SlideShare a Scribd company logo
1 of 26
Presented to : Shailesh Panwar Presented by :
Shivank Negi
III SEM (CSE)
HNBGU
Srinagar Garhwal
 What is finger print sensing
 Introduction
 User convenience
 Application
 History
 Types
 Conclusion
 Finger print recognization system is Finger
print recognization system is under biometric
application used under biometric application
used to increase the user security. Generally
the biometric systems Generally the systems
operats in two modes
 Verification
 Identification
8
Heavy Web users have an average of 21 passwords; 81% of
users select a common password (the most common password
is the word «password») and 30% write their passwords down
or store them in a file. (2002 NTA Monitor Password Survey)
9
 Security –authentication
 Forensic sciences–individualization
10
11
 1750 B.C.- people in Babylon used
fingerprints to sign their identity on
clay tablets
 300 B.C.-Emperors of China used
personalized clay seals
12
Civil:
 Welfare Fraud Reduction
 Border Control
 Driver registration
Commercial:
 Personal Access Protection
 Banking Security
 Business-to-Business Transactions
 A fingerprint pattern is comprised of a A
fingerprint pattern is comprised of a
sequence of Ridges and Valleys. In a
fingerprint image, the ridges appear as
dark lines dark lines while the valleys
are the light areas between the ridges.
 The three basic types of these singular regions
The three basic types of these singular regions
are loop, delta, and whorl.
 Ink and paper are
the tried-and-true
way to take
fingerprints, but
technology has
found ways to
eliminate
smudges and ink
stains.
19
 Sensing by projecting
an image of the
fingerprint onto a
camera by total internal
reflection.
20
 The most commonly found type of fingerprint
scanner used today is the capacitive scanner.
 Instead of creating a traditional image of a
fingerprint, capacitive fingerprint scanners use
arrays tiny capacitor circuits to collect data about
a fingerprint.
 The latest fingerprint scanning technology to
enter the smartphone space is an ultrasonic
sensor, which was first announced to be inside
the Le Max Pro smartphone.
 To actually capture the details of a fingerprint,
the hardware consists of both an ultrasonic
transmitter and a receiver.
22
 Secure logins via keyboard modules
 User identification
 Biometric door locks
 Credit card security
 Weapon activation
 Theft protection
 The controller based system the trasitions of
the user and providing the security for locker
system and even more for passport verification
using a finger print scanner is followed
 https://www.google.co.in/webhp?sourceid=c
hrome-instant&ion=1&espv=2&ie=UTF-
8#q%20fingure%20print%20scanner
 www.studentmafia.com
finger print sensing

More Related Content

What's hot

DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
ijait
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 

What's hot (18)

071029
071029071029
071029
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdfDiploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D password
3D password3D password
3D password
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 

Viewers also liked

Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
Akshay Govekar
 

Viewers also liked (11)

FINGERPRINT DOOR LOCK
FINGERPRINT DOOR LOCKFINGERPRINT DOOR LOCK
FINGERPRINT DOOR LOCK
 
Electric door openers linear telephone entry systems - fingerprint readers ...
Electric door openers   linear telephone entry systems - fingerprint readers ...Electric door openers   linear telephone entry systems - fingerprint readers ...
Electric door openers linear telephone entry systems - fingerprint readers ...
 
Anti-finger Print Varnish Catalog
Anti-finger Print Varnish CatalogAnti-finger Print Varnish Catalog
Anti-finger Print Varnish Catalog
 
Finger printing
Finger printingFinger printing
Finger printing
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 

Similar to finger print sensing

Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 

Similar to finger print sensing (20)

Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
D0351022026
D0351022026D0351022026
D0351022026
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
A011140104
A011140104A011140104
A011140104
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
H029044050
H029044050H029044050
H029044050
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Seetu
SeetuSeetu
Seetu
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

finger print sensing

  • 1. Presented to : Shailesh Panwar Presented by : Shivank Negi III SEM (CSE) HNBGU Srinagar Garhwal
  • 2.
  • 3.  What is finger print sensing  Introduction  User convenience  Application  History  Types  Conclusion
  • 4.
  • 5.
  • 6.  Finger print recognization system is Finger print recognization system is under biometric application used under biometric application used to increase the user security. Generally the biometric systems Generally the systems operats in two modes  Verification  Identification
  • 7.
  • 8. 8 Heavy Web users have an average of 21 passwords; 81% of users select a common password (the most common password is the word «password») and 30% write their passwords down or store them in a file. (2002 NTA Monitor Password Survey)
  • 9. 9  Security –authentication  Forensic sciences–individualization
  • 10. 10
  • 11. 11  1750 B.C.- people in Babylon used fingerprints to sign their identity on clay tablets  300 B.C.-Emperors of China used personalized clay seals
  • 12. 12 Civil:  Welfare Fraud Reduction  Border Control  Driver registration Commercial:  Personal Access Protection  Banking Security  Business-to-Business Transactions
  • 13.
  • 14.  A fingerprint pattern is comprised of a A fingerprint pattern is comprised of a sequence of Ridges and Valleys. In a fingerprint image, the ridges appear as dark lines dark lines while the valleys are the light areas between the ridges.
  • 15.  The three basic types of these singular regions The three basic types of these singular regions are loop, delta, and whorl.
  • 16.
  • 17.
  • 18.  Ink and paper are the tried-and-true way to take fingerprints, but technology has found ways to eliminate smudges and ink stains.
  • 19. 19  Sensing by projecting an image of the fingerprint onto a camera by total internal reflection.
  • 20. 20  The most commonly found type of fingerprint scanner used today is the capacitive scanner.  Instead of creating a traditional image of a fingerprint, capacitive fingerprint scanners use arrays tiny capacitor circuits to collect data about a fingerprint.
  • 21.  The latest fingerprint scanning technology to enter the smartphone space is an ultrasonic sensor, which was first announced to be inside the Le Max Pro smartphone.  To actually capture the details of a fingerprint, the hardware consists of both an ultrasonic transmitter and a receiver.
  • 22. 22  Secure logins via keyboard modules  User identification  Biometric door locks  Credit card security  Weapon activation  Theft protection
  • 23.
  • 24.  The controller based system the trasitions of the user and providing the security for locker system and even more for passport verification using a finger print scanner is followed