Open Access Open Access  Restricted Access Subscription or Fee Access

Designing of a Virtual System with Fingerprint Security by Considering Security Threats

Kalpana Saini, M.L. Dewal, Rajeev Kumar


We have taken Biometrics i.e. fingerprint for this purpose which is the most reliable security tool for security of the system Fingerprint recognition has long been favored among many biometric identification technologies due to its uniqueness and permanence. Nowadays, fingerprint recognition is considered to be the best choice for most applications from network security systems to compact devices, due to its accuracy, speed, reliability, non-intrusive interfaces, and cost-effectiveness. We have made a fingerprint matching system using MATLAB. After collecting the database we provide a security to a virtual process that has been designed in LABVIEW and make an efficient HMI. The fingerprint recognition system may suffer attacks at different points during the authentication process. Sometimes the fingerprints gives 100% matching but it may be false fingerprint. The most common attacks occur by the use of fake fingerprint during the capture of image. The transmission channel between the feature extractor and matching may also be intercepted and the fingerprint feature may be stored for the later use. The main problem relies on how to differentiate a live finger from that one made of some synthetic material. In This Paper we discuss the all such type of attacks as well as some other interesting and other topics related to fingerprints like these may be damage or stolen by some person and effect of illness to them. This paper gives an approach to remove such type of attacks by using a virtual system. Along with this virtual system some aspects related to secure fingerprint is also be considered in this paper.


Authentication, Biometrics, Fingerprint recognition, HMI.

Full Text:



Maltoni, D., Maio, D., Jain, A.K., & Prabhakar, S. (2003). ―Handbook of fingerprint recognition‖. New York: Springer..

Thomas Yeo, Wee Peng Tay, Ying Yu Tai., ―Image Systems Engineering Program‖, Stanford University. Student project.

L.C. Jain, U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui. Intelligent biometric techniques in fingerprint and face recognition. 1999, the CRC Press.

N. Ratha, S. Chen and A.K. Jain, "Adaptive Flow Orientation Based Feature Extraction in Fingerprint Images", Pattern Recognition, Vol. 28, pp. 1657-1672, November 1995.

Ko, T. (2005). ―Multimodal biometric identification for large user population using fingerprint, face and iris recognition‖. Proceedings of the 34th Applied Imagery and Pattern Recognition Workshop, 218-223.

Luo, X., Tian, J., & Wu, Y. (2000). ―A minutia matching algorithm in fingerprint verification‖. 15th International Conference on Pattern Recognition, 4, 833-836.

Patil, P.M., Suralkar, S.R., & Sheikh, F.B. (2005). ―Rotation invariant thinning algorithm to detect ridge bifurcations for fingerprint identification.‖ Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence, 634-641.

Ross, A., Jain, A. K., Reisman, J.: ―A Hybrid Fingerprint Matcher, Pattern Recognition‖, Vol. 36, No. 7, (2003) 1661-1673.

A. Jain, L. Hong, S. Pankanti, and R. Bolle ―On-line identity-authentication system using fingerprints‖, Proceedings of IEEE (Special Issue on Automated Biometrics), vol. 85, pp. 1365–1388, September 1997.

Ito, K., Morita, A., Aoki, T., Higuchi, T., Nakajima, H., & Kobayashi, K. (2005), ―A fingerprint recognition algorithm using phase-based image matching for low quality fingerprints‖ Proceedings of IEEE International Conference on Image Processing, 2, 33- 36.

Jain, A.K., Ross, A., & Prabhakar, S. (2004). ―An introduction to biometric recognition‖ IEEE Transactions on Circuits and Systems for Video Technology, 14, 4-20.

T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. ―Impact of artificial ’gummy’ fingers on fingerprint systems‖. In proceedings of SPIE, vol. 4677, Jan 2002.

D.Maio and D. Maltoni. ―Direct gray-scale minutiae detection in fingerprints‖. IEEE Trans. Pattern Anal. And Machine Intell., 19(1):27-40, 1997.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.