SlideShare a Scribd company logo
1 of 26
Contents
1. Definition.
2. Introduction.
3. Features.
4. Uses.
5. Advantages.
6. Applications.
7. Fingerprint
Recognition Gadgets.
8. Types of fingerprint.
9. Characteristics of
Fingerprint.
10. Variations of
Fingerprint.
11. Fingerprinting
Sensors.
12. Algorithms.
13. Different Techniques
of Fingerprinting.
14. Requirements for
Fingerprint Processor.
15. Block Diagram of
Fingerprint
Processing System.
16 . Fingerprint
Mechanism using DIP.
17. Steps in Fingerprint
Processing.
18. Conclusion.
19. References.
Definition
A fingerprint in its narrow
sense is an impression left by
the friction ridges of a
human finger.
Introduction
i. Fingerprint Identification/Recognition is one of the most well-
known & publicized biometrics.
ii. Because of their uniqueness & consistency over time,
fingerprints have been used for Identification for over a century
& recently becoming automated.
iii. The concept of fingerprint came in 19Th century by Sir Francis
Galton, which were known as Galton Points.
iv. In 1969, it was a major push by FBI (Federal Bureau of
Investigation) & CIA (Central Intelligence Agency) officials in
United States to develop a completely “Automated Fingerprint
Identification Process” to track Criminals, Smugglers & keep
their records as an Identification to track them in American
Airports & Ports.
v. Hence, making this attempt famous & overwhelming around the
world.
Features
 Unique - The ridges and their
characteristics of our fingers are
unique. Each person has distinct
and unique ridges on finger, sole,
and palm.
Uses
 Personal Identification:-The patterns of fingerprint are
extensively modified but the quantity, characteristics,
and position of the ridges remained unchanged.
Eg:- Fingerprint in an ID-Card.
 Criminal Cases:- During investigations on criminal
cases - Fingerprinting is the most affordable and at the
same time the best way to identity a criminal. The
presence of fingerprints in the crime scene is the only
way that will prove who was the criminal. This is
because a fingerprint alone is enough conclusive
evidence.
Advantages &
Applications
 Advantages
 To prevent stealing of
identity - The fingerprints
are important to be
included in some
important documents
such as passports, social
security cards, bank
accounts, driving
licenses, and others to
avoid the use or access
of unauthorized persons.
 Applications
Fingerprints are important
in manufacturing
biometrics-based electronic
gadgets such as –
 Finger printing systems.
 Security systems door.
 Locking door access
control systems.
 Attendance fingerprint
systems.
 Digital fingerprints of
security systems.
Fingerprint Recognition
Gadgets
Types of fingerprint
 Visible prints :- It is also called patent prints. It can be
seen when blood, dirt, ink or grease on the finger come
into contact with a smooth surface and leave a friction
ridge impression that is visible without development.
 Latent prints :- They are not apparent to the naked eye.
They can be made sufficiently visible by dusting, fuming
or chemical reagents.
 Impressed prints :- It also called plastic prints. They are
visible and can be viewed or photographed without
development.
Characteristics Variations
Fingerprinting
Sensors
A fingerprint sensor is
an electronic device used
to capture a digital
image of the fingerprint
pattern. The captured
image is called a live
scan. This live scan
is digitally processed to
create a biometric
template (a collection
of extracted features)
which is stored and used
for matching. This is an
overview of some of the
more commonly used
fingerprint
sensor technologies. :-
 Optical:- Optical fingerprint imaging involves
capturing a digital image of the print using visible
light. This type of sensor is, in essence, a
specialized digital camera.
 Ultrasonic:- Ultrasonic sensors make use of the
principles of medical ultra-sonography in order to
create visual images of the fingerprint. Unlike
optical imaging, ultrasonic sensors use very high
frequency sound waves to penetrate the
epidermal layer of skin.
 Capacitance:- Capacitance sensors utilize the
principles associated with capacitance in order to
form fingerprint images.
 Passive capacitance:- A passive capacitance
sensor uses the principle outlined above to form
an image of the fingerprint patterns on the dermal
layer of skin.
 Active capacitance:- Active capacitance
