SlideShare a Scribd company logo
1 of 40
Welcome to 
Axis Software Pvt. Ltd.
Axis is an India based ISO 9001:2000 
Technology Company, 
developing 
Advanced Authentication Products, 
Solutions, Integration Suites & Services 
using 
primarily Biometrics, 
PKI & Symmetric Encryption, 
Smart Cards & 
other related technologies.
Axis developes solutions for Banks, 
Financial institutions, e-commerce, 
Stock Exchanges, various Industry Verticals, 
Defense Organization, Public Sector, 
Private Sector, 
and Government Organizations.
We take pride in 
calling ourselves as an 
authentication management 
Solutions Company, 
dealing in a wide range of 
authentication products 
and services
Our Strengths 
Axis has a talented team of 
full time employees with 
vast industry experience 
and expertise.
The areas we specialize in are … 
Software - Research, design & development 
Hardware – Research, design & development 
Integration – product development 
Customization – Biometric / SmartCard solutions 
Up-grades – deploying high-end technologies 
End-to-End solutions – customer satisfaction
Infrastructure 
 Excellent ISO standard manufacturing facility 
 Solid customer base 
 Mechanical engineering 
 CAD designing 
 Graphic designing 
 Prototyping
Research, Design & Development 
 Biometrics 
 SmartCards 
 Network Security 
 RF Identification 
 PKI & Encryption 
 Embedded systems 
 Central Monitoring Systems 
 Access Control & Surveillance
Product Line 
 Time N' Track 
 Bio ATM 
 DesCop 
 Bio Enterprise 
 Bio Exchange 
 AFIS
AFIS 
Product Line 
The Automated Fingerprint Identification 
System(AFIS) is a biometric identification 
Methodology that uses digital imaging 
technology to obtain, store and analyze 
fingerprint data.
Introduction 
• Definition of Biometrics:- 
“Automated methods of recognizing a 
person based on a physiological or 
behavioral characteristics”. 
“ The technology used for identification of a 
user based on a physical or behavioral 
characteristic, such as a fingerprint, iris, 
face, voice or handwriting is called 
Biometrics”.
Biometrics Includes
The key steps involved in a 
biometric authentication system 
• Image capture - Using scanning devices 
available in the market 
• Image recognition - Using standard 
algorithms 
• Template creation - Using standard 
algorithms 
• Matching - Using application and standard 
algorithms
Types of Biometrics Systems 
• Unimodal system:- They use only 1 
biometric sample to recognize a user. 
• E.g.: Iris, fingerprint, retina scanners, 
Face, Palm etc. 
• Multimodal biometric systems use 2 or 
more biometric samples from the same 
person in order to identify him/her. 
• E.g.: fingerprint and face recognition, 
Face recognition and lip movement, 
Fingerprint recognition, dynamic 
signature verification
Continue….. 
 Finger-scan biometrics is based on the 
distinctive characteristics of the human 
fingerprint 
 A fingerprint image is read from a capture 
device 
 Features are extracted from the image 
 A template is created for comparison
FINGERPRINT RECOGNITION 
Features 
• Global features 
• Local features
GLOBAL FEATURES 
 Pattern Area 
 Core Point 
 Delta 
 Line types 
 Ridge Count 
 Ridge Patterns
Continue…
FINGERPRINT LOCAL FEATURES 
 Minutia Features : - Minutiae are major 
features of a fingerprint, using which 
comparisons of one print with another can 
be made. 
 Ridge ending - the abrupt end of a ridge. 
 Ridge bifurcation - a single ridge that 
divides into two ridges 
 Short ridge, or independent ridge - a 
ridge that commences, travels a short 
distance and then ends
Continue… 
 Island - a single small ridge inside a short 
ridge or ridge ending that is not 
connected to all other ridges 
 Ridge enclosure - a single ridge that 
bifurcates and reunites shortly afterward 
to continue as a single ridge 
 Spur - a bifurcation with a short ridge 
branching off a longer ridge 
 Crossover or bridge - a short ridge that 
runs between two parallel ridges
Continue… 
Delta - a Y-shaped ridge meeting 
Core - a U-turn in the ridge pattern
Classification 
 Fingerprint patterns comprise of loops 
(left or right), whorls and arches. 
 The Patterns are differentiated based on 
presence of zero, one or two delta 
regions. 
 A delta regions defined by a tri-radial 
ridge direction at a point. 
 Arch patterns have no delta, loops have 
one delta, and whorls have two deltas.
Advance Techniques… 
 Advanced Matching: 
 Correlation-based techniques 
 Minutiae-based techniques 
