SlideShare a Scribd company logo
1 of 31
MEMBERS:
CHANG KA LONG 15211959
KONG WING SUEN 15227200
LEE TSZ NGA 15215423
LEUNG TSZ YAN 13204505
Fingerprint Technology in Our Lives
Content
Introduction
• What are
Fingerprints?
• What is
Fingerprint
Technology?
Applications
• Advantages of
Fingerprint
Technology
• Disadvantages
of Fingerprint
Technology Survey
Results
Video Conclusion
Mind Map
Objectives
 Explain fingerprint technology
 Discusses the advantages and disadvantages of
fingerprint technology
 Evaluates the degree of acceptancy among
people
What are Fingerprints?
 The impression left by the friction ridges of a human
finger
 Mainly made up of ridges and furrows
What are Fingerprints? (Cont.)
5 % of Arch 30% of Whorl 65% of Loop
What is Fingerprint Technology?
 General Concept:
 Uses a person's fingerprints to identify him/her through
fingerprint scanning
 Biometric Technology:
 The study of how people differ from each other based on
biological factors
 Fields:
 Security systems
 Forensic science
 Crime scene investigations
Uses:
 To record the details of
convicted criminals
 To control access to
high-security buildings
What is Fingerprint Technology?
What is Fingerprint Technology? (Cont.)
 To unlock some
electronic gadgets
 To examine evidence
from crime scenes
What is Fingerprint Technology? (Cont.)
 Process:
Advantages of Fingerprint Technology
 1. Acceptance
 Generally accepted
 One of the oldest biometric technology
 People are familiar with the use of it for identification
purposes
 2. Ease of use
 Little time is required for enrollment
 Simply place a finger on a scanner
 Do not require concentrated effort
Advantages of Fingerprint Technology (Cont.)
 3. Uniqueness
 An unique identifier specific to the individual
 No two fingerprints are identical
 4. Installation
 Easy to install
 Inexpensive
 Fingerprint scanners are small and portable (Plug-
and-play technologies)
Disadvantages of Fingerprint Technology
 1. Security
 Can be copied and reproduced easily by using some
publicly available documentation and inexpensive
materials (latex)
 2. Privacy
 May be used to track a person’s activities
 May be improperly used for forensic purposes
Disadvantages of Fingerprint Technology
 3. Performance
 Deteriorates over time
 The characteristics of fingerprints may change over
time
 Makes identification and verification more difficult
Disadvantages of Fingerprint Technology
 4. Groups/People
 Some ethnic groups have lower quality fingerprints
(Manual laborers & elderly)
 Not appropriate with children
 More difficult to be enrolled in some finger-scanning
systems
 Make mistakes with the dryness or dirty of the
finger’s skin
Survey Results
 Target: All age groups
 Site:
https://docs.google.com/forms/d/1IZcLe1lBNUb6be
xs0Udf6VanLCbEgGN4JDGKH1aOdeM/viewform?u
sp=send_form
Survey Results (Cont.)
6%
61%
24%
9%
0%
15%
Affection from fingerprints on daily life
No affection
More convenient
Privacy declined
Over applied in today's technology
Others
Survey Results (Cont.)
Yes
62%
No
38%
Having TECHNOLOGIES with fingerprint technology
Yes No
Survey Results (Cont.)
14
1 0 0
1-3 4-6 7-9 10 or above
How many TECHNOLOGIES that you have used involve
the application of fingerprints?
Survey Results (Cont.)
0
2
4
6
8
10
12
0 1 2 More than 3
Number of PROPERTIES own with fingerprint
technology
Survey Results (Cont.)
0 2 4 6 8 10 12
At least once everyday
At least once per month
At least once per year
HOW FREQUENT DO YOU USE TECHNOLOGIES
THAT INVOLVE THE APPLICATION OF
FINGERPRINTS?
Survey Results (Cont.)
0
2
9 9
4
0
0
1
2
3
4
5
6
7
8
9
10
Strongly Disagree Strongly Agree
0 1 2 3 4 5
numberofpeople
Degree of extent
TO WHAT EXTENT DO YOU AGREE THAT
FINGERPRINTS PLAY AN IMPORTANT ROLE IN
OUR DAILY LIFE?
Survey Results (Cont.)
0 0
2
15
7
0
0
2
4
6
8
10
12
14
16
Do not trust Trust
1 2 3 4 5
Do you trust the usage of fingerprints?
Survey Results (Cont.)
0 2 4 6 8 10 12 14
Fingerprint Lock
Password Lock
Key Lock
Which of the following would you choose to be the format
of your door lock?
Survey Results (Cont.)
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
4
4.1
11 to 20 21 to 30
Age Group
To what extent do you agree that fingerprints should be
fully applied to our future technology?
Results Analysis
 Fingerprint technology plays an important role in
our lives
 Most of the interviewees use technologies which involve the
application of fingerprints every day
 Fingerprint technology is generally accepted by the
public
 Interviewees tend to trust the fingerprint technology
 Most of the them prefer to use it as their door lock
 They highly agree that fingerprint technology should be fully
applied in the future
Video
Conclusion
Fields
Security systems
Forensic science
Crime scene investigations
Uses
To record the details of
convicted criminals
To control access to high-
security buildings
To unlock some electronic
gadgets
To examine evidence from
crime scenes
Conclusion
Advantages Disadvantages
1. Acceptance
•Generally accepted by the public
1. Security
•Can be copied and reproduced easily
by some materials
2. Ease of use
•Little time and effort are required for
enrollment
2. Privacy
•May be used to track a person’s
activities
3. Uniqueness
•An unique identifier specific to the
individuals
3. Performance
•Deteriorates over time
4. Installation
•Easy to install
4. Groups/People
•Some people may not be able to enroll
in the finger-scanning systems
References
 Buracker, C., & Stover, W. (1984). Automated fingerprint
identification: Regional application of technology. Washington,
D.C.?: [Federal Bureau of Investigation, U.S. Dept. of Justice].
 Komarinski, P. (2005). Automated fingerprint identification
systems (AFIS). Amsterdam: Elsevier Academic.
 Park, J. (2009). Advances in information security and its
application third international conference, ISA 2009, Seoul, Korea,
June 25-27, 2009 ; proceedings. Berlin: Springer.
 Park, J. (2012). Future information technology, application, and
service FutureTech 2012. Dordrecht: Springer.
 Wentworth, P. (1990). The fingerprint. Leicester: Ulverscroft.
Job Division
Chang Ka Long
- Survey Questions
- Survey Result Analysis
- PowerPoint Editing
Kong Wing Suen
- Survey Result Charts
- Survey Result Analysis
- PowerPoint Editing
Lee Tsz Nga
- Mind Map
- PowerPoint Editing
- Prezi Editing
Leung Tsz Yan
Job Division

