Free Essay

Fingerprint

In:

Submitted By mehakshah
Words 2109
Pages 9
Operating System – CS 407
Spring 2014 (BE (CS))

Course contents
Overview of Operating System Objectives and functions of operating system A brief overview of computer architecture
Concept of process States of process; Process control block; Address space
Threads and processes Concept of threads; context of a thread Symmetric Multiprocessing (SMP) Microkernel architecture of Operating system
Concurrency, Mutual exclusion and Synchronization Principles of concurrency Hardware support for mutual exclusion Semaphores and monitors Synchronization through message passing
Deadlock and Starvation Deadlock prevention, avoidance and detection Algorithms for deadlock prevention, avoidance and detection
Memory management Requirements; Memory partitioning; paging and segmentation Virtual memory management and operating system support
Processor Scheduling Types of scheduling and scheduling algorithms Multiprocessor scheduling and real-time scheduling
I/O Management and Disk Scheduling Organization of I/O devices; Buffering Disk scheduling; Disk cache RAIDs
File management File organization and file directories File sharing and record blocking Secondary storage management
Protection and Security Computer security; Threats and attacks Viruses, Worms and Bots Authentication and access control Intrusion detection and malware defence
Distributed processing and Networks Communication architecture; Client/server computing Distributed message passing; Remote procedure calls

Text Book Operating Systems – Internals and Design Principles William Stallings – Sixth or Seventh Edition
Reference books 1. Operating System Concepts Silberscahtz and Galvin – 8th Edition 2. Modern Operating Systems Andrew S. Tanenbaum – 3rd Edition 3. Operating Systems Gary Nutt – 3rd Edition

Session Evaluation Marks Distribution (Total = 30) Test 10 marks Midterm 15 marks Quizzes, etc. 5 marks

Course Instructor Prof. Hasina Khatoon hkhatoon@neduet.edu.pk

Consultancy hours Monday and Thursday 14:00 to 16:00 hours

BASIC ELEMENTS OF A COMPUTER

Operating system exploits its resources to provide services to users Manages system including secondary storage and I/O devices
Basic elements of a computer include: Processor I/O modules Main memory System bus
Processor consists of a set of registers User-visible registers Data registers Address registers Index register Segment pointer Stack pointer Control and status registers Program counter (PC) Instruction register (IR) Condition code/ Flags register

Instruction execution goes through a cycle Instruction cycle Fetch and execute

A much simplified view of instruction format and the various steps of instruction execution cycle

Interrupts Mechanism to interrupt the normal sequencing of the processor
Classes of interrupts Interrupts from a program Timer I/O interrupts Hardware failure (not an exhaustive list)
Interrupts and execution cycle Suspend the program and handle the interrupts When? Interrupt step is added at the end of the steps of instruction execution

The process of interrupt handling – Intel 8086/8088

Multiple interrupts and their priorities Sequential order Priority-based interrupts Pre-emptive and non-preemptive interrupts

Multiprogramming Why is it required? Long I/O waits put the processor in idle state Program is context-switched

The memory hierarchy Parameters that describe the memory hierarchy Capacity Speed Cost
Build a memory hierarchy that gives high capacity at a fats speed and at a low cost

Behaviour of the hierarchy while moving from top to the lower levels Decreasing cost per bit Increasing capacity Increasing access time Decreasing frequency of access by the processor
Hierarchy is comprised of Registers Cache memory Main memory Secondary storage

For a two-level hierarchy T = H1 t1 + (1 – H1) t2 Speed is desired to be close to the speed of the 1st level. How? Due to principle of locality of reference Applicable to more than two levels of memory

Cache memory Working and Mapping schemes

Key elements of cache design Cache size Block size Mapping function Replacement algorithm Write policy

I/O communication techniques Programmed I/O Interrupt-driven I/O Direct memory Access (DMA) (estimate the level of understanding of the above topics)

OPERATING SYSTEM OVERVIEW

OBJECTIVES OF THE OPERATING SYSTEM An OS is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware

Three main objectives Convenience Efficiency Ability to evolve

OS as an Interface between a User and a Computer
A user is not concerned with the details of the computer hardware A layered structure of the system Fig. 2.1 Collection of system programs form the OS to ease the task of application programmer

