SlideShare a Scribd company logo
1 of 17
Welcome
Finger print sensor
Irteza Rahman [133-15-3057]
Index
 What is fingerprint ?
 History
 Fingerprint pattern
 Different identification on fingerprint
 Fingerprint technology
 Fingerprint processing
 References
What is
fingerprint?
 An impression or mark made on a surface by a
person's fingertip, especially as used for identifying
individuals from the unique pattern of whorls and
lines.
History
 Fingerprinting was first created by Dr. Henry
Fault, a British surgeon in 1882.
 Based on key
Fingerprint
pattern
 Arch-The ridges enter from one side of
the finger, rise in the center forming an
arc, and then exit the other side of the
finger.
 Loop-The ridges enter from one side of
a finger, form a curve, and then exit on
that same side.
 Whorl- Ridges form circularly around a
central point on the finger.
Fingerprint
pattern
Loop(65%)
Arch(5%)
Whorl(30%)
Different
identification
on
fingerprint
Fingerprint
Variations
Different
identification
on
fingerprint
Crossover: two ridges
cross
each other
Core: centre
Bifurcation: ridge
separates
Ridge ending: end point
Island: small ridge b/w
two
spaces
Delta: space between
ridges
Pore: human pore
Fingerprint
technology
 Optical sensor
 Capacitive sensor
 Ultrasonic
Fingerprint
processing
Fingerprint
processing
References
 https://support.apple.com/en-us/HT201371
 https://en.wikipedia.org/wiki/Fingerprint
Any question?
Thank you

More Related Content

Similar to Implementation of finger print sensor

DERMATOGLYPHICS.pptx by shree charan N
DERMATOGLYPHICS.pptx by shree charan NDERMATOGLYPHICS.pptx by shree charan N
DERMATOGLYPHICS.pptx by shree charan Nguestguest43
 
Finger print presentation by R Rajkumar
Finger print presentation by R Rajkumar Finger print presentation by R Rajkumar
Finger print presentation by R Rajkumar Rajkumar R
 
Classification of periodontal instruments
Classification of periodontal instrumentsClassification of periodontal instruments
Classification of periodontal instrumentsMD Abdul Haleem
 
SEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSSEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSpadma gade
 

Similar to Implementation of finger print sensor (11)

DERMATOGLYPHICS.pptx by shree charan N
DERMATOGLYPHICS.pptx by shree charan NDERMATOGLYPHICS.pptx by shree charan N
DERMATOGLYPHICS.pptx by shree charan N
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Finger print
Finger printFinger print
Finger print
 
Finger print presentation by R Rajkumar
Finger print presentation by R Rajkumar Finger print presentation by R Rajkumar
Finger print presentation by R Rajkumar
 
Fs Ch 7
Fs Ch 7Fs Ch 7
Fs Ch 7
 
Fingerprinting
FingerprintingFingerprinting
Fingerprinting
 
fingerprint characteristics
fingerprint characteristicsfingerprint characteristics
fingerprint characteristics
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
 
Classification of periodontal instruments
Classification of periodontal instrumentsClassification of periodontal instruments
Classification of periodontal instruments
 
SEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSSEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTS
 

More from Md. Irteza rahman Masud

More from Md. Irteza rahman Masud (7)

Application of projectile motion physics
Application of projectile motion physicsApplication of projectile motion physics
Application of projectile motion physics
 
Unity 3D, A game engine
Unity 3D, A game engineUnity 3D, A game engine
Unity 3D, A game engine
 
Simulation of vehicle polishing service
Simulation of vehicle polishing serviceSimulation of vehicle polishing service
Simulation of vehicle polishing service
 
Statistics history and applications
Statistics history and applicationsStatistics history and applications
Statistics history and applications
 
RGB and CMY based color model
RGB and CMY based color modelRGB and CMY based color model
RGB and CMY based color model
 
Range kutta numerical method techniques
Range kutta numerical method techniques Range kutta numerical method techniques
Range kutta numerical method techniques
 
History of calculus and applications
History of calculus and applications History of calculus and applications
History of calculus and applications
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Implementation of finger print sensor

Editor's Notes

  1. Along the way we’ve discovered…
  2. To view this presentation, first, turn up your volume and second, launch the self-running slide show.
  3. To view this presentation, first, turn up your volume and second, launch the self-running slide show.
  4. Presentations are a powerful communication medium.
  5. Presentations are a powerful communication medium.