://en.wikipedia.org/wiki/Heredityhttp://en.wikipedia.org/wiki/File:Whorl.jpghttp://en.wikipedia.org/wiki/File:Whorl.jpghttp://en.wikipedia.org/wiki/File:Loop.jpghttp://en.wikipedia.org/wiki/File:Loop.jpghttp://en.wikipedia.org/wiki/File:Arch.jpghttp://en.wikipedia.org/wiki/File:Arch.jpghttp://en.wikipedia.org/wiki/Skinhttp://en.wikipedia.org/wiki/Whorlhttp://en.wikipedia.org/wiki/Heredity
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    10/17

    Minutia features

    The major Minutia features of fingerprint ridges are: ridge ending, bifurcation,

    and short ridge (or dot). The ridge ending is the point at which a ridge terminates.Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or

    dots) are ridges which are significantly shorter than the average ridge length on the

    fingerprint. Minutiae and patterns are very important in the analysis of fingerprints sinceno two fingers have been shown to be identical.

    Ridge ending. Bifurcation. Short Ridge (Dot).

    Functions

    A biometric system can provide the following two functions

    Verification

    Authenticates its users in conjunction with a smart card, username or ID number.The biometric template captured is compared with that stored against the

    registered user either on a smart card or database for verification.

    Identification

    Authenticates its users from the biometric characteristic alone without the use of

    smart cards, usernames or ID numbers. The biometric template is compared to all

    http://en.wikipedia.org/wiki/Minutiaehttp://en.wikipedia.org/wiki/File:Short_ridge.svghttp://en.wikipedia.org/wiki/File:Short_ridge.svghttp://en.wikipedia.org/wiki/File:Bifurcation.svghttp://en.wikipedia.org/wiki/File:Bifurcation.svghttp://en.wikipedia.org/wiki/File:Ridge_ending.svghttp://en.wikipedia.org/wiki/File:Ridge_ending.svghttp://en.wikipedia.org/wiki/Minutiae
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    11/17

    records within the database and a closest match score is returned. The closest

    match within the allowed threshold is deemed the individual and authenticated.

    Applications

    Markets for fingerprint technology include entrance control and door-lock

    applications, fingerprint identification mouses, fingerprint mobile phones, and many

    others. The fingerprint markets are classified as follows:

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    12/17

    As the advanced technology enables even more compact fingerprint sensor

    size, the range of application is extended to the mobile market. Considering thegrowing phase of the present mobile market, its potential is the greatest of all

    application markets.

    A list of significant modern dates documenting the use of fingerprints for positive

    identification are as follows:

  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    13/17

    1684:Nehemiah Grew (1641-1712, English physician, botanist, and microscopist)

    published the first paper on the ridge structure of skin of the fingers and palms.[18]

    In 1685, Govard Bidloo (1649-1713, Dutch physician)[19] and Marcello Malpighi

    (1628-1694, Italian physician)[20]

    published books on anatomy which alsoillustrated the ridge structure of the fingers.

    1788: Johann Christoph Andreas Mayer[21] (1747-1801, German anatomist)recognized that fingerprints are unique to each individual.[22]

    1823: Jan Evangelista Purkyn, a professor of anatomy at the University of

    Breslau, published his thesis discussing 9 fingerprint patterns, but he did notmention the use of fingerprints to identify persons.[23]

    1853: Georg von Meissner(1829-1905, German anatomist) studied friction

    ridges.[24]

    1858: SirWilliam James Herschel (1833-1918, English magistrate) initiated

    fingerprinting in India.[25]

    1880: Dr Henry Faulds published his first paper on the subject in the scientificjournalNature in 1880.[26]Returning to the UK in 1886, he offered the concept tothe Metropolitan Police in London but it was dismissed.[27][28]

    1892: SirFrancis Galton published a detailed statistical model of fingerprint

    analysis and identification and encouraged its use in forensic science in his bookFinger Prints.[29]

    1892: Juan Vucetich, an Argentine police officer who had been studying Galton

    pattern types for a year, made the first criminal fingerprint identification. Hesuccessfully proved Francisca Rojas guilty ofmurderafter showing that the

    bloody fingerprint found at the crime scene was hers, and could only be hers.

