41
NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Embed Size (px)

Citation preview

Page 1: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS

ENGINEERS (NIEEE), PORT HARCOURT BRANCH

TECHNICAL PRESENTATION

Page 2: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

TOPIC: ‘FINGERPRINT

IDENTIFICATIONAND ITS ADVANCED APPLICATION’

1st JULY, 2015

Page 3: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

PRESENTED BY

AMADI PETER CHIDINGOZI, B-ENG’G (Electrical Engineering/Power),

GMNSE, MNIEE, PGDE, Certification in Instrumentation

(Walvis Bay)

Page 4: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

‘’FINGERPRINT IDENTIFICATION AND ITS APPLICATION’’

SYNOPSIS:This presentation presents systematically, the

principles and key technologies of fingerprints identification. The process of fingerprint identification includes fingerprint image capturing, pre-processing, feature extracting and feature matching. It investigated the applications of automatic fingerprint identification technology to Biometrics for verification control;.

Page 5: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Database management systems (personal data recording and capturing), Data Security Fields such as; fingerprint locks, fingerprint verification cards, bank saving network systems, all kinds of network exchange, and so on. Applications of automatic fingerprints will be expanded extensively and must be a significant research in Engineering, Information, Security, Banking Institutions, Schools, Homes, Companies and Parastatals where security of data & information, electronic based-locks, documents & properties is very paramount

Page 6: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

INTRODUCTIONFINGERPRINT RECOGNITION AND

IDENTIFICATIONFingerprint recognition or fingerprint

authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.

Page 7: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

BackgroundThe analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.PatternsThe three basic patterns of fingerprint ridges are the arch, loop, and whorl:•Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.•Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.•Whorl: Ridges form circularly around a central point on the finger.Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited.

Page 8: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

The Loop Pattern.

The Arch Pattern

Page 11: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Minutiae featuresThe major minutia features of fingerprint ridges are ridge ending, bifurcation, and short ridge (or dot). The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical.

Page 15: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Fingerprint sensorsA fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

Page 16: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

OpticalOptical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint

Page 17: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.Fingerprints can be read from a distance.

Page 18: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

UltrasonicUltrasonic sensors make use of the principles of medical ultrasonography in order to create visual images of the fingerprint. Unlike optical imaging, ultrasonic sensors use very high frequency sound waves to penetrate the epidermal layer of skin. The sound waves are generated using piezoelectric transducers and reflected energy is also measured using piezoelectric materials. Since the dermal skin layer exhibits the same characteristic pattern of the fingerprint, the reflected wave measurements can be used to form an image of the fingerprint. This eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.

Page 19: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

CapacitanceCapacitance sensors use principles associated with capacitance in order to form fingerprint images. In this method of imaging, the sensor array pixels each act as one plate of a parallel-plate capacitor, the dermal layer (which is electrically conductive) acts as the other plate, and the non-conductive epidermal layer acts as a dielectric.

Page 20: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Passive capacitanceA passive capacitance sensor use the principle outlined above to form an image of the fingerprint patterns on the dermal layer of skin. Each sensor pixel is used to measure the capacitance at that point of the array. The capacitance varies between the ridges and valleys of the fingerprint due to the fact that the volume between the dermal layer and sensing element in valleys contains an air gap. The dielectric constant of the epidermis and the area of the sensing element are known values. The measured capacitance values are then used to distinguish between fingerprint ridges and valleys.

Page 21: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Active capacitanceActive capacitance sensors use a charging cycle to apply a voltage to the skin before measurement takes place. The application of voltage charges the effective capacitor. The electric field between the finger and sensor follows the pattern of the ridges in the dermal skin layer. On the discharge cycle, the voltage across the dermal layer and sensing element is compared against a reference voltage in order to calculate the capacitance. The distance values are then calculated mathematically, and used to form an image of the fingerprint.[7] Active capacitance sensors measure the ridge patterns of the dermal layer like the ultrasonic method. Again, this eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.

Page 22: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

AlgorithmsMatching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compared

Page 23: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Pattern-based (or image-based) algorithms

Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images can be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.

Page 24: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

THE PROCESS OF FINGERPRINT IDENTIFICATION

Fingerprints Image Capturing: This is done with the aid of a fingerprint scanner.

Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints. The digital image obtained by such scanning is called a finger image. In some texts, the terms fingerprinting and fingerprint are used, but technically, these terms refer to traditional ink-and-paper processes and images

Page 25: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 26: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 27: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 28: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Pre-processing of Fingerprints Image:

Page 29: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 30: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

•Feature Extraction;

Page 31: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Feature Matching;

Page 32: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 33: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

APPLICATION OF FINGERPRINTS IDENTIFICATION

•Security (Access Doors used in Military, Banks, Schools, Hospitals, Government Agencies, Individuals eg. Computers etc)•Banks (Access into Money Safe Room, Electronic Safe etc)•Biometrics (For Personal Data Storage & Identification)•Process Controls (Human Interface Machines HMI)

Page 34: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

BENEFITS OF FINGERPRINTS IDENTICATION

AdvantagesFingerprint identification has a number of advantages which make it a popular method of identification in settings ranging from police stations to secured facilities. This method of identification is accomplished by comparing fingerprints from someone against a database of known fingerprints. If the sample fingerprints match fingerprints in the database, it is considered a positive match. It is important to note that many identification systems which use fingerprints go for a statistically significant match; rather than matching the whole fingerprint, they look for key markers which can be used for comparison.

Page 35: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

One big advantage of fingerprint identification is that it is very well accepted in the legal community, among law enforcement, and the general public. It has a long history in forensic science, complete with numerous studies which back up the use of fingerprints for identification. This venerable history gives it weight and credence which are not available to newer identification systems. In addition, fingerprint identification is widely perceived as highly accurate and very reliable, since the statistical chance of two people on Earth having identical fingerprints is very low.

Page 36: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

The accuracy factor is important, as mistaken identity is hard to do when fingerprints are collected and studied properly. However, this can also be a pitfall; because people rely so heavily on fingerprint identification, if fingerprint evidence is not collected, stored, or handled properly it may result in a false identification which people will believe is valid because they view fingerprinting as highly reliable.

Page 37: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Fingerprint identification can also be accomplished with an automated system, which reduces the amount of human work required to make a positive match. This can also increase security; if an automated system controls access to a site with fingerprint identification, for example, it's impossible to bribe or trick the system to get in, as might be a problem with a human.

Page 38: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

Fingerprints also tend to remain consistent throughout life, unless someone experiences an accident or works in an industry with caustic or hot materials which damage fingerprints. This can be extremely useful in some settings. For example, parents who fingerprint their children and put the fingerprints on file can be assured that if their children are kidnapped and later identified, the childhood fingerprints can be used to make a positive match even if the children have matured. This consistency, however, can be another problem; if people do experience changes to their fingerprints, they may find it difficult to verify their identity.

Page 39: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 40: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION
Page 41: NIGERIAN INSTITUTE OF ELECTRICAL & ELECTRONICS ENGINEERS (NIEEE), PORT HARCOURT BRANCH TECHNICAL PRESENTATION

REFERENCES:•Fingerprint Recognitionn from Wikipedia, the free encyclopedia, Last modified June 2015; 8:26AM•Fingerprints preprocessing Image viewer, google search, the free Wikipedia•Fingerprints Feature extraction & matching image by the free Wikipedia, google sourcer, last modified June 2015, 7:28pm