Biometric Fingerprint
Transcript of Biometric Fingerprint
-
7/31/2019 Biometric Fingerprint
1/21
0 BIOMETRIC- FINGERPRINT WHITE PAPER
SCHOOL OF COMPUTER SCIENCES
UNIVERSITI SAINS MALAYSIACST 233 Information Security and Assurance
ASSIGNMENT 3
BIOMETRIC- FINGERPRINT
LECTURER : DR. AMAN JANTAN
NAME : OH YING SAN
-
7/31/2019 Biometric Fingerprint
2/21
1 BIOMETRIC- FINGERPRINT WHITE PAPER
Table of Contents
1.0Abstract..32.0 Introduction3-43.0Why We Need Fingerprint5
3.1Uniqueness of Fingerprint.5 3.2Accuracy of Fingerprint63.3Efficiency/ Speed of Fingerprint For Use In Identification..6
4.0Types of Fingerprints...74.1Types of Fingerprints Pattern..7
4.1.1 Arch Pattern...74.1.2 Loop Pattern..84.1.3 Whorl Pattern9
4.2Types of Lines Found In Fingerprints..105.0How Does Fingerprints Biometric Works11
5.1Acquisition/ Enrollment Process125.2Preprocessing Process..125.3Feature Extraction Process.135.4Matching Process..13
6.0The Issues that We Need to Concern About.156.1Security Issues.156.2Privacy Issues16
7.0Case Study.177.1States Beat Benefit Fraud177.2Bank Services at Your Fingertips18
8.0Conclusion18 9.0References20
-
7/31/2019 Biometric Fingerprint
3/21
2 BIOMETRIC- FINGERPRINT WHITE PAPER
1.0AbstractAuthentication by biometric is becoming increasingly common in corporate and
public security systems, customer electronics and so on. To prevent identity theft,
biometric data is usually encrypted when its gathered.
This paper will shows how the biometric verification phase by phase works and
the issues that we need to concern about when we are using the biometric
devices such as privacy and the security. In addition, the types of fingerprints
will further discuss below.
2.0IntroductionBiometric is a technology used for measuring and analyzing to identify and verify
humans characteristic and traits. [6] There are many types of physical
biometrics technologies such as fingerprint, iris, retina, hand, palm vein and face.
Among all the biometric techniques, fingerprint-based identification is the oldest
method and extremely useful biometrics since the last nineteenth century which
has been successfully used in numerous applications and recognized as a primary
accurate identification method. Even with the recent advancements made in the
field of DNA analysis, the biometric fingerprint is still commonly used whether it
has been taken in the traditional way using ink and paper as shown in Figure 1
or scanned into a computer database to record peoples unique characteristics.
-
7/31/2019 Biometric Fingerprint
4/21
3 BIOMETRIC- FINGERPRINT WHITE PAPER
As we know that, everyone is known to have unique, immutable fingerprints and
consistency for over time, thus the fingerprint identification is one of the well
known and publicized biometrics and it has been used for identification for over a
century. Besides that, the inherent ease in acquisition, the numerous sources
(ten fingers) available for collection, and their established use and collections by
law enforcements and immigration. However, recently the biometric fingerprint
becoming automated due to the advancements in computer capabilities and
computer techniques are now widely used. Hence, the biometric fingerprint
always as a front-line security measure for both identity verification and crime
detection and also offers an effective crime deterrent.
There are a variety of hardware sensors types for biometric fingerprint such as
optical, capacitive, ultrasound and thermal are used to collect the digital image of
a fingerprint surface. Nowadays the most common sensor is the optical sensors
to take an image of the fingerprint. While the software for fingerprint matching
techniques can be classified into two which are minutiae-based matching and
pattern matching. The most widely used software recognition technique is
Figure 1: The example of biometric
fingerprint by using the ink & paper
method. [2]
-
7/31/2019 Biometric Fingerprint
5/21
4 BIOMETRIC- FINGERPRINT WHITE PAPER
minutiae-based matching as it can relies on the minutiae points and specifically
the location and direction of each point.
Last but not least, biometric fingerprint is one of the most highly used methods
for human recognition. This is because fingerprints have been acceptance by the
general public, law enforcement, and the forensic science. Therefore, in this
white paper will be focus on the reasons and issues related to the fingerprint
type of fingerprint, how the fingerprint works and the real cases regarding the
biometric fingerprint.
