SlideShare a Scribd company logo
1 of 20
Fingerprint Recognition
Represented by:Represented by:
Karam ButtKaram Butt
Rana YasirRana Yasir
Tahzeeb AhmadTahzeeb Ahmad
Presented to:Presented to:
Mam IqraMam Iqra
OUTLINEOUTLINE
• Introduction to biometricsIntroduction to biometrics
• FingerprintFingerprint
• What is Fingerprint Recognition?What is Fingerprint Recognition?
• Fingerprint recognition systemFingerprint recognition system
• AdvantagesAdvantages
• DisadvantagesDisadvantages
• ApplicationsApplications
• ConclusionConclusion
BIOMETRICSBIOMETRICS
• Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and
analyzing biological dataanalyzing biological data
• Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze
human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye
retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand
measurements, for authentication purposes.measurements, for authentication purposes.
• The two categories of biometric identifiers include :The two categories of biometric identifiers include :
physiological characteristics.physiological characteristics.
behavioral characteristics.behavioral characteristics.
 PhysiologicalPhysiological characteristics :characteristics :
FingerprintFingerprint
face recognitionface recognition
DNADNA
palm printpalm print
hand geometryhand geometry
iris recognition(which has largely replacediris recognition(which has largely replaced
retina)retina)
Odour /scent.Odour /scent.
 BehavioralBehavioral characteristics :characteristics :
GaitGait
voicevoice
FINGERPRINTFINGERPRINT
• A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger.
• It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in
the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip.
• Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of
a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge
characteristics and their relationshipscharacteristics and their relationships
• These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
• Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.
• The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are
1) ridge ending and1) ridge ending and
2) ridge bifurcation.2) ridge bifurcation.
Fig 1. A fingerprint image acquired by an Optical
Sensor
• A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends
abruptly.abruptly.
• A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where
a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges.
Fig 2.ridge and valley
WHAT IS FINGERPRINTWHAT IS FINGERPRINT
RECOGNITION?RECOGNITION?
• Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as
dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and
known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if
the impressions are from the same finger or palm.the impressions are from the same finger or palm.
• The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into
two sub-domains:two sub-domains:
Fingerprint verification :Fingerprint verification :
Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one
person by his fingerprint.person by his fingerprint.
Fingerprint identification:Fingerprint identification:
Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity
by his fingerprint(s).by his fingerprint(s).
Fig 3.Verification vs. Identification
FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION
SYSTEMSYSTEM
• Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages:
(i) Fingerprint acquiring device(i) Fingerprint acquiring device
(ii) Minutia extraction and(ii) Minutia extraction and
(iii) Minutia matching(iii) Minutia matching
Fig 4. Fingerprint recognition system
1.Fingerprint acquisition:1.Fingerprint acquisition:
For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct
sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and
acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the
user’s finger is too dirty or dry.user’s finger is too dirty or dry.
2.Minutia extractor :2.Minutia extractor :
To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach
is widely used by researchers which areis widely used by researchers which are
 preprocessingpreprocessing
 minutia extraction andminutia extraction and
 post processing stage.post processing stage.
Fig 5.Minutia extractor
• For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage:
Image enhancementImage enhancement
Image binarizationImage binarization
Image segmentationImage segmentation
• The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two
operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,.
• In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and
bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and
bifurcations.bifurcations.
3.Minutiae Matching:3.Minutiae Matching:
• Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved
with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a
pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of
fingerprint images.fingerprint images.
• The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference
minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first.
• If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned
and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
ADVANTAGESADVANTAGES
 Very high accuracy.Very high accuracy.
 Easy to use.Easy to use.
 Small storage space required for the biometric template.Small storage space required for the biometric template.
  
DISADVANTAGESDISADVANTAGES
 Dirt , grime and wounds .Dirt , grime and wounds .
 Placement of finger.Placement of finger.
 Can be spoofed .Can be spoofed .
APPLICATIONSAPPLICATIONS
 Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction
 Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)
 Information System SecurityInformation System Security
 National ID SystemsNational ID Systems
 Passport control (INSPASS)Passport control (INSPASS)
 Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control
 VotingVoting
 Identification of CriminalsIdentification of Criminals
 Identification of missing childrenIdentification of missing children
 Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
CONCLUSIONCONCLUSION
• The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate
and fast in minutia extraction.and fast in minutia extraction.
• The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted
regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further
processing.processing.
• This is a very important property because suchThis is a very important property because such
unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted
fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to
minutiae extraction.minutiae extraction.
Finger print recognition

More Related Content

What's hot

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingNikhil Hubballi
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithmFatima Akhtar
 

What's hot (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithm
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 

Viewers also liked

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationIJASCSE
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint IndividualizationRmcauley
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Adit Group
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comZhuo Zhang
 
Report finger print
Report finger printReport finger print
Report finger printEshaan Verma
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranformvishakhmarari
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUAlpesh Kurhade
 
"Memristor" by mahadev desai
"Memristor" by mahadev desai "Memristor" by mahadev desai
"Memristor" by mahadev desai desaimv
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Jury Rocamora
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 

