fingerprint technology

37
Fingerprint Technology For Information Security Joy Dutta Exam Roll : 97/CSM/130033 M.Tech in CSE 2013 -15 Calcutta University

Upload: joy-dutta

Post on 19-Jul-2015

133 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Fingerprint Technology

Fingerprint Technology For Information Security

Joy Dutta

Exam Roll : 97/CSM/130033

M.Tech in CSE

2013 -15

Calcutta University

Page 2: Fingerprint Technology

Protecting Your PC, Privacy and Self“The minute you dial in to your Internet service provider or

connect to a DSL or cable modem, you are casting your computer adrift in a sea of millions of other computers – all of which are sharing the world's largest computer network, the Internet. Most of those computers are cooperative and well behaved, but some are downright nasty. Only you can make sure your computer is ready for the experience.”

Daniel Appleman, Always Use Protection, A Teen's Guide to Safe Computing

2

Page 3: Fingerprint Technology

Agenda

♦ What information security?♦ Why Biometrics?♦ Fingerprint Patterns♦ Advanced Minutiae Based Algorithm♦ Identification vs. Authentication♦ Security♦ Applications♦ Versus other Biometric Technologies♦ Industry

3

Page 4: Fingerprint Technology

What is Information Security?

♦ The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction

♦ Process by which digital information assets are protected

4

Page 5: Fingerprint Technology

Understanding the Importance of Information Security

♦ Prevents data theft♦ Avoids legal consequences of not securing

information♦ Maintains productivity♦ Foils cyber terrorism♦ Thwarts identity theft

5

Page 6: Fingerprint Technology

Latest Trends - Identity Theft

♦ Crime of the 21st century♦ Involves using someone’s personal

information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating

6

Page 7: Fingerprint Technology

Why Biometrics?

Page 8: Fingerprint Technology

Why Biometrics?

Know Password, PIN

Have Key, Smart Card

Are Fingerprint, Face, Iris

♦ Biometrics is a security solution based on something you know, have, and are:

8

Page 9: Fingerprint Technology

Why Biometrics?

♦ Passwords are not reliable.– Too many – Can be stolen– Forgotten

♦ Protect Sensitive Information– Banking– Medical

9

Page 10: Fingerprint Technology

Why Biometrics?

♦ Has been used since 14th century in China– Reliable and trusted

♦ Will never leave at home♦ Fingerprints are unique

– Everyone is born with one

♦ 80% of public has biometric recorded in China

♦ 50% of public in India is now Biometric Recorded.

10

Page 11: Fingerprint Technology

Fingerprint Patterns

Page 12: Fingerprint Technology

Fingerprints

♦ A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.

♦ Their pattern is permanent and unchangeable on each finger during the whole life time of an individual.

♦ The probability that fingerprints of two individual are alike is about 1 in 1.9×1015.

♦ According to FBI the accuracy and reliability of fingerprint scans are correct 99.8% of the time.

12

Page 13: Fingerprint Technology

Fingerprint Patterns Arch- The ridges enter from one side of the finger, rise in the

centre forming an arc, and then exit the other side of the finger.

Loop- The ridges enter from one side of a finger, form a curve, and then exit on that same side.

Whorl- Ridges form circularly around a central point on the finger.

Arch Loop Whorl

13

Page 14: Fingerprint Technology

The human population has fingerprints in the following percentages:

Loop – 65%Whorl -- 30%Arch -- 5%

Fingerprint Patterns

14

Page 15: Fingerprint Technology

Fingerprint Patterns

♦ Minutiae– Crossover: two ridges cross

each other

– Core: center

– Bifurcation: ridge separates

– Ridge ending: end point

– Island: small ridge b/w 2 spaces

– Delta: space between ridges

– Pore: human pore

15

Page 16: Fingerprint Technology

Fingerprint Patterns

♦ Two main technologies used to capture image of the fingerprint– Optical – use light refracted through a prism

– Capacitive-based – detect voltage changes in skin between ridges and valleys

16

Page 17: Fingerprint Technology

Fingerprint matching techniques

Techniques available for Fingerprint matching are :

1. minutiae-based .