    1897: The world's first Fingerprint Bureau opened in Calcutta (Kolkata), India

    after the Council of the Governor General approved a committee report (on 12June1897) that fingerprints should be used for classification of criminal records.

    Working in the Calcutta Anthropometric Bureau (before it became the Fingerprint

    Bureau) were Azizul Haque and Hem Chandra Bose. Haque and Bose were theIndian fingerprint experts credited with primary development of the fingerprint

    classification system eventually named after their supervisor, Sir Edward Richard

    Henry.[30][31]

    1901: The first United Kingdom Fingerprint Bureau was founded in Scotland

    Yard. The Henry Classification System, devised by Sir Edward Richard Henry

    with the help ofHaque and Bose was accepted in England and Wales.

    1902: Dr. Henry P. DeForrest used fingerprinting in theNew York Civil Service.

    1906:New York City Police Department Deputy Commissioner Joseph A. Faurot

    introduced fingerprinting of criminals to the United States.

    http://www.answers.com/topic/nehemiah-grewhttp://www.answers.com/fingerprint%20technology#cite_note-17http://www.answers.com/topic/govert-bidloohttp://www.answers.com/fingerprint%20technology#cite_note-18http://www.answers.com/topic/marcello-malpighihttp://www.answers.com/fingerprint%20technology#cite_note-19http://www.answers.com/fingerprint%20technology#cite_note-19http://www.answers.com/fingerprint%20technology#cite_note-20http://www.answers.com/fingerprint%20technology#cite_note-21http://www.answers.com/topic/jan-evangelista-purkyn-1http://www.answers.com/topic/university-of-wroc-aw-1http://www.answers.com/topic/university-of-wroc-aw-1http://www.answers.com/fingerprint%20technology#cite_note-22http://www.answers.com/topic/georg-meissnerhttp://www.answers.com/fingerprint%20technology#cite_note-23http://www.answers.com/topic/william-james-herschelhttp://www.answers.com/fingerprint%20technology#cite_note-24http://www.answers.com/topic/henry-fauldshttp://www.answers.com/topic/scientific-journalhttp://www.answers.com/topic/scientific-journalhttp://www.answers.com/topic/nature-journalhttp://www.answers.com/fingerprint%20technology#cite_note-faulds1-25http://www.answers.com/fingerprint%20technology#cite_note-faulds1-25http://www.answers.com/topic/metropolitan-police-servicehttp://www.answers.com/topic/londonhttp://www.answers.com/fingerprint%20technology#cite_note-reid1-26http://www.answers.com/fingerprint%20technology#cite_note-27http://www.answers.com/topic/francis-galtonhttp://www.answers.com/fingerprint%20technology#cite_note-galtonfps-28http://www.answers.com/topic/juan-vucetichhttp://www.answers.com/topic/francisca-rojashttp://www.answers.com/topic/murderhttp://www.answers.com/topic/crime-scenehttp://www.answers.com/topic/calcuttahttp://www.answers.com/topic/june-12http://www.answers.com/topic/june-12http://www.answers.com/topic/1897http://www.answers.com/topic/azizul-haquehttp://www.answers.com/topic/hem-chandra-bosehttp://www.answers.com/topic/edward-henryhttp://www.answers.com/topic/edward-henryhttp://www.answers.com/fingerprint%20technology#cite_note-29http://www.answers.com/fingerprint%20technology#cite_note-30http://www.answers.com/topic/scotland-yardhttp://www.answers.com/topic/scotland-yardhttp://www.answers.com/topic/henry-classification-systemhttp://www.answers.com/topic/edward-henryhttp://www.answers.com/topic/haque-2http://www.answers.com/topic/new-york-city-police-departmenthttp://www.answers.com/topic/new-york-city-police-departmenthttp://www.answers.com/topic/nehemiah-grewhttp://www.answers.com/fingerprint%20technology#cite_note-17http://www.answers.com/topic/govert-bidloohttp://www.answers.com/fingerprint%20technology#cite_note-18http://www.answers.com/topic/marcello-malpighihttp://www.answers.com/fingerprint%20technology#cite_note-19http://www.answers.com/fingerprint%20technology#cite_note-20http://www.answers.com/fingerprint%20technology#cite_note-21http://www.answers.com/topic/jan-evangelista-purkyn-1http://www.answers.com/topic/university-of-wroc-aw-1http://www.answers.com/topic/university-of-wroc-aw-1http://www.answers.com/fingerprint%20technology#cite_note-22http://www.answers.com/topic/georg-meissnerhttp://www.answers.com/fingerprint%20technology#cite_note-23http://www.answers.com/topic/william-james-herschelhttp://www.answers.com/fingerprint%20technology#cite_note-24http://www.answers.com/topic/henry-fauldshttp://www.answers.com/topic/scientific-journalhttp://www.answers.com/topic/scientific-journalhttp://www.answers.com/topic/nature-journalhttp://www.answers.com/fingerprint%20technology#cite_note-faulds1-25http://www.answers.com/topic/metropolitan-police-servicehttp://www.answers.com/topic/londonhttp://www.answers.com/fingerprint%20technology#cite_note-reid1-26http://www.answers.com/fingerprint%20technology#cite_note-27http://www.answers.com/topic/francis-galtonhttp://www.answers.com/fingerprint%20technology#cite_note-galtonfps-28http://www.answers.com/topic/juan-vucetichhttp://www.answers.com/topic/francisca-rojashttp://www.answers.com/topic/murderhttp://www.answers.com/topic/crime-scenehttp://www.answers.com/topic/calcuttahttp://www.answers.com/topic/june-12http://www.answers.com/topic/june-12http://www.answers.com/topic/1897http://www.answers.com/topic/azizul-haquehttp://www.answers.com/topic/hem-chandra-bosehttp://www.answers.com/topic/edward-henryhttp://www.answers.com/topic/edward-henryhttp://www.answers.com/fingerprint%20technology#cite_note-29http://www.answers.com/fingerprint%20technology#cite_note-30http://www.answers.com/topic/scotland-yardhttp://www.answers.com/topic/scotland-yardhttp://www.answers.com/topic/henry-classification-systemhttp://www.answers.com/topic/edward-henryhttp://www.answers.com/topic/haque-2http://www.answers.com/topic/new-york-city-police-departmenthttp://www.answers.com/topic/new-york-city-police-department
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    14/17