-
7/31/2019 Biometric Fingerprint
6/21
5 BIOMETRIC- FINGERPRINT WHITE PAPER
3.0Why we need fingerprint?Nowadays, we live in an anonymous information society characterized by
increasing global mobility. The traditional methods such as PIN or passwords for
identifying and verifying peoples characteristics are not enough because it is
very difficult to remember the long password and the level of the security is not
as high compare to the fingerprint technique. Hence, biometric fingerprint
become a necessity for sensitive work processes in the public and private sectors.
There are a few main reasons of why we need the fingerprint for identifying
peoples characteristics.
3.1 Uniqueness of FingerprintAs we know that, all of the fingerprints have a unique combination and
arrangement of patterns and ridge characteristics. Hence, no two prints have
ever been found to be exactly alike with one another, even those of identical
twins print are different. This is because the fingerprints are not inherited,
although the general pattern may be the same in families but there are some
level of the fingerprint will differ. Due to this reason, the fingerprint technique
has been widely used for electronic passport which stores two fingerprints in the
database. As such, fingerprint techniques are powerful tools for security and
other operations that require authentication or identification of peoples unique
fingerprint.
-
7/31/2019 Biometric Fingerprint
7/21
6 BIOMETRIC- FINGERPRINT WHITE PAPER
3.2 Accuracy of FingerprintThe fingerprint recognition technique is the dominant technology in the biometric
market due to the high level of accuracy. It is proven that the fingerprint
recognition technology may reach recognition rate near 100% in good quality
images. Although there are 2% of the populations have poor quality of
fingerprint especially the elder people and manual workers. In fact it is very
difficult to obtain reliable fingerprints images from these populations. However,
the fingerprint technologies are still able to achieve the correct level of security
and accuracy of the fingerprint without overly inconveniencing the user.
3.3 Efficiency/Speed of Fingerprint For Use In IdentificationThe principle of recognition by comparisons of the fingerprints has speed up
border crossing through the use of scanners. Many countries have set up the
fingerprint technique to confirm the identity of the bearer of the card and to
control migration flows to and from their territories. Hence, the fingerprint
scanners help to identify the people in a more precise and reliable way as well as
increase the efficiency of the process. Nevertheless, the fingerprint technique has
the ability to enroll multiple fingers when there are some problems with one
finger such as injured then it still can used the other 9 fingers to improve the
recognition. Therefore, the successful development effort of the biometric
fingerprint enhanced the end user experienced by providing added convenience
and faster speed for secure network access and identification fingerprint.
-
7/31/2019 Biometric Fingerprint
8/21
7 BIOMETRIC- FINGERPRINT WHITE PAPER
4.0Types of FingerprintsThe types of fingerprint can be divided into two parts, one is types of fingerprint
pattern and another one is types of line found in fingerprints. In order to identify
peoples characteristics by using the fingerprint technique, it is necessary to
understand and familiar with the types of fingerprint on the finger. This is due to
avoid the error occur in identifying and verifying peoples fingerprint.
4.1Types of Fingerprints PatternThe fingerprint patterns are divided into three main groups which are arches,
loop and whorls. Approximately five percent of all fingerprints are arches, 30%
are whorls and 65% are loops.
4.1.1 Arch Pattern
Figure 2: The picture of the arch pattern [3]
An arch is a pattern of fingerprint where the ridge enters one side of the finger,
then rises in the centre forming an arch, and exits on the other side of the finger.
-
7/31/2019 Biometric Fingerprint
9/21
8 BIOMETRIC- FINGERPRINT WHITE PAPER
As what we can see from the Figure 2 above, the arch pattern is like a hill
starting from one side and stopping on the other. Arch pattern can divided into
two groups which are plain arches and tented arches. A plain arch is the simplest
while the tented arch is similar to a plain arch except that instead of rising
smoothly at the centre, there is a sharp upward thrust or spike, causes the
centre of the print to look like a tent. Arch pattern is the least common of
fingerprint patterns as it contain no deltas or cores.
4.1.2
Loop Pattern
Figure 3: The picture of the loop pattern [3]
The Figure 3 illustrates the loop pattern, with a loop the ridge enters one side of
the finger, then forms a curve and then exits on the same side of the finger from
which it entered. This results when one core and one delta is present. In fact, by
looking at the middle of the fingerprint, we can see that a loop looks like a jump
rope turned upside down and each line starts on one side and returns to that
side. Eventually, loops are the most common pattern in fingerprints.
