Title: Introduction to Biometrics
1Introduction to Biometrics
- Dr. Bhavani Thuraisingham
- The University of Texas at Dallas
- Lecture 7
- Biometric Technologies Finger Scan
- September 14, 2005
2Outline
- Introduction
- Basic Terms
- Technologies
- Finger Scan Process
- Feature Extraction
- Classification
- Accuracy and Integrity
- Biometric Middleware
- Strengths and Weaknesses
- Biometric vs. Non Biometric Fingerprinting
- Research Directions
- Project Related Information
3References
- Course Text Book, Chapter 4
- http//www.biometricsinfo.org/fingerprintrecogniti
on.htm
4Introduction
- What is Finger-Print Scanning
- Fingerprint scanning is the acquisition and
recognition of a persons fingerprint
characteristics for identification purposes. - This allows the recognition of a person through
quantifiable physiological characteristics that
verify the identity of an individual. - Methods
- There are basically two different types of
finger-scanning technology that make this
possible. - One is an optical method, which starts with a
visual image of a finger. - The other uses a semiconductor-generated electric
field to image a finger.
5Introduction (Concluded)
- There are a range of ways to identify
fingerprints. - traditional police methods of matching minutiae
- straight pattern matching
- Ultrasonics
- Fingerprint revenues are projected to grow from
144.2m in 2002 to 1,229.8m in 2007. Fingerprint
revenues are expected to comprise approximately
30 of the entire biometric technologies - Applications
- to access networks and PCs, enter restricted
areas, and to authorize transactions. - Deployed in many locations (discussed in text
book)
6Basic Terms
- Components
- Image acquisition systems, image processing
components, template generation and matching
components, storage components - Surface on which finger is placed is Platen or
Scanner - Finger scan module
- consists of platen printed circuit board
standard connector that transmits digitized
information to a peripheral or standalone device
7Example Technologies
- Optical Technology
- Oldest technology
- Camera registers the image of the fingerprint
against a coated glass or plastic platen - Black, gray and white lines
- Silicon Technology
- Silicon chip embedded in a platen
- High image quality
- Commercially available since around 1998
- Ultrasound Technology
- Transmit acoustic waves to the finger and
generating images
8Process
- Image Acquisition
- Measured in terms of dots per inch
- Center of the finger print must be placed on the
platen - Need appropriate size for platen
- Image Processing
- Eliminate gray areas from image
- Convent gray pixels to black and white pixels
- Location of Distinctive Characteristics
- Fingerprints consists of ridges and valleys
- Swirls, loops, arches, deltas
- Ridges and valleys are characterized by
irregularities called minutiae - A finger scan image can produce about 15-50
minutiae
9Process (Concluded)
- Template Creation
- Vendors use proprietary algorithms
- Depends on the following
- Location and angle of a minutiae point
- Distance and position of minutiae relative to the
core - Type and quality of the minutiae
- Need to eliminate sweat, scars, dirt, etc.
- Template matching
- May depend on the number of minutiae matched
10Methods of Finger PrintingMinutiae vs. Pattern
matching
- Minutiae
- Most of the finger-scan technologies are based on
minutiae - Pattern Matching
- Feature extraction and template generation based
on series of ridges as opposed to discrete points - Advantage Minutiae points affected by wear and
tear - Disadvantage Sensitive to proper placement of
finger large storage for templates - Correlation
- Michigan State University of developing
correlation based methods
11Feature Extraction
- The human fingerprint is comprised of various
types of ridge patterns - left loop, right loop, arch, whirl, and tented
arch. - Loops make up nearly 2/3 of all fingerprints
- whirls are nearly 1/3
- 5-10 are arches.
- Figure 1
- Source Book, URL
12Feature Extraction (Continued)
- Minutiae (Figure 1), the discontinuities that
interrupt the otherwise smooth flow of ridges,
are the basis for most fingerprint
authentication. - Many types of minutiae exist, including dots
(very small ridges), islands (ridges slightly
longer than dots), ponds or lakes - - - - - The core is the inner point, normally in the
middle of the print, around which swirls, loops,
or arches center. - Deltas are the points, normally at the lower left
and right hand of the fingerprint, around which a
triangular series of ridges center. - The ridges are also marked by pores, which appear
at steady intervals.
13Feature Extraction (Continued)
- Once a high-quality image is captured, there are
a several steps required to convert its
distinctive features into a compact template. - This process, known as feature extraction, is at
the core of fingerprint technology. - fingerprint vendor has a proprietary feature
extraction mechanism - The image must then be converted to a usable
format. - If the image is grayscale, areas lighter than a
particular threshold are discarded, and those
darker are made black - The ridges are then thinned from 5-8 pixels in
width down to one pixel, for precise location of
endings and bifurcations.