Utilities or library programs are a set of system programs that implement frequently used functions Program creation Management of files Control of I/O devices
Services provided by the OS • Program development e.g. editors and debuggers – application program development tools • Program execution: Load program into memory Initialize memory, I/O devices, files, etc. • Access to I/O devices OS provides a uniform interface for all types of I/O devices • Controlled access to files Controls access to files while providing a protection mechanism • System access OS controls access to system resources and resolves conflicts during resource contention • Error detection and response • Accounting OS collects usage statistics for various resources Future enhancements and tuning for improving system performance

Operating System as a Resource Manager All resources are controlled by a set of OS programs
Kernel or nucleus which is resident in the main memory contains the most frequently used functions of the OS Rest of the main memory is managed by the OS and allocated to user programs I/O devices and other resources are also managed by the OS
Ability of the OS to Evolve
The OS must evolve over the passage of time because of a number of reasons 1. Hardware upgrades and addition of new types of hardware 2. Addition of new services 3. Repair of faults as and when they occur
System should be modular with clearly defined interfaces to achieve the above objectives

THE EVOLUTION OF OS Earliest computer system has no OS – serial processing took place User interacted directly with the computer
Problems identified: Scheduling and Set-up time

Simple Batch systems were designed with monitor program to control the sequential processing of application programs User program interacted with the monitor
Resident monitor had features of interrupt processing, device drivers, job sequencing and Command Line Interpreter (CLI)

Monitor point of view
Processor point of view Processor executes both monitor and application program instructions
A Job Control Language (JCL) is used by the application to interface with the monitor

In addition to monitor program, other hardware features were also desirable 1. Features for memory protection 2. Timer for job timing 3. Privileged instructions to be executed only by the monitor 4. Interrupt mechanism to relinquish and regain control from user programs

User mode and kernel mode of operation Overhead of monitor is also incurred
A high CPU idle time was still there because of long I/O waits
Multiprogramming or multitasking were used to avoid this large idle time

Multiprogramming batch system Memory management features were required Several programs are in memory at the same time An algorithm for scheduling is required Select one of several jobs for execution

Time sharing systems Multiple interactive jobs need time sharing when run in multiprogrammed mode
Key differences between batch multiprogramming and time sharing systems Objective and source of directives to the OS

Major Advances in the Development of Operating system • Processes • Memory management • Information protection and security • Scheduling and resource management • System structure

The process A program in execution An instance of a program running on a computer The entity that can be assigned to and executed on a processor A unit of activity characterized by a single sequential thread of execution, a current state and an associated set of system resources The concept of a process developed due to Multiprogramming batch operation Time sharing Real-time transaction systems
A number of errors occurred while synchronizing between various events, which were difficult to handle
There were four main causes of errors 1. Improper design of synchronization mechanism 2. Failed mutual exclusion More than one user/program attempted to use a shared resource at the same time A mutual exclusion mechanism was required 3. Non-determinate program operation The order in which programs are scheduled may affect the outcome of the program Due to sharing of memory and other resources 5. Deadlocks Two or more programs may be waiting on each other and do not progress

The process concept provides the foundation to deal with the above problems

Components of a process An executable program The associated data needed by the program The execution context of the program Process state Contents of processor registers – PC and data registers OS related information e.g. present state and the priority Process management requires a process list Process context including base and limit registers

Memory Management OS performs five storage management functions 1. Process isolation The OS must prevent processes from interfering with each other’s memory 2. Automatic allocation and management Memory allocation should be done dynamically across the memory hierarchy Should be transparent to the user 3. Support for modular programming Programmers should be able to create, destroy and alter the size of modules dynamically 4. Protection and access control Sharing of memory at any level should be controlled under user requirements 5. Long-term storage Information needs to be stored even after the system is powered-off

Virtual memory and file system facilities help the OS to deal with the above functions
File-system implements the long-term storage File is a useful unit of access control and protection for the OS

Virtual memory allows programs to address memory from a logical point of view without considering the amount of physical memory available VM allows viewing programs comprising of blocks called pages
Virtual address – Page number and offset within the page

Dynamic mapping between virtual address and real or physical address is performed by the paging system
All pages of a process may not be in memory at the same time VM management module loads a required page in memory if it is not in memory

Address translation hardware and address translation mechanism

Information Protection and Security Problem of controlling access to the computer system and protect the information stored in them
The characteristics can be categorized into four categories 1. Availability: protecting the system against interruption 2. Confidentiality: User should not data for which the access is unauthorized 3. Data integrity: Protection of data against unauthorized modification 4. Authenticity: Proper identification and verification of users and validity of messages or data

