SlideShare a Scribd company logo
1 of 27
By
Sagar Verma
1412213082
Biometrics
Fingerprint
CONTENTS
• Introduction : Biometrics
• Physical and behavioral Traits
• System Process Flow
• Fingerprint Patterns
• Fingerprint Matching Techniques
• Future Scope
• Advantages and Disadvantages
• Applications
• Biometrics Growth Graph
• Conclusion
INTRODUCTION
What is Biometrics?
• The study of automated identification, by use of
physical or behavioral traits.
 Fingerprinting was first created by Dr.
Henry Fault, a British surgeon in 1882.
 It is a process of securing data
by adopting various techniques.
Physical and Behavioral:
• A biometric system based on physiological characteristics is more reliable
than one which adopts behavioral features, even if the later may be easier to
integrate within certain specific applications.
Biometric system process flow:
Why fingerprint biometric:
 High Universality.
 High Permanence.
 High Performance.
 High Acceptability.
 Reliable and trusted.
 Will never leave at home.
 Fingerprints are unique as everyone is born
with one.
 80% of public has biometric recorded.
Fingerprint patterns:
Loops:
 Ridge lines enter from one side and curve around to exit from the same
side.
 60-65%of population.
Whorls:
 Rounded and circular ridge pattern.
 30-35% of population.
Arches:
 The ridges enter from one side of the finger, rise in the centre forming an
arc, and then exit the other side of the finger.
 5% population.
population
Loop
Whorl
Arch
In figure
Whorl
1.Double Loop
Whorl.
2.Plain whorl.
3.Central.
pocket Loop whorl.
4.Accidental whorl.
Loop
1.Ulnar Loop.
2.Radial Loop.
Arch
1.Plain Arch.
2.Tented Arch.
Fingerprint scanner:
 A fingerprint sensor is an electronic device used to
capture a digital image of the fingerprint pattern.
BASIC COMPONENTS REQUIRED
FOR SCANNING
 POWER SUPPLY
 Most digital logic.
 circuits and processors need a 5 volt power supply.
 we use a LM-7805 voltage regulator IC.
 MAX 232
 To connect any RS-232 to a microcontroller
converters such as MAX-232 is used in fig 1.
 Bit 1 for -3v to -25v.
 Bit 0 for +3v to +25v. fig1
 BUZZER
 Informs when any unauthorized
person try to access illegally.
 MICROCONTROLLER
 A Micro controller consists of a powerful CPU tightly
coupled with memory RAM, ROM or EPROM),
 Various I / O features such as Serial ports, Parallel
Ports, Timer/Counters, Interrupt Controller, Data
Acquisition interfaces-Analog to Digital Converter
(ADC), Digital to Analog Converter (ADC),
everything integrated onto a single Silicon Chip.
 LOCKER SYSTEM:
 DC motor as the Locker for the authorized persons in
the Locker system mode.
 EEPROM:
 This is the additional memory which we are using for
the storage of the data for a particular person.
 KEY PAD:
We are using two types of keypads
 The matrix keypad and
 Other is the normal key for selecting the mode of
operation.
LCD:
 Output device
 Clearly displayed on the LCD.
WORKING PROCESS:
 If a person enters in an ATM/Bank he has to scan his
fingerprint. If it matches then he goes for transactions.
 Otherwise if any unauthorized
person enters then alarm sound will be
heard from buzzer.
FINGERPRINT MATCHING
TECHNIQUES
There are two
categories of
fingerprint
matching
techniques:
1.Minutiae-based
Minutiae-based techniques first find
minutiae points and then map their
relative placement on the finger.
2.Correlation based.
The correlation-based method is able
to overcome some of the difficulties
of the minutiae-based approach.
DIFFERENT IDENTIFICATION ON
FINGERPRINT
1.Crossover: two ridges cross
each other.
2.Core: centre
3.Bifurcation: ridge separates
