Fingerprint reconstruction

As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed...

Full description

Saved in:
Bibliographic Details
Main Author: Downie, Fiona
Other Authors: Kot Chichung, Alex
Format: Final Year Project
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/10356/50006
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-50006
record_format dspace
spelling sg-ntu-dr.10356-500062023-07-07T16:54:53Z Fingerprint reconstruction Downie, Fiona Kot Chichung, Alex School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed and used for entry into the system. This report looks into two reconstruction method and if some of the aspects of the methods were changed how this would affect the acceptance into the security system. These aspects are whether the frequency of the binary ridges and the estimation of the orientation field for the reconstructed fingerprints make an impact to the falsely accepted rate of the reconstructed fingerprint. The second half of this report investigates the uses of third level features of fingerprints and their impact into the identification methods both for use in reconstructed fingerprints and for proving an identity of a person after a security breach. Bachelor of Engineering 2012-05-28T07:05:19Z 2012-05-28T07:05:19Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/50006 en Nanyang Technological University 42 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Biometrics
Downie, Fiona
Fingerprint reconstruction
description As fingerprints are used for identification purposes more and more these day how safe are they against a reconstructed fingerprint? Due to the methods that a person’s identity is stored on a biometric system there are ways from after obtaining this information that a fingerprint can be reconstructed and used for entry into the system. This report looks into two reconstruction method and if some of the aspects of the methods were changed how this would affect the acceptance into the security system. These aspects are whether the frequency of the binary ridges and the estimation of the orientation field for the reconstructed fingerprints make an impact to the falsely accepted rate of the reconstructed fingerprint. The second half of this report investigates the uses of third level features of fingerprints and their impact into the identification methods both for use in reconstructed fingerprints and for proving an identity of a person after a security breach.
author2 Kot Chichung, Alex
author_facet Kot Chichung, Alex
Downie, Fiona
format Final Year Project
author Downie, Fiona
author_sort Downie, Fiona
title Fingerprint reconstruction
title_short Fingerprint reconstruction
title_full Fingerprint reconstruction
title_fullStr Fingerprint reconstruction
title_full_unstemmed Fingerprint reconstruction
title_sort fingerprint reconstruction
publishDate 2012
url http://hdl.handle.net/10356/50006
_version_ 1772825831348895744