2. CONTENTS
Introduction
History of fingerprints
Fingerprint scanner in mobile phones
General structure of fingerprint scanner
Fingerprint Patterns
Different identification on fingerprint
Finger print matching techniques
Scanners
Block diagram of fingerprint process system
Latest technologies
Applications
Advantages and Disadvantages
3. INTRODUCTION
Fingerprint recognition or fingerprint authentication refers
to the automated method of verifying a match between two
human fingerprints. Fingerprints are one of many forms of
biometrics used to identify individuals and verify their identity.
Fingerprinting was first created by Dr.Henry Fault, a British
surgeon in 1882.
Fingerprint is based on “Key”
4. HISTORY OF FINGERPRINT
Human fingerprints have been discovered on a large number
of archaeological artifacts and historical items.
In 1684, the English plant morphologist, Nehemiah Grew,
published the first scientific paper reporting his systematic study
on the ridge, furrow, and pore structure.
In 1788, a detailed description of the anatomical formations of
fingerprints was made by Mayer.
In 1975, The FBI funded the development of fingerprint
scanners.
5. FINGERPRINT SCANNER IN
MOBILE PHONES
HISTORY
Two of the first smartphones
manufacturers to integrate
fingerprint scanner into their
phones were Motorola with
ATRIX4G in 2011,And apple
with the iphone 5s on
september 10,2013
7. FINGERPRINT PATTERNS
Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
Whorl-Ridges form circularly around a central point on
the finger.
8. DIFFERENT IDENTIFICATION ON
FINGERPRINT
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two spaces
Delta: space between ridges
Pore: human pore
10. FINGERPRINT MATCHING
TECHNIQUES
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
Correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
11. TWO MAIN TECHNOLOGIES USED
TO CAPTURE IMAGE OF THE
FINGERPRINT
Optical Scanner – use light refracted through a prism. An optical sensor based
reader uses light to read and acquire fingerprint images. Optical sensors can be
affected by a number of real life factors such as stray light, surface contamination
or even prior fingerprint impressions present on the sensor surface. Hence it is
essential to clean the fingerprint reader glass on a regular basis for optimal
performance.
Capacitive Scanner – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint and capture
the image. As sensors apply a small voltage to the finger, a real fingerprint is
required rather than a visual impression of it. This technique makes the
fingerprint reader more reliable as it becomes harder to fake enrolment.
12. IMAGE PROCESSING
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged areas,
removing extraneous artifacts and healing most scars, cuts and breaks.
14. LATEST TECHNOLOGIES
1. On Screen Fingerprint Scanner:
The fingerprint sensor -- made by sensor
company Synaptics -- lives beneath the 6-inch
OLED display. That's the "screen" you're actually
looking at beneath the cover glass. When your
fingertip hits the target, the sensor array turns on
the display to light your finger, and only your finger.
The image of your print makes its way to an optical
image sensor beneath the display.
It's then run through an AI processor that's trained
to recognize 300 different characteristics of your
digit, like how close the ridges of your fingers are.
It's a different kind of technology than what most
readers use in today's phones.
15. 3-D FINGERPRINT:
A new generation of touchless live scan devices
that generate a 3D representation of fingerprints is
appearing.
Several images of the finger are acquired from
different views using a multicamera system, and a
contact-free 3D representation of the fingerprint is
constructed.
This new sensing technology overcomes some of
the problems that intrinsically appear in contact-based
sensors such as improper finger placement, skin
deformation, sensor noise or dirt.
16. APPLICATIONS
•Banking Security - ATM security,card transaction
•Physical Access Control (e.g. Airport)
•Information System Security
•National ID Systems
•Passport control (INSPASS)
•Prisoner, prison visitors, inmate control
•Voting
•Identification of Criminals
•Identification of missing children
•Secure E-Commerce (Still under research
17. PROS AND CONS
• Advantage of Fingerprint:
• Very high accuracy.
• Is the most economical biometric PC
user authentication technique.
• Easy to use.
• Small storage space required for the
biometric template, reducing the size
of the database memory required
• It is standardized.
• Disadvantage of Fingerprint:
• For some people it is very intrusive,
because is still related to criminal
identification.
• It can make mistakes with the dryness
or dirty of the finger’s skin, as well as
with the age (is not appropriate with
children, because the size of their
fingerprint changes quickly).