 Point-pattern matching 
 Minutiae with pre-alignment 
 Classification 
 Syntactic 
 Structural 
 Statistical 
 Retrieval 
 Synthesis
Fingerprint Acquisition 
 Sensors 
 optical sensors 
 ultrasound sensors 
 chip-based sensors 
 thermal sensors 
 Integrated products 
 for identification – AFIS systems 
 for verification
Our Solution 
 PRODUCT: 
 Verifier® 320 LC Scanner 
 Application Environments: 
• Border and port security 
• Correctional facilities 
• Critical infrastructure 
• Finance 
• Healthcare 
• Homeland security 
• Identity protection 
• Law enforcement and court
CROSSMATCH TECHNOLOGY 
Verifier® 320 LC Scanner
Functions 
• The Cross Match® Verifier 320 LC is a 
unique forensic-quality two fingerprint 
capture device. 
• The scanner delivers fast, accurate and 
reliable results for identification, 
verification and enrollment programs. 
• Compared to a single-finger scan, a 
Verifier 320 LC image provides enhanced 
accuracy for identification and verification 
purposes − while reducing the time 
necessary to obtain a full enrollment. 
• Auto Capture™ of flat and rolled fingers 
• Two flat fingers capture simultaneously
Specifications 
• Resolution: 500 ppi ± 1% 
• Capture Speed: Very fast capture speed 
due to high frame rate (15fps) 
• Linearity and Rectilinearity: Less than one 
pixel (average) 
• Image Area: 1.6" x 1.5“ (40.6 mm x 38.1 
mm) 
• Interface: Universal Serial Bus (USB 2.0 
HS)
Continue… 
• Power: Supplied through the USB 2.0 
interface (500 mA @ 5V) 
• Dimensions (H x L x W): 2.6" x 6.8" x 
3.8“ (66 mm x 173 mm x 97 mm) 
• Weight: 1.4 lbs (620 g) 
• Scanner Dynamic Range: 8 bit, max. 256 
grayscale 
• Mean time between failure (MTBF): 
45,000 hours (5 years continuous use 
under normal operating conditions)
System Requirement 
• Operating Systems: Windows® XP (SP2), 
Windows® Vista, Windows® 7 
• 2 GHz CPU minimum 
• 512 MB RAM minimum 
• 50 MB of available disk space 
• USB 2.0 HS compliant ports or 
• USB 2.0 PCI/PCMCIA Card 
• SDK: L SCAN® Essentials 5.5 or higher
Benefits 
• Fastest dual-finger scanner on the market 
• Consistent forensic-quality flat and rolled 
fingerprints 
• Auto Capture™ of flat and rolled fingers 
• Large active platen area 
• Raised platen border for natural finger 
positioning 
• Under-cut lip for easy hand access 
• Silicone membrane to enhance biometric 
data capture from dry fingers
Continue… 
• I/R filter to improve ambient light 
rejection 
• Improved optical system to capture high-quality 
fingerprints from stained, marked 
or dark fingers 
• FBI Appendix F certified 
• Low maintenance requirements
IRIS Technology 
• PRODUCTS 
• I SCAN™ 2 
Dual Iris Capture Scanner 
• Application Environments: 
Military 
National ID Programs
I Scan
Specifications 
• Accommodates interpupillary distances 
(IPD) ranging from 38 – 80 mm, covering 
99% of subjects aged 5 and older 
• High level image quality Spatial 
resolution: 4.0 lp/mm at 60% or higher 
contrast 
• Pixel Resolution: >22 pixels/mm ( > 210 
pixels over iris diameter)
Continue… 
• Incorporates “Anti-Dilation” system to 
facilitate a smaller pupil 
• Near-IR Illumination (700-900 nm) 
• Capture volume: 33 mm x 30 mm x 12.7 
mm, exceeding NIST Mobile ID Best 
Practice Recommendations and UID 
standard 
• Dual Optical system utilizing 1.3 
megapixel cameras 
• Power supplied via USB 2.0 (no battery 
required)
Continue… 
• USB cable ~ six-feet long, permanently 
attached with a strain-relief feature 
• USB-Org certified USB 2.0 high speed 
interface 
• Device provides bitmap images at a 
maximum rate of 7.5 fps 
• Housing: PC/ABS blend, attached visor to 
set optical distance, retractable ambient 
light shield 
• Auto Capture used as field calibration 
check 
• Manufactured in U.S
Certifications 
• Meets iris image interchange format 
specifications: ANSI INCITS 379-2004 
and ISO/IEC 19794-6 standards 
• Certified according to UID specifications 
(BDSC-03-08) with “Certificate of 
Approval” 
• Certifications: FCC Class A, RoHS 
• Splash and dust resistant, designed to 
meet IP54 (IEC 60529) 
• Shock and Vibration per ISTA 2A Shipping 
and Handling Specification
Benefits 
• Dual iris capture in less than ten seconds 
• Automatic image capture without user 
intervention 
• Durable housing 
• Portable system that integrates into Cross 
Match Jump Kits or other mobile identity 
management solutions 
• Fold open visor accurately sets optimum 
focus and shields the eyes from direct 
sunlight 
• Operates in total darkness
THANK YOU

