SlideShare a Scribd company logo
1 of 18
Download to read offline
Fingerprint Recognition in
Smart Phones
Presenter: Mohamad Reza Jebeli Haji Abadi
Supervisor: Dr. Safabakhsh
o History
o Biometrics characteristics
o Fingerprint
o Authentication
o Conclusion
o References
Content
o First phone with fingerprint sensor
• 2004
• Pantech G100
History
o Revolution
• 2013
• iPhone 5s
History Introduction Authentication Conclusion References 1
Biometrics
Characteristics
History Introduction Authentication Conclusion References
o Physiological
• Fingerprint
• Face
• Iris
• ...
o Behavioral
• voice
• sign
• ...
2
Fingerprint
o Advantages
• Low cost
• High distinctiveness
• High permanence
• High performance
o Ridge
o Valley
History Introduction Authentication Conclusion References 3
First level
patterns
Tented Arch Arch Left Loop Right Loop Whorl
Arch Loop
5% 65%
30%
History Introduction Authentication Conclusion References 4
Second level
patterns
Termination Bifurcation Short ridge Dot Enclosure Break Crossbar
Overlap Bridge
Opposite
bifurcations Trifurcation Dock Return Spike
History Introduction Authentication Conclusion References 5
o Capturing
o Enhancement
o Neural Network
o Detection of first level pattern
o Detection of second level pattern
o Matching
Authentication
History Introduction Authentication Conclusion References 6
o Optical Sensors
• Reflection of light from a prism
• Cleanliness
• Low security
o Capacitive Sensors
• voltage
• High security
Capturing
History Introduction Authentication Conclusion References 7
Enhancement
o Increasing clarity
o Using filters
• Gabor Filter
History Introduction Authentication Conclusion References 8
Neural
Network
o Inputs
o Outputs
o Training with train data
History Introduction Authentication Conclusion References 9
Detecting first
level pattern
Neural Network
outputsInputs
..
..
..
o Inputs : fingerprint
o Outputs : first level patterns
History Introduction Authentication Conclusion References 10
Detecting second
level pattern
Neural Network
OutputsInputs
..
..
..
o Inputs : fingerprint
o Outputs :
..
..
..
Number of each
second level pattern
and their relative
position from each
other
History Introduction Authentication Conclusion References 11
Matching
o Comparison with saved fingerprints which have same first level
pattern
o Algorithm BOZORTH3
Level 2
patterns
vector
Level 2
patterns
vector
Matching? Authentication
History Introduction Authentication Conclusion References 12
Conclusion
o History
o Fingerprint introduction
o Authentication
Capturing
Enhancement
First neural
networkTrain
Data
Second
neural
network
Feature
vector
Set of same first
level pattern
fingerprints
Feature
vector
BOZORTH3 Authentication
History Introduction Authentication Conclusion References 13
References
[1] Pavol Mark, Alexander Hambalik, “FINGERPRINT RECOGNITION
SYSTEM USING ARTIFICIAL NEURAL NETWORK AS FEATURE
EXTRACTOR: DESIGN AND PERFORMANCE EVALUATION ” (2016)
[2] Sainath Maddala, Sreekanth Rao Tangellapally , “Implementation and
Evaluation of NIST Biometric Image Software for Fingerprint Recognition”
(2010)
[3] Davide Maltoni, “A Tutorial on Fingerprint Recognition ” (2016)
[4] https://www.bayometric.com/minutiae-based-extraction-fingerprint-recognition
History Introduction Authentication Conclusion References 14
Thank you for
your attention

More Related Content

Similar to Fingerprint Recognition in Smart Phones

Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
 
Optical Character Recognition: from data driven to self-supervised learning (...
Optical Character Recognition: from data driven to self-supervised learning (...Optical Character Recognition: from data driven to self-supervised learning (...
Optical Character Recognition: from data driven to self-supervised learning (...LianWenJin1
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNIJCSEA Journal
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNIJCSEA Journal
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)ainizbahari97
 
Development of a EEG-Based Biometric Authentication & Security System
Development of a EEG-Based Biometric Authentication &  Security SystemDevelopment of a EEG-Based Biometric Authentication &  Security System
Development of a EEG-Based Biometric Authentication & Security SystemMd. Mahmudul Hasan Mubin
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Waterfall: Rapid identification of IP flows using cascade classification
Waterfall: Rapid identification of IP flows using cascade classificationWaterfall: Rapid identification of IP flows using cascade classification
Waterfall: Rapid identification of IP flows using cascade classificationPawel Foremski
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identificationIJCSEA Journal
 

Similar to Fingerprint Recognition in Smart Phones (12)

Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Optical Character Recognition: from data driven to self-supervised learning (...
Optical Character Recognition: from data driven to self-supervised learning (...Optical Character Recognition: from data driven to self-supervised learning (...
Optical Character Recognition: from data driven to self-supervised learning (...
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Development of a EEG-Based Biometric Authentication & Security System
Development of a EEG-Based Biometric Authentication &  Security SystemDevelopment of a EEG-Based Biometric Authentication &  Security System
Development of a EEG-Based Biometric Authentication & Security System
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Waterfall: Rapid identification of IP flows using cascade classification
Waterfall: Rapid identification of IP flows using cascade classificationWaterfall: Rapid identification of IP flows using cascade classification
Waterfall: Rapid identification of IP flows using cascade classification
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
 

Recently uploaded

Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxStephen266013
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理pyhepag
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchersdarmandersingh4580
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证zifhagzkk
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证ppy8zfkfm
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证ju0dztxtn
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Valters Lauzums
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationmuqadasqasim10
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesBoston Institute of Analytics
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...ThinkInnovation
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理cyebo
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfgreat91
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token PredictionNABLAS株式会社
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...BabaJohn3
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfRobertoOcampo24
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证pwgnohujw
 

Recently uploaded (20)

Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
123.docx. .
123.docx.                                 .123.docx.                                 .
123.docx. .
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 

Fingerprint Recognition in Smart Phones

  • 1. Fingerprint Recognition in Smart Phones Presenter: Mohamad Reza Jebeli Haji Abadi Supervisor: Dr. Safabakhsh
  • 2. o History o Biometrics characteristics o Fingerprint o Authentication o Conclusion o References Content
  • 3. o First phone with fingerprint sensor • 2004 • Pantech G100 History o Revolution • 2013 • iPhone 5s History Introduction Authentication Conclusion References 1
  • 4. Biometrics Characteristics History Introduction Authentication Conclusion References o Physiological • Fingerprint • Face • Iris • ... o Behavioral • voice • sign • ... 2
  • 5. Fingerprint o Advantages • Low cost • High distinctiveness • High permanence • High performance o Ridge o Valley History Introduction Authentication Conclusion References 3
  • 6. First level patterns Tented Arch Arch Left Loop Right Loop Whorl Arch Loop 5% 65% 30% History Introduction Authentication Conclusion References 4
  • 7. Second level patterns Termination Bifurcation Short ridge Dot Enclosure Break Crossbar Overlap Bridge Opposite bifurcations Trifurcation Dock Return Spike History Introduction Authentication Conclusion References 5
  • 8. o Capturing o Enhancement o Neural Network o Detection of first level pattern o Detection of second level pattern o Matching Authentication History Introduction Authentication Conclusion References 6
  • 9. o Optical Sensors • Reflection of light from a prism • Cleanliness • Low security o Capacitive Sensors • voltage • High security Capturing History Introduction Authentication Conclusion References 7
  • 10. Enhancement o Increasing clarity o Using filters • Gabor Filter History Introduction Authentication Conclusion References 8
  • 11. Neural Network o Inputs o Outputs o Training with train data History Introduction Authentication Conclusion References 9
  • 12. Detecting first level pattern Neural Network outputsInputs .. .. .. o Inputs : fingerprint o Outputs : first level patterns History Introduction Authentication Conclusion References 10
  • 13. Detecting second level pattern Neural Network OutputsInputs .. .. .. o Inputs : fingerprint o Outputs : .. .. .. Number of each second level pattern and their relative position from each other History Introduction Authentication Conclusion References 11
  • 14. Matching o Comparison with saved fingerprints which have same first level pattern o Algorithm BOZORTH3 Level 2 patterns vector Level 2 patterns vector Matching? Authentication History Introduction Authentication Conclusion References 12
  • 15. Conclusion o History o Fingerprint introduction o Authentication Capturing Enhancement First neural networkTrain Data Second neural network Feature vector Set of same first level pattern fingerprints Feature vector BOZORTH3 Authentication History Introduction Authentication Conclusion References 13
  • 16. References [1] Pavol Mark, Alexander Hambalik, “FINGERPRINT RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK AS FEATURE EXTRACTOR: DESIGN AND PERFORMANCE EVALUATION ” (2016) [2] Sainath Maddala, Sreekanth Rao Tangellapally , “Implementation and Evaluation of NIST Biometric Image Software for Fingerprint Recognition” (2010) [3] Davide Maltoni, “A Tutorial on Fingerprint Recognition ” (2016) [4] https://www.bayometric.com/minutiae-based-extraction-fingerprint-recognition History Introduction Authentication Conclusion References 14
  • 17.
  • 18. Thank you for your attention