SlideShare a Scribd company logo
1 of 18
Seminar presentation
on
FINGERPRINT
SCANNER
Presented By:
Abhishek kumar
15/ec/08
CONTENTS
Introduction
History of fingerprints
Fingerprint scanner in mobile phones
General structure of fingerprint scanner
Fingerprint Patterns
Different identification on fingerprint
Finger print matching techniques
Scanners
Block diagram of fingerprint process system
Latest technologies
Applications
Advantages and Disadvantages
INTRODUCTION
Fingerprint recognition or fingerprint authentication refers
to the automated method of verifying a match between two
human fingerprints. Fingerprints are one of many forms of
biometrics used to identify individuals and verify their identity.
Fingerprinting was first created by Dr.Henry Fault, a British
surgeon in 1882.
Fingerprint is based on “Key”
HISTORY OF FINGERPRINT
Human fingerprints have been discovered on a large number
of archaeological artifacts and historical items.
In 1684, the English plant morphologist, Nehemiah Grew,
published the first scientific paper reporting his systematic study
on the ridge, furrow, and pore structure.
In 1788, a detailed description of the anatomical formations of
fingerprints was made by Mayer.
In 1975, The FBI funded the development of fingerprint
scanners.
FINGERPRINT SCANNER IN
MOBILE PHONES
HISTORY
Two of the first smartphones
manufacturers to integrate
fingerprint scanner into their
phones were Motorola with
ATRIX4G in 2011,And apple
with the iphone 5s on
september 10,2013
THE GENERAL STRUCTURE OF
FINGERPRINT SCANNER
FINGERPRINT PATTERNS
Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
Whorl-Ridges form circularly around a central point on
the finger.
DIFFERENT IDENTIFICATION ON
FINGERPRINT
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two spaces
Delta: space between ridges
Pore: human pore
THEIR SHAPES
FINGERPRINT MATCHING
TECHNIQUES
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
Correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
TWO MAIN TECHNOLOGIES USED
TO CAPTURE IMAGE OF THE
FINGERPRINT
Optical Scanner – use light refracted through a prism. An optical sensor based
reader uses light to read and acquire fingerprint images. Optical sensors can be
affected by a number of real life factors such as stray light, surface contamination
or even prior fingerprint impressions present on the sensor surface. Hence it is
essential to clean the fingerprint reader glass on a regular basis for optimal
performance.
Capacitive Scanner – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint and capture
the image. As sensors apply a small voltage to the finger, a real fingerprint is
required rather than a visual impression of it. This technique makes the
fingerprint reader more reliable as it becomes harder to fake enrolment.
IMAGE PROCESSING
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged areas,
removing extraneous artifacts and healing most scars, cuts and breaks.
ENROLLMENT AND USAGE OF
USER’S FINGERPRINT
LATEST TECHNOLOGIES
1. On Screen Fingerprint Scanner:
The fingerprint sensor -- made by sensor
company Synaptics -- lives beneath the 6-inch
OLED display. That's the "screen" you're actually
looking at beneath the cover glass. When your
fingertip hits the target, the sensor array turns on
the display to light your finger, and only your finger.
The image of your print makes its way to an optical
image sensor beneath the display.
It's then run through an AI processor that's trained
to recognize 300 different characteristics of your
digit, like how close the ridges of your fingers are.
It's a different kind of technology than what most
readers use in today's phones.
3-D FINGERPRINT:
A new generation of touchless live scan devices
that generate a 3D representation of fingerprints is
appearing.
Several images of the finger are acquired from
different views using a multicamera system, and a
contact-free 3D representation of the fingerprint is
constructed.
This new sensing technology overcomes some of
the problems that intrinsically appear in contact-based
sensors such as improper finger placement, skin
deformation, sensor noise or dirt.
APPLICATIONS
•Banking Security - ATM security,card transaction
•Physical Access Control (e.g. Airport)
•Information System Security
•National ID Systems
•Passport control (INSPASS)
•Prisoner, prison visitors, inmate control
•Voting
•Identification of Criminals
•Identification of missing children
•Secure E-Commerce (Still under research
PROS AND CONS
• Advantage of Fingerprint:
• Very high accuracy.
• Is the most economical biometric PC
user authentication technique.
• Easy to use.
• Small storage space required for the
biometric template, reducing the size
of the database memory required
• It is standardized.
• Disadvantage of Fingerprint:
• For some people it is very intrusive,
because is still related to criminal
identification.
• It can make mistakes with the dryness
or dirty of the finger’s skin, as well as
with the age (is not appropriate with
children, because the size of their
fingerprint changes quickly).
Finger Print Sensor