14Feature Extraction (Continued)
- Minutiae localization begins with this processed
image. - At this point, even a very precise image will
have distortions and false minutiae that need to
be filtered out - an algorithm may search the image and eliminate
one of two adjacent minutiae, as minutiae are
very rarely adjacent. - Anomalies caused by scars, sweat, or dirt appear
as false minutiae, and algorithms locate any
points or patterns that do not make sense - A large percentage of would-be minutiae are
discarded in this process.
15Feature Extraction (Concluded)
- The point at which a ridge ends, and the point
where a bifurcation begins, are the most
rudimentary minutiae, and are used in most
applications. - There is variance in how exactly to situate a
minutia point - whether to place it directly on the end of the
ridge, one pixel away from the ending, or one
pixel within the ridge ending - Once the point has been situated, its location is
commonly indicated by the distance from the core,
with the core serving as the 0,0 on an X,Y-axis. - Some vendors classify minutia by type and
quality. The advantage of this is that searches
can be quicker
16Fingerprint Classification
- Large volumes of fingerprints are collected and
stored everyday in a wide range of applications
including forensics, access control, and driver
license registration. - An automatic recognition of people based on
fingerprints requires that the input fingerprint
be matched with a large number of fingerprints in
a database (FBI database contains approximately
70 million fingerprints). - To reduce the search time and computational
complexity, it is desirable to classify these
fingerprints in an accurate and consistent manner
so that the input fingerprint is required to be
matched only with a subset of the fingerprints in
the database.
17Fingerprint Classification (Continued)
- Fingerprint classification is a technique to
assign a fingerprint into one of the several
pre-specified types already established in the
literature which can provide an indexing
mechanism. - Fingerprint classification can be viewed as a
coarse level matching of the fingerprints. - An input fingerprint is first matched at a coarse
level to one of the pre-specified types and then,
at a finer level, it is compared to the subset of
the database containing that type of fingerprints
only.
18Fingerprint Classification (Concluded)
- Michigan State University has developed an
algorithm to classify fingerprints into five
classes, - whirl, right loop, left loop, arch, and tented
arch. - The algorithm separates the number of ridges
present in four directions (0 degree, 45 degree,
90 degree, and 135 degree) by filtering the
central part of a fingerprint with a bank of
Gabor filters. - This information is quantized to generate a
FingerCode which is used for classification. - Classification is based on a two-stage classifier
which uses a K-nearest neighbor classifier in the
first stage and a set of neural networks in the
second stage. - The classifier is tested on 4,000 images in the
NIST-4 database with about 90 accuracy
19Image Enhancement
- A critical step in automatic fingerprint matching
is to automatically and reliably extract minutiae
from the input fingerprint images. - However, the performance of a minutiae extraction
algorithm relies heavily on the quality of the
input fingerprint images. - In order to ensure that the performance of an
automatic fingerprint identification/verification
system will be robust with respect to the quality
of the fingerprint images, it is essential to
incorporate a fingerprint enhancement algorithm
in the minutiae extraction module. - Michigan State University has developed
algorithms for enhancement
20Image Enhancement (Concluded)
Source URL
21Accuracy and Integrity
- In most cases, false negatives (a failure to
recognize a legitimate user) are more likely than
false positives. - Overcoming a fingerprint system by presenting it
with a "false or fake" fingerprint will be
difficult - Sensors on the market use a variety of means to
circumvent the problems. - Problem Someone may attempt to use latent print
residue on the sensor just after a legitimate
user accesses the system Presenting a finger to
the system that is no longer connected to its
owner. - Solutions Sensors attempt to determine whether a
finger is live, and not made of latex Detectors
for temperature, blood-oxygen level, pulse, blood
flow, humidity, or skin conductivity would be
integrated.