Scheduling and Resource Management Manage resources and schedule their use by various active processes
A resource allocation and scheduling policy should consider the following three factors:
1. Fairness: Fair access to resources should be given to all competing processes
2. Differential responsiveness: OS needs to discriminate among different classes of jobs with different service requirements
3. Efficiency: The OS should maximize throughput, minimize response time and accommodate as many users as possible

All the conflicting requirements must be balanced
OS maintains a number of queues that contain a list of processes waiting for each of the resources Short-term queue: Round-robin technique is generally used Long-term queue I/O queue: A unique I/O queue is maintained for each device

System Structure Size and complexity of OS have grown over time
Four problems have emerged due to the above 1. OS are late in being delivered, especially the updates 2. System has bugs that can be fixed in the field 3. Performance is often not what was expected 4. OS is vulnerable to a variety of security attacks, including viruses and worms

A modular structure of the OS has been proposed to overcome the above problems Layered architecture is preferred with levels of OS layers

Hierarchical model of modern OS
Level 1: Electronic circuits – Registers, memory cells, etc. Operations are – clearing a register or read a memory location
Level 2: The processor’s instruction set Allowed machine language instructions
Level 3: Adds the concept of a procedure or a subroutine
Level 4: Interrupts that cause the processor to save current context and invoke an ISR

The above are not actually a part of OS, but the OS begins to appear at level 4
Level 5: The notion of a process Cooperation between processes, synchronization, etc.
Level 6: Secondary storage devices of the computer Scheduling, etc.
Level 7: Creates a logical address space for processes Organizes the virtual address space Fixed-size pages, variable-size segments, both pages and segments
Level 8: Communication of information and messages between processes
Level 9: Supports the long-term storage of named files
Level 10: Provides access to external devices using standardized interfaces
Level 11: Maintains the association between the external and internal identifiers of the system’s resources and objects
Level 12: Full-featured facility for support of processes
Level 13: Provides and interface to the OS for the user – shell

The Concept of Virtual Machines

Similar Documents

Free Essay

Fingerprints

...Elliott CRJ 202 Mr. Scott March 11, 14 Fingerprints For over a century, law enforcement agencies, forensic laboratories, and penal courts worldwide have used fingerprint impressions as reliable and conclusive evidence to identify perpetrators of criminal activity. Although fingerprint identification has been repeatedly proven as one of the most robust and definite forensic techniques, a measure of the rate at which latent fingerprints degrade over time has not been established effectively. Ideally, criminal investigators should be able not only to place any given individual at a crime scene but also be able to date the moment any latent fingerprints were deposited at the location. The present report aims to determine particular visual patterns of degradation of latent fingerprints exposed to certain monitored laboratory conditions simulating those in the field. Factors considered include temperature, relative humidity, air currents, composition of fingerprint depositions (sebaceous and eccrine), various exposures to daylight (direct, penumbra, and darkness), and type of physical substrate (glass and plastic) over a period of 6 months. The study employs a titanium dioxide-based powder as developer. Our results indicate that, contrary to common belief, certain latent fingerprints exposed to direct sunlight indoors degrade similarly to those in the dark where environmental conditions are more constant. While all sebaceous latent fingerprints on glass are still useful for identification...

Words: 814 - Pages: 4

Premium Essay

Fingerprints

...Fingerprints Fingerprints have always been a form of identification. This is probably the reason why fingerprints have supplanted most methods of identifying criminals that deny ever being arrested or even committing the crime. Identifying fingerprints has become a science and it also stands out to many other forensic sciences ( www.onin.com). The science of fingerprints, has helped many governments around the world, presenting them with correct discovery of criminals There are millions of people on this planet and never have 2 fingerprints been found that are alike within humans and automated computer comparisons (www.onin.com). No 2 humans have the same finger, palm or footprint. These parts of the human body have ridges that are constantly broken up by endings or forks; these are called characteristics (www.south-wales.police.uk). Every person has unique distributions of the characteristics that build up in womb and throughout life in general, these characteristics stay the same for a time after death too so it makes identifying a body possible People have often tried to alter their fingerprints with different methods like cutting their fingerprints, burning the skin with acid but that doesn’t work because, superficial skin damage is repaired by the body so the same ridges come back with the new skin that forms Fingerprints are formed by our skin and our skin is made out of two layers, dermis and epidermis. The epidermis is a thin layer and it is a protective cover...

