SlideShare a Scribd company logo
1 of 6
Download to read offline
How Fingerprint Scanners
             Work
●     Introduction to How Fingerprint
    Scanners Work
●     Fingerprint Basics
●     Optical Scanner
●   Capacitance Scanner
●     Analysis
Introduction to How
Fingerprint Scanners Work

   we'll examine the secrets behind this
 exciting development in law enforcement
  and identity security. We'll also see how
fingerprint scanner security systems stack
 up to conventional password and identity
 card systems, and find out how they can
                     fail.
Fingerprint Basics
●   People have tiny ridges of skin on their
    fingers because this particular
    adaptation was extremely advantageous
    to the ancestors of the human species.
    The pattern of ridges and "valleys" on
    fingers make it easier for the hands to
    grip things, in the same way a rubber
    tread pattern helps a tire grip the road.
Optical Scanner


  There are a number of different ways to
  get an image of somebody's finger. The
most common methods today are optical
scanning and capacitance scanning. Both
   types come up with the same sort of
 image, but they go about it in completely
              different ways.
Capacitance Scanner


   The diagram below shows a simple
capacitive sensor. The sensor is made up
  of one or more semiconductor chips
containing an array of tiny cells. Each cell
     includes two conductor plates.
Analysis

 Instead, most fingerprint scanner systems
compare specific features of the fingerprint,
   generally known as minutiae. Typically,
     human and computer investigators
concentrate on points where ridge lines end
       or where one ridge splits into two
(bifurcations). Collectively, these and other
  distinctive features are sometimes called
                     typica.

More Related Content

What's hot

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprintPiyush Mittal
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
FingerprintscannerAi Hirasawa
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Workss1190017
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 

What's hot (12)

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
G12
G12G12
G12
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Kadai2
Kadai2Kadai2
Kadai2
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
week12
week12week12
week12
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 

Viewers also liked

Viewers also liked (20)

politica prevención del consumo de alcohol
politica prevención del consumo de alcoholpolitica prevención del consumo de alcohol
politica prevención del consumo de alcohol
 
2012 02-06 leccionadultos
2012 02-06 leccionadultos2012 02-06 leccionadultos
2012 02-06 leccionadultos
 
Unidad 11. formacion graficos Fabian Muñoz Tec. Sistemas
Unidad 11. formacion graficos Fabian Muñoz Tec. Sistemas Unidad 11. formacion graficos Fabian Muñoz Tec. Sistemas
Unidad 11. formacion graficos Fabian Muñoz Tec. Sistemas
 
Ashton richey all about me
Ashton richey all about meAshton richey all about me
Ashton richey all about me
 
Wix jennyfer
Wix jennyferWix jennyfer
Wix jennyfer
 
Ezequiel
EzequielEzequiel
Ezequiel
 
Informe `Jóvenes Españoles 2010´
Informe `Jóvenes Españoles 2010´Informe `Jóvenes Españoles 2010´
Informe `Jóvenes Españoles 2010´
 
4 things
4 things4 things
4 things
 
Educacion A Distancia
Educacion A DistanciaEducacion A Distancia
Educacion A Distancia
 
Convivencia infantiles y juveniles
Convivencia  infantiles y juvenilesConvivencia  infantiles y juveniles
Convivencia infantiles y juveniles
 
Miotramujer
MiotramujerMiotramujer
Miotramujer
 
ตะลุยครัว1
ตะลุยครัว1ตะลุยครัว1
ตะลุยครัว1
 
Luuuuus
LuuuuusLuuuuus
Luuuuus
 
Final ad makeover
Final   ad makeoverFinal   ad makeover
Final ad makeover
 
Exposicion de informatica grupo 6 (1)
Exposicion de informatica grupo 6 (1)Exposicion de informatica grupo 6 (1)
Exposicion de informatica grupo 6 (1)
 
9강
9강9강
9강
 
Salin top trade - il recupero dati secondo kroll ontrack
Salin   top trade - il recupero dati secondo kroll ontrackSalin   top trade - il recupero dati secondo kroll ontrack
Salin top trade - il recupero dati secondo kroll ontrack
 
Auistwich
AuistwichAuistwich
Auistwich
 
Tik presentation (sma)
Tik presentation (sma)Tik presentation (sma)
Tik presentation (sma)
 
Ning california
Ning californiaNing california
Ning california
 

Similar to How fingerprint scanners work: optical, capacitive scanning & analysis

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2Haruki0428
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners works1180002
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workguest13f6ca
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkAnzu Nakada
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Workoceanflying
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27s1170050
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behs1190106
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkShota Suzuki
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners workRaxTonProduction
 
assignment
assignmentassignment
assignments1190098
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 

Similar to How fingerprint scanners work: optical, capacitive scanning & analysis (20)

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Week12
Week12Week12
Week12
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Prezen3
Prezen3Prezen3
Prezen3
 
Kadai2
Kadai2Kadai2
Kadai2
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Ex12
Ex12Ex12
Ex12
 
Week12
Week12Week12
Week12
 

More from Shouta Yoshida (20)

Week13 b
Week13 bWeek13 b
Week13 b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Week12
Week12Week12
Week12
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
 
How rss works
How rss worksHow rss works
How rss works
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
How rss works
How rss worksHow rss works
How rss works
 
Sw week10 part1 b-1
Sw week10 part1 b-1Sw week10 part1 b-1
Sw week10 part1 b-1
 
Week11 b
Week11 bWeek11 b
Week11 b
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation2
Presentation2Presentation2
Presentation2
 
S1190027 shouta yoshida
S1190027 shouta yoshidaS1190027 shouta yoshida
S1190027 shouta yoshida
 
Sw week10 part1 b-1
Sw week10 part1 b-1Sw week10 part1 b-1
Sw week10 part1 b-1
 
sw week10 part1-B.odp
sw week10 part1-B.odp	sw week10 part1-B.odp
sw week10 part1-B.odp
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

How fingerprint scanners work: optical, capacitive scanning & analysis

  • 1. How Fingerprint Scanners Work ● Introduction to How Fingerprint Scanners Work ● Fingerprint Basics ● Optical Scanner ● Capacitance Scanner ● Analysis
  • 2. Introduction to How Fingerprint Scanners Work we'll examine the secrets behind this exciting development in law enforcement and identity security. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.
  • 3. Fingerprint Basics ● People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip things, in the same way a rubber tread pattern helps a tire grip the road.
  • 4. Optical Scanner There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways.
  • 5. Capacitance Scanner The diagram below shows a simple capacitive sensor. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates.
  • 6. Analysis Instead, most fingerprint scanner systems compare specific features of the fingerprint, generally known as minutiae. Typically, human and computer investigators concentrate on points where ridge lines end or where one ridge splits into two (bifurcations). Collectively, these and other distinctive features are sometimes called typica.