Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Fingerprint scanner


Published on

PPT on fingerprint scanner
By Ausaf khan
Integral university,Lucknow

Published in: Engineering
  • Be the first to comment

Fingerprint scanner

  1. 1. A PRESENTATION on Fingerprint Scanner BY:- AUSAF KHAN 1400113002 Electronics & Comm. Engg.
  2. 2. CONTENTS:  Introduction  History of fingerprints  Fingerprint scanner in mobile phones  General structure of fingerprint scanner  Fingerprint Patterns  Different identification on fingerprint  Finger print matching techniques  Scanners  Block diagram of fingerprint process system  Latest technologies  Applications  Advantages and Disadvantages
  3. 3. INTRODUCTION  Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.  Fingerprinting was first created by Dr.Henry Fault, a British surgeon in 1882.  Fingerprint is based on “Key”
  4. 4. 4 History of fingerprint:  Human fingerprints have been discovered on a large number of archaeological artifacts and historical items.  In 1684, the English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure.  In 1788, a detailed description of the anatomical formations of fingerprints was made by Mayer.  In 1975, The FBI funded the development of fingerprint scanners.
  5. 5. Fingerprint scanner in mobile phones: HISTORY  Two of the first smartphones manufacturers to integrate fingerprint scanner into their phones were Motorola with ATRIX4G in 2011,And apple with the iphone 5s on september 10,2013 ATRIX 4G
  6. 6. 6 The general structure of fingerprint scanner
  7. 7. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl-Ridges form circularly around a central point on the finger. Arch Loop Whorl
  8. 8. Sales Loop whorl Arch The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% population Loop Whorl Arch
  9. 9. Different Identification on Fingerprint Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  10. 10. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  11. 11. Fingerprint matching techniques There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  12. 12. Two main technologies used to capture image of the fingerprint Optical Scanner – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive Scanner – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  13. 13. Image Processing Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  14. 14. Latest Technologies 3-D fingerprint  A new generation of touchless live scan devices that generate a 3D representation of fingerprints is appearing.  Several images of the finger are acquired from different views using a multicamera system, and a contact-free 3D representation of the fingerprint is constructed.  This new sensing technology overcomes some of the problems that intrinsically appear in contact-based sensors such as improper finger placement, skin deformation, sensor noise or dirt.
  15. 15. •Banking Security - ATM security,card transaction •Physical Access Control (e.g. Airport) •Information System Security •National ID Systems •Passport control (INSPASS) •Prisoner, prison visitors, inmate control •Voting •Identification of Criminals •Identification of missing children •Secure E-Commerce (Still under research) Applications
  16. 16. Advantage of Fingerprint: a. Very high accuracy. b. Is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantage of Fingerprint: a. For some people it is very intrusive, because is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).
  17. 17. THANKS-