Impact of Finger Type in Fingerprint Authentication View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2010

AUTHORS

Davrondzhon Gafurov , Patrick Bours , Bian Yang , Christoph Busch

ABSTRACT

Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%. More... »

PAGES

1-7

References to SciGraph publications

Book

TITLE

Security Technology, Disaster Recovery and Business Continuity

ISBN

978-3-642-17609-8
978-3-642-17610-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-17610-4_1

DOI

http://dx.doi.org/10.1007/978-3-642-17610-4_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052489285


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Norwegian University of Science and Technology", 
          "id": "https://www.grid.ac/institutes/grid.5947.f", 
          "name": [
            "Norwegian Information Security Lab, Gj\u00f8vik University College, P.O. Box 191, 2802, Gj\u00f8vik, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gafurov", 
        "givenName": "Davrondzhon", 
        "id": "sg:person.016427145551.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016427145551.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Norwegian University of Science and Technology", 
          "id": "https://www.grid.ac/institutes/grid.5947.f", 
          "name": [
            "Norwegian Information Security Lab, Gj\u00f8vik University College, P.O. Box 191, 2802, Gj\u00f8vik, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bours", 
        "givenName": "Patrick", 
        "id": "sg:person.012362475737.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012362475737.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Norwegian University of Science and Technology", 
          "id": "https://www.grid.ac/institutes/grid.5947.f", 
          "name": [
            "Norwegian Information Security Lab, Gj\u00f8vik University College, P.O. Box 191, 2802, Gj\u00f8vik, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yang", 
        "givenName": "Bian", 
        "id": "sg:person.014471467160.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014471467160.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Norwegian University of Science and Technology", 
          "id": "https://www.grid.ac/institutes/grid.5947.f", 
          "name": [
            "Norwegian Information Security Lab, Gj\u00f8vik University College, P.O. Box 191, 2802, Gj\u00f8vik, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Busch", 
        "givenName": "Christoph", 
        "id": "sg:person.011143356603.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://app.dimensions.ai/details/publication/pub.1028717201", 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-84882-254-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028717201", 
          "https://doi.org/10.1007/978-1-84882-254-2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-84882-254-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028717201", 
          "https://doi.org/10.1007/978-1-84882-254-2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1504/ijcat.2009.024079", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1067441352"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icar.2005.1507437", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094803106"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsa.2010.71", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095306812"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2010", 
    "datePublishedReg": "2010-01-01", 
    "description": "Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.", 
    "editor": [
      {
        "familyName": "Kim", 
        "givenName": "Tai-hoon", 
        "type": "Person"
      }, 
      {
        "familyName": "Fang", 
        "givenName": "Wai-chi", 
        "type": "Person"
      }, 
      {
        "familyName": "Khan", 
        "givenName": "Muhammad Khurram", 
        "type": "Person"
      }, 
      {
        "familyName": "Arnett", 
        "givenName": "Kirk P.", 
        "type": "Person"
      }, 
      {
        "familyName": "Kang", 
        "givenName": "Heau-jo", 
        "type": "Person"
      }, 
      {
        "familyName": "\u015al\u0119zak", 
        "givenName": "Dominik", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-17610-4_1", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-17609-8", 
        "978-3-642-17610-4"
      ], 
      "name": "Security Technology, Disaster Recovery and Business Continuity", 
      "type": "Book"
    }, 
    "name": "Impact of Finger Type in Fingerprint Authentication", 
    "pagination": "1-7", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052489285"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-17610-4_1"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "fa062942ec141a044045b202e9d923297dfa97a1e87adb95ec3e6ea3d8d16751"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-17610-4_1", 
      "https://app.dimensions.ai/details/publication/pub.1052489285"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T08:30", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000364_0000000364/records_72834_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-642-17610-4_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-17610-4_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-17610-4_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-17610-4_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-17610-4_1'


 

This table displays all metadata directly associated to this object as RDF triples.

