21.02.2013 Views

Advances in Fingerprint Technology.pdf

Advances in Fingerprint Technology.pdf

Advances in Fingerprint Technology.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

F<strong>in</strong>gerpr<strong>in</strong>t<br />

Quality<br />

Acquisition Estimation<br />

F<strong>in</strong>gerpr<strong>in</strong>t<br />

Index<strong>in</strong>g<br />

Feature<br />

Extraction<br />

F<strong>in</strong>gerpr<strong>in</strong>t<br />

Match<strong>in</strong>g<br />

Match<br />

Verification<br />

F<strong>in</strong>gerpr<strong>in</strong>t<br />

Enhancement<br />

Feature<br />

Edit<strong>in</strong>g<br />

Figure 8.2 Functional block diagram of an “automatic” f<strong>in</strong>gerpr<strong>in</strong>t identification<br />

system. The dotted l<strong>in</strong>es illustrate alternative paths. Some of the functional<br />

blocks (e.g., <strong>in</strong>dex<strong>in</strong>g) can be performed either by an expert or a computer. The<br />

feature edit<strong>in</strong>g and match verification tasks are performed by an expert. Typically,<br />

a f<strong>in</strong>gerpr<strong>in</strong>t matcher passes a ranked list of 10 to 100 f<strong>in</strong>gerpr<strong>in</strong>ts for the match<br />

verification stage; a f<strong>in</strong>gerpr<strong>in</strong>t expert browses the orig<strong>in</strong>al f<strong>in</strong>gerpr<strong>in</strong>t images (as<br />

opposed to their representations) to confirm/reject a candidate match.<br />

biometric measurements. Second, people are concerned about l<strong>in</strong>kages:<br />

unauthorized usage of biometric measurements across different identification<br />

systems (e.g., crim<strong>in</strong>al and civilian f<strong>in</strong>gerpr<strong>in</strong>t identification systems) to<br />

l<strong>in</strong>k the identities of people and to gather/track <strong>in</strong>dividual <strong>in</strong>formation that<br />

may otherwise be unavailable. It is necessary to enforce systemwide mechanisms<br />

to ensure the usage of the biometric measurement for its proscribed<br />

<strong>in</strong>tent. As novel applications of f<strong>in</strong>gerpr<strong>in</strong>ts (and other biometric identifiers)<br />

become more widespread, law enforcement agencies will be <strong>in</strong>creas<strong>in</strong>gly<br />

<strong>in</strong>volved <strong>in</strong> resolv<strong>in</strong>g the frauds <strong>in</strong>volv<strong>in</strong>g repudiation (e.g., users deny<strong>in</strong>g hav<strong>in</strong>g<br />

accessed the system), coercion (e.g., users claim<strong>in</strong>g to have been forced <strong>in</strong>to the<br />

system), contam<strong>in</strong>ation (e.g., erroneous acquisition of biometrics identifier not<br />

associated with the <strong>in</strong>tended user), and circumvention (e.g., unauthorized user

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!