Skip to main content

Introduction

  • Chapter
  • First Online:
Handbook of Fingerprint Recognition

Abstract

This chapter presents an introduction to biometric and, in particular, fingerprint recognition systems and provides some historical timeline on fingerprints and their adoption in forensic and civilian recognition applications. All the topics that are covered in detail in the successive chapters are surveyed here in brief. The notation and terminology are introduced, and error rates of a biometric system are explained and formalized by defining the main performance metrics. Other relevant topics such as biometric system applications, system integration, and privacy issues are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Applications that assume a negative claim of identity cannot work in verification mode: in fact, the system has to search the entire archive to prove that the query feature set does not have a match in the enrollment database. Sometimes, even in applications that assume positive claim of identity, the system must necessarily work in identification mode, due to the practical difficulty of using an input device to enter a PIN.

  2. 2.

    “He also forced everyone, small and great, rich and poor, free and slave, to receive a mark on his right hand or on his forehead, so that no one could buy or sell unless he had the mark, which is the name of the beast or the number of his name.” (Revelation 13:16–17).

  3. 3.

    Although there is touchless (direct) fingerprint scanning technology available, it is still necessary for the subject to be in the very close proximity of the scanner. There is presently no technology capable of video snooping of fingerprints.

  4. 4.

    https://gdpr.eu.

  5. 5.

    https://en.wikipedia.org/wiki/Trusted_execution_environment.

References

  • Babler, W. J. (1991). Embryologic development of epidermal ridges and their configuration. Birth Defects Original Article Series, 27(2), 95–112.

    Google Scholar 

  • Bazen, A. M., & Veldhuis, R. N. J. (2004). Likelihood-ratio-based biometric verification. IEEE Transaction on Circuits and Systems for Video Technology, 14(1), 86–94.

    Google Scholar 

  • Bolle, R. M., Connell, J. H., & Ratha, N. K. (2002). Biometric perils and patches. Pattern Recognition, 35(12), 2727–2738.

    Google Scholar 

  • Bolle, R. M., Ratha, N. K., & Pankanti, S. (1999). Evaluating authentication systems using bootstrap confidence intervals. In Proceedings of Workshop on Automatic Identification Advanced Technologies (pp. 9–13).

    Google Scholar 

  • Bolle, R. M., Ratha, N. K., & Pankanti, S. (2004). Error analysis of pattern recognition systems—The subsets bootstrap. Computer Vision and Image Understanding, 93(1), 1–33.

    Google Scholar 

  • Bonneau, V., Probst, L., & Lefebvre, V. (2018). Biometrics technologies: A key enabler for future digital services. Retrieved July, 2021, from https://ati.ec.europa.eu/reports/technology-watch/biometrics-technologies-key-enabler-future-digital-services.

  • Brooks, R. R., & Iyengar, S. S. (1997). Multi-sensor fusion: Fundamentals and applications with software. Prentice-Hall.

    Google Scholar 

  • Cappelli, R., Ferrara, M., & Maltoni, D. (2008). On the operational quality of fingerprint scanners. IEEE Transactions on Information Forensics and Security, 3(2), 192–202.

    Google Scholar 

  • Cappelli, R., Maio, D., & Maltoni, D. (2000a). Synthetic fingerprint-image generation. In Proceedings of Internatonal Conference on Pattern Recognition (15th ed., Vol. 3, pp. 475–478).

    Google Scholar 

  • Cappelli, R., Maio, D., & Maltoni, D. (2000b). Indexing fingerprint databases for efficient 1:N matching. In Proceedings of International Conference on Control, Automation, Robotics and Vision (6th ed.).

    Google Scholar 

  • Cappelli, R., Maio, D., & Maltoni, D. (2002). Synthetic fingerprint-database generation. In Proceedings of International Conference on Pattern Recognition (16th ed.).

    Google Scholar 

  • Cappelli, R., Maio, D., Maltoni, D., Wayman, J. L., & Jain, A. K. (2006). Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(1), 3–18.

    Google Scholar 

  • Clark, J., & Yuille, A. (1990). Data fusion for sensory information processing systems. Kluwer.

    Google Scholar 

  • Cole, S. A. (2001). What counts for identity? Fingerprint Whorld, 27(103), 7–35.

    Google Scholar 

  • Cukic, B., & Bartlow, N. (2005, September). Biometric system threats and countermeasures: A risk based approach. In Proceedings of Biometric Consortium Conference, Crystal City, VA, USA.

    Google Scholar 

  • Cummins, H., & Midlo, C. (1943). Fingerprints, palms and soles. Dover.

    Google Scholar 

  • Cummins, H., & Midlo, C. (1961). Fingerprints, palms and soles: An introduction to dermatoglyphics. Dover.

