Advertisement

2019001791_Fingerprint_Authentication.pptx

Mar. 21, 2023
Advertisement

More Related Content

Advertisement

2019001791_Fingerprint_Authentication.pptx

  1. PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE (GUJ.MED.) & SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT Submitted By Mr. Prince Finaviya - 71 Guided By Asst. Prof. Mansi Shah
  2. FINGERPRINT AUTHENTICATI ON
  3. CONTENT • Introduction • What is a biometric? • Method of verification • Fingerprint recognition • Verification & authentication • Applications area of biometric • Advantages of biometrics • Disadvantages of biometrics • Reference
  4. INTRODUCTION • Fingerprint authentication technology widely used now days for security reason. • Many system want first identify user then give access to use the system . • Identification process are easy to use now days . just because of fingerprint authentication. • Fingerprints have been accepted as the most common form of biometrics authentication today.
  5. • Every human beings fingerprint is unique. Each fingerprint has a unique characteristic and pattern that is made up of lines and spaces. • The lines are called ridges while the spaces between the ridges are called valleys. These patterns of ridges and valleys are used to match the fingerprint for verification and authentication. • There are about one billion possible minutiae combinations on a fingerprint; since there are about 5 billion people inhabiting the earth, and each has ten fingers, this means that statistically it is likely that fifty people on earth share a fingerprint”. • In identification process, an individual presents a sample to the biometric system during enrolment. The biometric system then attempts to compare the sample with the database which has samples stored in it. This is one- to-many form of comparison. The identification process is further divided into positive identification and negative identification.
  6. WHAT IS BIOMETRIC ? • Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic. Biometrics as authentication Something You Know Something You Have Something You Are • Can be combined with other tools to form more secure, easier to use verification solutions. • Recognizes individuals definitively.
  7. METHOD OF VERIFICATION There are two methods of verification for security. Psychological verification : Verification of the organs of the human being, which will have unique identification. There are five types of verifications. These are: Fingerpri nt Handpri nt Face measurement Retinal scans DNA analysis
  8.  Finger print It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot.
  9.  Handprint It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.
  10.  Face measurement measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database
  11.  Retinal scans It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it. This energy is absorbed by the blood vessels is different in different individuals.
  12.  DNA analysis It involves in checking the dna pattern of a human used when physical characteristics are unrecognizable • This is one biometric that is judicially accepted. No human have identified similar DNA patterns except in twins.
  13. Behavioural verification this involves in oral thing done by the individual. There are 3 types of behavioral verifications,  Typing  Signature  Voice Typing Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.
  14.  Signature Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations.  Voice It involves in the recognition of the voice of the individual.
  15. FINGERPRINT RECOGNITION • This is a technique used to match and identify unique finger prints that might need to be stored and then accessed in a database.
  16. WHY FINGERPRINT RECOGNITION?  Pin's and passwords may be forgotten  The fingerprints in twins are not the same.  Relies on the concept that no two people have identical fingerprints.  More secure.  A person's fingerprint will not naturally change structure after about one year after birth
  17. FINGERPRINT RECOGNITION SYSTEMS Fingerprint recognition system is a free tool that will recognize and verify fingerprints. Fingerprint identification system is a biometric identification (id) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The three main functions of fingerprint recognition systems are: 1) Acquisition of fingerprints 2) Derivation of characteristics and 3) Matching
  18. FINGERPRINT RECOGNITION STEPS Database
  19. FINGERPRINT SENSORS  Fingerprint scanners are security systems of biometrics. They are now used in police stations, security industries and most recently, on computers.  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan.
  20. There are two types of fingerprint scanners:  1. The optical scanner optical fingerprint imaging involves capturing a digital image of the print using visible light.  2. The ultrasonic scanner Ultrasonic sensors make use of the principles of medical ultra sonography in order to create visual images of the fingerprint
  21. VERIFICATION AND AUTHENTICATION  This refers to the automated method of verifying a match between two human fingerprints.  The analysis of fingerprints for matching purposes generally are of two types 1)patterns The three basic patterns of fingerprint ridges they are: A) arch B) loop C) whorl
  22.  Arch: the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
  23.  Loop: the ridges enter from one side of a finger and then exit on that same side.
  24.  Whorl: ridges form circularly around a central point on the finger.
  25. 2)Minutia The major minutia features of fingerprint ridges are a) ridge ending b) bifurcation. C) short ridge (dot). A) ridge ending The ridge ending is the point at which a ridge terminates
  26.  B) Bifurcation Bifurcations are points at which a single ridge splits into two ridges.
  27. c) Short ridges Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint.
  28. APPLICATION AREA OF BIOMETRIC o Fingerprint based biometrics has primarily been used to secure entry devices for building door locks and computer network access. o Perhaps one of the most common uses of biometric technology is smartphone security. Apple were the first to introduce the touch ID solution using fingerprint recognition technology and since then, mobile phone security has evolved to utilize a number of biometric technologies including facial recognition, iris recognition and voice recognition. A small number of banks use fingerprint readers for authorization at atms. o Grocery stores are experimenting with a fingerprint scan checkout that automatically recognizes and bills a registered user’s credit card or debit account.
  29. ADVANTAGES OF BIOMETRICS o It provide good security mechanism than all other security methods o It never fails in security constraints. o In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition systems attached to video surveillance systems are supposed to help catch them. o Fairly small storage space is required for the biometric template, reducing the size of the database required. o It is one of the most developed biometrics, with more history, research, and design.
  30. DISADVANTAGES OF BIOMETRICS o It needs high memory space in the back end. o Collect data for security is difficult o Sometimes fails the security with right users o Any time data loose in database high effect for security mechanism. o So many equipment’s are needed for provide this technology. o It highly expensive o Facial imaging can also hinder accurate identifications. o Missing body part problem.
  31. REFERENCE • HTTPS://WWW.ARROW.COM/EN/RESEARCH-AND-EVENTS/ARTICLES/HOW- FINGERPRINT-SENSORS-WORK • HTTPS://WWW.SEMINARSTOPICS.COM/SEMINAR/9286/FINGER-PRINT- AUTHENTICATION • HTTPS://WWW.ALLEYDOG.COM/GLOSSARY/DEFINITION.PHP?TERM=BIOMETRICS • HTTPS://WWW.ANDROIDAUTHORITY.COM/HOW-FINGERPRINT-SCANNERS-WORK- 670934/
  32. Thank You
Advertisement