U3.6 Fingerprint

Description

Masters Degree Network Security Mind Map on U3.6 Fingerprint, created by Craig Parker on 23/11/2013.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago
Craig Parker
Created by Craig Parker over 10 years ago
66
0

Resource summary

U3.6 Fingerprint
  1. Uses ridges on the skin, Ridges = lines. Valleys = Spaces between
    1. Major and Minor features
      1. 3 Major Features
        1. Arch, Loop, Whorl
          1. Major features used to classify fingerprints so they are more easily searchable
            1. Only look in or compare to Arch records etc.
        2. Minor features = Minutiae
          1. Minutiae are the distinguishing features
            1. Ridge endings and burifications in fingerprint pattern
              1. Most algorithms are based on munutiae
          2. Fingerprint processing involves several steps
            1. Image is captured by sensor
              1. noise is reduced IE:dirt, dryness, scars. definition against the valleys is enhanced
                1. Image is binarised = reduced to black or white
                  1. Thinning is performed = reduction of ridges down to a single pixel to help detect ridge endings and burifications in the pattern
                    1. Ridges are traced,endings are found at termination points of the ridges and burifications are found at the junction of lines
                      1. Extracted features consists of the sequence of bits representing for each minutuae, type of minutiae (ridge or burification) its location and direction
                        1. Matching is done by comparing extracted features against the reference template
                          1. Like comparing the shape of 2 graphs, if the graphs are similar enough according to the tolerance threshold the result is a match
                            1. Some FP recognition can be done without the minutiae instead using pattern matching
            2. Advantages
              1. Mature technology, lots of development, investment and research. Takes up 2/3 of Biometric Market
                1. Easy to use, non intrusive
                  1. High levels of accuracy, low error rates, low FMR, low FNMR
                    1. Long term stability of FP over a lifetime
                      1. Ability to enrol multiple fingers
                      2. Disadvantages
                        1. Inability to Enrol some users IE elderly, manual workers, thin fingerprints (Asian)
                          1. Accuracy affected by skin condition
                            1. Association with forensic applications
                              1. Privacy issues with users
                            2. Sensors
                              1. Optical
                                1. Oldest / most mature
                                  1. Finger placed on glass and Image taken using optical device (camera)
                                    1. Not much further development
                                2. Ultrasound
                                  1. Uses ultrasound for capturing images
                                    1. Un affected by dirt grease moisture etc
                                      1. Better than optical but can only operate between 10c -32 c. Mainly used indoors
                                  2. Chip Based
                                    1. Capacitive
                                      1. Most widely used chip based sensor
                                      2. E-field
                                        1. reads sub surface of skin, not affected by skin surface issues
                                        2. Direct Optical Scanning
                                          1. Robust fibre optic sensor
                                          2. Thermal
                                            1. Uses the fingers natural heat, no optic or light source required
                                        Show full summary Hide full summary

                                        Similar

                                        CCNA Security 210-260 IINS - Exam 1
                                        Mike M
                                        CCNA Security 210-260 IINS - Exam 2
                                        Mike M
                                        SY0-401 Part 1 (50 questions)
                                        desideri
                                        CCNA Security 210-260 IINS - Exam 1
                                        Ricardo Nuñez
                                        CCNA Security 210-260 IINS - Exam 3
                                        irvin pastora
                                        1.3 Network and Security Components
                                        DJ Perrone
                                        U1. OSI 7 Layer Reference Model
                                        Craig Parker
                                        Types of Attacks
                                        River L.
                                        CCNA Security 210-260 IINS - Exam 1
                                        irvin pastora
                                        Network Security Vocabulary
                                        Shantal K Green
                                        CCNA Security 210-260 IINS - Exam 2
                                        irvin pastora