    Google Scholar 

  • Daugman, J. (1999). Recognizing persons by their iris patterns. In A. K. Jain, R. Bolle, & S. Pankanti (Eds.), Biometrics: Personal identification in a networked society. Kluwer.

    Google Scholar 

  • Dinca, L. M., & Hancke, G. P. (2017). The fall of one, the rise of many: A survey on multi-biometric fusion methods. IEEE Access, 5, 6247–6289.

    Google Scholar 

  • Doddington, G., Ligget, W., Martin, A., Przybocki, M., & Reynolds, D. (1998). Sheeps, goats, lambs, wolves: An analysis of individual differences in speaker recognition performance. In Proceedings of International Conference on Speech and Language Processing.

    Google Scholar 

  • Engelsma, J. J., Cao, K., Jain, A. K. (2021). Learning a fixed-length fingerprint representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(6), 1981–1997.

    Google Scholar 

  • FBI. (2021, April). FBI biometric services section. Next Generation Identification (NGI) System Fact Sheet. Retrieved June, 2021, from https://www.fbi.gov/file-repository/ngi-monthly-fact-sheet.

  • FBI—CJIS Division. (2006). Image quality specifications for single finger capture devices. Retrieved March, 2022, from https://fbibiospecs.fbi.gov/file-repository/pivspec.pdf/view.

  • FBI—CJIS Division. (2017). Electronic Biometric Transmission Specification (EBTS). Int. Report: NGI-DOC-01862-1.1 (V10.0.8). Retrieved July, 2021, from https://www.fbibiospecs.cjis.gov/Document/Get?fileName=Master%20EBTS%20v10.0.8%2009302017_Final.pdf.

  • Federal Bureau of Investigation. (1984). The science of fingerprints: Classification and uses. U.S. Government Publication.

    Google Scholar 

  • Federal Bureau of Investigation. (1991). The FBI fingerprint identification automation program: Issues and options. U.S. Government Publication/Congress of the U.S., Office of Technology Assessment.

    Google Scholar 

  • Galton, F. (1892). Finger prints. Macmillan.

    Google Scholar 

  • Golfarelli, M., Maio, D., & Maltoni, D. (1997). On the error-reject tradeoff in biometric verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 786–796.

    Google Scholar 

  • Grother, P., McCabe, M., Watson, C., Indovina, M., Salamon, W., Flanagan, P., Tabassi, E., Newton, E., & Wilson, C. (2006, March). Performance and interoperability of the INCITS 378 fingerprint template. NIST Research Report: NISTIR 7296.

    Google Scholar 

  • Hong, L., Jain, A. K., & Pankanti, S. (1999). Can multibiometrics improve performance? In Proceedings of Workshop on Automatic Identification Advanced Technologies (pp. 59–64).

    Google Scholar 

  • ISO/IEC 19795-2. (2007). ISO/IEC, ISO/IEC 19795-2:2007—Biometric performance testing and reporting—Part 2: Testing methodologies for technology and scenario evaluation. ISO/IEC Standard.

    Google Scholar 

  • ISO/IEC 19795-4. (2008). ISO/IEC, ISO/IEC 19795-4:2008—Biometric performance testing and reporting—Performance and Interoperability Testing of Interchange Formats. ISO/IEC Standard.

    Google Scholar 

  • ISO/IEC 19795-1. (2021). ISO, ISO/IEC 19795-1:2021—Information technology—Biometric performance testing and reporting—Part 1: Principles and framework. Retrieved July, 2021, from https://www.iso.org/standard/73515.html.

  • ISO/IEC 30107-1. (2016). ISO, ISO/IEC 30107-1:2016—Information technology—Biometric presentation attack detection—Part 1: Framework. Retrieved July, 2021, from https://www.iso.org/standard/53227.html.

  • ISO/IEC 30107-3. (2017). ISO, ISO/IEC 30107-3:2017—Information technology—Biometric presentation attack detection—Part 3: Testing and reporting. Retrieved July, 2021, from https://www.iso.org/standard/67381.html.

  • ISO/IEC TR 19795-3. (2007). ISO/IEC, ISO/IEC TR 19795-3:2007—Biometric performance testing and reporting—Technical Report—Modality-specific Testing. ISO/IEC Standard.

    Google Scholar 

  • Jain, A. K., Deb, D., & Engelsma, J. J. (2021). Biometrics: Trust, but verify. IEEE Transactions on Biometrics, Behavior, and Identity Science. https://doi.org/10.1109/TBIOM.2021.3115465.

  • Jain, A. K., Pankanti, S., Prabhakar, S., Hong, L., Ross, A., & Wayman J. L. (2004). Biometrics: A grand challenge. In Proceedings of International Conference on Pattern Recognition (17th ed., Vol. 2, pp. 935–942).

