preview

The Necessity of Automated Fingerprint Identification System in Law Enforcement

Good Essays

Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Several cases of fingerprint obfuscation have been reported in the press. Also NFIQ algorithm used to evaluate the large database of altered fingerprints .further we proposed NFIQ2.0 …show more content…

Fingerprint quality assessment routines used inmost fingerprint identification systems, such as the opensource NFIQ2 (NIST Fingerprint Image Quality) softwaremay be useful in detecting altered fingerprints if thecorresponding images are indeed of poor quality. But, notall altered fingerprint images have poor quality. Since existing fingerprint quality assessment algorithms are designed to examine if an imagecontains sufficient information (say, minutiae) for matching,they have limited capability in determining if an image is anatural fingerprint or an altered fingerprint.Altered fingerprints are different from fake fingerprints. The use of fake fingers—made ofglue, latex, or silicone—is a well-publicized method to circumvent fingerprint systems. Altered fingerprints, however, are real fingers that are used to conceal one’s identity in order to evade identification by a biometric system. While fake fingers are typically used by individuals toadopt another person’s identity, altered fingers are used to mask one’s own identity. In order to detect attacks based on fake fingers, many software and hardware solutions have been proposed. However, the problem of altered fingerprints has hitherto not been studied in the literature and there are no reported techniques to identify them. Furthermore, the lack of public databases comprised of altered fingerprint images has

Get Access