sensors use a charging cycle to apply a voltage to
the skin before measurement takes place.
Algorithms
Matching algorithms are used to compare previously stored
templates of fingerprints against candidate fingerprints
for authentication purposes. In order to do this either the
original image must be directly compared with the candidate
image or certain features must be compare.
 Pattern-based (or image-based) algorithms:-Pattern
based algorithms compare the basic fingerprint patterns
(arch, whorl, and loop) between a previously stored template
and a candidate fingerprint. This requires that the images be
aligned in the same orientation. The candidate fingerprint
image is graphically compared with the template to determine
the degree to which they match.
Different Techniques of
Fingerprinting Traditional Technique:-
The traditional or most common technique of fingerprinting is taking impressions of a
person's hand with the help of ink. Pressing fingers covered in ink, on to a paper is the way
of obtaining fingerprints.
 Digital Scanning Technique:-
A sensitive touch-pad is used to capture the fingerprints of a person or a suspect in this
method. The impression of fingerprint recorded on the touch-pad is then compared with
thousands of impressions with the help of software .
 Lifting Technique:-
In this technique, oil from hands which are left behind are captured by means of powders
made from resinous polymers. This technique is specially used in Crime Investigations.
 Laser Technique:-
The laser technique is one of the most useful for capturing fingerprints. In this
fingerprinting technology, the fingerprints from many different surfaces can be lifted by
means of laser.
 Bullet Fingerprinting :-
This technique is considered as a sure shot method of fingerprint identification, because
even wiping and washing of the surface cannot remove the sweat gland deposits
completely. It is possible to visualize the fingerprint.
Requirements for Fingerprint
Processor
 Speed.
 Size of the fingerprint identification database
 Power consumption.
 The core architecture of a processor: A dual
multiply-accumulate (MAC) or single-MAC core
should be considered for this application.
 Bus architecture.
 Power management integration.
 Others: Other important considerations include
dedicated hardware for different addressing
modes, loop control and execution control and
peripheral integration.
Block Diagram of Fingerprint
Processing System.
Fingerprint Mechanism using DIP
 A popular and reliable way to compare fingerprints is to analyze the minutiae of the fingerprint. To do so,
a system must first capture the image of a fingerprint and process the image to make it easy for image
analysis. After the analysis, the minutiae will be extracted and saved in a template format. The system
must then store the data of the minutiae to be used for future comparison.
 Fingerprint sensors
Based on the fingerprint processing diagram, a sensor is the “front-end” of the system, playing an import
role: it captures the image of the fingerprint. The two types of popular sensors used in fingerprint
analysis are the optical and swipe sensors. Here are basic descriptions of how they operate.
 Optical sensor:-An optical fingerprint sensor captures a digital image of the fingerprint by using
visible light. The following describes the operation principle of an optical sensor.
 First, the light source inside of a sensor will emit light to illuminate the surface of the finger.
 The light reflected from the finger passes to a solid-state pixels sensor (either a charge-coupled device
[CCD] or complementary metal oxide semiconductor [CMOS] image sensor), which captures a visual
image of the fingerprint. On the path of the light, a specially designed lens will be used.
 Swipe sensor:-A swipe sensor is a type of active capacitance sensor. Here is how an active
capacitance sensor works.
 First, the active capacitance sensors will apply a voltage to the skin. This will generate an electrical field
in the space between the skin and sensor.
 Since the electrical field between the finger-skin and sensor follows the pattern of the ridges in the
dermal skin layer, the effective capacitance will be measured across this field.
 The distances between skin and sensors can then be calculated mathematically by using this
equation: C = ε0*εr*(A/d); here “d” represents the distance.
