SlideShare a Scribd company logo
1 of 6
Download to read offline
How Fingerprint Scanners Work



                   s1150153   Kei Taniue
                   s1180178   Mariko Saito
                   s1180182   Kahori Shitomi
                   s1180187   Kazuki Tuda
Fingerprint Basics

 Fingerprints are one of those bizarre
twists of nature. Human beings happen to
have built-in, easily accessible identity
cards. You have a unique design, which
represents you alone, literally at your
fingertips. People have tiny ridges of skin
on their fingers because this particular
adaptation was extremely advantageous
to the ancestors of the human species.
 Fingerprints are a unique marker for a
person, even an identical twin. This is the
basic idea of fingerprint analysis, in both
crime investigation and security.
Optical Scanner
 A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger,
and it needs to determine whether the pattern of ridges and valleys in this image matches
the pattern of ridges and valleys in pre-scanned images. There are a number of different
ways to get an image of somebody's finger. The most common methods today are optical
scanning and capacitance scanning. Both types come up with the same sort of image, but
they go about it in completely different ways.

 The scanning process starts when you place your finger on a glass plate, and a CCD
camera takes a picture. The CCD system actually generates an inverted image of the finger,
with darker areas representing more reflected light (the ridges of the finger) and lighter areas
representing less reflected light (the valleys between the ridges). It checks the average pixel
darkness, or the overall values in a small sample, and rejects the scan if the overall image
is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let
in more or less light, and then tries the scan again.
Capacitance Scanner

 Like optical scanners, capacitive
fingerprint scanners generate an image of
the ridges and valleys that make up a
fingerprint. But instead of sensing the print
using light, the capacitors use electrical
current.
 The main advantage of a capacitive
scanner is that it requires a real fingerprint-
type shape, rather than the pattern of light
and dark that makes up the visual                 The diagram shows a simple capacitive sensor.
impression of a fingerprint. This makes the
system harder to trick. Additionally, since
they use a semiconductor chip rather than
a CCD unit, capacitive scanners tend to be
more compact that optical devices.
Analysis

 In movies and TV shows, automated fingerprint analyzers typically overlay
various fingerprint images to find a match. In actuality, this isn't a particularly
practical way to compare fingerprints.

 The scanner system software uses highly complex algprithms to recognize and
analyze these minutiae. The basic idea is to measure the relative positions of
minutiae, in the same sort of way you might recognize a part of the sky by the
relative positions of stars. A simple way to think of it is to consider the shapes
that various minutia form when you draw straight lines between them. If two
prints have three ridge endings and two bifurcations, forming the same shape
with the same dimensions, there's a high likelihood they're from the same print.
Pros and Cons
There are several ways a security system can verify that somebody is an authorized
user. Most systems are looking for one or more of the following:
     What you have
     What you know
     Who you are
"Who you are" systems like fingerprint scanners have a number of advantages over other
systems. To name few:
     Physical attributes are much harder to fake than identity cards.
     You can't guess a fingerprint pattern like you can guess a password.
     You can't misplace your fingerprints, irises or voice like you can misplace an access
     card.
     You can't forget your fingerprints like you can forget a password.
To make these security systems more reliable, it's a good idea to combine the biometric
analysis with a conventional means of identification, such as a password (in the same
way an ATM requires a bank card and a PIN code).

More Related Content

What's hot

Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...Rong-Hao Liang
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...Rong-Hao Liang
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 

What's hot (14)

Prezen3
Prezen3Prezen3
Prezen3
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
assignment
assignmentassignment
assignment
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...
CHI'15 - WonderLens: Optical Lenses and Mirrors for Tangible Interactions on ...
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...
[UIST 2015] FlexiBend: Enabling Interactivity of Multi-Part, Deformable Fabri...
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 

Similar to Week12

In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behs1190106
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners workRaxTonProduction
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkKS
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workguest13f6ca
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
assignment
assignmentassignment
assignments1190098
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12motoki_guransahal
 

Similar to Week12 (20)

Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Roy3
Roy3Roy3
Roy3
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Kadai2
Kadai2Kadai2
Kadai2
 
Ex12
Ex12Ex12
Ex12
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Roy b2
Roy b2Roy b2
Roy b2
 
Sw week12
Sw week12Sw week12
Sw week12
 
Roy
RoyRoy
Roy
 
Kadai2
Kadai2Kadai2
Kadai2
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
assignment
assignmentassignment
assignment
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12
 

Week12

  • 1. How Fingerprint Scanners Work s1150153 Kei Taniue s1180178 Mariko Saito s1180182 Kahori Shitomi s1180187 Kazuki Tuda
  • 2. Fingerprint Basics Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips. People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. Fingerprints are a unique marker for a person, even an identical twin. This is the basic idea of fingerprint analysis, in both crime investigation and security.
  • 3. Optical Scanner  A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways. The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The CCD system actually generates an inverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges). It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again.
  • 4. Capacitance Scanner Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current. The main advantage of a capacitive scanner is that it requires a real fingerprint- type shape, rather than the pattern of light and dark that makes up the visual The diagram shows a simple capacitive sensor. impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.
  • 5. Analysis In movies and TV shows, automated fingerprint analyzers typically overlay various fingerprint images to find a match. In actuality, this isn't a particularly practical way to compare fingerprints. The scanner system software uses highly complex algprithms to recognize and analyze these minutiae. The basic idea is to measure the relative positions of minutiae, in the same sort of way you might recognize a part of the sky by the relative positions of stars. A simple way to think of it is to consider the shapes that various minutia form when you draw straight lines between them. If two prints have three ridge endings and two bifurcations, forming the same shape with the same dimensions, there's a high likelihood they're from the same print.
  • 6. Pros and Cons There are several ways a security system can verify that somebody is an authorized user. Most systems are looking for one or more of the following: What you have What you know Who you are "Who you are" systems like fingerprint scanners have a number of advantages over other systems. To name few: Physical attributes are much harder to fake than identity cards. You can't guess a fingerprint pattern like you can guess a password. You can't misplace your fingerprints, irises or voice like you can misplace an access card. You can't forget your fingerprints like you can forget a password. To make these security systems more reliable, it's a good idea to combine the biometric analysis with a conventional means of identification, such as a password (in the same way an ATM requires a bank card and a PIN code).