-
7/31/2019 Biometric Fingerprint
10/21
9 BIOMETRIC- FINGERPRINT WHITE PAPER
4.1.3 Whorl Pattern
Figure 4: The picture of the whorl pattern [1]
The last fingerprint pattern is the whorl pattern as shown in the Figure 4; whorls
are divided into four groups which are plain whorl, central pocket loop and
accidental. All whorls contain one or more cores and a minimum of two deltas. A
whorl is the pattern when ridges form circularly around a central point.
Somehow, it looks like a pebble thrown in the water. A plain loop and central
pocket loop have at least one ridge while the double loop is made up of two
loops combined into one fingerprint which looks like S shape. Then, any print
classified as an accidental either contains two or more patterns and may consist
of a combination loop.
-
7/31/2019 Biometric Fingerprint
11/21
10 BIOMETRIC- FINGERPRINT WHITE PAPER
4.2Types of Lines Found in FingerprintsIn fact, fingerprint patterns are made up of a few types of line which determine
the general classification characteristics of the print such as arch, loop or whorl.
The fingerprint pattern area is a term used to describe the center area of a print
which contains many types of lines. The following examples are typical of the
most common types of line found in fingerprint.
ROD
A rod generally forms a straight line and it has little to no
curve features and tends to be found in the center of the
fingerprints pattern area.
Eclipse
An eclipse is a circular or oval shaped line-type which is
generally found in the center of whorl patterns.
Spiral
A spiral line is a type of spiral out from the center of the
fingerprint and is generally found in whorl patterns.
Bifurcation
Bifurcation is the intersection of two or more line and
which lines are converge or diverge.
Tented
This line is quickly raised and falls at a steep angle. They
tend to be associated with tented arch pattern
Loop
A loop is a curve line which enters and leaves from the
same side of the fingerprint.
Table 1: Types of line found in fingerprint. [3]
-
7/31/2019 Biometric Fingerprint
12/21
11 BIOMETRIC- FINGERPRINT WHITE PAPER
5.0How Does Fingerprints Biometric WorksFingerprint is one of the most mature biometric traits and considered legitimate
proof of evidence in courts of law all over worldwide. Therefore, fingerprint is
used in forensic divisions worldwide for criminal investigations. Hence, we are
necessary to understand the way of fingerprint works in identification, matching
and the flow of the fingerprint verification system. Among all the biometric
techniques, fingerprint-based identification is the oldest method which has been
used widely. A fingerprint is made up of a series of ridges and furrows on the
surface of the finger. The uniqueness of a fingerprint can be determined by the
pattern of ridges and furrows as well as the minutiae points.
Figure 5: The flow of the verification fingerprint system [1]
-
7/31/2019 Biometric Fingerprint
13/21
12 BIOMETRIC- FINGERPRINT WHITE PAPER
5.1Acquisition/Enrollment ProcessIn a verification fingerprint system, the template fingerprint image is obtained in
the enrollment phase. The live-scan of fingerprints can classify into four
technologies such as optical, ultrasound, electric field and thermal. For example,
the optical technology-based scanners are based on the image of a fingerprint
touching the surface of a prism. After that verification process takes place by a
inputting the sample of the users fingerprint at sensor and it will divide in the
database which contains the different sets of fingerprint templates according to
the classification.
5.2Preprocessing ProcessSince the input fingerprint must be processed in the preprocessing step. The
preprocessing step includes image enhancement and gray level adjust. A critical
step in automatic fingerprint matching is to automatically and reliably extract
minutiae from the input fingerprint images. However, the performance of a
minutiae extraction algorithm relies on the quality of the input fingerprint images.
Hence, the enhancement algorithm are needed to improve the clarity of ridge
and furrow structures of input fingerprint images based on the estimated local
ridge orientation and frequency. After that, the image enhancement will be
improved based on the goodness index and the verification accuracy.
-
7/31/2019 Biometric Fingerprint
14/21
13 BIOMETRIC- FINGERPRINT WHITE PAPER
Figure 6: The picture shows the before and after the image enhancement. [4]
5.3Feature Extraction ProcessAfter the fingerprint image has been preprocessed, the feature extraction will
extracts the relevant information that will be used for matching with the
template fingerprint. An automatic recognition of peoples fingerprint requires
that the input fingerprint be matched with a large number of fingerprints in a
database. Hence, to reduce the search time and computational complexity so it is
desirable to classify these fingerprints in an accurate and consistent manner. The
fingerprint classification can by the fingerprint patterns such as arch, whorl or
loop and the type of lines found in the fingerprint. The fingerprint classifier based
on the features such as position and numbers of deltas found in the fingerprint.