Viewers also liked (20)

Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint Identification
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint Individualization
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -com
 
Ppt1
Ppt1Ppt1
Ppt1
 
Report finger print
Report finger printReport finger print
Report finger print
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranform
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
"Memristor" by mahadev desai
"Memristor" by mahadev desai "Memristor" by mahadev desai
"Memristor" by mahadev desai
 
Finger Print
Finger PrintFinger Print
Finger Print
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
finger prints
finger printsfinger prints
finger prints
 
Memristor
MemristorMemristor
Memristor
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Memristors
MemristorsMemristors
Memristors
 
Memristors
MemristorsMemristors
Memristors
 

Similar to Finger print recognition

Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptxsahoosabyasachi000
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 

Similar to Finger print recognition (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Seminar
SeminarSeminar
Seminar
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Finger print recognition

  • 1. Fingerprint Recognition Represented by:Represented by: Karam ButtKaram Butt Rana YasirRana Yasir Tahzeeb AhmadTahzeeb Ahmad Presented to:Presented to: Mam IqraMam Iqra
  • 2. OUTLINEOUTLINE • Introduction to biometricsIntroduction to biometrics • FingerprintFingerprint • What is Fingerprint Recognition?What is Fingerprint Recognition? • Fingerprint recognition systemFingerprint recognition system • AdvantagesAdvantages • DisadvantagesDisadvantages • ApplicationsApplications • ConclusionConclusion
  • 3. BIOMETRICSBIOMETRICS • Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and analyzing biological dataanalyzing biological data • Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand measurements, for authentication purposes.measurements, for authentication purposes. • The two categories of biometric identifiers include :The two categories of biometric identifiers include : physiological characteristics.physiological characteristics. behavioral characteristics.behavioral characteristics.
  • 4.  PhysiologicalPhysiological characteristics :characteristics : FingerprintFingerprint face recognitionface recognition DNADNA palm printpalm print hand geometryhand geometry iris recognition(which has largely replacediris recognition(which has largely replaced retina)retina) Odour /scent.Odour /scent.  BehavioralBehavioral characteristics :characteristics : GaitGait voicevoice
  • 5. FINGERPRINTFINGERPRINT • A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger. • It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip. • Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge characteristics and their relationshipscharacteristics and their relationships • These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
  • 6. • Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges. • The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are 1) ridge ending and1) ridge ending and 2) ridge bifurcation.2) ridge bifurcation. Fig 1. A fingerprint image acquired by an Optical Sensor
  • 7. • A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends abruptly.abruptly. • A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges. Fig 2.ridge and valley
  • 8. WHAT IS FINGERPRINTWHAT IS FINGERPRINT RECOGNITION?RECOGNITION? • Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if the impressions are from the same finger or palm.the impressions are from the same finger or palm.
  • 9. • The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into two sub-domains:two sub-domains: Fingerprint verification :Fingerprint verification : Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one person by his fingerprint.person by his fingerprint. Fingerprint identification:Fingerprint identification: Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity by his fingerprint(s).by his fingerprint(s).
  • 10. Fig 3.Verification vs. Identification
  • 11. FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION SYSTEMSYSTEM • Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages: (i) Fingerprint acquiring device(i) Fingerprint acquiring device (ii) Minutia extraction and(ii) Minutia extraction and (iii) Minutia matching(iii) Minutia matching Fig 4. Fingerprint recognition system
  • 12. 1.Fingerprint acquisition:1.Fingerprint acquisition: For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the user’s finger is too dirty or dry.user’s finger is too dirty or dry. 2.Minutia extractor :2.Minutia extractor : To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach is widely used by researchers which areis widely used by researchers which are  preprocessingpreprocessing  minutia extraction andminutia extraction and  post processing stage.post processing stage.
  • 14. • For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage: Image enhancementImage enhancement Image binarizationImage binarization Image segmentationImage segmentation • The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,. • In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and bifurcations.bifurcations.
  • 15. 3.Minutiae Matching:3.Minutiae Matching: • Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of fingerprint images.fingerprint images. • The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
  • 16. ADVANTAGESADVANTAGES  Very high accuracy.Very high accuracy.  Easy to use.Easy to use.  Small storage space required for the biometric template.Small storage space required for the biometric template.   
  • 17. DISADVANTAGESDISADVANTAGES  Dirt , grime and wounds .Dirt , grime and wounds .  Placement of finger.Placement of finger.  Can be spoofed .Can be spoofed .
  • 18. APPLICATIONSAPPLICATIONS  Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction  Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)  Information System SecurityInformation System Security  National ID SystemsNational ID Systems  Passport control (INSPASS)Passport control (INSPASS)  Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control  VotingVoting  Identification of CriminalsIdentification of Criminals  Identification of missing childrenIdentification of missing children  Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
  • 19. CONCLUSIONCONCLUSION • The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate and fast in minutia extraction.and fast in minutia extraction. • The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further processing.processing. • This is a very important property because suchThis is a very important property because such unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to minutiae extraction.minutiae extraction.