Words: 1139 - Pages: 5

Premium Essay

Fingerprint

...Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer Science and Engineering by Rishabh Mishra (Roll no. 107cs016) and Prashant Trivedi (Roll no. 107cs015) Under the guidance of : Prof. B. Majhi Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Orissa, India 2 . Dedicated to Our Parents and Indian Scientific Community . 3 National Institute of Technology Rourkela Certificate This is to certify that the project entitled, ‘Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching’ submitted by Rishabh Mishra and Prashant Trivedi is an authentic work carried out by them under my supervision and guidance for the partial fulfillment of the requirements for the award of Bachelor of Technology Degree in Computer Science and Engineering at National Institute of Technology, Rourkela. To the best of my knowledge, the matter embodied in the project has not been submitted to any other University / Institute for the award of any Degree or Diploma. Date - 9/5/2011 Rourkela (Prof. B. Majhi) Dept. of Computer Science and Engineering 4 Abstract Our project aims at designing an student attendance system which could effectively manage attendance of students at institutes like NIT Rourkela. Attendance is marked after student...

Words: 14646 - Pages: 59

Premium Essay

Anatomy of Fingerprints

...Anatomy of Fingerprints The two fundamental principles of fingerprint identification are that fingerprints are permanent and unique in its nature. This states that fingerprints never change and no two fingerprints are the same (The Basics of Fingerprint Science, 2014). Fingerprints attain their unalterable shape before birth and remain the same for a lifetime unless a permanent scar appears. That is why fingerprints are accepted as a substantial proof of identity which is exclusive to their owner (Azimi, 2013). The practice of utilizing fingerprints as a mean of identification is referred as dactyloscopy, which is an indispensable aid to modern law enforcement (Hoover, 2016). The significance of fingerprint was discovered in late 19th century. Before then, people regarded fingerprints as ordinary curves without any specific importance or meaning. In Quran, Allah points to the fingertips which did not attract anyone’s attention at that time, and calls our attention to their importance in the fourth verse of surah Al-Qiyamah. The verse states “Yes, we are able to put together in perfect order the very tips of his fingers.” (Azimi, 2013) Formation of fingerprints Fingerprint is an impression made by the papillary ridges on the ends of the fingers. It afford an infallible means of personal identification, because the ridge arrangement on every finger of every human being is unique and does not alter with growth or age. It also serve to reveal an individual’s true identity despite...

Words: 1627 - Pages: 7

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Free Essay

Student Attendance with Fingerprint

...Table of Contents 1 Frontal Materials…………………………………………………………………………i 1.1 List of Figures………………………………………………………………………..i 1.2 List of Tables………………………………………………………………………..ii 1.3 List of Symbols…………...………………………………………………………..iii 1.4 List of Definitions…………………………………………………………………..iv 2 Introductory Materials…….…………………………………………………………….1 2.1 Executive Summary…………………………………………………………………1 2.2 Acknowledgment……………………………………………………………………2 2.3 Problem Statement…………………………………………………………………..2 2.4 Operating Environment……………………………………………………………...2 2.5 Intended Users and Uses…………………………………………………………….2 2.6 Assumptions and Limitations……………………………………………………….3 2.7 Expected End Product and Other Deliverables………………………………….…..3 3 Approach & Results……………………………………………………………………..4 3.1 Functional...

Words: 9087 - Pages: 37

Free Essay

Crj 311 Week 4 Dq 2 Fingerprint Evidence

...CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK...

Words: 697 - Pages: 3

Premium Essay

Introduction to Fingerprint Based Student Attendance

...becoming the foundation for highly secure identification and personal verification solutions./ Biometric applications have the potential to offer much more robust authentication/identification security than traditional systems (eg: passwords or pass codes ,PINs , tokens). The main goal of applying biometrics to user authentication is to provide security to users and detect imposters in terms of users physiological (e.g. fingerprint, face, iris, hand) or behavioural characteristics (e.g. speech, keystroke dynamics). Owing to the unique biometric characteristic that every person possesses, utilization of the same can be done in a form of identity access management. Ever since their inception, Fingerprint based biometric authentication and verification systems have gained immense popularity and acceptance. This is primarily because of the ease of operation, installation and easy acquisition of the biometric feature, which in this case is a fingerprint. Implementing fingerprint recognition system is secure to use since the uniqueness of one’s fingerprint does not change in user’s lifetime. The popularity of mobile devices is undeniable. According to the International Data Corporation (IDC), more smartphones were sold in 2012 than desktop and laptop computers combined. This rise may be due to increasing functionality and technological advances which in turn supports greater functionality. Thus, the frequency with which smartphone owners use their devices, these devices ...