 Based on the calculated distances across the field, the fingerprint image can be mapped.
OPTICAL SENSOR. SWIPE SENSOR.
Continued…
 Fingerprint processing
After an image of a fingerprint is captured, a sequence of image processing
algorithms will be applied to the captured image. In fingerprint
authentication applications, two main types of technologies are being used:
one is called minutiae based, and the other is called image based.
 Minutiae are the special spots of a fingerprint that show the changing of the
print. These spots have been predefined and categorized. Two main
features of minutiae, which are extracted from these spots:
 Ridge ending.
 Bifurcation.
 However, the minutiae are not limited to these two features.
 In a minutiae-based system, the goal is to find the minutiae in the captured
fingerprint image and compare them with fingerprints that are in the
database. In order to extract the minutiae successfully, the fingerprint
images must be preprocessed, which usually involves computationally-
intensive image processing algorithms.
The digital image signal processing
steps include:
Segmentation and filtering.
Contrast enhancement.
Orientation calculation.
Gabor filtering.
Binarization.
Thinning.
Feature extraction.
Continued….
 Segmentation and filtering:- The main purpose of segmentation is to
get the “good” area of a captured fingerprint image, then separate this
valid fingerprint from the image background. Some filtering can be
applied to the image to filter out the noise in the image.
 Contrast enhancement:- After segmentation, the image is subjected
to gray stretch to increase the global contrast of the image. Because
the skin of an entire finger has a similar color, the more interesting
parts of the fingerprint and the less interesting areas have a very low
level of contrast.
Mathematically, this type of operation is transformation.
 Orientation calculation:- There are different implementations for
mapping the orientation of a fingerprint. The most popular algorithm to
map the orientation of fingerprints is the gradient-based approach.
The gradient ∇(x, y) at point [x,y] of I (an image) is a two-dimensional
vector [∇x(x, y)∇y(x,y)].
Mathmatically, gradient ∇ is the first derivative of the image, the ∇x and
∇y are the derivatives on X and Y directions, respectively.
Continued….
 In a fingerprint system, to numerically calculate the ∇x(x, y)and ∇y(x,y), a
popular method is to use the Sobel operator. The following is a 3x3 Sobel mask:
The gradient can be calculated as following:
Continued….
 Then the gradient’s direction, angle θ, can be calculated as:
These calculations will be applied across the fingerprint image, and an
orientation map will be created.
 Gabor filtering:- A Gabor filter is defined as a two-dimensional Gaussian
function multiplied by a sinusoidal plane wave function:
Continued….
 Here the xθ and yθ are the point coordinate [x,y] rotated (90-θ) degrees, defined
as:
 θ represents the orientation.
 f represents the frequency of the ridge-valley-ridge pattern; it can
be the reciprocal of the width of ridge-valley measurement.
 σx and σy are the standard deviations of the Gaussian envelope
on x and y directions, respectively.
 Binarization :- The goal of binarization is to convert the gray-
level image to binary level “1” or “0.” In other words, this space-
changing operation converts the image to black or white with no
levels in between.
Continued….
 Thinning:- After the binarization, the ridges and valleys are in black
and white, respectively, but the width of lines may be wider than
one pixel. To further reduce the complexity of minutiae extraction, a
thinning algorithm will be applied to the image.
 Feature extraction. Figure 5 illustrates the fingerprint image for
each processing step during the entire fingerprint analysis flow.
After these steps of signal processing, we will obtain the final
fingerprint image. The minutiae-based features, such as ridge
ending and bifurcation, will be found and extracted from the final
image.
Conclusion
 Our fingerprints are unique and
permanent from birth until death.
 Our Fingerprints Never Lie as Our
Faces Do.
 Only if we know the unique knowledge
to this science.
 This is because fingerprint has its own
language and it is hard to understand
the truth it reveals.
References
 www.fbi.gov
 www.biometrics.gov
 www.altavista.com
 www.fpvte.nist.gov
THANKYOU….!!!!

