How Fingerprint Recognition Works
- Date: 2007-07-24 - Word Count: 622
Share This!
Biometrics is the identification of a person based on his/her intrinsic characteristics, such as voice, writing, fingerprint, iris, face, hand geometry, etc. It is a system that recognizes a person based on "who" the person is and does not rely on "what a person is carrying" or "what a person knows".
One of the most widely known and used biometric identification scheme is fingerprint. Fingerprint analysis and identification is a 100-year old science, with thousands of studies made and articles written, and thus confidence rates of more than 99%. It's the cheapest, fastest, most convenient and most reliable way to identify someone. That's why fingerprint alone has almost 60% of the biometric world market, according to the Biometrics Market and Industry Report 2007-2012 from the International Biometric Group. Cars, cell phones, PDAs, personal computers and dozens of products and devices are using fingerprints more and more. Fingerprint recognition can be used from criminal investigations to time attendance systems, in a movie rental or in a police identification institute.
A fingerprint contain a number of unique physical characteristics called minutiae, which includes certain visible aspects of fingerprints such as ridges, ridge endings and bifurcations (forks in ridges). Minutiae are generally found in the core points of fingerprints, located near the center of the fingertips. These characteristics are used to distinguish two fingerprints, or to state that they are the same. Even identical twins have different fingerprints.
There are a number of different ways to get an image of a fingerprint, and the most common methods today for electronic fingerprint readers are optical scanning and capacitance scanning. When a fingerprint is applied to - or passed over - the sensor window of the fingerprint reader, the fingerprint is scanned and a gray-scale image is captured. A special computer software then identifies the key minutiae points from the image. These points are then converted into a unique digital representation, called "template", comparable to a very big password.
When a fingerprint enrollment is done, only the fingerprint template is stored, not the actual image of the fingerprint. The fingerprint template is not only smaller than the finger image, but also faster to process when comparing two fingerprints.
Fingerprint recognition technology is divided into two distinct processes: verification and identification.
In the verification process the user states who he/she is and a fingerprint is taken and compared to the user's previously registered fingerprint. If the fingerprints match, the user is "verified" as who he/she says he/she is. Since the newly acquired fingerprint is compared to only one stored fingerprint, this is called a one-to-one matching process (1:1). As in the enrollment process, when a fingerprint verification is done, only the fingerprint template is used in the comparison, not the actual image of the fingerprint.
In the identification process the user doesn't need to state who he/she is. A fingerprint is taken and compared to each fingerprint in the database of registered users. When a match occurs, the user is "identified" as the existing user the system found. Since the newly acquired fingerprint is compared to many stored fingerprints, this is called a one-to-many matching process (1:N). As in the verification process, when a fingerprint identification is done, only the fingerprint template is used in the comparison, not the actual image of the fingerprint.
Although it may appear to be a simple process, fingerprint recognition involves the state-of-the-art technology in hardware, for the readers, and software, to process the fingerprint images and templates. But due to the effort of the hardware and software makers, all this complexity is hidden and fingerprint technology usage is nowadays as simple as touching the reader.
About the Author:
Hamilton Rocha is a freelance writer and computer researcher of A&H Software Ltda., the maker of FingerAuth Password Manager, the fingerprint login manager for Firefox (http://www.fingerauth.com).
One of the most widely known and used biometric identification scheme is fingerprint. Fingerprint analysis and identification is a 100-year old science, with thousands of studies made and articles written, and thus confidence rates of more than 99%. It's the cheapest, fastest, most convenient and most reliable way to identify someone. That's why fingerprint alone has almost 60% of the biometric world market, according to the Biometrics Market and Industry Report 2007-2012 from the International Biometric Group. Cars, cell phones, PDAs, personal computers and dozens of products and devices are using fingerprints more and more. Fingerprint recognition can be used from criminal investigations to time attendance systems, in a movie rental or in a police identification institute.
A fingerprint contain a number of unique physical characteristics called minutiae, which includes certain visible aspects of fingerprints such as ridges, ridge endings and bifurcations (forks in ridges). Minutiae are generally found in the core points of fingerprints, located near the center of the fingertips. These characteristics are used to distinguish two fingerprints, or to state that they are the same. Even identical twins have different fingerprints.
