21.02.2013 Views

Advances in Fingerprint Technology.pdf

Advances in Fingerprint Technology.pdf

Advances in Fingerprint Technology.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

That is, given a f<strong>in</strong>gerpr<strong>in</strong>t known to have orig<strong>in</strong>ated from, for example, Joe<br />

Smith’s left <strong>in</strong>dex f<strong>in</strong>ger and another pr<strong>in</strong>t from a left <strong>in</strong>dex f<strong>in</strong>ger, the system<br />

will determ<strong>in</strong>e whether the second pr<strong>in</strong>t, <strong>in</strong>deed, belongs to Joe Smith. The<br />

law enforcement systems, on the other hand, primarily deal with recognition<br />

(also popularly referred to as identification, as <strong>in</strong> automatic f<strong>in</strong>gerpr<strong>in</strong>t identification<br />

system), which <strong>in</strong>volves establish<strong>in</strong>g the identity of the person based<br />

on the f<strong>in</strong>gerpr<strong>in</strong>t <strong>in</strong>formation. Given a f<strong>in</strong>gerpr<strong>in</strong>t(s), possibly without any<br />

knowledge of the f<strong>in</strong>ger position (i.e., left <strong>in</strong>dex), the system, by search<strong>in</strong>g<br />

through the database of available f<strong>in</strong>gerpr<strong>in</strong>ts associated with the known<br />

identities, will determ<strong>in</strong>e whether the pr<strong>in</strong>t is associated with an identity.*<br />

The task of identity verification is much easier than that of identity recognition:<br />

the former <strong>in</strong>volv<strong>in</strong>g just one comparison while the latter <strong>in</strong>volves<br />

multiple comparisons with f<strong>in</strong>gerpr<strong>in</strong>ts <strong>in</strong> the database. Although some civilian<br />

applications <strong>in</strong>volve identity recognition, the underly<strong>in</strong>g design considerations<br />

are different (see Figure 8.1). Despite these differences <strong>in</strong> the<br />

functionalities among different f<strong>in</strong>gerpr<strong>in</strong>t identification application<br />

doma<strong>in</strong>s, all the f<strong>in</strong>gerpr<strong>in</strong>t based systems rely on the dist<strong>in</strong>ctive <strong>in</strong>dividual<br />

<strong>in</strong>formation <strong>in</strong> f<strong>in</strong>gerpr<strong>in</strong>ts — the f<strong>in</strong>gerpr<strong>in</strong>t expertise which has primarily<br />

resided with<strong>in</strong> law enforcement agencies for more than a century. Further,<br />

the authors believe that law enforcement agencies will eventually also be<br />

closely <strong>in</strong>volved <strong>in</strong> study<strong>in</strong>g the civilian/commercial/f<strong>in</strong>ancial f<strong>in</strong>gerpr<strong>in</strong>t<br />

(and more generally biometric) applications as well.<br />

For any biometric measurement to be <strong>in</strong>corporated <strong>in</strong>to a positive person<br />

identification system, it is necessary that such measurements be acceptable<br />

to society. Despite the crim<strong>in</strong>al stigma associated with f<strong>in</strong>gerpr<strong>in</strong>ts, a recent<br />

CNN poll found that f<strong>in</strong>gerpr<strong>in</strong>ts rate high <strong>in</strong> social acceptability. 4 While<br />

acceptability is a complex (and mutable) phenomenon depend<strong>in</strong>g on confound<strong>in</strong>g<br />

factors <strong>in</strong>clud<strong>in</strong>g <strong>in</strong>dividual/<strong>in</strong>stitutional trust, religious and personal<br />

beliefs/values, and culture, two system issues <strong>in</strong>fluence acceptability:<br />

system security 5 and <strong>in</strong>dividual privacy. 6,7 The security issues ensure that the<br />

<strong>in</strong>truders will neither be able to access the <strong>in</strong>dividual <strong>in</strong>formation/measurements<br />

(e.g., obta<strong>in</strong> f<strong>in</strong>gerpr<strong>in</strong>t <strong>in</strong>formation) nor be able to pose as other<br />

<strong>in</strong>dividuals by electronically <strong>in</strong>terject<strong>in</strong>g stale and fraudulently obta<strong>in</strong>ed biometrics<br />

measurements (e.g., surreptitiously lifted f<strong>in</strong>gerpr<strong>in</strong>ts from surfaces<br />

touched by the <strong>in</strong>dividuals) <strong>in</strong>to the system. It is desirable that a personal<br />

identification system uses the biometric measurements exclusively for the<br />

purposes for which they were acquired. For example, it may be possible to<br />

glean <strong>in</strong>formation about the medical conditions of <strong>in</strong>dividuals from their<br />

* The term “identification” is used <strong>in</strong> this chapter either to refer to the general problem<br />

of identify<strong>in</strong>g <strong>in</strong>dividuals (identification/recognition and authentication/verification) or to<br />

refer to the specific problem of identify<strong>in</strong>g (recogniz<strong>in</strong>g) an <strong>in</strong>dividual from a database<br />

which <strong>in</strong>volves one to many searches. We rely on the context to disambiguate the reference.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!