4.Ridge ending: end point
5.Island: small ridge b/w two
spaces.
6.Delta: space between ridges
7.Pore: human pore.
Two main technologies used to capture
image of the fingerprint
1.Optical sensor – use light refracted through a prism.
An optical sensor based reader uses light to read and
acquire fingerprint images. Optical sensors can be
affected by a number of real life factors such as stray
light, surface contamination or even prior fingerprint
impressions present on the sensor surface. Hence it is
essential to clean the fingerprint reader glass on a
regular basis for optimal performance.
2.Capacitive sensor – detect voltage changes in skin
between ridges and valleys. Capacitive sensors use
electric current to sense a fingerprint and capture the
image. As sensors apply a small voltage to the finger, a
real fingerprint is required rather than a visual
impression of it. This technique makes the fingerprint
reader more reliable as it becomes harder to fake
enrolment.
Image Processing
• Capture the fingerprint images and process them through a series of image
processing algorithms to obtain a clear unambiguous skeletal image of the
original gray tone impression, clarifying smudged areas, removing
extraneous artifacts and healing most scars, cuts and breaks
Future Scope
Performance can
be increased in
terms of speed
and memory.
A speaking voice
alarm can be
used to indicate
unauthorized
person accessing
the ATM.
The system can
be made to
communicate
with modems or
mobile phones.
Advantages of Fingerprint:
a. Very high accuracy.
b. It is the most economical biometric PC user
authentication technique.
c. Easy to use.
d. Small storage space required for the biometric template,
reducing the size of the database memory required
e. It is standardized.
Disadvantages of Fingerprint:
a. For some people it is very intrusive, because it is still related to criminal
identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with
the age (is not appropriate with children, because the size of their fingerprint changes
quickly).
Applications
• Access control to computer systems (workstations) : USB fingerprint
readers, voice and face recognition software using standard camera and
microphone hardware, etc.
• Door security: doors with biometric locks using iris recognition,
fingerprint readers, etc.
• Portable media such as USB sticks and mobile hard drives with integrated
biometric access control and mostly encrypting your data using a built-in
algorithm.
• Mobile hard disk with fingerprint reader in fig 1.
• Fingerprint reader used for border control by the US department of
Homeland Security in fig 2 and many more applications are there.
Fig 2 Fig3
• India's national ID program called Aadhaar is the largest biometric database
in the world. It is a biometrics-based digital identity assigned for a person's
lifetime, verifiable online instantly in the public domain, at any time, from
anywhere, in a paperless way.
• About 550 million residents have been enrolled and assigned 480 million
Aadhaar numbers as of 7 November 2013.It aims to cover the entire
population of 1.2 billion in a few years.
• At Walt Disney World in Lake Buena Vista, Florida, biometric
measurements are taken from the fingers of guests to ensure that a ticket is
used by the same person from day to day.
Versus other Biometric
Technologies
Conclusion:
 The microcontroller based system for securing the
transactions of the user and providing the security for
the locker system and even more for the PASSPORT
verification using a finger print scanner has been
followed.
THANK YOU