The classification accuracy is 90% achieved in the feature extraction process.
5.4Matching ProcessFingerprint matching techniques can be placed into two categories which are
minutiae-based and correlation based. The minutiae-based techniques find the
minutiae points and map their relative placement on the finger. This is done by
comparing neighborhoods of nearby minutiae for similarity and a single
Before After
-
7/31/2019 Biometric Fingerprint
15/21
14 BIOMETRIC- FINGERPRINT WHITE PAPER
neighborhood may consist of three or more nearby minutiae. However, it is
difficult to extract the minutiae points accurately especially when the fingerprint
is low quality. While the correlation-based method able to overcome some of the
difficulties of the minutiae-based approach but it require the precise location of a
registration point and are affected by image translation and rotation. Finally a
verification decision is made with results or percentages of similarity obtained
from the matching process. Then, this template will not match with every
template in the database but it will matched with the template according to the
characteristics in the particular domain.
Figure 7: The minutiae-based technique in fingerprint matching process [2]
-
7/31/2019 Biometric Fingerprint
16/21
15 BIOMETRIC- FINGERPRINT WHITE PAPER
6.0The Issues that We Need to Concern AboutOne of our highest priorities in the world of information security is confirmation
that a person accessing sensitive, confidential or classified information is
authorized to do so. The fingerprint biometric can identify users based on their
characteristics or traits on their print. Individuals are concerned that security
systems be put in place that would prevent unauthorized access to personal data
and their identities cannot be stolen by others. Therefore, this section will be
discussed about the personal issues of privacy related to the fingerprint.
6.1Security IssuesWe need to understand how vulnerable data are to theft or abuse and how the
data are to be retained to optimize the security of the data. Fingerprint
recognition proved to be the most secure among the other biometrics and there
was no success in any of the efforts made to fool the device. In order to guard
against attacks, system that stores the biometric fingerprint database should do
encrypted format to protect the authentication information. Finally, security is
enhanced to secure server for authentication and decreases the data can be
tampered with.
-
7/31/2019 Biometric Fingerprint
17/21
16 BIOMETRIC- FINGERPRINT WHITE PAPER
6.2Privacy IssuesAlthough the biometric fingerprint does not make the users feel very
uncomfortable when used for the purpose of authentication and this method of
authentication is not too intrusive of their personal space. However, the users
are concerned with how and where information is stored, how it can be used and
who can access as they are not willing to exposure their personal information to
criminal and threat to their privacy. For example, someone can stole their
fingerprint to commit in crime and at the end the victims have to face the
criminal responsibility as the there is no one has the same fingerprint with each
other. Hence, if their information can be stored locally which provide easier
access and control and the concern about network attack then they are worried
the crime case will happen on them. While smart storage data make the users
feel more comfortable as the others cannot accessing or take their sample of
fingerprint for illegal purpose at the same time the security risks decreases.
-
7/31/2019 Biometric Fingerprint
18/21
17 BIOMETRIC- FINGERPRINT WHITE PAPER
7.0Case Study7.1States Beat Benefit FraudMany states are investigating and piloting biometric systems to identify benefit
recipients in order to reduce fraud and increase efficiency. One state's high-tech
benefit system checks for evidence of wrongdoing and creates identification
cards as clients enroll. Applicants place their index fingers on an optical reader
which scans the prints to create images for the database. At the same time, the
applicant's photo is taken with a digital camera. Next, the client signs his or her
name on a tablet that captures the signature electronically. All these files are
transmitted to a host computer, where, in minutes, search engines verify that
the person has not enrolled in the system under another identity.
After a client is accepted into the system, an identification card is created on the
spot. A two-dimensional symbol on the card encodes the fingerprint file. The
card also carries the client's photo and signature, and a magnetic stripe for
future use. Clients present their cards and have their fingerprint scanned for
verification when they collect benefits. In this state, 41 percent of General
Assistance and 31 percent of AFDC recipients failed to re-enroll in those
programs when the new identification cards were issued. This is attributed to the
deterrence factor the new system provides. Those who attempt multiple
enrollments will be caught; suspected fraud cases are now under investigation.
