SlideShare a Scribd company logo
1 of 6
How Fingerprint Scanners Work

   Computerized fingerprint scanners have been
      mainstay of spy thrillers for decades, until
 recently, they were very exotic technology in the
real world. In recent years, the scanner has begun
     in many places. Instead of the computer is
 protected by a high-tech biometrics, in addition to
   a password to gain access you need a unique
   print. The fingerprint scanner security system,
look at how the password and ID cards stacked in
      a conventional system, find a way to fail.
Fingerprint Basics
Fingerprint is one of those bizarre twists of nature.
 Human ID card for easy access, because of the
built-in occur. Literally at your fingertips, a unique
   design that represents you alone, have. This
  particular adaptation, because the people were
 very beneficial to the ancestors of human beings
  have a small bump on the skin of their fingers.
 Pattern of ridges and finger "valleys" in the same
way, the rubber tread pattern helps a tire grip the
road surface can be easily carried in your hand to
                        the grip.
Optical Scanner
  It needs to get a picture of your fingers, and it is
   necessary to determine whether it matches the
     pattern of valleys and ridges of the scanned
     image in advance the pattern of valleys and
 ridges of this image - Scanner system fingerprint
there are two basic jobs. There are many ways to
     get a picture of someone's finger. The most
common methods today are optical scanning and
   capacitance scanning. The heart of the optical
    scanner, a charge coupled device (CCD), an
 optical sensor system is the same as those used
         in digital cameras and camcorders.
Capacitance Scanner
 Similar to optical scanners, capacitive fingerprint
   scanners to produce images that make up the
   fingerprint ridges and valleys. When you print
   using light sensing Instead, use the capacitor
 current. The sensor is composed of one or more
  semiconductor chips containing an array of tiny
cells. The sensor, integrator, and is connected to
an electrical circuit that is built around an inverting
 op amp. As with any amplifier, inverting amplifier
   based on a different variation of the current to
              change the current ones.
Analysis
Most fingerprint scanner system, fingerprint called
      minutiae in general, to compare specific
    characteristics. In general, human-computer
  scientists to focus on the point where one ridge
    splits in two lines and the edge of the ridge.
     Collectively, these and other features are
   sometimes called Tipika. The scanner system
software to recognize these characteristic points,
we use very complex algorithms to analyze. The
  basic idea is the same type and how you might
 recognize the relative position of stars in the sky
part is to measure the relative positions of feature
                         points.
Pros and Cons

Past "you have" to get the system, such as an ID
   card with magnetic stripe "tokens," must be
certain. "You know" the system, you must enter a
   password or PIN number. Systems such as
    fingerprint scanners, there are a number of
advantages compared to other systems. Physical
 attributes are much harder to fake than identity
cards. It is not possible to infer the pattern of the
  fingerprint. Fingerprint, iris and voice can not
   forget it. You can not forget your fingerprint.

More Related Content

What's hot

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkKS
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkAnzu Nakada
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workoceanflying
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
FingerprintscannerAi Hirasawa
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques Akhil Garg
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYjinal thakrar
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners works1180002
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprintPiyush Mittal
 

What's hot (17)

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Prezen3
Prezen3Prezen3
Prezen3
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
 
G12
G12G12
G12
 
Sw 12 B
Sw 12 BSw 12 B
Sw 12 B
 
Finalgesture22
Finalgesture22Finalgesture22
Finalgesture22
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
 
week12
week12week12
week12
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Roy b2
Roy b2Roy b2
Roy b2
 

Similar to Sw2assignment

Similar to Sw2assignment (20)

Roy3
Roy3Roy3
Roy3
 
Week12
Week12Week12
Week12
 
assignment
assignmentassignment
assignment
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Kadai2
Kadai2Kadai2
Kadai2
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Week12group
Week12groupWeek12group
Week12group
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Kadai2
Kadai2Kadai2
Kadai2
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Ex12
Ex12Ex12
Ex12
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
Sw week12
Sw week12Sw week12
Sw week12
 
2
22
2
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Prezen2
Prezen2Prezen2
Prezen2
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Sw2assignment

  • 1. How Fingerprint Scanners Work Computerized fingerprint scanners have been mainstay of spy thrillers for decades, until recently, they were very exotic technology in the real world. In recent years, the scanner has begun in many places. Instead of the computer is protected by a high-tech biometrics, in addition to a password to gain access you need a unique print. The fingerprint scanner security system, look at how the password and ID cards stacked in a conventional system, find a way to fail.
  • 2. Fingerprint Basics Fingerprint is one of those bizarre twists of nature. Human ID card for easy access, because of the built-in occur. Literally at your fingertips, a unique design that represents you alone, have. This particular adaptation, because the people were very beneficial to the ancestors of human beings have a small bump on the skin of their fingers. Pattern of ridges and finger "valleys" in the same way, the rubber tread pattern helps a tire grip the road surface can be easily carried in your hand to the grip.
  • 3. Optical Scanner It needs to get a picture of your fingers, and it is necessary to determine whether it matches the pattern of valleys and ridges of the scanned image in advance the pattern of valleys and ridges of this image - Scanner system fingerprint there are two basic jobs. There are many ways to get a picture of someone's finger. The most common methods today are optical scanning and capacitance scanning. The heart of the optical scanner, a charge coupled device (CCD), an optical sensor system is the same as those used in digital cameras and camcorders.
  • 4. Capacitance Scanner Similar to optical scanners, capacitive fingerprint scanners to produce images that make up the fingerprint ridges and valleys. When you print using light sensing Instead, use the capacitor current. The sensor is composed of one or more semiconductor chips containing an array of tiny cells. The sensor, integrator, and is connected to an electrical circuit that is built around an inverting op amp. As with any amplifier, inverting amplifier based on a different variation of the current to change the current ones.
  • 5. Analysis Most fingerprint scanner system, fingerprint called minutiae in general, to compare specific characteristics. In general, human-computer scientists to focus on the point where one ridge splits in two lines and the edge of the ridge. Collectively, these and other features are sometimes called Tipika. The scanner system software to recognize these characteristic points, we use very complex algorithms to analyze. The basic idea is the same type and how you might recognize the relative position of stars in the sky part is to measure the relative positions of feature points.
  • 6. Pros and Cons Past "you have" to get the system, such as an ID card with magnetic stripe "tokens," must be certain. "You know" the system, you must enter a password or PIN number. Systems such as fingerprint scanners, there are a number of advantages compared to other systems. Physical attributes are much harder to fake than identity cards. It is not possible to infer the pattern of the fingerprint. Fingerprint, iris and voice can not forget it. You can not forget your fingerprint.