Biometric, Biometric security 
services, Biometric solutions, Biometric technology
Biometric fingerprint, 
Biometric companies, Biometric fingerprint, Biometric research

Biometric books, 
biometric tutorials, biometric india, biometric access, biometric contact pune

Biometric, Biometric security services, Biometric solutions, Biometric technology, Biometric fingerprint, Biometric companies, Biometric fingerprint, Biometric research, Biometric books, biometric tutorials, biometric india, biometric access, biometric contact pune, bioaccess, biometric products, fingerprint india, time attendance, fingerprint access control, time cards, biometric identification, biometric research, biometric solutions, biometric services, biometrics ,Biometrics India, USA, America, Europe, Japan, UK, Germany, france, uae, singapore, Time attendance india, access control india, biometric india, security india Fingerprint india, Precise Biometrics Biometric Biometrics Security Biometrics Information Bio, Biometrics india, Biometric, Fingerprint scanner, Time attendance, Access control, OEM modules, security, Time cards, SDK, USB finger print sensor, Authentication, Identification, Verification, Biometrics time attendance, Biometrics access control, Fingerprint time attendance, Fingerprint access control, Proximity, RFID, smart cards, Software, Hardware, free, low cost, cheapest, products, Solutions, project, services, development, matching, recognition
   Home |  About Us |  Services |  Products |  Solutions |  Support  | Partners |  News |  Contact Us
    
Why Fingerprints?  |   History of Fingerprint Technology  |   Fingerprint Identification Process  |   Fingerprint Application
 :: Why Fingerprints?
With increasingly urgent need for reliable security, biometrics is being spotlighted as the authentication method for the next generation. Among numerous biometric technologies, fingerprint authentication has been in use for the longest time and bears more advantages than other biometric technologies do.

Fingerprint authentication is possibly the most sophisticated method of all biometric technologies and has been thoroughly verified through various applications. Fingerprint authentication has particularly proved its high efficiency and further enhanced the technology in criminal investigation for more than a century.

Even features such as a person�s gait, face, or signature may change with passage of time and may be fabricated or imitated. However, a fingerprint is completely unique to an individual and stayed unchanged for lifetime. This exclusivity demonstrates that fingerprint authentication is far more accurate and efficient than any other methods of authentication.

Also, a fingerprint may be taken and digitalized by relatively compact and cheap devices and takes only a small capacity to store a large database of information. With these strengths, fingerprint authentication has long been a major part of the security market and continues to be more competitive than others in today�s world.
:: History of Fingerprint Technology
The beginning of fingerprints goes back to as early as the ancient times. According to historical findings, fingerprints were used on clay tablets for business transactions in ancient Babylon. In China, thumb prints were found on clay seals. But it was in the 19th century that the results of scientific studies were published and fingerprint technology began to be considered more seriously.

Using the1800�s scientific studies as a foundation, fingerprint technology was already in use by the beginning of the 20th century. In 1924, FBI(Federal Bureau of Investigation) is already known to have maintained more than 250 million civil files of fingerprints for the purpose of criminal investigation and the identification of unknown casualties. In the late 1960's, fingerprint technology met a great turning point when it gave birth to 'live-scan,' a method to obtain a fingertip image without the use of print ink. When the FBI announced that it planned to stop using paper fingerprint cards inside their new Integrated AFIS (IAFIS) site, it was actually announcing the remarkable breakthrough of today's live-scan technology.

But fingerprint identification technology did not stop as a forensic method only. It was officially used for business purposes in 1968 at one security corporation in Wall Street. Fingerprints are now being used as a secure and effective authentication method in numerous fields, including financial, medical, e-commerce and entrance control applications. Modern applications of fingerprint technology rely in large part on the development of exceptionally compact fingerprint sensors.
 top
::  Fingerprint Identification Process
Fingerprint identification process consists of two essential procedures: enrollment and authentication. Taking the following steps completes each procedure:
As shown in the diagram above, fingerprint identification system compares the input fingerprint image and previously registered data to determine the genuineness of a fingerprint. All the steps described above affect the efficiency of the entire system, but the computational load of the following steps can be reduced to a great extent by acquiring a good-quality fingerprint image in the first step.
Step 1. Image Acquisition
Real-time image acquisition method is roughly classified into optical and non-optical. Optical method relies on the total reflection phenomenon on the surface of glass or reinforced plastic where the fingertip is in contact. The sensor normally consists of an optical lens and a CCD module or CMOS image sensor. In contrast, semiconductor sensors, as a typical example of non-optical sensors, exploit electrical characteristics of a fingertip such as capacitance. Ultrasonic wave, heat, and pressure are also utilized to obtain images with the non-optical fingerprint sensors. Non-optical sensors are said to be relatively more suitable for massive production and size reduction such as in the integration with mobile devices. Detailed comparison is found in Table 1. 
Optical Non-optical
Measuring Method light pressure, heat, capacitance, ultrasonic wave
Strength highly-stable performance
physical/electrical durability
high-quality image
low cost with mass production compact size integrated with low-power application
Weakness relatively high cost
limit to size-reduction
relatively easy to fool with a finger trace or fake finger
physical/electrical weakness
performance sensitive to the outer environment(temperature, dryness of a finger)
Application entrance, time, and attendance control
banking service
PC security
PC security
e-commerce authentication
mobile devices & smart cards
Step 2. Feature Extraction
There are two main ways to compare an input fingerprint image and registered fingerprint data. One is to compare an image with another image directly. The other is to compare the so-called 'features' extracted from each fingerprint image. The latter is called feature-based/minutia-based matching. Every finger has a unique pattern formed by a flow of embossed lines called �ridges� and hollow regions between them called �valleys.� As seen in the Picture 2 below, ridges are represented as dark lines, while valleys are bright.
Step 3. Matching
The matching step is classified into 1:1 and 1:N matching according to its purpose and/or the number of reference templates. 1:1 matching is also called personal identification or verification. It is a procedure in which a user claims his/her identity by means of an ID and proves it with a fingerprint. The comparison occurs only once between the input fingerprint image and the selected one from the database following the claim by the user.

On the contrary, 1:N matching denotes a procedure where the system determines the user's identity by comparing the input fingerprint with the information in the database without asking for the user's claim. A good example of this is AFIS(Automated Fingerprint Identification System) frequently used in criminal investigation.

The output result of the matching step is whether or not the input fingerprint is identical to the one being compared in the database. Then how could the accuracy of the matching procedure be represented in number? The simplest measures are FRR(False Reject Rate) and FAR(False Accept Rate). The former is the rate of genuine user's rejection and the latter is the rate of impostor's acceptance.
 top
::  Fingerprint Application
Markets for fingerprint technology include entrance control and door-lock applications, fingerprint identification mouses, fingerprint mobile phones, and many others. The fingerprint markets are classified as follows:
As the advanced technology enables even more compact fingerprint sensor size, the range of application is extended to the mobile market. Considering the growing phase of the present mobile market, its potential is the greatest of all application markets.
References
[1] International Biometric Group,「Biometric Market Report 2000-2005」, 2001.
[2] Anil K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle,「An Identity Authentication System Using Fingerprints」, 1997.
[3] http://onin.com/fp/fphistory.html
 top
 
Send your requirements

 

your e-mail
Requirements
 
 

:: Useful Links ::


 

Sitemap | � Bioenable Technologies Pvt. Ltd. 2004-2005