More Related Content

What's hot

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
DEVELOPMENT OF FINGERPRINTS
DEVELOPMENT OF FINGERPRINTSDEVELOPMENT OF FINGERPRINTS
DEVELOPMENT OF FINGERPRINTSDon Caeiro
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYsathish sak
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprintingVivek Jha
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Retina scan
Retina scanRetina scan
Retina scan
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Fs Ch 7
Fs Ch 7Fs Ch 7
Fs Ch 7
 
DEVELOPMENT OF FINGERPRINTS
DEVELOPMENT OF FINGERPRINTSDEVELOPMENT OF FINGERPRINTS
DEVELOPMENT OF FINGERPRINTS
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
FINGERPRINTS
FINGERPRINTSFINGERPRINTS
FINGERPRINTS
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 

Viewers also liked

LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Super Glue Enhancement Techniques-Fingerprint Evidence.
Super Glue Enhancement Techniques-Fingerprint Evidence.Super Glue Enhancement Techniques-Fingerprint Evidence.
Super Glue Enhancement Techniques-Fingerprint Evidence.Timothy Babcock
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyFIDO Alliance
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Fingerprint development and Ridge Characteristics
Fingerprint development and Ridge CharacteristicsFingerprint development and Ridge Characteristics
Fingerprint development and Ridge CharacteristicsBlancoScience
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysisheremi
 
Chapter 6 fingerprints power point
Chapter 6 fingerprints power pointChapter 6 fingerprints power point
Chapter 6 fingerprints power pointwatsonma12
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint developmentfaraharooj
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime sceneBlancoScience
 

Viewers also liked (20)

LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Super Glue Enhancement Techniques-Fingerprint Evidence.
Super Glue Enhancement Techniques-Fingerprint Evidence.Super Glue Enhancement Techniques-Fingerprint Evidence.
Super Glue Enhancement Techniques-Fingerprint Evidence.
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
K0167683
K0167683K0167683
K0167683
 
Fingerprint development and Ridge Characteristics
Fingerprint development and Ridge CharacteristicsFingerprint development and Ridge Characteristics
Fingerprint development and Ridge Characteristics
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysis
 
Chapter 6 fingerprints power point
Chapter 6 fingerprints power pointChapter 6 fingerprints power point
Chapter 6 fingerprints power point
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Finger print
Finger printFinger print
Finger print
 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint development
 
Fingerprinting
FingerprintingFingerprinting
Fingerprinting
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 

Similar to Dip fingerprint

Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignments1180051
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2Haruki0428
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Editor IJARCET
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
assignment
assignmentassignment
assignments1190098
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 

Similar to Dip fingerprint (20)

Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Dip fingerprint

  • 1.
  • 2. Contents 1. Definition. 2. Introduction. 3. Features. 4. Uses. 5. Advantages. 6. Applications. 7. Fingerprint Recognition Gadgets. 8. Types of fingerprint. 9. Characteristics of Fingerprint. 10. Variations of Fingerprint. 11. Fingerprinting Sensors. 12. Algorithms. 13. Different Techniques of Fingerprinting. 14. Requirements for Fingerprint Processor. 15. Block Diagram of Fingerprint Processing System. 16 . Fingerprint Mechanism using DIP. 17. Steps in Fingerprint Processing. 18. Conclusion. 19. References.
  • 3. Definition A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.
  • 4. Introduction i. Fingerprint Identification/Recognition is one of the most well- known & publicized biometrics. ii. Because of their uniqueness & consistency over time, fingerprints have been used for Identification for over a century & recently becoming automated. iii. The concept of fingerprint came in 19Th century by Sir Francis Galton, which were known as Galton Points. iv. In 1969, it was a major push by FBI (Federal Bureau of Investigation) & CIA (Central Intelligence Agency) officials in United States to develop a completely “Automated Fingerprint Identification Process” to track Criminals, Smugglers & keep their records as an Identification to track them in American Airports & Ports. v. Hence, making this attempt famous & overwhelming around the world.
  • 5. Features  Unique - The ridges and their characteristics of our fingers are unique. Each person has distinct and unique ridges on finger, sole, and palm.
  • 6. Uses  Personal Identification:-The patterns of fingerprint are extensively modified but the quantity, characteristics, and position of the ridges remained unchanged. Eg:- Fingerprint in an ID-Card.  Criminal Cases:- During investigations on criminal cases - Fingerprinting is the most affordable and at the same time the best way to identity a criminal. The presence of fingerprints in the crime scene is the only way that will prove who was the criminal. This is because a fingerprint alone is enough conclusive evidence.
  • 7. Advantages & Applications  Advantages  To prevent stealing of identity - The fingerprints are important to be included in some important documents such as passports, social security cards, bank accounts, driving licenses, and others to avoid the use or access of unauthorized persons.  Applications Fingerprints are important in manufacturing biometrics-based electronic gadgets such as –  Finger printing systems.  Security systems door.  Locking door access control systems.  Attendance fingerprint systems.  Digital fingerprints of security systems.
  • 9. Types of fingerprint  Visible prints :- It is also called patent prints. It can be seen when blood, dirt, ink or grease on the finger come into contact with a smooth surface and leave a friction ridge impression that is visible without development.  Latent prints :- They are not apparent to the naked eye. They can be made sufficiently visible by dusting, fuming or chemical reagents.  Impressed prints :- It also called plastic prints. They are visible and can be viewed or photographed without development.
  • 11. Fingerprinting Sensors A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies. :-  Optical:- Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera.  Ultrasonic:- Ultrasonic sensors make use of the principles of medical ultra-sonography in order to create visual images of the fingerprint. Unlike optical imaging, ultrasonic sensors use very high frequency sound waves to penetrate the epidermal layer of skin.  Capacitance:- Capacitance sensors utilize the principles associated with capacitance in order to form fingerprint images.  Passive capacitance:- A passive capacitance sensor uses the principle outlined above to form an image of the fingerprint patterns on the dermal layer of skin.  Active capacitance:- Active capacitance sensors use a charging cycle to apply a voltage to the skin before measurement takes place.
  • 12. Algorithms Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compare.  Pattern-based (or image-based) algorithms:-Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.
  • 13. Different Techniques of Fingerprinting Traditional Technique:- The traditional or most common technique of fingerprinting is taking impressions of a person's hand with the help of ink. Pressing fingers covered in ink, on to a paper is the way of obtaining fingerprints.  Digital Scanning Technique:- A sensitive touch-pad is used to capture the fingerprints of a person or a suspect in this method. The impression of fingerprint recorded on the touch-pad is then compared with thousands of impressions with the help of software .  Lifting Technique:- In this technique, oil from hands which are left behind are captured by means of powders made from resinous polymers. This technique is specially used in Crime Investigations.  Laser Technique:- The laser technique is one of the most useful for capturing fingerprints. In this fingerprinting technology, the fingerprints from many different surfaces can be lifted by means of laser.  Bullet Fingerprinting :- This technique is considered as a sure shot method of fingerprint identification, because even wiping and washing of the surface cannot remove the sweat gland deposits completely. It is possible to visualize the fingerprint.
  • 14. Requirements for Fingerprint Processor  Speed.  Size of the fingerprint identification database  Power consumption.  The core architecture of a processor: A dual multiply-accumulate (MAC) or single-MAC core should be considered for this application.  Bus architecture.  Power management integration.  Others: Other important considerations include dedicated hardware for different addressing modes, loop control and execution control and peripheral integration.
  • 15. Block Diagram of Fingerprint Processing System.
