Friday, August 22, 2008

Fingerprint Scanners


Photo courtesy Siemens
A computer mouse with a built-in fingerprint scanner
  1. Introduction to How Fingerprint Scanners Work
  2. Fingerprint Basics
  3. Optical Scanner
  1. Capacitance Scanner
  2. Analysis
  3. Pros and Cons

Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.

In this article, we'll examine the secrets behind this exciting development in law enforcement and identity security. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.

Fingerprint Basics

Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips. How did this happen?

People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip things, in the same way a rubber tread pattern helps a tire grip the road.


The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events. The exact position of the fetus in the womb at a particular moment and the exact composition and density of surrounding amniotic fluid decides how every individual ridge will form.

So, in addition to the countless things that go into deciding your genetic make-up in the first place, there are innumerable environmental factors influencing the formation of the fingers. Just like the weather conditions that form clouds or the coastline of a beach, the entire development process is so chaotic that, in the entire course of human history, there is virtually no chance of the same exact pattern forming twice.

Consequently, fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences.

This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record. In the next few sections, we'll find out how scanners do this.

Optical Scanner

A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.

There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways.

The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites, which generate an electrical signal in response to light photons. Each photosite records a pixel, a tiny dot representing the light that hit that spot. Collectively, the light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image. See How Digital Cameras Work for details on CCDs and digital conversion.

The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. The CCD system actually generates an inverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges).

Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again.

If the darkness level is adequate, the scanner system goes on to check the image definition (how sharp the fingerprint scan is). The processor looks at several straight lines moving horizontally and vertically across the image. If the fingerprint image has good definition, a line running perpendicular to the ridges will be made up of alternating sections of very dark pixels and very light pixels.

If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file. We'll look at this process in a minute, but first we'll examine the other major scanning technology, the capacitive scanner.

Capacitance Scanner

Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current.

The diagram below shows a simple capacitive sensor. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, covered with an insulating layer. The cells are tiny -- smaller than the width of one ridge on a finger.


The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors. The details of its operation would fill an entire article by itself, but here we can get a general sense of what it does in a capacitance scanner. (Check out this page on operational amplifiers for a technical overview.)

Like any amplifier, an inverting amplifier alters one current based on fluctuations in another current (see How Amplifiers Work for more information). Specifically, the inverting amplifier alters a supply voltage. The alteration is based on the relative voltage of two inputs, called the inverting terminal and the non-inverting terminal. In this case, the non-inverting terminal is connected to ground, and the inverting terminal is connected to a reference voltage supply and a feedback loop. The feedback loop, which is also connected to the amplifier output, includes the two conductor plates.

As you may have recognized, the two conductor plates form a basic capacitor, an electrical component that can store up charge (see How Capacitors Work for details). The surface of the finger acts as a third capacitor plate, separated by the insulating layers in the cell structure and, in the case of the fingerprint valleys, a pocket of air. Varying the distance between the capacitor plates (by moving the finger closer or farther away from the conducting plates) changes the total capacitance (ability to store charge) of the capacitor. Because of this quality, the capacitor in a cell under a ridge will have a greater capacitance than the capacitor in a cell under a valley.

To scan the finger, the processor first closes the reset switch for each cell, which shorts each amplifier's input and output to "balance" the integrator circuit. When the switch is opened again, and the processor applies a fixed charge to the integrator circuit, the capacitors charge up. The capacitance of the feedback loop's capacitor affects the voltage at the amplifier's input, which affects the amplifier's output. Since the distance to the finger alters capacitance, a finger ridge will result in a different voltage output than a finger valley.

The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner.

The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.

Analysis

In movies and TV shows, automated fingerprint analyzers typically overlay various fingerprint images to find a match. In actuality, this isn't a particularly practical way to compare fingerprints. Smudging can make two images of the same print look pretty different, so you're rarely going to get a perfect image overlay. Additionally, using the entire fingerprint image in comparative analysis uses a lot of processing power, and it also makes it easier for somebody to steal the print data.

Instead, most fingerprint scanner systems compare specific features of the fingerprint, generally known as minutiae. Typically, human and computer investigators concentrate on points where ridge lines end or where one ridge splits into two (bifurcations). Collectively, these and other distinctive features are sometimes called typica.

The scanner system software uses highly complex algorithms to recognize and analyze these minutiae. The basic idea is to measure the relative positions of minutiae, in the same sort of way you might recognize a part of the sky by the relative positions of stars. A simple way to think of it is to consider the shapes that various minutia form when you draw straight lines between them. If two prints have three ridge endings and two bifurcations, forming the same shape with the same dimensions, there's a high likelihood they're from the same print.