22Biometric Middleware
- Enables various biometric technologies
- Allows match / no-match decisions made by core
technologies to provide authentication to various
applications - Similar to the concept of middleware in systems
- Integrates applications and resources
- Flexible middleware
- Solutions adapted for applications
23Biometric Middleware (Concluded)
Immigration Entry
Building Entry
PC Entry
Middleware Applications
Middleware
Middleware Services
Iris-scan
Face-scan
Finger-scan
24Strengths and Weaknesses
- Strengths
- Proven technology and high level of accuracy
- Many deployments
- Easy to use
- Can enroll multiple fingers
- Weaknesses
- Some users do not have clear fingerprints
- Over time image quality deteriorates
- Privacy concerns
25Biometric vs. Non Biometric Fingerprinting
- Fingerprinting, is the acquisition and storage of
the image of the fingerprint. - Two types of systems
- Forensic (AFIS Automatic Fingerprint
Identification System) - Biometric system
- AFIS stores images of fingerprints need large
amount if storage. - Biometric systems store particular data about the
fingerprint in a much smaller template. - After the data is extracted, the fingerprint is
not stored - The full fingerprint cannot be reconstructed from
the fingerprint template. - Used to log on to PC
26Biometric vs. Non Biometric Fingerprinting
(Concluded)
- Response time - AFIS systems may take hours to
match a candidate, while fingerprint systems
respond within seconds - Cost - an AFIS capture device is very expensive.
A PC peripheral fingerprint device is much
cheaper - Accuracy - an AFIS system might return the top 5
candidates with the intent of locating or
questioning the top suspects. Fingerprint systems
are designed to return a single yes/no answer. - Scale AFIS systems scalable to thousands and
millions of users. Fingerprint systems are and do
not require significant processing power. - Capture AFIS systems are designed to use the
entire fingerprint. Fingerprint systems use only
the center of the fingerprint. - Storage AFIS systems need large storage.
Fingerprint systems do not - Infrastructure AFIS systems require a backend
infrastructure for storage, matching, and
duplicate resolution. Fingerprint systems rely on
a PC or a peripheral device for processing and
storage.
27Some Research Directions
- New Biometric Technologies
- Less False Positives and False Negatives
- Better Performance
- Secure Biometrics
- Privacy
- Societal Impact
28Summary
- Most popular biometric technology
- Fairly high accuracy
- Market expected to grow a great deal
- Feature extraction is the key mechanism
- Minutiae based and non Minutiae based methods for
Biometric matching - Differences between systems used for forensic
applications and biometric systems
29Some Project Related Information
- Dr. Bhavani Thuraisingham
- The University of Texas at Dallas
- Graduate Student Pallabi Parveen
- September 14, 2005
30TA Office Hours
- Nathalie Tsybulnik
- 7-10pm Monday in ECSS 3.403
- Tuesday from 10.00-11.00am she will usually be
in the general lab downstairs.
31Some Tools for Project
- http//java.sun.com/products/java-media/jai/forDev
elopers/jaifaq.htmlwhat - Java Advanced Imaging Toolkit (product of Sun
Microsystems) - Can Download
- http//www.mathworks.com/products/image/
- Matlab Image Processing
- Matlab available in some of our labs
- Cannot download
- CMU Voice Recognition Open Source System Sphinx
- http//cmusphinx.sourceforge.net/html/cmusphinx.ph
p
32Face Recognition
- Given at CMU, involves face recognition using
neural networks. - 32 images of each of 20 students in the class
were taken with a variety of head positions and
facial expressions. - These images were then used to train and test
neural networks to recognize individual people,
and to recognize different face - Source
- http//www.cs.cmu.edu/afs/cs.cmu.edu/user/avrim/ww
w/ML94/face_homework.html
33Finger Print Recognition
- Fingerprint Minutiae from Latent and Matching
Tenprint Images - NIST Special Database 27 contains latent
fingerprints from crime scenes and their matching
rolled fingerprint mates. - Source http//www.nist.gov/srd/nistsd27.htm
- http//www.itl.nist.gov/iad/894.03/databases/defs/
dbases.htmlfinglist\
34Fingerprint Research
- NIST 8-Bit Gray Scale Images of Fingerprint Image
Groups (FIGS) - 2000 8-bit gray scale fingerprint image pairs
including classifications - 400 fingerprint pairs from each of the five
classifications - Arch, Left and Right Loops,
Tented Arch, Whirl) - Source http//www.nist.gov/srd/nistsd4.htm
35Iris Recognition
- CASIA Iris Image Database( ver 1.0) includes 756
iris images from 108 eyes (hence 108 classes). - For each eye, 7 images are captured in two
sessions, where three samples are collected in
the first session and four in the second session. - Source http//www.sinobiometrics.com/casia20iris
.htm
36Keystroke Dynamics as a Biometric for
Authentication
- An emerging non-static biometric technique that
aims to identify users based on analyzing
habitual rhythm patterns in the way they type
Fabian Monrose et al.. - Source http//www.cs.jhu.edu/fabian/papers/fgcs.
pdf