    Defense

    Fingerprints collected at a crime scene, or on items of evidence from a crime, can

    be used in forensic science to identify suspects, victims and other persons who touched asurface. Fingerprint identification emerged as an important system within police agencies

    in the late 19th century, when it replaced anthropometric measurements as a more reliable

    method for identifying persons having a prior record, often under an alias name, in acriminal record repository

    The science of fingerprint identification can assert its standing amongst forensicsciences for many reasons, including the following

    Has served all governments worldwide during the past 100 years to provideaccurate identification of criminals. No two fingerprints have ever been found

    identical in many billions of human and automated computer comparisons.

    Fingerprints are the very basis for criminal history foundation at every policeagency.[3]

    Established the first forensic professional organization, the International

    Association for Identification (IAI), in 1915.[33]

    Established the first professional certification program for forensic scientists, theIAI's Certified Latent Print Examiner program (in 1977), issuing certification to

    those meeting stringent criteria and revoking certification for serious errors such

    as erroneous identifications.[34]

    Remains the most commonly used forensic evidence worldwidein most

    jurisdictions fingerprint examination cases match or outnumber all other forensic

    examination casework combined.

    Continues to expand as the premier method for identifying persons, with tens ofthousands of persons added to fingerprint repositories daily in America alonefar

    outdistancing similar databases in growth.