Words: 281 - Pages: 2

Premium Essay

Design and Implementation of a Bio-Metric (Fingerprint) Clocking System

...be very laborious using the conventional method of paper sheets and old file system method. Every corporate organization poses some standards concerning how attendance is to be confirmed for staff in offices. This is to enable the management of the organization identify those staff that are punctual and competent, that is why keeping the accurate record of attendance is very important. Also in institutions, tracking and monitoring staff time of attendance could pose a tedious task, time consuming and as well prone to errors. As an alternative to the traditional manual clocking process by staff in offices, biometrics characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System.  The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large offices where row count can take longer time. The trending concern in this modern age is regarding national security, identifying...

Words: 1919 - Pages: 8

Premium Essay

Two Different Area Where the Fingerprint Identify System Be Used

...Two Different Area Where The Fingerprint Identify System Be Used One of the area that used fingerprint scanner is in Hospital. This technology could help with the complex issue of positive patient identification. The first implementation of fingerprint identification was a standalone system in a single methadone clinic. It was that the hospital system had an opportunity to work out some of the initial issue with the system and to watch the technology mature, according to Catholic Health System Vice President of IT Jeff Baughan. The staff and the patient are asked to register via the “Personal Touch System.” After they registered, they can use their fingerprint to identify their identity. This provides much more consistency in patient identification than usually exists. This also an addition to assuring positive patient identification which is one of the main benefit of the product. Another benefit of the fingerprint identification system is that it can help to eliminate fraud. As a nonprofit, faith-based institution. By the way, the patient privacy is more secure. The patient’s information and personal details are protected by just the few hastily thought-out numbers in our passwords.  Hospital use fingerprint scanner to replace password to improve their efficiency in the medical field. This device allows the doctors to access medical records by swiping simply their fingers rather than typing passwords. This device brings a lot of benefit for the patients who are suffer in...

Words: 567 - Pages: 3

Premium Essay

Fingerprints

...Sherman Alexie ENG 150 – Critical Analysis Assignment Fingerprints Recently, I was introduced to a man named Sherman Alexie. See, what I liked about Sherman from the beginning was the dissimilarity we shared. Too often, as a society we get so caught up in the bait of commonality that we forget it’s the differences that make us individuals. His family was not like mine. The significant values that shape a young man’s life, like Sherman’s and mine, were founded on different life experiences and were respected on unfamiliar levels. I came to see he loved differently and for different reasons. He esteemed for different reasons and his perception on life was remarkable yet understated. Sherman had a way of seeing things… the realness he bestowed was astonishing, but more importantly, he was able to help me see differently too. You’re asking, “Where did you meet this Sherman Alexie?” The answer to that question is difficult to state because I feel like I’ve known him my whole life, but I doubt he’d say the same of me. The Absolutely True Story of a Part Time Indian is a novel by Sherman Alexie written for anyone willing to read it. It displays his inner deepest thoughts through the story of a young man named Junior. The great thing about being introduced to a man through his work is that he reveals himself to you through nothing but the deepest and best thoughts; and Sherman had many. Sherman Alexie was a Native American who grew up on a reservation in Spokane...

Words: 1658 - Pages: 7

Free Essay

Fingerprint

...1 Learning Fingerprint Reconstruction: From Minutiae to Image Kai Cao and Anil K. Jain, Fellow, IEEE Abstract—The set of minutia points is considered to be the most distinctive feature for fingerprint representation and is widely used in fingerprint matching. It was believed that the minutiae set does not contain sufficient information to reconstruct the original fingerprint image from which minutiae were extracted. However, recent studies have shown that it is indeed possible to reconstruct fingerprint images from their minutiae representations. Reconstruction techniques demonstrate the need for securing fingerprint templates, improve the template interoperability and improve fingerprint synthesis. But, there is still a large gap between the matching performance obtained from original fingerprint images and their corresponding reconstructed fingerprint images. In this paper, the prior knowledge about fingerprint ridge structures is encoded in terms of orientation patch and continuous phase patch dictionaries to improve the fingerprint reconstruction. The orientation patch dictionary is used to reconstruct the orientation field from minutiae, while the continuous phase patch dictionary is used to reconstruct the ridge pattern. Experimental results on three public domain databases (FVC2002 DB1 A, FVC2002 DB2 A and NIST SD4) demonstrate that the proposed reconstruction algorithm outperforms the stateof-the-art reconstruction algorithms in terms of both i) spurious ...