126 TRIPLES      23 PREDICATES      32 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-17610-4_1 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Nde798047414b41968add1a9148770397
4 schema:citation sg:pub.10.1007/978-1-84882-254-2
5 https://app.dimensions.ai/details/publication/pub.1028717201
6 https://doi.org/10.1109/icar.2005.1507437
7 https://doi.org/10.1109/iccsa.2010.71
8 https://doi.org/10.1504/ijcat.2009.024079
9 schema:datePublished 2010
10 schema:datePublishedReg 2010-01-01
11 schema:description Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.
12 schema:editor N96234f0761c84ebf9689ad7096dcf72a
13 schema:genre chapter
14 schema:inLanguage en
15 schema:isAccessibleForFree false
16 schema:isPartOf N99703e2f6ade42b2b3b398d305fb78f9
17 schema:name Impact of Finger Type in Fingerprint Authentication
18 schema:pagination 1-7
19 schema:productId N5745d4cf869b40018ab0f455fd0e3054
20 N8716c9e0b701461fa11cd2388eacde41
21 Nbe6fa5f3041a4fe6bb7a088a3aee886b
22 schema:publisher N5df8df9002144981b1c6a7051b1d333a
23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052489285
24 https://doi.org/10.1007/978-3-642-17610-4_1
25 schema:sdDatePublished 2019-04-16T08:30
26 schema:sdLicense https://scigraph.springernature.com/explorer/license/
27 schema:sdPublisher N72b1ed6672a94b5ab3869e8285bdfde4
28 schema:url https://link.springer.com/10.1007%2F978-3-642-17610-4_1
29 sgo:license sg:explorer/license/
30 sgo:sdDataset chapters
31 rdf:type schema:Chapter
32 N14e0f0db4b6b4c11a0fbd041c4023831 rdf:first sg:person.014471467160.30
33 rdf:rest N1d6d699eda704e8a8771ecbc8c0d6b52
34 N1d6d699eda704e8a8771ecbc8c0d6b52 rdf:first sg:person.011143356603.69
35 rdf:rest rdf:nil
36 N2038ddb380a6413fae22acd774df220c rdf:first sg:person.012362475737.51
37 rdf:rest N14e0f0db4b6b4c11a0fbd041c4023831
38 N2f1f1eb1e3844afd9b12c4921cebae1a schema:familyName Fang
39 schema:givenName Wai-chi
40 rdf:type schema:Person
41 N30fd50e1b63649c7931d2c8da1d10c3b schema:familyName Arnett
42 schema:givenName Kirk P.
43 rdf:type schema:Person
44 N454de3bced184c1399b73a8f71d18448 rdf:first N888f54bb643b433eb6bce88880fa401f
45 rdf:rest Naaa3604faf8e433c88ae35347b5e192a
46 N5745d4cf869b40018ab0f455fd0e3054 schema:name doi
47 schema:value 10.1007/978-3-642-17610-4_1
48 rdf:type schema:PropertyValue
49 N5df8df9002144981b1c6a7051b1d333a schema:location Berlin, Heidelberg
50 schema:name Springer Berlin Heidelberg
51 rdf:type schema:Organisation
52 N72b1ed6672a94b5ab3869e8285bdfde4 schema:name Springer Nature - SN SciGraph project
53 rdf:type schema:Organization
54 N8716c9e0b701461fa11cd2388eacde41 schema:name readcube_id
55 schema:value fa062942ec141a044045b202e9d923297dfa97a1e87adb95ec3e6ea3d8d16751
56 rdf:type schema:PropertyValue
57 N888f54bb643b433eb6bce88880fa401f schema:familyName Khan
58 schema:givenName Muhammad Khurram
59 rdf:type schema:Person
60 N8fe2a447792945f69f6d77e8cbc3e966 rdf:first N2f1f1eb1e3844afd9b12c4921cebae1a
61 rdf:rest N454de3bced184c1399b73a8f71d18448
62 N95996e08aa4f4bcd8d4a0b57d320eac9 schema:familyName Kim
63 schema:givenName Tai-hoon
64 rdf:type schema:Person
65 N96234f0761c84ebf9689ad7096dcf72a rdf:first N95996e08aa4f4bcd8d4a0b57d320eac9
66 rdf:rest N8fe2a447792945f69f6d77e8cbc3e966
67 N99703e2f6ade42b2b3b398d305fb78f9 schema:isbn 978-3-642-17609-8
68 978-3-642-17610-4
69 schema:name Security Technology, Disaster Recovery and Business Continuity
70 rdf:type schema:Book
71 Naaa3604faf8e433c88ae35347b5e192a rdf:first N30fd50e1b63649c7931d2c8da1d10c3b
72 rdf:rest Ne90ebc32be934c86a0dc2e9213cc6a59
73 Nab4fe71077114300b81009179d3b100d schema:familyName Kang
74 schema:givenName Heau-jo
75 rdf:type schema:Person
76 Nb4114f6a5b544e5f9a0fdaa46a9f0c80 rdf:first Nc45488acc6f544a1bc9e96f364a3628f
77 rdf:rest rdf:nil
78 Nbe6fa5f3041a4fe6bb7a088a3aee886b schema:name dimensions_id
79 schema:value pub.1052489285
80 rdf:type schema:PropertyValue
81 Nc45488acc6f544a1bc9e96f364a3628f schema:familyName Ślęzak
82 schema:givenName Dominik
83 rdf:type schema:Person
84 Nde798047414b41968add1a9148770397 rdf:first sg:person.016427145551.22
85 rdf:rest N2038ddb380a6413fae22acd774df220c
86 Ne90ebc32be934c86a0dc2e9213cc6a59 rdf:first Nab4fe71077114300b81009179d3b100d
87 rdf:rest Nb4114f6a5b544e5f9a0fdaa46a9f0c80
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
92 schema:name Artificial Intelligence and Image Processing
93 rdf:type schema:DefinedTerm
94 sg:person.011143356603.69 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
95 schema:familyName Busch
96 schema:givenName Christoph
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69
98 rdf:type schema:Person
99 sg:person.012362475737.51 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
100 schema:familyName Bours
101 schema:givenName Patrick
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012362475737.51
103 rdf:type schema:Person
104 sg:person.014471467160.30 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
105 schema:familyName Yang
106 schema:givenName Bian
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014471467160.30
108 rdf:type schema:Person
109 sg:person.016427145551.22 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
110 schema:familyName Gafurov
111 schema:givenName Davrondzhon
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016427145551.22
113 rdf:type schema:Person
114 sg:pub.10.1007/978-1-84882-254-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028717201
115 https://doi.org/10.1007/978-1-84882-254-2
116 rdf:type schema:CreativeWork
117 https://app.dimensions.ai/details/publication/pub.1028717201 schema:CreativeWork
118 https://doi.org/10.1109/icar.2005.1507437 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094803106
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1109/iccsa.2010.71 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095306812
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1504/ijcat.2009.024079 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067441352
123 rdf:type schema:CreativeWork
124 https://www.grid.ac/institutes/grid.5947.f schema:alternateName Norwegian University of Science and Technology
125 schema:name Norwegian Information Security Lab, Gjøvik University College, P.O. Box 191, 2802, Gjøvik, Norway
126 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...