    Google Scholar 

  • Jain, A. K., Prabhakar, S., & Pankanti, S. (2002). On the similarity of identical twin fingerprints. Pattern Recognition, 35(11), 2653–2663.

    Google Scholar 

  • Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.

    Google Scholar 

  • Lee, H. C., & Gaensslen, R. E. (2012). Advances in fingerprint technology (3rd ed.). CRC Press.

    Google Scholar 

  • Levi, G., & Sirovich, F. (1972). Structural description of fingerprint images. Information Sciences, 327–355.

    Google Scholar 

  • Lin, C. H., Liu, J. H., Ostenberg, J. W., & Nicol, J. D. (1982). Fingerprint comparison I: Similarity of fingerprints. Journal of Forensic Sciences, 27(2), 290–304.

    Google Scholar 

  • Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., & Jain, A. K. (2000, September). FVC2000: Fingerprint verification competition. Technical Report: DEIS, University of Bologna.

    Google Scholar 

  • Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., & Jain, A. K. (2002). FVC2002: Second fingerprint verification competition. In Proceedings of International Conference on Pattern Recognition (16th ed.).

    Google Scholar 

  • Moenssens, A. (1971). Fingerprint techniques. Chilton Book Company.

    Google Scholar 

  • Monson, K. L., Roberts, M. A., Knorr, K. B., Ali, S., Meagher, S. B., Biggs, K., Blume, P., Brandelli, D., Marzioli, A., Reneau, R., & Tarasi, F. (2019). The permanence of friction ridge skin and persistence of friction ridge skin and impressions: A comprehensive review and new results. Forensic Science International, 297, 111–131.

    Google Scholar 

  • Mordor. (2021). Mordor intelligence. Consumer biometrics market—growth, trends, COVID-19 impact, and forecasts (2022–2027). Retrieved July, 2021, from https://www.mordorintelligence.com/industry-reports/consumer-biometrics-market.

  • Mulvhill, J. J. (1969). The genesis of dematoglyphics. The Journal of Pediatrics, 75(4), 579–589.

    Google Scholar 

  • Penrose, L. S. (1965). Dermatoglyphic topology. Nature, 205, 545–546.

    Google Scholar 

  • Phillips, P. J., Martin, A., Wilson, C. L., & Przybocki, M. (2000, February). An introduction to evaluating biometric systems. IEEE Computer Magazine, 33(2), 56–63.

    Google Scholar 

  • Ratha, N. K., Connell, J. H., & Bolle, R. M. (1999). A biometrics-based secure authentication system. In Proceedings of Workshop on Automatic Identification Advances Technologies.

    Google Scholar 

  • Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). An analysis of minutiae matching strength. In Proceedings of International Conference on Audio- and Video-Based Biometric Person Authentication (3rd ed., pp. 223–228).

    Google Scholar 

  • Ratha, N. K., Connell, J. H., & Bolle, R. M. (2003). Biometrics break-ins and band-aids. Pattern Recognition Letters, 24(13), 2105–2113.

    Google Scholar 

  • Rhodes, H. T. F. (1956). Alphonse Bertillon: Father of scientific detection. Abelard-Schuman.

    Google Scholar 

  • Roddy, A., & Stosz, J. (1997). Fingerprint features: Statistical-analysis and system performance estimates. Proceedings of the IEEE, 85(9), 1390–1421.

    Google Scholar 

  • Ross, A. A., Nandakumar, K., & Jain, A. K. (2006). Handbook of multibiometrics. Springer Science & Business Media.

    Google Scholar 

  • Scott, W. (1951). Fingerprint mechanics—A handbook. C. Thomas, Springfield.

    Google Scholar 

  • Singh, M., Singh, R., & Ross, A. (2019). A comprehensive overview of biometric fusion. Information Fusion, 52, 187–205.

    Google Scholar 

  • Viveros, R., Balasubramanian, K., & Mitas, J. A. (1984). Binomial and negative bionomial analogues under correlated bernoulli trials. Journal of the American Statistician, 48(3), 243–247.

    Google Scholar 

  • Watson, C. I., & Wilson, C. L. (1992). NIST special database 4, fingerprint database. U.S. National Institute of Standards and Technology.

    Google Scholar 

  • Wayman, J. L. (1999). Fundamentals of biometric authentication technologies. In J. L. Wayman (Ed.), National biometric test center collected works (Vol. 1). National Biometric Test Center.

    Google Scholar 

  • Wayman, J. L. (2001). Confidence interval and test size estimation for biometric data. Personal Communication.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Maltoni, D., Maio, D., Jain, A.K., Feng, J. (2022). Introduction. In: Handbook of Fingerprint Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-83624-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-83624-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-83623-8

  • Online ISBN: 978-3-030-83624-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics