SlideShare a Scribd company logo
1 of 21
Fingerprinting 
IT innovation shaping our day 
Tuesday, October 28, 2014
Group member 
Chow Ching Fung Jack (14223260) 
Chan Hiu Yung Joey (14225441) 
Ng Wing Yan Natalie (14224593)
Contents 
Introduction Application Survey Results 
Prospect and 
development 
Advantages 
and 
Disadvantages
Mind Map 
Web link: http://www.mindmeister.com/457202020/fingerprinting
Background - History 
● 1858 - Required fingerprinting and signatures on civil contracts 
● 1892 - Published the first book on fingerprinting 
● 1901 - Used as evidence 
● 1905 - Adopted the fingerprinting on US military 
● 1999 - Kept fingerprint record 
● Now - Use the fingerprinting all over the globe
Principle 
Constancy 
➢ Remaining unchanged during an individual’s lifetime 
Variation 
➢ Failing to find the identical fingerprint in different people 
Infallibility
Composition of patterns 
• 60-65% of the population 
• Having one or more ridges 
• Passing through an imaginary line from delta to 
core 
Loop 
• Having only 5% of the population 
• Having no delta 
• Flowing in one side and flow out the opposite 
side 
Arch 
• 30-50% of the population 
• Consisting of a series of almost concentric 
circles 
Whorl
Ways to capture a fingerprint 
Optical Way 
• Scanning the 
fingerprint by a 
scanner 
• Recording its 
reflection patterns 
images 
• Disadvantage: 
• Causing the 
distortions of 
fingerprint 
occasionally 
Thermal way 
• Using thermal 
detector to 
determine the 
fingerprint 
• Disadvantage: 
• Causing the 
distortions of 
fingerprint 
occasionally 
3D Scanner 
• New Innovation: 
Having developed 
in 2010 
• Avoiding 
distortions of the 
fingerprint images 
• Being 
uncommonly used 
in Hong Kong
Application 
Identifying People: 
➢ Immigration system 
➢ Criminal investigation 
Security Access: 
➢ Smartphone unlocking 
➢ Electronic door lock
Application - Identifying people 
Immigration 
➢ Matching image and data of fingerprint in ID card 
➢ Facilitating automated passenger clearance system from 2004 
(e.g. e-channel) 
Criminal investigation 
➢ Being evidence in criminal cases
Application - Security access 
Smartphone unlocking 
➢ Improving portability 
➢ Saving the uniqueness fingerprint as encrypted biometric key 
➢ Swiping the finger to unlock 
Electronic door locks 
➢ Being safe and secure 
➢ Having same function as usual door 
➢ Saving over 200 different fingerprints 
➢ Receiving a set of emergency access keys
Video
Online Survey 
❏ Target: General Public 
❏ Information: Opinion of Fingerprinting 
❏ Web link: 
❏ https://docs.google.com/a/life.hkbu.edu.hk/forms/d/1fNT61bnhtAJiuMg 
Q3YB5uQw4DIX2uFeiuE6XErzMXHE/viewform?usp=send_form
Survey Result 
Have you use the fingerprinting service before? 
Yes No 
91% 
9%
Survey Result 
What kind of fingerprinting application you use 
the most? 
Smartphone unlocking Library access 
Electronic door lock Criminal investigation 
Immigration procedure (e.g. e-Channel) 
26% 
4% 
0% 
11% 
59% 
15%
Prospect and development 
Fingerprint credit card 
➢ Having small fingerprint scanner 
on credit card 
Biometric gun 
➢ Requesting the owner’s 
authorized fingerprint to unlock 
➢ Controlling the gun safety
Advantages 
Uniqueness 
➢ Guaranteeing all application and avoiding frauds in most cases 
Highly reliable 
➢ Preventing error 
Reduce human workload 
➢ Matching process in computer 
➢ Reducing cost
Disadvantages 
Costly 
➢ Applying technology involves higher cost periodically 
Error instance 
➢ Causing distortion record 
➢ Making error 
➢ Immature technology 
➢ Accepting fake fingerprint occasionally
Disadvantages 
Hygiene problem 
➢ Transmittiing bacteria during using fingerprint scanner 
Privacy matters 
➢ Having risk of leaking personal data 
➢ Problem: Stealing your fingerprint for other purpose by device’s owner 
➢ Solution: Setting regulations protecting privacy
Division of work 
Chow Ching Fung Chan Hiu Yung Joey Ng Wing Yan 
Content    
Video editing   
Survey 
Analysis 
  
Animation   
Mind Map   
-The End-

More Related Content

Viewers also liked

The Dorm Shop
The Dorm ShopThe Dorm Shop
The Dorm ShopIOSIGNITE
 
Excuse letter, bonoan
Excuse letter, bonoanExcuse letter, bonoan
Excuse letter, bonoanRafael Basa
 
Presentacion dino salinas
Presentacion dino salinasPresentacion dino salinas
Presentacion dino salinaszarmath
 
Assign 24 digipak conventions
Assign 24 digipak conventionsAssign 24 digipak conventions
Assign 24 digipak conventionstwbsmediaconnell
 

Viewers also liked (7)

Database2011
Database2011Database2011
Database2011
 
The Dorm Shop
The Dorm ShopThe Dorm Shop
The Dorm Shop
 
Excuse letter, bonoan
Excuse letter, bonoanExcuse letter, bonoan
Excuse letter, bonoan
 
Presentacion dino salinas
Presentacion dino salinasPresentacion dino salinas
Presentacion dino salinas
 
Kumarshivam (2)
Kumarshivam (2)Kumarshivam (2)
Kumarshivam (2)
 
Assign 24 digipak conventions
Assign 24 digipak conventionsAssign 24 digipak conventions
Assign 24 digipak conventions
 
Types of rock
Types of rockTypes of rock
Types of rock
 

Similar to Group 4

Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our livescodykong
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phonektcube
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Smartphone & Security
Smartphone & SecuritySmartphone & Security
Smartphone & Security15215822
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technologyIzuho Niwa
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital IdentityIntopia
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital IdentityAndrew Arch
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesKatina Michael
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...Jiang Zhu
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 

Similar to Group 4 (20)

Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
It project
It projectIt project
It project
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Smartphone & Security
Smartphone & SecuritySmartphone & Security
Smartphone & Security
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Group 4

  • 1. Fingerprinting IT innovation shaping our day Tuesday, October 28, 2014
  • 2. Group member Chow Ching Fung Jack (14223260) Chan Hiu Yung Joey (14225441) Ng Wing Yan Natalie (14224593)
  • 3. Contents Introduction Application Survey Results Prospect and development Advantages and Disadvantages
  • 4. Mind Map Web link: http://www.mindmeister.com/457202020/fingerprinting
  • 5. Background - History ● 1858 - Required fingerprinting and signatures on civil contracts ● 1892 - Published the first book on fingerprinting ● 1901 - Used as evidence ● 1905 - Adopted the fingerprinting on US military ● 1999 - Kept fingerprint record ● Now - Use the fingerprinting all over the globe
  • 6. Principle Constancy ➢ Remaining unchanged during an individual’s lifetime Variation ➢ Failing to find the identical fingerprint in different people Infallibility
  • 7. Composition of patterns • 60-65% of the population • Having one or more ridges • Passing through an imaginary line from delta to core Loop • Having only 5% of the population • Having no delta • Flowing in one side and flow out the opposite side Arch • 30-50% of the population • Consisting of a series of almost concentric circles Whorl
  • 8. Ways to capture a fingerprint Optical Way • Scanning the fingerprint by a scanner • Recording its reflection patterns images • Disadvantage: • Causing the distortions of fingerprint occasionally Thermal way • Using thermal detector to determine the fingerprint • Disadvantage: • Causing the distortions of fingerprint occasionally 3D Scanner • New Innovation: Having developed in 2010 • Avoiding distortions of the fingerprint images • Being uncommonly used in Hong Kong
  • 9. Application Identifying People: ➢ Immigration system ➢ Criminal investigation Security Access: ➢ Smartphone unlocking ➢ Electronic door lock
  • 10. Application - Identifying people Immigration ➢ Matching image and data of fingerprint in ID card ➢ Facilitating automated passenger clearance system from 2004 (e.g. e-channel) Criminal investigation ➢ Being evidence in criminal cases
  • 11. Application - Security access Smartphone unlocking ➢ Improving portability ➢ Saving the uniqueness fingerprint as encrypted biometric key ➢ Swiping the finger to unlock Electronic door locks ➢ Being safe and secure ➢ Having same function as usual door ➢ Saving over 200 different fingerprints ➢ Receiving a set of emergency access keys
  • 12. Video
  • 13. Online Survey ❏ Target: General Public ❏ Information: Opinion of Fingerprinting ❏ Web link: ❏ https://docs.google.com/a/life.hkbu.edu.hk/forms/d/1fNT61bnhtAJiuMg Q3YB5uQw4DIX2uFeiuE6XErzMXHE/viewform?usp=send_form
  • 14. Survey Result Have you use the fingerprinting service before? Yes No 91% 9%
  • 15. Survey Result What kind of fingerprinting application you use the most? Smartphone unlocking Library access Electronic door lock Criminal investigation Immigration procedure (e.g. e-Channel) 26% 4% 0% 11% 59% 15%
  • 16. Prospect and development Fingerprint credit card ➢ Having small fingerprint scanner on credit card Biometric gun ➢ Requesting the owner’s authorized fingerprint to unlock ➢ Controlling the gun safety
  • 17. Advantages Uniqueness ➢ Guaranteeing all application and avoiding frauds in most cases Highly reliable ➢ Preventing error Reduce human workload ➢ Matching process in computer ➢ Reducing cost
  • 18. Disadvantages Costly ➢ Applying technology involves higher cost periodically Error instance ➢ Causing distortion record ➢ Making error ➢ Immature technology ➢ Accepting fake fingerprint occasionally
  • 19. Disadvantages Hygiene problem ➢ Transmittiing bacteria during using fingerprint scanner Privacy matters ➢ Having risk of leaking personal data ➢ Problem: Stealing your fingerprint for other purpose by device’s owner ➢ Solution: Setting regulations protecting privacy
  • 20. Division of work Chow Ching Fung Chan Hiu Yung Joey Ng Wing Yan Content    Video editing   Survey Analysis   Animation   Mind Map   