More Related Content

What's hot

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
Sunil Kumar Chawla
 

What's hot (20)

Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 

Similar to Biometrics fingerprint

Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Similar to Biometrics fingerprint (20)

Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security System
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)
 
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEMBm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
 
Fingerprint based electronic voting system
Fingerprint based electronic voting systemFingerprint based electronic voting system
Fingerprint based electronic voting system
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Biometrics fingerprint

  • 2. CONTENTS • Introduction : Biometrics • Physical and behavioral Traits • System Process Flow • Fingerprint Patterns • Fingerprint Matching Techniques • Future Scope • Advantages and Disadvantages • Applications • Biometrics Growth Graph • Conclusion
  • 3. INTRODUCTION What is Biometrics? • The study of automated identification, by use of physical or behavioral traits.  Fingerprinting was first created by Dr. Henry Fault, a British surgeon in 1882.  It is a process of securing data by adopting various techniques.
  • 4. Physical and Behavioral: • A biometric system based on physiological characteristics is more reliable than one which adopts behavioral features, even if the later may be easier to integrate within certain specific applications.
  • 6. Why fingerprint biometric:  High Universality.  High Permanence.  High Performance.  High Acceptability.  Reliable and trusted.  Will never leave at home.  Fingerprints are unique as everyone is born with one.  80% of public has biometric recorded.
  • 7. Fingerprint patterns: Loops:  Ridge lines enter from one side and curve around to exit from the same side.  60-65%of population. Whorls:  Rounded and circular ridge pattern.  30-35% of population. Arches:  The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  5% population.
  • 9. Whorl 1.Double Loop Whorl. 2.Plain whorl. 3.Central. pocket Loop whorl. 4.Accidental whorl. Loop 1.Ulnar Loop. 2.Radial Loop. Arch 1.Plain Arch. 2.Tented Arch.
  • 10. Fingerprint scanner:  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
  • 11. BASIC COMPONENTS REQUIRED FOR SCANNING  POWER SUPPLY  Most digital logic.  circuits and processors need a 5 volt power supply.  we use a LM-7805 voltage regulator IC.
  • 12.  MAX 232  To connect any RS-232 to a microcontroller converters such as MAX-232 is used in fig 1.  Bit 1 for -3v to -25v.  Bit 0 for +3v to +25v. fig1  BUZZER  Informs when any unauthorized person try to access illegally.
  • 13.  MICROCONTROLLER  A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM),  Various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip.
  • 14.  LOCKER SYSTEM:  DC motor as the Locker for the authorized persons in the Locker system mode.  EEPROM:  This is the additional memory which we are using for the storage of the data for a particular person.
  • 15.  KEY PAD: We are using two types of keypads  The matrix keypad and  Other is the normal key for selecting the mode of operation. LCD:  Output device  Clearly displayed on the LCD.
  • 16. WORKING PROCESS:  If a person enters in an ATM/Bank he has to scan his fingerprint. If it matches then he goes for transactions.  Otherwise if any unauthorized person enters then alarm sound will be heard from buzzer.
  • 17. FINGERPRINT MATCHING TECHNIQUES There are two categories of fingerprint matching techniques: 1.Minutiae-based Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. 2.Correlation based. The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 18. DIFFERENT IDENTIFICATION ON FINGERPRINT 1.Crossover: two ridges cross each other. 2.Core: centre 3.Bifurcation: ridge separates 4.Ridge ending: end point 5.Island: small ridge b/w two spaces. 6.Delta: space between ridges 7.Pore: human pore.
  • 19. Two main technologies used to capture image of the fingerprint 1.Optical sensor – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. 2.Capacitive sensor – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 20. Image Processing • Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks
  • 21. Future Scope Performance can be increased in terms of speed and memory. A speaking voice alarm can be used to indicate unauthorized person accessing the ATM. The system can be made to communicate with modems or mobile phones.
  • 22. Advantages of Fingerprint: a. Very high accuracy. b. It is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantages of Fingerprint: a. For some people it is very intrusive, because it is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).
  • 23. Applications • Access control to computer systems (workstations) : USB fingerprint readers, voice and face recognition software using standard camera and microphone hardware, etc. • Door security: doors with biometric locks using iris recognition, fingerprint readers, etc. • Portable media such as USB sticks and mobile hard drives with integrated biometric access control and mostly encrypting your data using a built-in algorithm. • Mobile hard disk with fingerprint reader in fig 1. • Fingerprint reader used for border control by the US department of Homeland Security in fig 2 and many more applications are there. Fig 2 Fig3
  • 24. • India's national ID program called Aadhaar is the largest biometric database in the world. It is a biometrics-based digital identity assigned for a person's lifetime, verifiable online instantly in the public domain, at any time, from anywhere, in a paperless way. • About 550 million residents have been enrolled and assigned 480 million Aadhaar numbers as of 7 November 2013.It aims to cover the entire population of 1.2 billion in a few years. • At Walt Disney World in Lake Buena Vista, Florida, biometric measurements are taken from the fingers of guests to ensure that a ticket is used by the same person from day to day.
  • 26. Conclusion:  The microcontroller based system for securing the transactions of the user and providing the security for the locker system and even more for the PASSPORT verification using a finger print scanner has been followed.