More Related Content

Viewers also liked

CURRICULUM VITAE OF V.L MHLONGO(0)
CURRICULUM VITAE OF V.L MHLONGO(0)CURRICULUM VITAE OF V.L MHLONGO(0)
CURRICULUM VITAE OF V.L MHLONGO(0)
veronica londiwe
 
Servaas_Morré_Intl_Innovation_192_Research_Media_HR
Servaas_Morré_Intl_Innovation_192_Research_Media_HRServaas_Morré_Intl_Innovation_192_Research_Media_HR
Servaas_Morré_Intl_Innovation_192_Research_Media_HR
Sander Ouburg
 

Viewers also liked (16)

Ruu pphi versi buruh online
Ruu pphi versi buruh onlineRuu pphi versi buruh online
Ruu pphi versi buruh online
 
Attribution Is Scary: Steps to Tame the Terror
Attribution Is Scary: Steps to Tame the TerrorAttribution Is Scary: Steps to Tame the Terror
Attribution Is Scary: Steps to Tame the Terror
 
[Webinar] 2016 Holiday Marketing Strategy
[Webinar] 2016 Holiday Marketing Strategy[Webinar] 2016 Holiday Marketing Strategy
[Webinar] 2016 Holiday Marketing Strategy
 
Ancillary task-Music Posters
Ancillary task-Music PostersAncillary task-Music Posters
Ancillary task-Music Posters
 
Evaluation media
Evaluation mediaEvaluation media
Evaluation media
 
Intranet
Intranet Intranet
Intranet
 
191148953 management-proyek-4
191148953 management-proyek-4191148953 management-proyek-4
191148953 management-proyek-4
 
