SlideShare a Scribd company logo
1 of 20
Fingerprint Recognition
Represented by:Represented by:
Karam ButtKaram Butt
Rana YasirRana Yasir
Tahzeeb AhmadTahzeeb Ahmad
Presented to:Presented to:
Mam IqraMam Iqra
OUTLINEOUTLINE
• Introduction to biometricsIntroduction to biometrics
• FingerprintFingerprint
• What is Fingerprint Recognition?What is Fingerprint Recognition?
• Fingerprint recognition systemFingerprint recognition system
• AdvantagesAdvantages
• DisadvantagesDisadvantages
• ApplicationsApplications
• ConclusionConclusion
BIOMETRICSBIOMETRICS
• Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and
analyzing biological dataanalyzing biological data
• Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze
human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye
retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand
measurements, for authentication purposes.measurements, for authentication purposes.
• The two categories of biometric identifiers include :The two categories of biometric identifiers include :
physiological characteristics.physiological characteristics.
behavioral characteristics.behavioral characteristics.
 PhysiologicalPhysiological characteristics :characteristics :
FingerprintFingerprint
face recognitionface recognition
DNADNA
palm printpalm print
hand geometryhand geometry
iris recognition(which has largely replacediris recognition(which has largely replaced
retina)retina)
Odour /scent.Odour /scent.
 BehavioralBehavioral characteristics :characteristics :
GaitGait
voicevoice
FINGERPRINTFINGERPRINT
• A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger.
• It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in
the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip.
• Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of
a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge
characteristics and their relationshipscharacteristics and their relationships
• These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
• Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.
• The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are
1) ridge ending and1) ridge ending and
2) ridge bifurcation.2) ridge bifurcation.
Fig 1. A fingerprint image acquired by an Optical
Sensor
• A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends
abruptly.abruptly.
• A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where
a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges.
Fig 2.ridge and valley
WHAT IS FINGERPRINTWHAT IS FINGERPRINT
RECOGNITION?RECOGNITION?
• Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as
dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and
known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if
the impressions are from the same finger or palm.the impressions are from the same finger or palm.
• The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into
two sub-domains:two sub-domains:
Fingerprint verification :Fingerprint verification :
Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one
person by his fingerprint.person by his fingerprint.
Fingerprint identification:Fingerprint identification:
Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity
by his fingerprint(s).by his fingerprint(s).
Fig 3.Verification vs. Identification
FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION
SYSTEMSYSTEM
• Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages:
(i) Fingerprint acquiring device(i) Fingerprint acquiring device
(ii) Minutia extraction and(ii) Minutia extraction and
(iii) Minutia matching(iii) Minutia matching
Fig 4. Fingerprint recognition system
1.Fingerprint acquisition:1.Fingerprint acquisition:
For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct
sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and
acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the
user’s finger is too dirty or dry.user’s finger is too dirty or dry.
2.Minutia extractor :2.Minutia extractor :
To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach
is widely used by researchers which areis widely used by researchers which are
 preprocessingpreprocessing
 minutia extraction andminutia extraction and
 post processing stage.post processing stage.
Fig 5.Minutia extractor
• For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage:
Image enhancementImage enhancement
Image binarizationImage binarization
Image segmentationImage segmentation
• The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two
operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,.
• In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and
bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and
bifurcations.bifurcations.
3.Minutiae Matching:3.Minutiae Matching:
• Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved
with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a
pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of
fingerprint images.fingerprint images.
• The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference
minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first.
• If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned
and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
ADVANTAGESADVANTAGES
 Very high accuracy.Very high accuracy.
 Easy to use.Easy to use.
 Small storage space required for the biometric template.Small storage space required for the biometric template.
  
DISADVANTAGESDISADVANTAGES
 Dirt , grime and wounds .Dirt , grime and wounds .
 Placement of finger.Placement of finger.
 Can be spoofed .Can be spoofed .
APPLICATIONSAPPLICATIONS
 Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction
 Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)
 Information System SecurityInformation System Security
 National ID SystemsNational ID Systems
 Passport control (INSPASS)Passport control (INSPASS)
 Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control
 VotingVoting
 Identification of CriminalsIdentification of Criminals
 Identification of missing childrenIdentification of missing children
 Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
CONCLUSIONCONCLUSION
• The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate
and fast in minutia extraction.and fast in minutia extraction.
• The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted
regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further
processing.processing.
• This is a very important property because suchThis is a very important property because such
unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted
fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to
minutiae extraction.minutiae extraction.
Finger print recognition

More Related Content

What's hot

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 

What's hot (20)

Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
Nabila mahjabin
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
Jury Rocamora
 

Viewers also liked (20)

Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint Identification
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint Individualization
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -com
 
