Abstract
This chapter presents an introduction to biometric and, in particular, fingerprint recognition systems and provides some historical timeline on fingerprints and their adoption in forensic and civilian recognition applications. All the topics that are covered in detail in the successive chapters are surveyed here in brief. The notation and terminology are introduced, and error rates of a biometric system are explained and formalized by defining the main performance metrics. Other relevant topics such as biometric system applications, system integration, and privacy issues are also discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Applications that assume a negative claim of identity cannot work in verification mode: in fact, the system has to search the entire archive to prove that the query feature set does not have a match in the enrollment database. Sometimes, even in applications that assume positive claim of identity, the system must necessarily work in identification mode, due to the practical difficulty of using an input device to enter a PIN.
- 2.
“He also forced everyone, small and great, rich and poor, free and slave, to receive a mark on his right hand or on his forehead, so that no one could buy or sell unless he had the mark, which is the name of the beast or the number of his name.” (Revelation 13:16–17).
- 3.
Although there is touchless (direct) fingerprint scanning technology available, it is still necessary for the subject to be in the very close proximity of the scanner. There is presently no technology capable of video snooping of fingerprints.
- 4.
- 5.
References
Babler, W. J. (1991). Embryologic development of epidermal ridges and their configuration. Birth Defects Original Article Series, 27(2), 95–112.
Bazen, A. M., & Veldhuis, R. N. J. (2004). Likelihood-ratio-based biometric verification. IEEE Transaction on Circuits and Systems for Video Technology, 14(1), 86–94.
Bolle, R. M., Connell, J. H., & Ratha, N. K. (2002). Biometric perils and patches. Pattern Recognition, 35(12), 2727–2738.
Bolle, R. M., Ratha, N. K., & Pankanti, S. (1999). Evaluating authentication systems using bootstrap confidence intervals. In Proceedings of Workshop on Automatic Identification Advanced Technologies (pp. 9–13).
Bolle, R. M., Ratha, N. K., & Pankanti, S. (2004). Error analysis of pattern recognition systems—The subsets bootstrap. Computer Vision and Image Understanding, 93(1), 1–33.
Bonneau, V., Probst, L., & Lefebvre, V. (2018). Biometrics technologies: A key enabler for future digital services. Retrieved July, 2021, from https://ati.ec.europa.eu/reports/technology-watch/biometrics-technologies-key-enabler-future-digital-services.
Brooks, R. R., & Iyengar, S. S. (1997). Multi-sensor fusion: Fundamentals and applications with software. Prentice-Hall.
Cappelli, R., Ferrara, M., & Maltoni, D. (2008). On the operational quality of fingerprint scanners. IEEE Transactions on Information Forensics and Security, 3(2), 192–202.
Cappelli, R., Maio, D., & Maltoni, D. (2000a). Synthetic fingerprint-image generation. In Proceedings of Internatonal Conference on Pattern Recognition (15th ed., Vol. 3, pp. 475–478).
Cappelli, R., Maio, D., & Maltoni, D. (2000b). Indexing fingerprint databases for efficient 1:N matching. In Proceedings of International Conference on Control, Automation, Robotics and Vision (6th ed.).
Cappelli, R., Maio, D., & Maltoni, D. (2002). Synthetic fingerprint-database generation. In Proceedings of International Conference on Pattern Recognition (16th ed.).
Cappelli, R., Maio, D., Maltoni, D., Wayman, J. L., & Jain, A. K. (2006). Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(1), 3–18.
Clark, J., & Yuille, A. (1990). Data fusion for sensory information processing systems. Kluwer.
Cole, S. A. (2001). What counts for identity? Fingerprint Whorld, 27(103), 7–35.
Cukic, B., & Bartlow, N. (2005, September). Biometric system threats and countermeasures: A risk based approach. In Proceedings of Biometric Consortium Conference, Crystal City, VA, USA.
Cummins, H., & Midlo, C. (1943). Fingerprints, palms and soles. Dover.
Cummins, H., & Midlo, C. (1961). Fingerprints, palms and soles: An introduction to dermatoglyphics. Dover.