Words: 9735 - Pages: 39

Free Essay

Fingerprint

...Bagaimana Software, Hardware, Jaringan, dan Sistem Pengamanan yang Sesuai Untuk FEB UA Sehingga Dapat Meminimalisasi Kecurangan yang Ditimbulkan dari Penggunaan Absensi Manual ( Pembahasan Chapter 5,7,dan 8 ) [pic] Kelas J Kelompok III : Zulfa Nurrahma Fitriani 040913129 / 56 Wahyu Firmandani 040913139 / 57 Dian Yunitasari 040913193 / 63 Rosilia Alfianita 040913216 / 68 Fakultas Ekonomi dan Bisnis Universitas Airlangga 2011 BAB I PENDAHULUAN 1.1 Latar Belakang Salah satu syarat agar sistem perkuliahan dapat berjalan dengan baik adalah diperlukannya pencatatan kehadiran mahasiswa maupun dosen yang akurat. Akurat berarti data kehadiran tersebut dapat dipertanggung jawabkan keasliannya. Pencatatan kehadiran mahasiswa digunakan sebagai syarat untuk mengikuti UTS (Ujian Tengah Semester) dan UAS (Ujian Akhir Semester) yaitu minimal 75% mahasiswa harus menghadiri perkuliahan. Ini adalah salah satu regulasi dan kebijakan akademik yang berlaku saat ini. Selain pencatatan kehadiran mahasiswa digunakan sebagai catatan bahwa mahasiswa tersebut mengikuti perkuliahan dapat juga digunakan sebagai bahan pembanding prestasi mahasiswa. Sementara pencatatan kehadiran dosen digunakan untuk mengukur produktifitas belajar mengajar. Saat ini di Universitas Airlangga, khususnya di Fakultas Ekonomi dan Bisnis, masih menggunakan pencatatan kehadiran secara manual. Data kehadiran menggunakan media kertas yang masih kosong dan diisi oleh dosen dengan tanda tangan...

Words: 4946 - Pages: 20

Free Essay

Fingerprint

...That, I approached Jimboy Dela Torre, tried to talk with him to calm down, but instead of heeding, he faced upon me, throws punches hitting on my face and head that caused me outbalance and hammered into the concrete pavement. Still not contended, he kicked me several times until I became unconscious. Afterwhich, suspect fled off to unknown direction; That, I was rushed unconscious by my brother, Gaudencio Ganeron, who witnessed the incident to Kapalong District Hospital for medical attention, and subsequently referred to Davao Regional Hospital in Tagum City for further medical examination; That, I was confined and undergone head surgery at Davao Regional Hospital from October 4 to 15, 2012 (12 days) with the following findings/diagnosis: EPIDURAL HEMATO, LEFT TEMPOROPAREITAL SECONDARY TO MAULING and undergone procedure of CRANIECTOMY, LEFT FRONTOTEMPOROPAREITAL, EVACUTION OF HEMATOMA; BLOOD TRANSFUSION. Attached is the MEDICO-LEGAL CERTIFICATE issued by DR JOHN RODEL A ACOSTA of Davao Regional Hospital dtd October 22, 2012; That, I am executing this Affidavit to attest the truth of the foregoing facts and circumstances, and to file criminal charges against JOVANIE DELA TORRE y MANUEL, alias JIMBOY; IN TRUTH WHEREOF, I have hereunto set my hand and affixed my signature this 11TH day of April 2013 at Hall of Justice, Mankilam, Tagum City, Davao del Norte, Philippines. _____________________________ FORTUNATO P GANERON JR Affiant SUBSCRIBED AND...

Words: 275 - Pages: 2

Premium Essay

Journal

...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...

Words: 3558 - Pages: 15