Fingerprint reconstruction

As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed...

Full description

Bibliographic Details
Main Author: Downie, Fiona
Other Authors: Kot Chichung, Alex
Format: Final Year Project (FYP)
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/10356/50006
_version_ 1826113755137703936
author Downie, Fiona
author2 Kot Chichung, Alex
author_facet Kot Chichung, Alex
Downie, Fiona
author_sort Downie, Fiona
collection NTU
description As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed and used for entry into the system. This report looks into two reconstruction method and if some of the aspects of the methods were changed how this would affect the acceptance into the security system. These aspects are whether the frequency of the binary ridges and the estimation of the orientation field for the reconstructed fingerprints make an impact to the falsely accepted rate of the reconstructed fingerprint. The second half of this report investigates the uses of third level features of fingerprints and their impact into the identification methods both for use in reconstructed fingerprints and for proving an identity of a person after a security breach.
first_indexed 2024-10-01T03:28:24Z
format Final Year Project (FYP)
id ntu-10356/50006
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:28:24Z
publishDate 2012
record_format dspace
spelling ntu-10356/500062023-07-07T16:54:53Z Fingerprint reconstruction Downie, Fiona Kot Chichung, Alex School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed and used for entry into the system. This report looks into two reconstruction method and if some of the aspects of the methods were changed how this would affect the acceptance into the security system. These aspects are whether the frequency of the binary ridges and the estimation of the orientation field for the reconstructed fingerprints make an impact to the falsely accepted rate of the reconstructed fingerprint. The second half of this report investigates the uses of third level features of fingerprints and their impact into the identification methods both for use in reconstructed fingerprints and for proving an identity of a person after a security breach. Bachelor of Engineering 2012-05-28T07:05:19Z 2012-05-28T07:05:19Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/50006 en Nanyang Technological University 42 p. application/pdf
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics
Downie, Fiona
Fingerprint reconstruction
title Fingerprint reconstruction
title_full Fingerprint reconstruction
title_fullStr Fingerprint reconstruction
title_full_unstemmed Fingerprint reconstruction
title_short Fingerprint reconstruction
title_sort fingerprint reconstruction
topic DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics
url http://hdl.handle.net/10356/50006
work_keys_str_mv AT downiefiona fingerprintreconstruction