Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.
- 1 Background
- 2 Fingerprint sensors
- 3 Fingerprint recognition in mobile phones
- 4 Algorithms
- 5 Defeats
- 6 See also
- 7 Notes
- 8 References
- 9 External links
- 10 Further reading
The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.
The three basic patterns of fingerprint ridges are the arch, loop, and whorl:
- arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
- loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.
- whorl: Ridges form circularly around a central point on the finger.
Fingerprint processing has three primary functions: enrollment, searching and verification. Among these functions, enrollment which captures fingerprint image from the sensor plays an important role. A reason is that the way people put their fingerprints on a mirror to scan can affect to the result in the searching and verifying process. Regarding to verification function, there are several techniques to match fingerprints such as correlation-based matching, minutiae-based matching, ridge feature-based matching and minutiae-based algorithm. However, the most popular algorithm was minutiae based matching algorithm due to its efficiency and accuracy
The major minutia features of fingerprint ridges are ridge ending, bifurcation, and short ridge (or dot). The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical.
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. Many technologies have been used including optical, capacitive, RF, thermal, piezoresistive, ultrasonic, piezoelectric, MEMS. This is an overview of some of the more commonly used fingerprint sensor technologies.
Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.
Fingerprints can be read from a distance.
Ultrasonic sensors make use of the principles of medical ultrasonography in order to create visual images of the fingerprint. Unlike optical imaging, ultrasonic sensors use very high frequency sound waves to penetrate the epidermal layer of skin. The sound waves are generated using piezoelectric transducers and reflected energy is also measured using piezoelectric materials. Since the dermal skin layer exhibits the same characteristic pattern of the fingerprint, the reflected wave measurements can be used to form an image of the fingerprint. This eliminates the need for clean, undamaged epidermal skin and a clean sensing surface. LeEco became the first company to introduce this in Smartphone.
Capacitance sensors use principles associated with capacitance in order to form fingerprint images. In this method of imaging, the sensor array pixels each act as one plate of a parallel-plate capacitor, the dermal layer (which is electrically conductive) acts as the other plate, and the non-conductive epidermal layer acts as a dielectric.
The iPhone 6 uses a capacitance fingerprint sensor.
A passive capacitance sensor use the principle outlined above to form an image of the fingerprint patterns on the dermal layer of skin. Each sensor pixel is used to measure the capacitance at that point of the array. The capacitance varies between the ridges and valleys of the fingerprint due to the fact that the volume between the dermal layer and sensing element in valleys contains an air gap. The dielectric constant of the epidermis and the area of the sensing element are known values. The measured capacitance values are then used to distinguish between fingerprint ridges and valleys.
Active capacitance sensors use a charging cycle to apply a voltage to the skin before measurement takes place. The application of voltage charges the effective capacitor. The electric field between the finger and sensor follows the pattern of the ridges in the dermal skin layer. On the discharge cycle, the voltage across the dermal layer and sensing element is compared against a reference voltage in order to calculate the capacitance. The distance values are then calculated mathematically, and used to form an image of the fingerprint. Active capacitance sensors measure the ridge patterns of the dermal layer like the ultrasonic method. Again, this eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.
Fingerprint recognition in mobile phones
Two of the first smartphone manufacturers to integrate fingerprint recognition into their phones were Motorola with the Atrix 4G in 2011, and Apple with the iPhone 5S on September 10, 2013. One month after, HTC launched the One Max, which also included fingerprint recognition. In April 2014, Samsung released the Galaxy S5, which integrated a fingerprint sensor on the home button.
Since December 2015, cheaper smartphones with fingerprint recognition have been released, such as the $100 UMI Fair. Samsung also recently introduced fingerprint sensors to its mid-end A-series smartphones.
In September 25, 2015 with Iphone 6s, two years later after introduction its first fingerprint scanner in iPhone 5S, Apple introduced a new generation fingerprint scanner claiming faster response times. In August 2016 Oppo Claimed 0,22s response time in its Oppo F1s model.
Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compared.
Pre-processing helped enhancing the quality of an image by filtering and removing unnecessary noises. The minutiae based algorithm only worked effectively in 8-bit gray scale fingerprint image. A reason was that an 8-bit gray fingerprint image was a fundamental base to convert the image to 1-bit image with value 0 for ridges and value 1 for furrows. As a result, the ridges were highlighted with black color while the furrows were highlighted with white color. This process partly removed some noises in an image and helped enhance the edge detection. Furthermore, there are two more steps to improve the best quality for the input image: minutiae extraction and false minutiae removal. The minutiae extraction was carried out by applying ridge thinning algorithm which was to remove redundant pixels of ridges. As a result, the thinned ridges of the fingerprint image are marked with a unique ID so that further operation can be conducted. After the minutiae extraction step, the false minutiae removal was also necessary.The lack of the amount of ink and the cross link among the ridges could cause false minutiae that led to inaccuracy in fingerprint recognition process.
Pattern-based (or image-based) algorithms
Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images can be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.
In 2002 a Japanese cryptographer demonstrated how fingerprint recognition devices can be fooled 4 out of 5 times using a combination of low cunning, cheap kitchen supplies and a digital camera.
Taking latent fingerprints from a glass, which were enhanced with a super-glue fumes in the form of cyanoacrylate adhesive and photographed. An image tool were then used to improve the contrast and then printed onto a transparency sheet. The sheet were then used to expose a UV sensitive printed-circuit board and etched. The copper imprint were then used for a plastic finger mould and gelatine found in Gummy bears a fake finger could be made. Eleven commercially available fingerprint biometric systems took the fake finger as the real thing. Noted cryptographer Bruce Schneier said "The results are enough to scrap the systems completely, and to send the various fingerprint biometric companies packing,"
- ^ Jain, L.C. et al. (Eds.). 1999. Intelligent Biometric Techniques in Fingerprint and Face Recognition. Boca Raton, FL: CRC Press.
- ^ Langenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his or her parents in any discernable way?". Scientific American. Retrieved 28 August 2010.
- ^ Thornton, John (May 9, 2000). Latent Fingerprints, Setting Standards In The Comparison and Identification. 84th Annual Training Conference of the California State Division of IAI. Retrieved 30 August 2010.
- ^ Diaz, Raul (2007). "Biometrics: Security Vs Convenience". SecurityWorld Magazine. Retrieved 30 August 2010.
- ^ Validity and Acceptability of Results in Fingerprint Scanners (PDF).
- ^ Setlak, Dale. "Advances in Biometric Fingerprint Technology are Driving Rapid Adoption in Consumer Marketplace". AuthenTec. Retrieved 4 November 2010.
- ^ a US patent 7597250, issued 2009-10-06
- ^ Mazumdar, Subhra; Dhulipala, Venkata (2008). "Biometric Security Using Finger Print Recognition" (PDF). University of California, San Diego. p. 3. Retrieved 30 August 2010.
- ^ Minutia vs. Pattern Based Fingerprint Templates Identix Incorporated Issued March 26, 2003
- Wasserman, Philip (2005-12-26). "Solid-State Fingerprint Scanners - A Survey of Technologies" (PDF). Retrieved 2015-10-18.
- A Fingerprint Scanner That Can Capture Prints From 20 Feet Away June 25, 2012 Popular Science
- "About Touch ID security on iPhone and iPad". Retrieved 2015-10-18.
- List of All Fingerprint Scanner Enabled Smartphones
- "Gummi bears defeat fingerprint sensors". 2002-05-16. Retrieved 2016-04-12.