  • 16. Fingerprint Mechanism using DIP  A popular and reliable way to compare fingerprints is to analyze the minutiae of the fingerprint. To do so, a system must first capture the image of a fingerprint and process the image to make it easy for image analysis. After the analysis, the minutiae will be extracted and saved in a template format. The system must then store the data of the minutiae to be used for future comparison.  Fingerprint sensors Based on the fingerprint processing diagram, a sensor is the “front-end” of the system, playing an import role: it captures the image of the fingerprint. The two types of popular sensors used in fingerprint analysis are the optical and swipe sensors. Here are basic descriptions of how they operate.  Optical sensor:-An optical fingerprint sensor captures a digital image of the fingerprint by using visible light. The following describes the operation principle of an optical sensor.  First, the light source inside of a sensor will emit light to illuminate the surface of the finger.  The light reflected from the finger passes to a solid-state pixels sensor (either a charge-coupled device [CCD] or complementary metal oxide semiconductor [CMOS] image sensor), which captures a visual image of the fingerprint. On the path of the light, a specially designed lens will be used.  Swipe sensor:-A swipe sensor is a type of active capacitance sensor. Here is how an active capacitance sensor works.  First, the active capacitance sensors will apply a voltage to the skin. This will generate an electrical field in the space between the skin and sensor.  Since the electrical field between the finger-skin and sensor follows the pattern of the ridges in the dermal skin layer, the effective capacitance will be measured across this field.  The distances between skin and sensors can then be calculated mathematically by using this equation: C = ε0*εr*(A/d); here “d” represents the distance.  Based on the calculated distances across the field, the fingerprint image can be mapped.
  • 18. Continued…  Fingerprint processing After an image of a fingerprint is captured, a sequence of image processing algorithms will be applied to the captured image. In fingerprint authentication applications, two main types of technologies are being used: one is called minutiae based, and the other is called image based.  Minutiae are the special spots of a fingerprint that show the changing of the print. These spots have been predefined and categorized. Two main features of minutiae, which are extracted from these spots:  Ridge ending.  Bifurcation.  However, the minutiae are not limited to these two features.  In a minutiae-based system, the goal is to find the minutiae in the captured fingerprint image and compare them with fingerprints that are in the database. In order to extract the minutiae successfully, the fingerprint images must be preprocessed, which usually involves computationally- intensive image processing algorithms.
  • 19. The digital image signal processing steps include: Segmentation and filtering. Contrast enhancement. Orientation calculation. Gabor filtering. Binarization. Thinning. Feature extraction.
  • 20. Continued….  Segmentation and filtering:- The main purpose of segmentation is to get the “good” area of a captured fingerprint image, then separate this valid fingerprint from the image background. Some filtering can be applied to the image to filter out the noise in the image.  Contrast enhancement:- After segmentation, the image is subjected to gray stretch to increase the global contrast of the image. Because the skin of an entire finger has a similar color, the more interesting parts of the fingerprint and the less interesting areas have a very low level of contrast. Mathematically, this type of operation is transformation.  Orientation calculation:- There are different implementations for mapping the orientation of a fingerprint. The most popular algorithm to map the orientation of fingerprints is the gradient-based approach. The gradient ∇(x, y) at point [x,y] of I (an image) is a two-dimensional vector [∇x(x, y)∇y(x,y)]. Mathmatically, gradient ∇ is the first derivative of the image, the ∇x and ∇y are the derivatives on X and Y directions, respectively.
  • 21. Continued….  In a fingerprint system, to numerically calculate the ∇x(x, y)and ∇y(x,y), a popular method is to use the Sobel operator. The following is a 3x3 Sobel mask: The gradient can be calculated as following:
  • 22. Continued….  Then the gradient’s direction, angle θ, can be calculated as: These calculations will be applied across the fingerprint image, and an orientation map will be created.  Gabor filtering:- A Gabor filter is defined as a two-dimensional Gaussian function multiplied by a sinusoidal plane wave function:
  • 23. Continued….  Here the xθ and yθ are the point coordinate [x,y] rotated (90-θ) degrees, defined as:  θ represents the orientation.  f represents the frequency of the ridge-valley-ridge pattern; it can be the reciprocal of the width of ridge-valley measurement.  σx and σy are the standard deviations of the Gaussian envelope on x and y directions, respectively.  Binarization :- The goal of binarization is to convert the gray- level image to binary level “1” or “0.” In other words, this space- changing operation converts the image to black or white with no levels in between.
  • 24. Continued….  Thinning:- After the binarization, the ridges and valleys are in black and white, respectively, but the width of lines may be wider than one pixel. To further reduce the complexity of minutiae extraction, a thinning algorithm will be applied to the image.  Feature extraction. Figure 5 illustrates the fingerprint image for each processing step during the entire fingerprint analysis flow. After these steps of signal processing, we will obtain the final fingerprint image. The minutiae-based features, such as ridge ending and bifurcation, will be found and extracted from the final image.
  • 25. Conclusion  Our fingerprints are unique and permanent from birth until death.  Our Fingerprints Never Lie as Our Faces Do.  Only if we know the unique knowledge to this science.  This is because fingerprint has its own language and it is hard to understand the truth it reveals.
  • 26. References  www.fbi.gov  www.biometrics.gov  www.altavista.com  www.fpvte.nist.gov THANKYOU….!!!!

