Externalized Fingerprint Matching
Externalized Fingerprint Matching
{claude.barral,jean-sebastien.coron,david.naccache}@gemplus.com
1 Introduction
Since the 9/11 tragedy fingerprints have rallied significant support as the bio-
metric technology that will probably be most widely used in the future.
The fingerprint’s strength is its acceptance, convenience and reliability. It
takes little time and effort for somebody using a fingerprint identification device
to have his or her fingerprint scanned. Studies have also found that using finger-
prints as an identification means is the least intrusive of all biometric techniques.
Verification of fingerprints is also fast and reliable. Users experience fewer errors
in matching when they use fingerprints versus many other biometric methods.
In addition, fingerprint identification devices usually require very little space
2
exceeds α, the two feature sets are declared as belonging to the same individual;
otherwise, they are assumed to belong to two different individuals.
Thus, there are two types of errors associated with a biometric system:
Minutiae matching is certainly the best known and most widely used method for
fingerprint matching. We refer the reader to [3] for a definition of the matching
problem that we recall here:
Let f (D) and f (D0 ) be the representation of the template and input fingerprint,
respectively. Here the representation f is a feature vector (of variable length)
whose elements are the fingerprint minutiae. Each minutia may be described by a
number of attributes, including its location in the fingerprint image, orientation,
type (e.g. ridge termination or ridge bifurcation), a weight based on the quality
of the fingerprint image in the neighborhood of the minutia, and so on. Most
common minutiae matching algorithms consider each minutia m as a triplet
{x, y, θ} that indicates the x, y minutia location coordinates and the minutia
angle θ:
where n and n0 denote the number of minutiae in f (D) and f (D0 ), respec-
tively.
A minutia m0j ∈ f (D0 ) and a minutia mi ∈ f (D) are considered matching, if
the spatial distance (sd) between them is smaller than a given tolerance r0 and
the direction difference (dd) between them is smaller than an angular tolerance
θ0 :
Externalized Fingerprint Matching 5
q
sd(m0j , mi ) = (x0j − xi )2 + (yj0 − yi )2 ≤ r0 (1)
and
dd(m0j , mi ) = min(|θj0 − θi |, 360◦ − |θj0 − θi |) ≤ θ0 (2)
Equation (2) takes the minimum of |θj0
− θi | and 360 − ◦
|θj0
− θi | because of
the circularity of angles (the difference between angles of 2 and 358◦ is only ◦
– scale has to be considered when the resolution of the two fingerprints may
vary (e.g. the two fingerprint images have been taken by scanners operating
at different resolutions);
– other distortion-tolerant geometrical transformations could be useful to match
minutiae in case one or both of the fingerprints is affected by severe distor-
tions.
In any case, tolerating a higher number of transformations results in addi-
tional degrees of freedom to the minutiae matcher: when a matcher is designed,
this issue needs to be carefully evaluated, as each degree of freedom results in a
huge number of new possible alignments which significantly increases the chance
of incorrectly matching two fingerprints from different fingers.
Let map(.) be the function that maps a minutia m0j ∈ f (D0 ) into m00j ac-
cording to a given geometrical transformation; for example, by considering a
displacement of [∆x, ∆y] and a counterclockwise rotation θ around the origin2 :
½
1 if sd(m00j , mi ) ≤ r0 and dd(m00j , mi ) ≤ θ0
ζ(m00j , mi ) =
0 otherwise
2
The origin is usually selected as the minutiae centroid (i.e. the average point); before
the matching step, minutiae coordinates are adjusted by subtracting the centroid
coordinates.
6
where P (i) is an unknown function that determines the pairing between f (D)
and f (D0 ) minutiae; in particular, each minutia has either exactly one mate in
the other fingerprint or has no mate at all:
Note that, in general, P (i) = j does not necessarily mean that minutiae m0j
and mi match in the sense of Equations (1) and (2) but only that they are the
most likely pair under the current transformation.
Expression (3) requires that the number of minutiae mates be maximized,
independently of how strict these mates are; in other words, if two minutiae
comply with Equations (1) and (2), then their contribution to expression (3) is
made independently of their spatial distance and of their direction difference.