Population and economics
Population and economicsPopulation and economics
Population and economics
 
[Webinar] Strategic Link Building
[Webinar] Strategic Link Building [Webinar] Strategic Link Building
[Webinar] Strategic Link Building
 
CURRICULUM VITAE OF V.L MHLONGO(0)
CURRICULUM VITAE OF V.L MHLONGO(0)CURRICULUM VITAE OF V.L MHLONGO(0)
CURRICULUM VITAE OF V.L MHLONGO(0)
 
Hackett ITResume SEPT01[2]
Hackett ITResume SEPT01[2]Hackett ITResume SEPT01[2]
Hackett ITResume SEPT01[2]
 
DKV_CV_Updated
DKV_CV_UpdatedDKV_CV_Updated
DKV_CV_Updated
 
Servaas_Morré_Intl_Innovation_192_Research_Media_HR
Servaas_Morré_Intl_Innovation_192_Research_Media_HRServaas_Morré_Intl_Innovation_192_Research_Media_HR
Servaas_Morré_Intl_Innovation_192_Research_Media_HR
 
Ronnie Fernandez-CV
Ronnie Fernandez-CVRonnie Fernandez-CV
Ronnie Fernandez-CV
 
Planning magazine
Planning magazinePlanning magazine
Planning magazine
 
Espire towers Luxury Property in Faridabad
Espire towers   Luxury Property in FaridabadEspire towers   Luxury Property in Faridabad
Espire towers Luxury Property in Faridabad
 

Similar to Fingerprint technology in our lives

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 

Similar to Fingerprint technology in our lives (20)

Group 4
Group 4Group 4
Group 4
 
Group 4
Group 4Group 4
Group 4
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
It project
It projectIt project
It project
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Data is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniquesData is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniques
 
Data are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniquesData are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniques
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Fingerprint technology in our lives