2. correlation based.

Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.

The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.

17

Page 18: Fingerprint Technology

Advanced Minutiae Based Algorithm (AMBA)

Page 19: Fingerprint Technology

Advanced Minutiae Based Algo

♦ Advanced Minutiae Based Algorithm– Developed by Suprema Solutions– Two processes

• Feature Extractor• Matcher

19

Page 20: Fingerprint Technology

Advanced Minutiae Based Algorithm

20

Page 21: Fingerprint Technology

Advanced Minutiae Based Algo♦ Feature Extractor

– Core of fingerprint technology– Capture and enhance image– Remove noise by using noise reduction algorithm– Extract Minutiae

21

Page 22: Fingerprint Technology

Advanced Minutiae Based Algo♦ Feature Extractor

– Most frequently used minutiae in applications

• Points of bifurcation

• Ridge endings

22

Page 23: Fingerprint Technology

Advanced Minutiae Based Algo

♦ Feature Extractor – Minutiae Coordinate and Angle are calculated– Core is used as center of reference (0,0)

23

Page 24: Fingerprint Technology

Advanced Minutiae Based Algo♦ Matcher

– Used to match fingerprint– Trade-off between speed and performance– Group minutiae and categorize by type

• Large number of certain type can result in faster searches

24

Page 25: Fingerprint Technology

Identification vs. Authentication

♦ Identification – Who are you?– 1 : N comparison– Slower– Scan all templates in database

♦ Authentication – Are you John Smith?– 1 : 1 comparison– Faster– Scan one template

25

Page 26: Fingerprint Technology

Security

♦ Accuracy– 97% will return correct results– 100% deny intruders

♦ Image– Minutiae is retrieved and template created

• Encrypted data

– Image is discarded• Cannot reconstruct the fingerprint from data

26

Page 27: Fingerprint Technology

Security

♦ Several sensors to detect fake fingerprints– Cannot steal from previous user

• Latent print residue (will be ignored)

– Cannot use cut off finger• Temperature• Pulse• Heartbeat sensors

• Blood flow

27

Page 28: Fingerprint Technology

Advantage of Fingerprint:

♦ Very high accuracy.♦ Is the most economical biometric PC user authentication

technique.♦ Easy to use.♦ Small storage space required for the biometric template,

reducing the size of the database memory required♦ It is standardized.

28

Page 29: Fingerprint Technology

Disadvantages of Fingerprint:

For some people it is very intrusive, because is still related to criminal identification.

It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).

29

Page 30: Fingerprint Technology

Applications

30

Page 31: Fingerprint Technology

Applications

31

Page 32: Fingerprint Technology

Versus other Biometric Technologies

Technology Accuracy Convenience Cost Size

Fingerprint 5 5 4 4

Voice 1 5 5 5

Face 2 3 4 3

Hand 3 3 2 2

Iris 5 2 3 3

1 (worst) – 5 (best)

32

Page 33: Fingerprint Technology

Versus other Biometric Technologies

33

Page 34: Fingerprint Technology

Industry♦ Hot market♦ Lots of $$$

34

Page 35: Fingerprint Technology

Conclusion♦ Want to protect information♦ Passwords are not reliable; forget♦ Fingerprints have been used for centuries♦ next generation of fingerprint recognition devices which are highly

reliable and accurate♦ Fingerprints are unique; can verify♦ Very accurate♦ a broad acceptance with the general public, law enforcement and the

forensic science community a broad acceptance with the general public, law enforcement and the forensic science community

♦ Lots of applications being developed♦ Hot market. Lots of $$$♦ Hence, they will continue to be used for human recognition, for

Information Security & new systems that require a reliable biometric. 35

Page 36: Fingerprint Technology

References♦ http://spie.org/x108321.xml♦ http://www.sans.org/reading-room/whitepapers/authentication/biometric-scanning-technologies-finger-facial-retinal-scanning-1177

36

Page 37: Fingerprint Technology

Thank You!!!