Daugman, J. (1999). Recognizing persons by their iris patterns. In A. K. Jain, R. Bolle, & S. Pankanti (Eds.), Biometrics: Personal identification in a networked society. Kluwer.
Dinca, L. M., & Hancke, G. P. (2017). The fall of one, the rise of many: A survey on multi-biometric fusion methods. IEEE Access, 5, 6247–6289.
Doddington, G., Ligget, W., Martin, A., Przybocki, M., & Reynolds, D. (1998). Sheeps, goats, lambs, wolves: An analysis of individual differences in speaker recognition performance. In Proceedings of International Conference on Speech and Language Processing.
Engelsma, J. J., Cao, K., Jain, A. K. (2021). Learning a fixed-length fingerprint representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(6), 1981–1997.
FBI. (2021, April). FBI biometric services section. Next Generation Identification (NGI) System Fact Sheet. Retrieved June, 2021, from https://www.fbi.gov/file-repository/ngi-monthly-fact-sheet.
FBI—CJIS Division. (2006). Image quality specifications for single finger capture devices. Retrieved March, 2022, from https://fbibiospecs.fbi.gov/file-repository/pivspec.pdf/view.
FBI—CJIS Division. (2017). Electronic Biometric Transmission Specification (EBTS). Int. Report: NGI-DOC-01862-1.1 (V10.0.8). Retrieved July, 2021, from https://www.fbibiospecs.cjis.gov/Document/Get?fileName=Master%20EBTS%20v10.0.8%2009302017_Final.pdf.
Federal Bureau of Investigation. (1984). The science of fingerprints: Classification and uses. U.S. Government Publication.
Federal Bureau of Investigation. (1991). The FBI fingerprint identification automation program: Issues and options. U.S. Government Publication/Congress of the U.S., Office of Technology Assessment.
Galton, F. (1892). Finger prints. Macmillan.
Golfarelli, M., Maio, D., & Maltoni, D. (1997). On the error-reject tradeoff in biometric verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 786–796.
Grother, P., McCabe, M., Watson, C., Indovina, M., Salamon, W., Flanagan, P., Tabassi, E., Newton, E., & Wilson, C. (2006, March). Performance and interoperability of the INCITS 378 fingerprint template. NIST Research Report: NISTIR 7296.
Hong, L., Jain, A. K., & Pankanti, S. (1999). Can multibiometrics improve performance? In Proceedings of Workshop on Automatic Identification Advanced Technologies (pp. 59–64).
ISO/IEC 19795-2. (2007). ISO/IEC, ISO/IEC 19795-2:2007—Biometric performance testing and reporting—Part 2: Testing methodologies for technology and scenario evaluation. ISO/IEC Standard.
ISO/IEC 19795-4. (2008). ISO/IEC, ISO/IEC 19795-4:2008—Biometric performance testing and reporting—Performance and Interoperability Testing of Interchange Formats. ISO/IEC Standard.
ISO/IEC 19795-1. (2021). ISO, ISO/IEC 19795-1:2021—Information technology—Biometric performance testing and reporting—Part 1: Principles and framework. Retrieved July, 2021, from https://www.iso.org/standard/73515.html.
ISO/IEC 30107-1. (2016). ISO, ISO/IEC 30107-1:2016—Information technology—Biometric presentation attack detection—Part 1: Framework. Retrieved July, 2021, from https://www.iso.org/standard/53227.html.
ISO/IEC 30107-3. (2017). ISO, ISO/IEC 30107-3:2017—Information technology—Biometric presentation attack detection—Part 3: Testing and reporting. Retrieved July, 2021, from https://www.iso.org/standard/67381.html.
ISO/IEC TR 19795-3. (2007). ISO/IEC, ISO/IEC TR 19795-3:2007—Biometric performance testing and reporting—Technical Report—Modality-specific Testing. ISO/IEC Standard.
Jain, A. K., Deb, D., & Engelsma, J. J. (2021). Biometrics: Trust, but verify. IEEE Transactions on Biometrics, Behavior, and Identity Science. https://doi.org/10.1109/TBIOM.2021.3115465.