  • 1. MEMBERS: CHANG KA LONG 15211959 KONG WING SUEN 15227200 LEE TSZ NGA 15215423 LEUNG TSZ YAN 13204505 Fingerprint Technology in Our Lives
  • 2. Content Introduction • What are Fingerprints? • What is Fingerprint Technology? Applications • Advantages of Fingerprint Technology • Disadvantages of Fingerprint Technology Survey Results Video Conclusion
  • 4. Objectives  Explain fingerprint technology  Discusses the advantages and disadvantages of fingerprint technology  Evaluates the degree of acceptancy among people
  • 5. What are Fingerprints?  The impression left by the friction ridges of a human finger  Mainly made up of ridges and furrows
  • 6. What are Fingerprints? (Cont.) 5 % of Arch 30% of Whorl 65% of Loop
  • 7. What is Fingerprint Technology?  General Concept:  Uses a person's fingerprints to identify him/her through fingerprint scanning  Biometric Technology:  The study of how people differ from each other based on biological factors  Fields:  Security systems  Forensic science  Crime scene investigations
  • 8. Uses:  To record the details of convicted criminals  To control access to high-security buildings What is Fingerprint Technology?
  • 9. What is Fingerprint Technology? (Cont.)  To unlock some electronic gadgets  To examine evidence from crime scenes
  • 10. What is Fingerprint Technology? (Cont.)  Process:
  • 11. Advantages of Fingerprint Technology  1. Acceptance  Generally accepted  One of the oldest biometric technology  People are familiar with the use of it for identification purposes  2. Ease of use  Little time is required for enrollment  Simply place a finger on a scanner  Do not require concentrated effort
  • 12. Advantages of Fingerprint Technology (Cont.)  3. Uniqueness  An unique identifier specific to the individual  No two fingerprints are identical  4. Installation  Easy to install  Inexpensive  Fingerprint scanners are small and portable (Plug- and-play technologies)
  • 13. Disadvantages of Fingerprint Technology  1. Security  Can be copied and reproduced easily by using some publicly available documentation and inexpensive materials (latex)  2. Privacy  May be used to track a person’s activities  May be improperly used for forensic purposes
  • 14. Disadvantages of Fingerprint Technology  3. Performance  Deteriorates over time  The characteristics of fingerprints may change over time  Makes identification and verification more difficult
  • 15. Disadvantages of Fingerprint Technology  4. Groups/People  Some ethnic groups have lower quality fingerprints (Manual laborers & elderly)  Not appropriate with children  More difficult to be enrolled in some finger-scanning systems  Make mistakes with the dryness or dirty of the finger’s skin
  • 16. Survey Results  Target: All age groups  Site: https://docs.google.com/forms/d/1IZcLe1lBNUb6be xs0Udf6VanLCbEgGN4JDGKH1aOdeM/viewform?u sp=send_form
  • 17. Survey Results (Cont.) 6% 61% 24% 9% 0% 15% Affection from fingerprints on daily life No affection More convenient Privacy declined Over applied in today's technology Others
  • 18. Survey Results (Cont.) Yes 62% No 38% Having TECHNOLOGIES with fingerprint technology Yes No
  • 19. Survey Results (Cont.) 14 1 0 0 1-3 4-6 7-9 10 or above How many TECHNOLOGIES that you have used involve the application of fingerprints?
  • 20. Survey Results (Cont.) 0 2 4 6 8 10 12 0 1 2 More than 3 Number of PROPERTIES own with fingerprint technology
  • 21. Survey Results (Cont.) 0 2 4 6 8 10 12 At least once everyday At least once per month At least once per year HOW FREQUENT DO YOU USE TECHNOLOGIES THAT INVOLVE THE APPLICATION OF FINGERPRINTS?
  • 22. Survey Results (Cont.) 0 2 9 9 4 0 0 1 2 3 4 5 6 7 8 9 10 Strongly Disagree Strongly Agree 0 1 2 3 4 5 numberofpeople Degree of extent TO WHAT EXTENT DO YOU AGREE THAT FINGERPRINTS PLAY AN IMPORTANT ROLE IN OUR DAILY LIFE?
  • 23. Survey Results (Cont.) 0 0 2 15 7 0 0 2 4 6 8 10 12 14 16 Do not trust Trust 1 2 3 4 5 Do you trust the usage of fingerprints?
  • 24. Survey Results (Cont.) 0 2 4 6 8 10 12 14 Fingerprint Lock Password Lock Key Lock Which of the following would you choose to be the format of your door lock?
  • 25. Survey Results (Cont.) 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 4 4.1 11 to 20 21 to 30 Age Group To what extent do you agree that fingerprints should be fully applied to our future technology?
  • 26. Results Analysis  Fingerprint technology plays an important role in our lives  Most of the interviewees use technologies which involve the application of fingerprints every day  Fingerprint technology is generally accepted by the public  Interviewees tend to trust the fingerprint technology  Most of the them prefer to use it as their door lock  They highly agree that fingerprint technology should be fully applied in the future
  • 27. Video
  • 28. Conclusion Fields Security systems Forensic science Crime scene investigations Uses To record the details of convicted criminals To control access to high- security buildings To unlock some electronic gadgets To examine evidence from crime scenes
  • 29. Conclusion Advantages Disadvantages 1. Acceptance •Generally accepted by the public 1. Security •Can be copied and reproduced easily by some materials 2. Ease of use •Little time and effort are required for enrollment 2. Privacy •May be used to track a person’s activities 3. Uniqueness •An unique identifier specific to the individuals 3. Performance •Deteriorates over time 4. Installation •Easy to install 4. Groups/People •Some people may not be able to enroll in the finger-scanning systems
  • 30. References  Buracker, C., & Stover, W. (1984). Automated fingerprint identification: Regional application of technology. Washington, D.C.?: [Federal Bureau of Investigation, U.S. Dept. of Justice].  Komarinski, P. (2005). Automated fingerprint identification systems (AFIS). Amsterdam: Elsevier Academic.  Park, J. (2009). Advances in information security and its application third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings. Berlin: Springer.  Park, J. (2012). Future information technology, application, and service FutureTech 2012. Dordrecht: Springer.  Wentworth, P. (1990). The fingerprint. Leicester: Ulverscroft.
  • 31. Job Division Chang Ka Long - Survey Questions - Survey Result Analysis - PowerPoint Editing Kong Wing Suen - Survey Result Charts - Survey Result Analysis - PowerPoint Editing Lee Tsz Nga - Mind Map - PowerPoint Editing - Prezi Editing Leung Tsz Yan Job Division

Editor's Notes

  1. https://www.youtube.com/watch?v=IrpTqKkgygA