0% found this document useful (0 votes)
189 views14 pages

Fingerprint Authentication: Name - Gaurav Singh Shekhawat ROLL NO. - 18EEBCS022

The document discusses fingerprint authentication and recognition. It provides an introduction to biometrics and defines fingerprint authentication as a method that verifies a person's identity based on their unique fingerprints. It then describes the key components of a fingerprint recognition system, including advantages like security and ease of use, as well as disadvantages such as possible system failures or exclusions of certain populations. Finally, it outlines various performance metrics used to evaluate biometric systems such as false match and false non-match rates.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views14 pages

Fingerprint Authentication: Name - Gaurav Singh Shekhawat ROLL NO. - 18EEBCS022

The document discusses fingerprint authentication and recognition. It provides an introduction to biometrics and defines fingerprint authentication as a method that verifies a person's identity based on their unique fingerprints. It then describes the key components of a fingerprint recognition system, including advantages like security and ease of use, as well as disadvantages such as possible system failures or exclusions of certain populations. Finally, it outlines various performance metrics used to evaluate biometric systems such as false match and false non-match rates.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

FINGERPRINT AUTHENTICATION

NAME – GAURAV SINGH SHEKHAWAT

ROLL NO. – 18EEBCS022


SUPERVISOR
MR RANU LAL CHOUHAN DESIGNATION

DEPARTMENT OF CSE

SEMINAR COORDINATOR

DR. RITURAJ SONI ASSISTANT PROFESSOR

DEPARTMENT OF CSE

31.12.2021
OUTLINE
INTRODUCTION TO
BIOMETRICS

W H AT I S F I N G E R P R I N T
A U T H E N T I C AT I O N

FINGERPRINT
R E C O G N I S AT I O N S Y S T E M

A D V A N TA G E S

D I S A D V A N TA G E S

CLOSING

2
INTRODUCTION
BIOMETRICS

Biometrics are body measurements and


calculations related to human characteristics.
Biometric authentication (or realistic
authentication) is used in computer science as a
form of identification and access control. It is also
used to identify individuals in groups that are
under surveillance.

3
S
C
I

WHAT IS FINGERPRINT
R
T
E

AUTHENTICATION?
M
O
I
B

Fingerprint authentication, which is also sometimes referred


to as fingerprint recognition, is a method which verifies a
person’s identity based on his or her fingerprints. Every
human being has unique fingerprints, so it is possible to
create an automated identification program using
this biometric. Of course, in order to be able to identify
someone based on his or her fingerprints, he or she must have
provided fingerprints at an earlier point in time. Therefore,
fingerprint authentication systems rely on a database
containing scans of fingerprints and the identities to which
they are connected

4
FINGERPRINT AUTHENTICATION
SYSTEM

5
S
C
I

FINGERPRINT RECOGNITION
R
T
E

SYSTEM
M
O
I
B

Fingerprint Recognition System is a Bio-metric


Recognition System that recognizes a person by his
Fingerprint. This system is used for identification and
verification purpose. The user whose impression is to
be identified or verified; his/her Fingerprint is
registered onto the Fingerprint Scanner by placing
fingertip on the scanner. Fingerprint is the impression
of Fingertip and the scanner produces digital
representation of the same and then it is compared
with the Database template and thus the user is
identified and verified.

6
ADAPTIVE BIOMETRIC SYSTEMS

ADAPTIVE BIOMETRIC SYSTEMS AIM TO AUTO-UPDATE THE TEMPLATES OR MODEL TO THE


INTRA-CLASS VARIATION OF THE OPERATIONAL DATA.THE TWO-FOLD ADVANTAGES OF
THESE SYSTEMS ARE SOLVING THE PROBLEM OF LIMITED TRAINING DATA AND TRACKING
THE TEMPORAL VARIATIONS OF THE INPUT DATA THROUGH ADAPTATION. RECENTLY,
ADAPTIVE BIOMETRICS HAVE RECEIVED A SIGNIFICANT ATTENTION FROM THE RESEARCH
COMMUNITY. THIS RESEARCH DIRECTION IS EXPECTED TO GAIN MOMENTUM BECAUSE OF
THEIR KEY PROMULGATED ADVANTAGES. FIRST, WITH AN ADAPTIVE BIOMETRIC SYSTEM,
ONE NO LONGER NEEDS TO COLLECT A LARGE NUMBER OF BIOMETRIC SAMPLES DURING THE
ENROLLMENT PROCESS. SECOND, IT IS NO LONGER NECESSARY TO ENROLL AGAIN OR
RETRAIN THE SYSTEM FROM SCRATCH IN ORDER TO COPE WITH THE CHANGING
ENVIRONMENT. THIS CONVENIENCE CAN SIGNIFICANTLY REDUCE THE COST OF
MAINTAINING A BIOMETRIC SYSTEM. DESPITE THESE ADVANTAGES, THERE ARE SEVERAL
OPEN ISSUES INVOLVED WITH THESE SYSTEMS. FOR MIS-CLASSIFICATION ERROR (FALSE
ACCEPTANCE) BY THE BIOMETRIC SYSTEM, CAUSE ADAPTATION USING IMPOSTOR SAMPLE.
HOWEVER, CONTINUOUS RESEARCH EFFORTS ARE DIRECTED TO RESOLVE THE OPEN ISSUES
ASSOCIATED TO THE FIELD OF ADAPTIVE BIOMETRICS. MORE INFORMATION ABOUT
ADAPTIVE BIOMETRIC SYSTEMS CAN BE FOUND IN THE CRITICAL REVIEW BY RATTANI  ET AL.