-
7/31/2019 Biometric Fingerprint
19/21
18 BIOMETRIC- FINGERPRINT WHITE PAPER
7.2Bank Services at Your FingertipsAn employee credit union has installed several unattended banking kiosks that
use fingerprint imaging to identify account holders for access to services. Credit
union members can enroll at the kiosks by touch screen input as they answer a
series of questions displayed on the screen. They then have to present each
finger for enrollment and have their photograph taken by a camera in the kiosk.
Once enrolled, members will be able to use the kiosks to make deposits and
withdrawals, complete loan applications, and more.
8.0ConclusionIn this white paper, I have introduced the biometric fingerprint, type of
fingerprint, how does the fingerprint identification works, the issues have to
taken into our considerations and the real cases regarding the biometric
fingerprint. Throughout this white paper, we know that the fingerprint is an
effective way to reduce time and achieve higher accuracy during the
identification process. The fingerprint technique able to scan the fingerprints that
have been found at a crime scene and automatically find and record the ridges,
whorls, arches or loops contained within. Hence, the fingerprint technique has
been bringing a lot of benefits to the people today and increase the efficiency of
the process.
-
7/31/2019 Biometric Fingerprint
20/21
19 BIOMETRIC- FINGERPRINT WHITE PAPER
Although the better fingerprint matching algorithms are used almost universally
today, but no algorithm can compensate for imperfect or missing images. In fact
it is extremely difficult or impossible to obtain reliable fingerprint images from a
significant percentage of the world population. There are many reasons that
fingerprints may be difficult to acquire, including genetic background, damagefrom manual labor, poor health and age and even the environmental conditions
can cause severe problems. However, the ideal fingerprint technique has to
achieve the correct level of security without overly inconveniencing the user.
Last but not least, the fingerprint biometric is a great way to authenticate users
due to the high accuracy, ease of use, uniqueness of the fingerprint and most
economical biometric technique. Besides that, the fingerprint technique can be
used for dozens of applications outside the scope of computer security and used
to find an offender according to traits left on the crime spot. Therefore,
fingerprint biometric has been successfully used in authenticating applications.
-
7/31/2019 Biometric Fingerprint
21/21
20 BIOMETRIC- FINGERPRINT WHITE PAPER
9.0References[1]:Fingerprints
https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/f
orensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+
line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp
5gb_0MTedd2z1NMcYSFWkg-
6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH
9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg
[accessed 9 May 2012]
[2]:Fingerprint Identification http://biometrics.cse.msu.edu/fingerprint.html
[accessed 9 May 2012]
[3]: Type of fingerprints
http://www.senseme.com/scripts/biometrics/fingerprints.htm
[Accessed 9 May 2012]
[4]:Biometric case
http://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asp
[Accessed 10 May 2012]
[5]: Biometrichttp://www.biometrics.gov/documents/fingerprintrec.pdf
[Accessed 10 May 2012]
[6] Biometrichttp://searchsecurity.techtarget.com/definition/biometrics
[Accessed 10 May 2012]
https://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttp://biometrics.cse.msu.edu/fingerprint.htmlhttp://biometrics.cse.msu.edu/fingerprint.htmlhttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://searchsecurity.techtarget.com/definition/biometricshttp://www.biometrics.gov/documents/fingerprintrec.pdfhttp://www.aimglobal.org/technologies/biometrics/casestudy_biometrics.asphttp://www.senseme.com/scripts/biometrics/fingerprints.htmhttp://biometrics.cse.msu.edu/fingerprint.htmlhttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJghttps://docs.google.com/viewer?a=v&q=cache:RHUobza5ts0J:www.bsapp.com/forensics_illustrated/forensic_text_adobe/text_unit_4_fingerprints.pdf+types+of+line+in+fingerprint&hl=en&gl=my&pid=bl&srcid=ADGEEShj8ACdx91DkQO4eyxp5gb_0MTedd2z1NMcYSFWkg-6VqQ3zP4IYM2nmhqavI5d2XKSTcGdICh01tJCqjUU_XoG66T9PHipOmPdE3fkplDH9A8r__DIu46-keC6byrJP1rNrBhy&sig=AHIEtbR1bjrm-8dAqTI0n8ALReP8kTSDJg