To get a match, the scanner system doesn't have to find the entire pattern of minutiae both in the sample and in the print on record, it simply has to find a sufficient number of minutiae patterns that the two prints have in common. The exact number varies according to the scanner programming.

Pros and Cons

There are several ways a security system can verify that somebody is an authorized user. Most systems are looking for one or more of the following:
  • What you have
  • What you know
  • Who you are

To get past a "what you have" system, you need some sort of "token," such as an identity card with a magnetic strip. A "what you know" system requires you to enter a password or PIN number. A "who you are" system is actually looking for physical evidence that you are who you say you are -- a specific fingerprint, voice or iris pattern.

"Who you are" systems like fingerprint scanners have a number of advantages over other systems. To name few:

  • Physical attributes are much harder to fake than identity cards.
  • You can't guess a fingerprint pattern like you can guess a password.
  • You can't misplace your fingerprints, irises or voice like you can misplace an access card.
  • You can't forget your fingerprints like you can forget a password.

But, as effective as they are, they certainly aren't infallible, and they do have major disadvantages. Optical scanners can't always distinguish between a picture of a finger and the finger itself, and capacitive scanners can sometimes be fooled by a mold of a person's finger. If somebody did gain access to an authorized user's prints, the person could trick the scanner. In a worst-case scenario, a criminal could even cut off somebody's finger to get past a scanner security system. Some scanners have additional pulse and heat sensors to verify that the finger is alive, rather than a mold or dismembered digit, but even these systems can be fooled by a gelatin print mold over a real finger. (This site explains various ways somebody might trick a scanner.)

To make these security systems more reliable, it's a good idea to combine the biometric analysis with a conventional means of identification, such as a password (in the same way an ATM requires a bank card and a PIN code).

The real problem with biometric security systems is the extent of the damage when somebody does manage to steal the identity information. If you lose your credit card or accidentally tell somebody your secret PIN number, you can always get a new card or change your code. But if somebody steals your fingerprints, you're pretty much out of luck for the rest of your life. You wouldn't be able to use your prints as a form of identification until you were absolutely sure all copies had been destroyed. There's no way to get new prints.

But even with this significant drawback, fingerprint scanners and biometric systems are an excellent means of identification. In the future, they'll most likely become an integral part of most peoples' everyday life, just like keys, ATM cards and passwords are today.

For much more information about fingerprint scanners and other biometric technologies, check out the links on the next page.


Tux Paint

What it is: Tux Paint (http://www.tuxpaint.org) offers open source software aka FREE. Tux Paint is a painting and creativity program similar to Kid Pix. tuxpaint.org offers the free download for both Macintosh and Windows computers. Tux Paint is easy to use, includes fun sound effects, and a cartoon mascot who guides students as they use the program. Students use a variety of drawing tools to create masterpieces.

How to integrate Tux Paint into your curriculum: Use Tux Paint as part of your publishing center. Students can illustrate their writing pieces using Tux Paint. Tux Paint can be used to enhance your literacy program. For example, I use Tux Paint when I am introducing kids to the Caldecott award. Don’t Let the Pigeon Drive the Bus by Mo Willems is a Caldecott Award winning book. The Pigeon is created with very simple shapes and can be easily recreated with the tools in Tux Paint. As part of this unit, I let kids create their own Pigeons. They look so close to Mo Willems Pigeon that the students feel like successful, award winning artists. This program is flexible enough to use in math (think patterns, money units, etc.), science, and history.

Tips: Make sure you have printing abilities. The students will be proud of their work and want to print it out! Be sure to download the stamp set. This is a free download but offers hundreds of stamps (including money) that enhance this already great program. Visit the school page to find out how other schools have used Tux Paint to enhance their curriculum.

Allow students to save their masterpieces and upload them to Artsonia (see archive).

Dance Mat Typing

What it is: Dance Mat Typing is a British site that teaches kids typing with fun characters and voices. The site features correct ergonomics and correct hand and finger placement. Students work through 12 stages to become top typist.

Integrating Dance Mat Typing into your curriculum: Use Dance Mat Typing to boost your students typing skills. This will make all of their computer time more productive! Encourage students to practice their typing skills with this site at home as well as at school. Set aside time once a month for a typing olympics where students can showcase their typing skills.