7
VERIFICATION VS IDENTICATION

8
ADVANTAGE
S
C
I

S
R
T
E
M
• Security – security-wise, it is a vast improvement on passwords and identity cards.
O
Fingerprints are much harder to fake, they also change very little over a lifetime, so the
I
B
data remains current for much longer than photos and passwords.  

• Ease of use – for the user they are simple and easy to use. No more struggling to
remember your last password or being locked out due to leaving your photo ID at
home. Your fingerprints are always with you.  

• Accountability – using fingerprint recognition also provides a higher level of


accountability at work. Biometric proof you have been present when a situation or
incident has occurred is hard to refute and can be used as evidence if required.  

• Cost effective – from a technology management perspective, fingerprint recognition is


now a cost-effective security solution. Small hand-held scanners are easy to set up and
benefit from a high level of accuracy.   
9
S

DISADVANTAG
C
I
R
T
E
ES
• System failures – scanners are subject to the same technical failures and limitations as all
M
O
other electronic identification systems such as power outages, errors and
I
B
environmental factors.  

• Cost – it is true that fingerprint recognition systems are more cost effective than ever, but
for smaller organisations the cost of implementation and maintenance can still be a
barrier to implementation. This disadvantage is lessening as devices become more cost
effective and affordable. 

• Exclusions – while fingerprints remain relatively stable over a person’s lifetime there are


sections of the population that will be excluded from using the system. For example,
older people with a history of manual work may struggle to register worn prints into a
system or people who have suffered the loss of fingers or hands would be excluded. 

10
S

PERFORMANC
C
I
R
T


E
E
The discriminating powers of all biometric technologies depend on the amount
M
O
of entropy they are able to encode and use in matching.The following are used as
I
performance metrics for biometric systems:
B

• False match rate (FMR, also called FAR = False Accept Rate): the probability that the
system incorrectly matches the input pattern to a non-matching template in the database. It
measures the percent of invalid inputs that are incorrectly accepted. In case of similarity
scale, if the person is an imposter in reality, but the matching score is higher than the
threshold, then he is treated as genuine. This increases the FMR, which thus also depends
upon the threshold value.[6]

• False non-match rate (FNMR, also called FRR = False Reject Rate): the probability that the
system fails to detect a match between the input pattern and a matching template in the
database. It measures the percent of valid inputs that are incorrectly rejected.

• Failure to capture rate (FTC): Within automatic systems, the probability that the system fails
to detect a biometric input when presented correctly.

• Template capacity: the maximum number of sets of data that can be stored in the system. 11
S

CONTINUE…..
C
I
R
T
E
• Receiver operating characteristic or relative operating characteristic (ROC): The ROC
M
O
plot is a visual characterization of the trade-off between the FMR and the FNMR. In
I
B
general, the matching algorithm performs a decision based on a threshold that
determines how close to a template the input needs to be for it to be considered a match.
If the threshold is reduced, there will be fewer false non-matches but more false accepts.
Conversely, a higher threshold will reduce the FMR but increase the FNMR. A common
variation is the Detection error trade-off (DET), which is obtained using normal deviation
scales on both axes. This more linear graph illuminates the differences for higher
performances (rarer errors).

• Equal error rate or crossover error rate (EER or CER): the rate at which both acceptance
and rejection errors are equal. The value of the EER can be easily obtained from the
ROC curve. The EER is a quick way to compare the accuracy of devices with different
ROC curves. In general, the device with the lowest EER is the most accurate.

• Failure to enroll rate (FTE or FER): the rate at which attempts to create a template from
an input is unsuccessful. This is most commonly caused by low-quality inputs. 12
SUMMARY
• The implemented fingerprint extraction algorithm is accurate
and fast.

• The algorithm also identifies the unrecoverable corrupted


regions in the fingerprint and removes them from further
processing.

• This is a very important property because such unrecoverable


regions do appear in some of the corrupted fingerprint images
and they are extremely harmful to minutiae extraction.

13
THANK YOU

[email protected]
G AU R AV S I N G H 6398367588
S H E K H A W AT

ENGINEERING COLLEGE BIKANER

You might also like