There are a number of different ways to get an image of a fingerprint, and the most common methods today for electronic fingerprint readers are optical scanning and capacitance scanning. When a fingerprint is applied to - or passed over - the sensor window of the fingerprint reader, the fingerprint is scanned and a gray-scale image is captured. A special computer software then identifies the key minutiae points from the image. These points are then converted into a unique digital representation, called "template", comparable to a very big password.
When a fingerprint enrollment is done, only the fingerprint template is stored, not the actual image of the fingerprint. The fingerprint template is not only smaller than the finger image, but also faster to process when comparing two fingerprints.
Fingerprint recognition technology is divided into two distinct processes: verification and identification.
In the verification process the user states who he/she is and a fingerprint is taken and compared to the user's previously registered fingerprint. If the fingerprints match, the user is "verified" as who he/she says he/she is. Since the newly acquired fingerprint is compared to only one stored fingerprint, this is called a one-to-one matching process (1:1). As in the enrollment process, when a fingerprint verification is done, only the fingerprint template is used in the comparison, not the actual image of the fingerprint.
In the identification process the user doesn't need to state who he/she is. A fingerprint is taken and compared to each fingerprint in the database of registered users. When a match occurs, the user is "identified" as the existing user the system found. Since the newly acquired fingerprint is compared to many stored fingerprints, this is called a one-to-many matching process (1:N). As in the verification process, when a fingerprint identification is done, only the fingerprint template is used in the comparison, not the actual image of the fingerprint.
Although it may appear to be a simple process, fingerprint recognition involves the state-of-the-art technology in hardware, for the readers, and software, to process the fingerprint images and templates. But due to the effort of the hardware and software makers, all this complexity is hidden and fingerprint technology usage is nowadays as simple as touching the reader.
About the Author:
Hamilton Rocha is a freelance writer and computer researcher of A&H Software Ltda., the maker of FingerAuth Password Manager, the fingerprint login manager for Firefox (http://www.fingerauth.com).
Related Tags: fingerprints, fingerprint recognition, fingerprint capture
Your Article Search Directory : Find in Articles
Recent articles in this category:
- What Is An Sd Card? What Are Main Types Of Sd Cards
Manufactured as a competition offering to Sony's Memory Stick, the SD Card was developed by the SD C - Industrial Computers
In this day and age you can't afford to run an industry efficiently without a computer as it plays a - Computer Fix Services - Tips To Choose Good Quality Personal Computer Maintenance Online
Online computer repair services have become a fast and reliable problem solution for day to day tech - Reverse Engineering Romer For Aerospace
One of the most amazing things about reverse engineering is its significant contribution in any fiel - How To Buy The Best Projector Bulb
It is very important for you to know the right time to change the projector bulb before it will burn - Laptops Vs Desktops- Their Significance
Computers obviously are commonly used for more or less everything from entertainment to office work. - Cooling Your Laptop
It is common knowledge that laptops are commonly used by everyone but one must also know how to take - Dymo Labelwriter Fast Performance & Reliability
I don't think I'm the only one who has gotten tired of trips to the post office, standing in endless - Buying Dell Laptops A Long Time Investment
Today if you go to an office or a school, Dell laptops can be seen very commonly. Though we do not b - Hard Drives - Digital Space
The first hard drives (Hard Disk Drives, HDD) were developed by IBM in 1956. Since then the need for
Most viewed articles in this category:
- Video Killed the Beautiful View
"The sound brought our group to a stop; we turned around to see the ice mass collapse with a roar. A - Crossfire: The Dual GPU System Gamers Want
CrossFire is the new dual graphics card system from ATI. It offers remarkable image quality improvem - Canon PIXMA IP1600 Photo Printer Review & Its True Cost of Ownership
With Canon PIXMA iP1600 Inkjet Printer you can make high quality photo printings at home. No need to - Basic Information about Nero Burn DVD
Nero is a popular burning ROM designed to burn DVD's. The way this product got its name is very inte - The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The public history of the PC began in August 1981, when IBM first announced "The IBM Personal Comput - PC Repairs
PC Repairs are often needed when we need our computer the most. One way to take away many problems o - Affordable Computer Printer Ink
The computer - once considered a luxury item - has easily become a staple in today's modern homes; a - Build your Own PC
Build your own PC! Simple and Fun. Just follow these instructions and you're on your way to a rel - Extending the Life of an Inkjet Printer with Proper Cleaning and Maintenance
Inkjet printers are becoming another "throw away" electronic device due to reducing costs and high i - Check Printers
A check printer is a printer that hooks up to a computer that has the capability of printing checks.