Ppt1
Ppt1Ppt1
Ppt1
 
Report finger print
Report finger printReport finger print
Report finger print
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranform
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
"Memristor" by mahadev desai
"Memristor" by mahadev desai "Memristor" by mahadev desai
"Memristor" by mahadev desai
 
Finger Print
Finger PrintFinger Print
Finger Print
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
finger prints
finger printsfinger prints
finger prints
 
Memristor
MemristorMemristor
Memristor
 

Similar to Finger print recognition

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 

Similar to Finger print recognition (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Seminar
SeminarSeminar
Seminar
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Finger print recognition

  • 1. Fingerprint Recognition Represented by:Represented by: Karam ButtKaram Butt Rana YasirRana Yasir Tahzeeb AhmadTahzeeb Ahmad Presented to:Presented to: Mam IqraMam Iqra
  • 2. OUTLINEOUTLINE • Introduction to biometricsIntroduction to biometrics • FingerprintFingerprint • What is Fingerprint Recognition?What is Fingerprint Recognition? • Fingerprint recognition systemFingerprint recognition system • AdvantagesAdvantages • DisadvantagesDisadvantages • ApplicationsApplications • ConclusionConclusion
  • 3. BIOMETRICSBIOMETRICS • Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and analyzing biological dataanalyzing biological data • Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand measurements, for authentication purposes.measurements, for authentication purposes. • The two categories of biometric identifiers include :The two categories of biometric identifiers include : physiological characteristics.physiological characteristics. behavioral characteristics.behavioral characteristics.
  • 4.  PhysiologicalPhysiological characteristics :characteristics : FingerprintFingerprint face recognitionface recognition DNADNA palm printpalm print hand geometryhand geometry iris recognition(which has largely replacediris recognition(which has largely replaced retina)retina) Odour /scent.Odour /scent.  BehavioralBehavioral characteristics :characteristics : GaitGait voicevoice
  • 5. FINGERPRINTFINGERPRINT • A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger. • It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip. • Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge characteristics and their relationshipscharacteristics and their relationships • These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
  • 6. • Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges. • The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are 1) ridge ending and1) ridge ending and 2) ridge bifurcation.2) ridge bifurcation. Fig 1. A fingerprint image acquired by an Optical Sensor
  • 7. • A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends abruptly.abruptly. • A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges. Fig 2.ridge and valley
  • 8. WHAT IS FINGERPRINTWHAT IS FINGERPRINT RECOGNITION?RECOGNITION? • Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if the impressions are from the same finger or palm.the impressions are from the same finger or palm.
  • 9. • The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into two sub-domains:two sub-domains: Fingerprint verification :Fingerprint verification : Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one person by his fingerprint.person by his fingerprint. Fingerprint identification:Fingerprint identification: Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity by his fingerprint(s).by his fingerprint(s).
  • 10. Fig 3.Verification vs. Identification
  • 11. FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION SYSTEMSYSTEM • Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages: (i) Fingerprint acquiring device(i) Fingerprint acquiring device (ii) Minutia extraction and(ii) Minutia extraction and (iii) Minutia matching(iii) Minutia matching Fig 4. Fingerprint recognition system
  • 12. 1.Fingerprint acquisition:1.Fingerprint acquisition: For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the user’s finger is too dirty or dry.user’s finger is too dirty or dry. 2.Minutia extractor :2.Minutia extractor : To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach is widely used by researchers which areis widely used by researchers which are  preprocessingpreprocessing  minutia extraction andminutia extraction and  post processing stage.post processing stage.
  • 14. • For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage: Image enhancementImage enhancement Image binarizationImage binarization Image segmentationImage segmentation • The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,. • In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and bifurcations.bifurcations.
  • 15. 3.Minutiae Matching:3.Minutiae Matching: • Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of fingerprint images.fingerprint images. • The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
  • 16. ADVANTAGESADVANTAGES  Very high accuracy.Very high accuracy.  Easy to use.Easy to use.  Small storage space required for the biometric template.Small storage space required for the biometric template.   
  • 17. DISADVANTAGESDISADVANTAGES  Dirt , grime and wounds .Dirt , grime and wounds .  Placement of finger.Placement of finger.  Can be spoofed .Can be spoofed .
  • 18. APPLICATIONSAPPLICATIONS  Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction  Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)  Information System SecurityInformation System Security  National ID SystemsNational ID Systems  Passport control (INSPASS)Passport control (INSPASS)  Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control  VotingVoting  Identification of CriminalsIdentification of Criminals  Identification of missing childrenIdentification of missing children  Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
  • 19. CONCLUSIONCONCLUSION • The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate and fast in minutia extraction.and fast in minutia extraction. • The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further processing.processing. • This is a very important property because suchThis is a very important property because such unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to minutiae extraction.minutiae extraction.