1 / 12

Fingerprint Authentication

Fingerprint Authentication. Kevin Amendt David Friend April 26, 2006 - MIT Course 6.111 Project Presentations. Authentication. Nontransferable (possession based) Keycard Fingerprint Transferable (knowledge based) Password Certificate. Overview of System. Two operation modes

roxy
Download Presentation

Fingerprint Authentication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fingerprint Authentication Kevin Amendt David Friend April 26, 2006 - MIT Course 6.111 Project Presentations

  2. Authentication • Nontransferable (possession based) • Keycard • Fingerprint • Transferable (knowledge based) • Password • Certificate

  3. Overview of System • Two operation modes • Add to database • Validate a user

  4. System Operation(Database Entry)

  5. System Operation(Validation)

  6. Validation • The same fingerprint differs between images: • Translation • Rotation • Scaling • Noise

  7. Validation • How to match two fingerprint images? • Two Methods: • Feature Matching • Pattern Matching

  8. Feature Matching • Locate specific characteristics of the fingerprint (minutiae), where ridges end or branch • Match minutiae between images • Considered the more accurate algorithm • Usually implemented through software, and difficult to implement with digital logic

  9. Pattern Matching • Simple idea (maybe better for 6.111): overlay images and see if they match • Problems… • Noise: Set a threshold. If it’s “close” • Translation: Use convolution • Rotation: User training • Scaling: Will consider this a noise problem

  10. Conclusion • Fingerprint ID • Pattern matching validation • Compute convolution sum and compare to threshold

  11. How Convolution Works

  12. Detailed Block Diagram

More Related