    Is claimed to outperform DNA and all other human identification systems(fingerprints are said to solve ten times more unknown suspect cases than DNA in

    most jurisdictions).

    Fingerprint identification was the first forensic discipline (in 1977) to formallyinstitute a professional certification program for individual experts, including a

    procedure for decertifying those making errors. Other forensic disciplines later

    followed suit in establishing certification programs whereby certification could berevoked for error.

    http://www.answers.com/topic/forensic-sciencehttp://www.answers.com/fingerprint%20technology#cite_note-ashbaugh1-2http://www.answers.com/topic/international-association-for-identificationhttp://www.answers.com/topic/international-association-for-identificationhttp://www.answers.com/fingerprint%20technology#cite_note-iaihist-32http://www.answers.com/fingerprint%20technology#cite_note-lpcb1-33http://www.answers.com/topic/forensic-sciencehttp://www.answers.com/fingerprint%20technology#cite_note-ashbaugh1-2http://www.answers.com/topic/international-association-for-identificationhttp://www.answers.com/topic/international-association-for-identificationhttp://www.answers.com/fingerprint%20technology#cite_note-iaihist-32http://www.answers.com/fingerprint%20technology#cite_note-lpcb1-33
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    15/17

    Fingerprint identification effects far more positive identifications of persons

    worldwide daily than any other human identification procedure. Some of the discontent

    over fingerprint evidence may be due to the desire to push the conclusiveness offingerprint examinations to the same level of certitude as that of DNA analysis. DNA is

    probability-based inasmuch as an individual is genetically half from the mother's

    contribution and half from the father's contribution. These genetic contributions arepassed down from generation to generation. While pattern type (arch, loops, and whorls)

    may be inherited, the details of the friction ridges are not. For example, it cannot be

    concluded that a person inherited a certain bifurcation from their mother and an endingridge from their father as the development of these features are completely random.

    Further, fingerprints as an analogy of uniqueness has been widely scientifically accepted.

    For example, chemists often use the term "fingerprint region" to describe an area of a

    chemical that can be used to identify it.

    Other uses

    Locks and other applications

    In the 2000s, electronic fingerprint readers have been introduced for security

    applications such as identification of computer users (log-in authentication). However,early devices have been discovered to be vulnerable to quite simple methods of

    deception, such as fake fingerprints cast in gels. In 2006, fingerprint sensors gained

    popularity in the notebook PC market. Built-in sensors in ThinkPads,VAIO laptops, andothers also double as motion detectors for document scrolling, like this scroll wheel.

    Another recent use of fingerprints in a day-to-day setting has been the increasingreliance onbiometrics in schools where fingerprints and, to a lesser extent, iris scans are

    used to validate electronic registration, cashless catering, and library access. This practice

    isparticularly widespread in the UK, where more than 3500 schools currently use suchtechnology, though it is also starting to be adopted in some states in the US.

    Fingerprints in other species

    Some other animals, including many primates, koalas, and fishers have their

    own unique prints.[50]According to one study, even with an electron microscope, it can be

    quite difficult to distinguish between the fingerprints of a koala and a human

    Fingerprinting in fiction

    http://www.answers.com/topic/gelhttp://www.answers.com/topic/thinkpadhttp://www.answers.com/topic/vaiohttp://www.answers.com/topic/biometrics-in-schoolshttp://news.bbc.co.uk/1/hi/uk_politics/6468643.stmhttp://www.answers.com/topic/primatehttp://www.answers.com/topic/koalahttp://www.answers.com/topic/fisher-animalhttp://www.answers.com/fingerprint%20technology#cite_note-49http://www.answers.com/fingerprint%20technology#cite_note-49http://www.answers.com/topic/gelhttp://www.answers.com/topic/thinkpadhttp://www.answers.com/topic/vaiohttp://www.answers.com/topic/biometrics-in-schoolshttp://news.bbc.co.uk/1/hi/uk_politics/6468643.stmhttp://www.answers.com/topic/primatehttp://www.answers.com/topic/koalahttp://www.answers.com/topic/fisher-animalhttp://www.answers.com/fingerprint%20technology#cite_note-49
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    16/17