Editor's Notes

  1. Fingerprint is totally a part of a Biometrics….subjected related to biology.
  2. Ridges can also be seen through naked eye….!
  3. Eg:- Id card, Aadar Card.
  4. The above images are 1) Mobile Phone. 2) Attendance Fingerprint System.
  5. Collecting Patent Prints Patent prints are collected using a fairly straightforward method: photography. These prints are photographed in high resolution with a forensic measurement scale in the image for reference. Investigators can improve the quality of the images by using low-angle or alternate light sources and/or certain chemicals or dyes during photography, but this is usually not necessary. Collecting Latent Prints One of the most common methods for discovering and collecting latent fingerprints is by dusting a smooth or nonporous surface with fingerprint powder (black granular, aluminium flake, black magnetic, etc.). If any prints appear, they are photographed as mentioned above and then lifted from the surface with clear adhesive tape. The lifting tape is then placed on a latent lift card to preserve the print. However, fingerprint powders can contaminate the evidence and ruin the opportunity to perform other techniques that could turn up a hidden print or additional information. Therefore, investigators may examine the area with an alternate light source or apply cyanoacrylate (super glue) before using powders.
  6. Arch- no deltas......ridges move parallel and then diverge. Whorl- one delta.... only concentric circles surrounding the finger. Loop-two deltas.....recursive looping lines... Delta -The point on a ridge at or in front of and nearest the center of  the    divergence of the type lines. -The delta area is located as a triangular area where the  ridges        radiate outward in three directions.
  7. 5 Types of Sensor Technologies:- Optical, Ultrasonic, Capacitance, Passive & Active Capacitance…..cmos 4.0 active capacitance technology……… Capacitance sensors use principles associated with capacitance in order to form fingerprint images. In this method of imaging, the sensor array pixels each act as one plate of a parallel-plate capacitor, the dermal layer (which is electrically conductive) acts as the other plate, and the non-conductive epidermal layer acts as a dielectric. A passive capacitance sensor use the principle outlined above to form an image of the fingerprint patterns on the dermal layer of skin. Each sensor pixel is used to measure the capacitance at that point of the array. The capacitance varies between the ridges and valleys of the fingerprint due to the fact that the volume between the dermal layer and sensing element in valleys contains an air gap. The dielectric constant of the epidermis and the area of the sensing element are known values. The measured capacitance values are then used to distinguish between fingerprint ridges and valleys.[6] Active capacitance[edit] Active capacitance sensors use a charging cycle to apply a voltage to the skin before measurement takes place. The application of voltage, charges the effective capacitor. The electric field between the finger and sensor follows the pattern of the ridges in the dermal skin layer. On the discharge cycle, the voltage across the dermal layer and sensing element is compared against a reference voltage in order to calculate the capacitance. The distance values are then calculated mathematically, and used to form an image of the fingerprint.[7] Active capacitance sensors measure the ridge patterns of the dermal layer like the ultrasonic method. Again, this eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.[7] Algorithms[edit] Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compared.[8] Pattern-based (or image-based) algorithms[edit] Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images can be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.[9]
  8. Fingerprint System cannot be used to compare or identify without an algorithm.
  9. There are in total 5 techniques in which the “Bullet Fingerprinting” is the latest.
  10. These are the main Assets of the Fingerprint System.
  11. Matching or identification is done through Algorithm.