Jain, A. K., Pankanti, S., Prabhakar, S., Hong, L., Ross, A., & Wayman J. L. (2004). Biometrics: A grand challenge. In Proceedings of International Conference on Pattern Recognition (17th ed., Vol. 2, pp. 935–942).
Jain, A. K., Prabhakar, S., & Pankanti, S. (2002). On the similarity of identical twin fingerprints. Pattern Recognition, 35(11), 2653–2663.
Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.
Lee, H. C., & Gaensslen, R. E. (2012). Advances in fingerprint technology (3rd ed.). CRC Press.
Levi, G., & Sirovich, F. (1972). Structural description of fingerprint images. Information Sciences, 327–355.
Lin, C. H., Liu, J. H., Ostenberg, J. W., & Nicol, J. D. (1982). Fingerprint comparison I: Similarity of fingerprints. Journal of Forensic Sciences, 27(2), 290–304.
Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., & Jain, A. K. (2000, September). FVC2000: Fingerprint verification competition. Technical Report: DEIS, University of Bologna.
Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., & Jain, A. K. (2002). FVC2002: Second fingerprint verification competition. In Proceedings of International Conference on Pattern Recognition (16th ed.).
Moenssens, A. (1971). Fingerprint techniques. Chilton Book Company.
Monson, K. L., Roberts, M. A., Knorr, K. B., Ali, S., Meagher, S. B., Biggs, K., Blume, P., Brandelli, D., Marzioli, A., Reneau, R., & Tarasi, F. (2019). The permanence of friction ridge skin and persistence of friction ridge skin and impressions: A comprehensive review and new results. Forensic Science International, 297, 111–131.
Mordor. (2021). Mordor intelligence. Consumer biometrics market—growth, trends, COVID-19 impact, and forecasts (2022–2027). Retrieved July, 2021, from https://www.mordorintelligence.com/industry-reports/consumer-biometrics-market.
Mulvhill, J. J. (1969). The genesis of dematoglyphics. The Journal of Pediatrics, 75(4), 579–589.
Penrose, L. S. (1965). Dermatoglyphic topology. Nature, 205, 545–546.
Phillips, P. J., Martin, A., Wilson, C. L., & Przybocki, M. (2000, February). An introduction to evaluating biometric systems. IEEE Computer Magazine, 33(2), 56–63.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (1999). A biometrics-based secure authentication system. In Proceedings of Workshop on Automatic Identification Advances Technologies.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). An analysis of minutiae matching strength. In Proceedings of International Conference on Audio- and Video-Based Biometric Person Authentication (3rd ed., pp. 223–228).
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2003). Biometrics break-ins and band-aids. Pattern Recognition Letters, 24(13), 2105–2113.
Rhodes, H. T. F. (1956). Alphonse Bertillon: Father of scientific detection. Abelard-Schuman.
Roddy, A., & Stosz, J. (1997). Fingerprint features: Statistical-analysis and system performance estimates. Proceedings of the IEEE, 85(9), 1390–1421.
Ross, A. A., Nandakumar, K., & Jain, A. K. (2006). Handbook of multibiometrics. Springer Science & Business Media.
Scott, W. (1951). Fingerprint mechanics—A handbook. C. Thomas, Springfield.
Singh, M., Singh, R., & Ross, A. (2019). A comprehensive overview of biometric fusion. Information Fusion, 52, 187–205.
Viveros, R., Balasubramanian, K., & Mitas, J. A. (1984). Binomial and negative bionomial analogues under correlated bernoulli trials. Journal of the American Statistician, 48(3), 243–247.
Watson, C. I., & Wilson, C. L. (1992). NIST special database 4, fingerprint database. U.S. National Institute of Standards and Technology.
Wayman, J. L. (1999). Fundamentals of biometric authentication technologies. In J. L. Wayman (Ed.), National biometric test center collected works (Vol. 1). National Biometric Test Center.
Wayman, J. L. (2001). Confidence interval and test size estimation for biometric data. Personal Communication.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Maltoni, D., Maio, D., Jain, A.K., Feng, J. (2022). Introduction. In: Handbook of Fingerprint Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-83624-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-83624-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-83623-8
Online ISBN: 978-3-030-83624-5
eBook Packages: Computer ScienceComputer Science (R0)