More Related Content

What's hot

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 

What's hot (20)

Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 

Similar to Finger Print Sensor

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
s1180051
 

Similar to Finger Print Sensor (20)

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Kadai2
Kadai2Kadai2
Kadai2
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Prezen3
Prezen3Prezen3
Prezen3
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Worldleading fingerprint technolopgy
Worldleading fingerprint technolopgyWorldleading fingerprint technolopgy
Worldleading fingerprint technolopgy
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 

Recently uploaded

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Finger Print Sensor

  • 2. CONTENTS Introduction History of fingerprints Fingerprint scanner in mobile phones General structure of fingerprint scanner Fingerprint Patterns Different identification on fingerprint Finger print matching techniques Scanners Block diagram of fingerprint process system Latest technologies Applications Advantages and Disadvantages
  • 3. INTRODUCTION Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Fingerprinting was first created by Dr.Henry Fault, a British surgeon in 1882. Fingerprint is based on “Key”
  • 4. HISTORY OF FINGERPRINT Human fingerprints have been discovered on a large number of archaeological artifacts and historical items. In 1684, the English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure. In 1788, a detailed description of the anatomical formations of fingerprints was made by Mayer. In 1975, The FBI funded the development of fingerprint scanners.
  • 5. FINGERPRINT SCANNER IN MOBILE PHONES HISTORY Two of the first smartphones manufacturers to integrate fingerprint scanner into their phones were Motorola with ATRIX4G in 2011,And apple with the iphone 5s on september 10,2013
  • 6. THE GENERAL STRUCTURE OF FINGERPRINT SCANNER
  • 7. FINGERPRINT PATTERNS Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger. Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side. Whorl-Ridges form circularly around a central point on the finger.
  • 8. DIFFERENT IDENTIFICATION ON FINGERPRINT Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  • 10. FINGERPRINT MATCHING TECHNIQUES There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. Correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 11. TWO MAIN TECHNOLOGIES USED TO CAPTURE IMAGE OF THE FINGERPRINT Optical Scanner – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive Scanner – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 12. IMAGE PROCESSING Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  • 13. ENROLLMENT AND USAGE OF USER’S FINGERPRINT
  • 14. LATEST TECHNOLOGIES 1. On Screen Fingerprint Scanner: The fingerprint sensor -- made by sensor company Synaptics -- lives beneath the 6-inch OLED display. That's the "screen" you're actually looking at beneath the cover glass. When your fingertip hits the target, the sensor array turns on the display to light your finger, and only your finger. The image of your print makes its way to an optical image sensor beneath the display. It's then run through an AI processor that's trained to recognize 300 different characteristics of your digit, like how close the ridges of your fingers are. It's a different kind of technology than what most readers use in today's phones.
  • 15. 3-D FINGERPRINT: A new generation of touchless live scan devices that generate a 3D representation of fingerprints is appearing. Several images of the finger are acquired from different views using a multicamera system, and a contact-free 3D representation of the fingerprint is constructed. This new sensing technology overcomes some of the problems that intrinsically appear in contact-based sensors such as improper finger placement, skin deformation, sensor noise or dirt.
  • 16. APPLICATIONS •Banking Security - ATM security,card transaction •Physical Access Control (e.g. Airport) •Information System Security •National ID Systems •Passport control (INSPASS) •Prisoner, prison visitors, inmate control •Voting •Identification of Criminals •Identification of missing children •Secure E-Commerce (Still under research
  • 17. PROS AND CONS • Advantage of Fingerprint: • Very high accuracy. • Is the most economical biometric PC user authentication technique. • Easy to use. • Small storage space required for the biometric template, reducing the size of the database memory required • It is standardized. • Disadvantage of Fingerprint: • For some people it is very intrusive, because is still related to criminal identification. • It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).