    The 1985 Granada TV adoption ofThe Adventure of the Final Problem, an 1893

    Sherlock Holmes short story set in 1891, has aplot hole in Holmes's use of the

    Bertillon criminal ID system, in which he uses fingerprints to trap Moriarty'sagents and recover the Mona Lisa. The real Bertillon system did not use

    fingerprints. Bertillon added four spaces for fingerprints on his identification

    cards by 1900 because of fingerprinting's growing popularity, however theidentification cards were still organized based on anthropometric measurements.

    In The Norwood Builder, an 1903 Sherlock Holmes short story set in 1894, the

    discovery of a bloody fingerprint helps Holmes expose the real criminal and freehis client.

    Limitations:

    Although also an advantage, user acceptance is not guaranteed. Fingerprintscanning crosses the fine line between the impersonal and nonintrusive nature of

    passwords and personal identification numbers (PINs), and utilising part of an

    individuals body to identify him/her. As will be discussed, some people view thisas an invasion of privacy13 or worse.

    Injury, whether temporary or permanent, can interfere with the scanning process.

    In some cases reenrolment is required. For example, bandaging a finger for ashort period of time can impact an individual if fingerprint scanning is used in a

    wide variety of situations. Something as simple as a burn to the identifying finger

    could prevent use of an automatic teller machine (ATM). As some authors have argued, there is nothing to suggest that the same technology

    that is used to store fingerprints as statistical algorithms cannot also be used or

    modified to recreate accurate depiction of the print itself. This raises serious

    concerns related to how such data should be stored, maintained and protected toprevent fraudulent use.14

    Conclusion:

    http://www.answers.com/topic/the-adventure-of-the-final-problemhttp://www.answers.com/topic/sherlock-holmeshttp://www.answers.com/topic/plot-holehttp://www.answers.com/topic/alphonse-bertillonhttp://www.answers.com/topic/mona-lisahttp://www.answers.com/topic/the-adventure-of-the-norwood-builderhttp://www.answers.com/topic/sherlock-holmeshttp://www.answers.com/topic/the-adventure-of-the-final-problemhttp://www.answers.com/topic/sherlock-holmeshttp://www.answers.com/topic/plot-holehttp://www.answers.com/topic/alphonse-bertillonhttp://www.answers.com/topic/mona-lisahttp://www.answers.com/topic/the-adventure-of-the-norwood-builderhttp://www.answers.com/topic/sherlock-holmes
  • 8/6/2019 BIOMETRICS FINGER PRINT TECHNOLOGY

    17/17

    Fingerprint technology which plays a vital role in todays technical world for

    security as well as for identification in several cases. Advantages of these biometric

    technologies also give a greater impact on the of todays World market. Biometricsincreases security which provides a convenient and low-cost additional tier of security. It

    eliminates problems caused by lost IDs or forgotten passwords by using physiological

    attributes.Fingerprint authentication has particularly proved its high efficiency and further

    enhanced the technology in criminal investigation for more than a century. , a fingerprint

    is completely unique to an individual and stayed unchanged for lifetime. This exclusivitydemonstrates that fingerprint authentication is far more accurate and efficient than any

    other methods of authentication.

    References of fingerprint technology

    1. Advances in Biometrics: Sensors, Algorithms and Systems

    Publisher Springer-VerlagAuthor(s) Venu Govindaraju

    Behavioral Biometrics: A Remote Access Approach

    Publisher John Wiley and Sons

    Author(s) Kenneth Revett

    2. Biometrics

    Publisher McGraw-Hill/Osborne

    Author(s) Peter T. Higgins

    Biometric User Authentication for IT Security: From Fundamentals to Handwriting

    (Advances in Information Security)

    Publisher Springer-Verlag

    Author(s) Claus Vielhauer