Solving the minutiae matching problem (expression (3)) is trivial when the
correct alignment (∆x, ∆y, θ) is known; in fact, the pairing (i.e. the function P )
can be determined by setting for each i = 1, · · · , n:
To comply with constraint 4 above, each minutia m00j already mated has to
be marked, to avoid mating it twice or more. Figure 5 shows an example of
minutiae pairing given a fingerprint alignment.
To achieve the optimum pairing (according to Equation (3)), a slightly more
complicated scheme should be adopted: in fact, in the case when a minutia of
f (D0 ) falls within the tolerance hyper-sphere of more than one minutia of f (D),
the optimum assignment is that which maximizes the number of mates (refer to
Figure 6 for a simple example).
The maximization in (3) can be easily solved if the function P (minutiae
correspondence) is known; in this case, the unknown alignment (∆x, ∆y, θ) can
be determined in the least square sense. Unfortunately, in practice, neither the
alignment parameters nor the correspondence function P are known and there-
fore, solving the matching problem is very hard. A brute force approach, that
Externalized Fingerprint Matching 7
is, evaluating all the possible solutions (correspondences and alignments) is pro-
hibitive as the number of possible solutions is exponential in the number of
minutiae (the function P is more than a permutation due to the possible ⊥
values). Hence heuristics are used.
In figure 5 minutiae of f (D0 ) mapped into f (D) coordinates for a given
alignment. Minutiae of f (D) are denoted by ¯s, whereas f (D0 ) minutiae are
denoted by ×s. Note that f (D0 ) minutiae are referred to as m00 , because what is
shown in the figure is their mapping into f (D) coordinates. Pairing is performed
according to the minimum distance. The dashed circles indicate the maximum
spatial distance. The gray circles denote successfully mated minutiae; minutia
m1 of f (D) and minutia m003 of f (D0 ) have no mates, minutiae m3 and m006 cannot
be mated due to their large direction difference.
In figure 6, if m1 were mated with m002 (the closest minutia), m2 would remain
unmated; however, pairing m1 with m001 , allows m2 to be mated with m002 , thus
maximizing Equation (3).
Pµ
P
P
Pµ
P
P
Pµ
Pµ P
Pµ
P
Pµ
Figure 5. Mating
P
Pµ
P
Pµ
Figure 6. Mating with a Second-Closest
8
3 Fingerprint Match-On-Card
ISO Standard 7816 specifies that the micromodule must contain an array of
eight contacts but only six of these are actually connected to the chip, which is
usually not visible. The contacts are assigned to power supplies (Vcc and Vpp ),
ground, clock, reset and a serial data communication link commonly called I/O.
ISO is currently considering various requests for re-specification of the contacts;
notably for dual USB/7816 support.
While for the time being card CPUs are mainly 8 or 16-bit microcontrollers3
new 32-bit devices has recently become available.
For storing user-specific data individual to each card, cards contain EEPROM
(Electrically Erasable and Programmable ROM) or flash memory, which can be
written and erased hundreds of thousands of times. Java cards even allow the
import of executable programs (applets) into their nonvolatile memory according
to the card holder’s needs.
3
The most common cores are Motorola’s 68HC05 and Intel’s 80C51.
Externalized Fingerprint Matching 9
+ = chip chip
To prevent information probing, all these elements are packed into one single
chip. If this is not done, the wires linking the system components to each another
could become potential passive or active penetration routes [1]. The different
steps of smart card manufacturing are shown in figure 7: wire bonding (chip +
micromodule) and potting (chip + micromodule + plastic).
4.1 Enrolment
The enrolment protocol is the following:
1. The issuer extracts f (D), picks a set of random minutiae r and merges it
into f (D). We denote the result of this operation (illustrated in figures 8
and 9) by t = f (D) ∪ r.
!
Figure 8. Fingerprint Scrambling with False Minutiae
S
=
Figure 9. Fingerprint Scrambling with False Minutiae
2. The issuer encodes t as a binary string u where bit ui = 1 if the i-th minutia
in t belongs to f (D) and ui = 0 if the i-th minutia in t belongs to r.