Tips: Create a bookmark for Dance Mat Typing so students can quickly and easily access the site. Allow them to practice their typing as an “I’m done, now what” activity.

e-learning for Kids

What it is: e-learning for Kids offers schools free and unlimited use of their courseware and access up-to-date content on children and learning. e-Learning for Kids provides a fun place to help your students build and strengthen skills in math, science, reading, computers and keyboarding. The programs are designed for kindergarten through sixth graders.

How to integrate e-learning for Kids into your curriculum: You can easily incorporate the e-learning for Kids courses into your current curriculums. Match up the e-learning for Kids courses with your current curriculum. Students can work on specific skills and access the self-paced programs independently. Students will be engaged and work at a level where they can perform successfully.

Tips: e-learning for Kids offers a free CD version of the courses. This is the perfect solution for computers that are not connected to the Internet or have an unreliable connection.

iLearn Ezine

I have been working on a special project the last few months. Introducing iLearn ezine. This is an online education magazine for Mac users. The magazine is 26 pages, full color and includes articles about Mac OS Leopard in education, time saving tips, a lesson plan, iPods in education, and more. The ezine cost $1.00 and includes 3 templates to accompany the lesson plan. You can purchase the ezine at my new online store . But wait, there is more! If you are one of the first 10 to send me a request email, I will send you the iLearn ezine for free! Just send the request to ktenkely@chcc.org. Happy reading :)

Animoto for Education


What it is: There are some really neat online tools that I find that live in my Google Notebook for a long time (I have upward of 800 links for educational websites yet to post to iLearn Technology…and growing daily!) Some get pushed aside for my newest cool find, and some move to the bottom of the list because, while they may have educational value, they are not intended JUST for education and may have some questionable user created content that I wouldn’t want my students to stumble on. Animoto was one of these sites for me. It is an amazing and COOL tool but wasn’t necessarily geared just toward education. I got a fun email today that Animoto now has an education only site! Animoto for education is a site where students can create compelling and impressive digital content quickly and easily. It is the perfect addition to your classroom’s digital storytelling kit. It is very intuative and easy to use, in no time students have digital videos that they created! This is also an amazing place for you, the teacher, to create a video that will bring your lessons to life. You can post or embed videos on your class site or even, are you ready for this?, download for in class presentations. Animoto for Education makes it simple to mix audio and visual for a dynamic, unique presentation in no time. It is so easy to use that students could create a complete animoto presentation in one computer class.

How to integrate Animoto for Education into the classroom: Animoto for education is a great place for you to teach from. Make any lesson come to life with audio and visual, use at the beginning of the day as a ‘teaser’ for what your students can look forward to learning each day or use to teach complex concepts in history, math, science, or character education. Students will respond to new media in the classroom. Allow your students to display knowledge of a concept using Animoto. Use Animoto for Education for a beginning of the year get to know you activity. Students can each create an Animoto showcasing who they are through pictures and music. Animoto presentations are quicker to create than traditional PowerPoint type presentations making them ideal for digital storytelling in the classroom setting. Because Animoto is completely web-based, students can create videos from school and continue working on them at home. The ability to download videos is outstanding…students could save their work for offline viewing too!

Tips: Children under 13 can’t sign up for their own account. To use Animoto for Education with your students you can register your students with dummy accounts using dummy email addresses. Animoto is private to your school. This means that other people can’t come accross student videos or contact students through the site.

Web Tools 4U2 Use


What it is: Web Tools 4U2 Use is an incredible wiki created for school library media specialists to learn about cool new web tools, learn how they can be used in school library media programs, and share ideas and success stories. The links, tips, and information on this site are valuable for school library specialists but also for classroom teachers. Many of the ideas and tools on this site are ideal for classroom integration as well. The wiki is well organized and easy to navigate. Each section of the wiki gives “Five to Test Drive” giving the top 5 resources in each category and then “More to Explore” which gives additional resources and ideas on how they are being used in library media centers. You will also find links to tutorials and more information.

How to integrate Web Tools 4U2 Use into the classroom: Are you in need of some inspiration for your classroom? Looking for tools to help increase productivity? Need to make some brownie points with your school library media specialist? Web Tools 4U2 Use is a great site to share with colleagues, particularly your school library media specialist. Use this wiki as a place to be inspired, share with others, and learn. The wiki has excellent tools for you professionally to grow, as well as ideas for using web tools in your classroom.

Tips: Definitely send this site along to your school library media specialists, they will love it!