More Related Content

What's hot

voice recognition
voice recognition voice recognition
voice recognition Hemant Jain
 
Detecting STR Peaks in Degraded DNA samples
Detecting STR Peaks in Degraded DNA samplesDetecting STR Peaks in Degraded DNA samples
Detecting STR Peaks in Degraded DNA samplesEmanuela Marasco
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Individual Characteristics.pptx
Individual Characteristics.pptxIndividual Characteristics.pptx
Individual Characteristics.pptxSoham Bhattacharya
 
Mobile Forensic Van (MFV)
Mobile Forensic Van (MFV)Mobile Forensic Van (MFV)
Mobile Forensic Van (MFV)Parth Chuahan
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint developmentTejasvi Bhatia
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptxSHAILESH CHAUBEY
 
Genetic Markers and their importance in Forensics
Genetic Markers and their importance in ForensicsGenetic Markers and their importance in Forensics
Genetic Markers and their importance in ForensicsMrinal Vashisth
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 
Principles of forensic science
Principles of forensic sciencePrinciples of forensic science
Principles of forensic scienceChithiraMeBcs
 
(PART-II)- Development of latent fingerprints using powders method.pptx
(PART-II)- Development of latent fingerprints using powders method.pptx(PART-II)- Development of latent fingerprints using powders method.pptx
(PART-II)- Development of latent fingerprints using powders method.pptxApplied Forensic Research Sciences
 

What's hot (20)

National Crime Record Bureau
National Crime Record BureauNational Crime Record Bureau
National Crime Record Bureau
 
voice recognition
voice recognition voice recognition
voice recognition
 
Detecting STR Peaks in Degraded DNA samples
Detecting STR Peaks in Degraded DNA samplesDetecting STR Peaks in Degraded DNA samples
Detecting STR Peaks in Degraded DNA samples
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Individual Characteristics.pptx
Individual Characteristics.pptxIndividual Characteristics.pptx
Individual Characteristics.pptx
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Mobile Forensic Van (MFV)
Mobile Forensic Van (MFV)Mobile Forensic Van (MFV)
Mobile Forensic Van (MFV)
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Touch dna
Touch dnaTouch dna
Touch dna
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
 
Genetic Markers and their importance in Forensics
Genetic Markers and their importance in ForensicsGenetic Markers and their importance in Forensics
Genetic Markers and their importance in Forensics
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Principles of forensic science
Principles of forensic sciencePrinciples of forensic science
Principles of forensic science
 
(PART-II)- Development of latent fingerprints using powders method.pptx
(PART-II)- Development of latent fingerprints using powders method.pptx(PART-II)- Development of latent fingerprints using powders method.pptx
(PART-II)- Development of latent fingerprints using powders method.pptx
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Charred documents
Charred documentsCharred documents
Charred documents
 

Similar to Presentation Automated Fingerprint Identification System

project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Read&Go_E-document readers
Read&Go_E-document readersRead&Go_E-document readers
Read&Go_E-document readersGerrit Littouw
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
blue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxblue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxShubhamsingh861786
 
How to easily improve quality using automated visual inspection
How to easily improve quality using automated visual inspectionHow to easily improve quality using automated visual inspection
How to easily improve quality using automated visual inspectionDesign World
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Workss1190017
 
arh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdfarh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdfMichael993266
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Iit kgp workshop
Iit kgp workshopIit kgp workshop
Iit kgp workshopArpan Pal
 
audio labler device for visual impare
audio labler device for visual impareaudio labler device for visual impare
audio labler device for visual imparehusnatajwar
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romquratyousaf8
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 

Similar to Presentation Automated Fingerprint Identification System (20)

project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
MATRIX Biometrics Technology New
MATRIX Biometrics Technology NewMATRIX Biometrics Technology New
MATRIX Biometrics Technology New
 
IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Opn3002i
Opn3002iOpn3002i
Opn3002i
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
LTC Laser Profilometry
LTC Laser ProfilometryLTC Laser Profilometry
LTC Laser Profilometry
 
Read&Go_E-document readers
Read&Go_E-document readersRead&Go_E-document readers
Read&Go_E-document readers
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
blue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxblue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptx
 
How to easily improve quality using automated visual inspection
How to easily improve quality using automated visual inspectionHow to easily improve quality using automated visual inspection
How to easily improve quality using automated visual inspection
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
arh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdfarh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdf
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Iit kgp workshop
Iit kgp workshopIit kgp workshop
Iit kgp workshop
 
audio labler device for visual impare
audio labler device for visual impareaudio labler device for visual impare
audio labler device for visual impare
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and rom
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Presentation Automated Fingerprint Identification System

  • 1. Welcome to Axis Software Pvt. Ltd.
  • 2. Axis is an India based ISO 9001:2000 Technology Company, developing Advanced Authentication Products, Solutions, Integration Suites & Services using primarily Biometrics, PKI & Symmetric Encryption, Smart Cards & other related technologies.
  • 3. Axis developes solutions for Banks, Financial institutions, e-commerce, Stock Exchanges, various Industry Verticals, Defense Organization, Public Sector, Private Sector, and Government Organizations.
  • 4. We take pride in calling ourselves as an authentication management Solutions Company, dealing in a wide range of authentication products and services
  • 5. Our Strengths Axis has a talented team of full time employees with vast industry experience and expertise.
  • 6. The areas we specialize in are … Software - Research, design & development Hardware – Research, design & development Integration – product development Customization – Biometric / SmartCard solutions Up-grades – deploying high-end technologies End-to-End solutions – customer satisfaction
  • 7. Infrastructure  Excellent ISO standard manufacturing facility  Solid customer base  Mechanical engineering  CAD designing  Graphic designing  Prototyping
  • 8. Research, Design & Development  Biometrics  SmartCards  Network Security  RF Identification  PKI & Encryption  Embedded systems  Central Monitoring Systems  Access Control & Surveillance
  • 9. Product Line  Time N' Track  Bio ATM  DesCop  Bio Enterprise  Bio Exchange  AFIS
  • 10. AFIS Product Line The Automated Fingerprint Identification System(AFIS) is a biometric identification Methodology that uses digital imaging technology to obtain, store and analyze fingerprint data.
  • 11. Introduction • Definition of Biometrics:- “Automated methods of recognizing a person based on a physiological or behavioral characteristics”. “ The technology used for identification of a user based on a physical or behavioral characteristic, such as a fingerprint, iris, face, voice or handwriting is called Biometrics”.
  • 13. The key steps involved in a biometric authentication system • Image capture - Using scanning devices available in the market • Image recognition - Using standard algorithms • Template creation - Using standard algorithms • Matching - Using application and standard algorithms
  • 14. Types of Biometrics Systems • Unimodal system:- They use only 1 biometric sample to recognize a user. • E.g.: Iris, fingerprint, retina scanners, Face, Palm etc. • Multimodal biometric systems use 2 or more biometric samples from the same person in order to identify him/her. • E.g.: fingerprint and face recognition, Face recognition and lip movement, Fingerprint recognition, dynamic signature verification
  • 15. Continue…..  Finger-scan biometrics is based on the distinctive characteristics of the human fingerprint  A fingerprint image is read from a capture device  Features are extracted from the image  A template is created for comparison
  • 16. FINGERPRINT RECOGNITION Features • Global features • Local features
  • 17. GLOBAL FEATURES  Pattern Area  Core Point  Delta  Line types  Ridge Count  Ridge Patterns
  • 19. FINGERPRINT LOCAL FEATURES  Minutia Features : - Minutiae are major features of a fingerprint, using which comparisons of one print with another can be made.  Ridge ending - the abrupt end of a ridge.  Ridge bifurcation - a single ridge that divides into two ridges  Short ridge, or independent ridge - a ridge that commences, travels a short distance and then ends
  • 20. Continue…  Island - a single small ridge inside a short ridge or ridge ending that is not connected to all other ridges  Ridge enclosure - a single ridge that bifurcates and reunites shortly afterward to continue as a single ridge  Spur - a bifurcation with a short ridge branching off a longer ridge  Crossover or bridge - a short ridge that runs between two parallel ridges
  • 21. Continue… Delta - a Y-shaped ridge meeting Core - a U-turn in the ridge pattern
  • 22. Classification  Fingerprint patterns comprise of loops (left or right), whorls and arches.  The Patterns are differentiated based on presence of zero, one or two delta regions.  A delta regions defined by a tri-radial ridge direction at a point.  Arch patterns have no delta, loops have one delta, and whorls have two deltas.
  • 23. Advance Techniques…  Advanced Matching:  Correlation-based techniques  Minutiae-based techniques  Point-pattern matching  Minutiae with pre-alignment  Classification  Syntactic  Structural  Statistical  Retrieval  Synthesis
  • 24. Fingerprint Acquisition  Sensors  optical sensors  ultrasound sensors  chip-based sensors  thermal sensors  Integrated products  for identification – AFIS systems  for verification
  • 25. Our Solution  PRODUCT:  Verifier® 320 LC Scanner  Application Environments: • Border and port security • Correctional facilities • Critical infrastructure • Finance • Healthcare • Homeland security • Identity protection • Law enforcement and court
  • 27. Functions • The Cross Match® Verifier 320 LC is a unique forensic-quality two fingerprint capture device. • The scanner delivers fast, accurate and reliable results for identification, verification and enrollment programs. • Compared to a single-finger scan, a Verifier 320 LC image provides enhanced accuracy for identification and verification purposes − while reducing the time necessary to obtain a full enrollment. • Auto Capture™ of flat and rolled fingers • Two flat fingers capture simultaneously
  • 28. Specifications • Resolution: 500 ppi ± 1% • Capture Speed: Very fast capture speed due to high frame rate (15fps) • Linearity and Rectilinearity: Less than one pixel (average) • Image Area: 1.6" x 1.5“ (40.6 mm x 38.1 mm) • Interface: Universal Serial Bus (USB 2.0 HS)
  • 29. Continue… • Power: Supplied through the USB 2.0 interface (500 mA @ 5V) • Dimensions (H x L x W): 2.6" x 6.8" x 3.8“ (66 mm x 173 mm x 97 mm) • Weight: 1.4 lbs (620 g) • Scanner Dynamic Range: 8 bit, max. 256 grayscale • Mean time between failure (MTBF): 45,000 hours (5 years continuous use under normal operating conditions)
  • 30. System Requirement • Operating Systems: Windows® XP (SP2), Windows® Vista, Windows® 7 • 2 GHz CPU minimum • 512 MB RAM minimum • 50 MB of available disk space • USB 2.0 HS compliant ports or • USB 2.0 PCI/PCMCIA Card • SDK: L SCAN® Essentials 5.5 or higher
  • 31. Benefits • Fastest dual-finger scanner on the market • Consistent forensic-quality flat and rolled fingerprints • Auto Capture™ of flat and rolled fingers • Large active platen area • Raised platen border for natural finger positioning • Under-cut lip for easy hand access • Silicone membrane to enhance biometric data capture from dry fingers
  • 32. Continue… • I/R filter to improve ambient light rejection • Improved optical system to capture high-quality fingerprints from stained, marked or dark fingers • FBI Appendix F certified • Low maintenance requirements
  • 33. IRIS Technology • PRODUCTS • I SCAN™ 2 Dual Iris Capture Scanner • Application Environments: Military National ID Programs
  • 35. Specifications • Accommodates interpupillary distances (IPD) ranging from 38 – 80 mm, covering 99% of subjects aged 5 and older • High level image quality Spatial resolution: 4.0 lp/mm at 60% or higher contrast • Pixel Resolution: >22 pixels/mm ( > 210 pixels over iris diameter)
  • 36. Continue… • Incorporates “Anti-Dilation” system to facilitate a smaller pupil • Near-IR Illumination (700-900 nm) • Capture volume: 33 mm x 30 mm x 12.7 mm, exceeding NIST Mobile ID Best Practice Recommendations and UID standard • Dual Optical system utilizing 1.3 megapixel cameras • Power supplied via USB 2.0 (no battery required)
  • 37. Continue… • USB cable ~ six-feet long, permanently attached with a strain-relief feature • USB-Org certified USB 2.0 high speed interface • Device provides bitmap images at a maximum rate of 7.5 fps • Housing: PC/ABS blend, attached visor to set optical distance, retractable ambient light shield • Auto Capture used as field calibration check • Manufactured in U.S
  • 38. Certifications • Meets iris image interchange format specifications: ANSI INCITS 379-2004 and ISO/IEC 19794-6 standards • Certified according to UID specifications (BDSC-03-08) with “Certificate of Approval” • Certifications: FCC Class A, RoHS • Splash and dust resistant, designed to meet IP54 (IEC 60529) • Shock and Vibration per ISTA 2A Shipping and Handling Specification
  • 39. Benefits • Dual iris capture in less than ten seconds • Automatic image capture without user intervention • Durable housing • Portable system that integrates into Cross Match Jump Kits or other mobile identity management solutions • Fold open visor accurately sets optimum focus and shields the eyes from direct sunlight • Operates in total darkness