3. The issuer signs, using a public-key signature scheme the data {t, u, d} where
d is a security parameter which choice is discussed below. Let σ be the
signature of {t, u, d}.
4. The issuer delivers an identity card containing {t, u, d, σ}. The card allows
the free reading of t and d.
Externalized Fingerprint Matching 11
4.2 Identification
Where:
12
µ ¶ µ ¶
0 n+k m−k
R (n, m, k) = ×
i i−k
Eventually, the FAR is the maximum probability, over all possible k, that a
candidate u0 is accepted:
m
FAR = max P (n, m, k)
k=−n
Letting FAR = 10−e typical {n, m} values for e = 5 and d = 0 would be:
{6, 17}, {7, 14}, {8, 12}, {9, 11}, {10, 10}, {11, 9}. Variations in d affect the FAR
as shown in the graphics below:
40
-Log@2,FARD
20 30
0 20
m
10
10
20
n
30
-Log@2,FARD
d=0
60
d=2
50
d=4
40 d=6
d=8
30
20
10
n=m
5 10 15 20 25 30 35
Figure 11. FAR for m = n and different d values.
Note that the above calculations rely on the following two assumptions:
Assumption 1. Spatial Uniformity Assumption: The probability to
find a minutia at any given {x, y} coordinate in f (D) is constant.
In other words, the simplified FAR estimate assumes5 that there are no denser
or scarcer areas in f (D) and that minutiae are independent of each other i.e.,
knowing that a minutia m exists at a given {x, y} location does not provide any
information about the would-be existence (or type) of minutiae at m’s neighbor-
hood.
Assumption 2. Biometric Scrambling Assumption: There exists an
probabilistic algorithm A taking as input f (D) and outputting a t = f (D) ∪ r
such that partitioning t into the original subsets f (D) and r, even approximately,
is intractable.
An alternative fingerprint scrambling model is given in the appendix.
as the ID card number, the surname, given names, nationality, height, place of
birth, date of birth, dates of issue and expiry, color of eyes, residence etc. In the
sequel we assume that σ also signs Q
Given that the portable reader is under the agent’s total control (i.e. provides
end-to-end security from the capture unit to the decision taking and display
module) the display of Q on the reader’s screen provides the officer with a
binding between the physically present individual and Q.
Note (as is the case with all other match-on-card protocols) that biometry
alone cannot provide a binding between the ID (physical support) and the in-
dividual but only between Q (the information) and the individual. To provide
also a binding between the ID and the individual the ID must be enriched with
active digital signature or zero-knowledge capabilities.
5.4 Conclusion
The above shows that although extremely economic (from an on-board resource
consumption perspective), the protocol presented in this paper provides equiv-
alent functionalities to other match-on-card techniques in all typical use-cases.
References
1. O. Kommerling and M. Kuhn, Design principles for tamper-resistant smartcard
processors, Proceedings of USENIX Workshop on Smartcard Technology, 1999,
pp. 9–20.
2. A. Robert, La Tribune, Les cartes à puce se cherchent une identité, page 59b,
October 10, 2003.
3. D. Maltoni, D. Maio, A. Jain, S. Prabhakar, Handbook of Fingerprint Recognition,
Springer, New York, 2003.
16
APPENDIX A
SIMPLIFIED MINUTIAE SCRAMBLING MODEL
A.2. Security
Identification is identical to 4.2.
A.3. Security
The second property of the Simplified Assumption ensures that the success
probability of an attacker is only negligibly greater than the success probability
obtained by just randomly “guessing” the random string u.
The following theorem proves that the identification protocol protocol is se-
cure under the Simplified Assumption.
Theorem 1. Without the knowledge of f (D) an attacker’s success probability
is smaller than ²guess + negl.
Externalized Fingerprint Matching 17
Neglecting the term negl, the following table lists various {k, d} choices and
their corresponding FARs.
− log10 (FAR) 2 3 3 4
k 10 20 26 30
d 2 3 5 5
The FRR being the percentage of correct fingerprints that do not pass the
identification algorithm, the FRR is equal to 1 − β, where β in the probability
introduced in the Simplified Assumption. 1 − β must be small.