SlideShare a Scribd company logo
1 of 32
PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE
(GUJ.MED.) &
SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI
VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT
Submitted By
Mr. Prince Finaviya -
71
Guided By
Asst. Prof. Mansi
Shah
FINGERPRINT
AUTHENTICATI
ON
CONTENT
• Introduction
• What is a biometric?
• Method of verification
• Fingerprint recognition
• Verification & authentication
• Applications area of biometric
• Advantages of biometrics
• Disadvantages of biometrics
• Reference
INTRODUCTION
• Fingerprint authentication technology widely used now days for security
reason.
• Many system want first identify user then give access to use the system .
• Identification process are easy to use now days . just because of fingerprint
authentication.
• Fingerprints have been accepted as the most common form of biometrics
authentication today.
• Every human beings fingerprint is unique. Each fingerprint has a unique
characteristic and pattern that is made up of lines and spaces.
• The lines are called ridges while the spaces between the ridges are called
valleys. These patterns of ridges and valleys are used to match the
fingerprint for verification and authentication.
• There are about one billion possible minutiae combinations on a
fingerprint; since there are about 5 billion people inhabiting the earth, and
each has ten fingers, this means that statistically it is likely that fifty
people on earth share a fingerprint”.
• In identification process, an individual presents a sample to the biometric
system during enrolment. The biometric system then attempts to compare
the sample with the database which has samples stored in it. This is one-
to-many form of comparison. The identification process is further divided
into positive identification and negative identification.
WHAT IS BIOMETRIC ?
• Biometrics are automated methods of identifying a
person or verifying the identity of a person based on
a physiological or behavioural characteristic.
Biometrics as authentication
Something You Know
Something You Have
Something You Are
• Can be combined with other tools to form more
secure, easier to use verification solutions.
• Recognizes individuals definitively.
METHOD OF VERIFICATION
There are two methods of verification for security.
Psychological verification :
Verification of the organs of the human being, which will have unique identification.
There are five types of verifications.
These are:
Fingerpri
nt
Handpri
nt
Face
measurement
Retinal
scans
DNA
analysis
 Finger print
It involves the user placing his finger over a glass-plate, which resides
over a high-resolution camera, which uses optical or electromagnetic means
to take its snapshot.
 Handprint
It compares a 3D image of the users hand to that present in the
system database. It is somewhat similar to finger print verification.
 Face measurement
measuring this is as simple as taking a picture and analyzing the image
from a security video capture. This technique enables the computer to use
your face as your password and matching these to an existing database
 Retinal scans
It involves imaging of the blood vessels in the retina of the eye when
infrared light of a certain frequency and wavelength is incident upon it. This
energy is absorbed by the blood vessels is different in different individuals.
 DNA analysis
It involves in checking the dna pattern of a human used when physical
characteristics are unrecognizable
• This is one biometric that is judicially accepted. No human have identified
similar DNA patterns except in twins.
Behavioural verification
this involves in oral thing done by the individual.
There are 3 types of behavioral verifications,
 Typing
 Signature
 Voice
Typing
Some systems measure things you do in addition to the things
you are, you will notice that your typing has a certain pattern. Some
letters follow others in quick succession, while others take longer.
 Signature
Some qualities looked into include acceleration rates, direction, and
pressure and stroke length. Here mainly concentrate on pressures. This
pressures stored in back end for future significations.
 Voice
It involves in the recognition of the voice of the individual.
FINGERPRINT RECOGNITION
• This is a technique used to match and identify unique finger prints that might
need to be stored and then accessed in a database.
WHY FINGERPRINT RECOGNITION?
 Pin's and passwords may be forgotten
 The fingerprints in twins are not the same.
 Relies on the concept that no two people have identical fingerprints.
 More secure.
 A person's fingerprint will not naturally change structure after about one
year after birth
FINGERPRINT RECOGNITION SYSTEMS
Fingerprint recognition system is a free tool that will recognize and verify
fingerprints.
Fingerprint identification system is a biometric identification (id) methodology that
uses digital imaging technology to obtain, store, and analyze fingerprint data.
The three main functions of fingerprint recognition systems are:
1) Acquisition of fingerprints
2) Derivation of characteristics and
3) Matching
FINGERPRINT RECOGNITION STEPS
Database
FINGERPRINT SENSORS
 Fingerprint scanners are security systems of biometrics. They are now used
in police stations, security industries and most recently, on computers.
 A fingerprint sensor is an electronic device used to capture a digital image of
the fingerprint pattern. The captured image is called a live scan.
There are two types of fingerprint scanners:
 1. The optical scanner
optical fingerprint imaging involves capturing a digital image of
the print using visible light.
 2. The ultrasonic scanner
Ultrasonic sensors make use of the principles of medical ultra
sonography in order to create visual images of the fingerprint
VERIFICATION AND AUTHENTICATION
 This refers to the automated method of verifying a match between two
human fingerprints.
 The analysis of fingerprints for matching purposes generally are of two types
1)patterns
The three basic patterns of fingerprint ridges
they are:
A) arch
B) loop
C) whorl
 Arch:
the ridges enter from one side of the finger, rise in the center forming an arc,
and then exit the other side of the finger.
 Loop:
the ridges enter from one side of a finger and then exit on that same side.
 Whorl:
ridges form circularly around a central point on the finger.
2)Minutia
The major minutia features of fingerprint ridges are
a) ridge ending
b) bifurcation.
C) short ridge (dot).
A) ridge ending
The ridge ending is the point at which a ridge terminates
 B) Bifurcation
Bifurcations are points at which a single ridge splits into two ridges.
c) Short ridges
Short ridges (or dots) are ridges which are significantly shorter than the
average ridge length on the fingerprint.
APPLICATION AREA OF BIOMETRIC
o Fingerprint based biometrics has primarily been used to secure entry
devices for building door locks and computer network access.
o Perhaps one of the most common uses of biometric technology is
smartphone security. Apple were the first to introduce the touch ID solution
using fingerprint recognition technology and since then, mobile phone
security has evolved to utilize a number of biometric technologies including
facial recognition, iris recognition and voice recognition. A small number of
banks use fingerprint readers for authorization at atms.
o Grocery stores are experimenting with a fingerprint scan checkout that
automatically recognizes and bills a registered user’s credit card or debit
account.
ADVANTAGES OF BIOMETRICS
o It provide good security mechanism than all other security methods
o It never fails in security constraints.
o In public locations such as banks and airports a large number of people
transit every day including known criminals. Face recognition systems
attached to video surveillance systems are supposed to help catch them.
o Fairly small storage space is required for the biometric template, reducing
the size of the database required.
o It is one of the most developed biometrics, with more history, research, and
design.
DISADVANTAGES OF BIOMETRICS
o It needs high memory space in the back end.
o Collect data for security is difficult
o Sometimes fails the security with right users
o Any time data loose in database high effect for security mechanism.
o So many equipment’s are needed for provide this technology.
o It highly expensive
o Facial imaging can also hinder accurate identifications.
o Missing body part problem.
REFERENCE
• HTTPS://WWW.ARROW.COM/EN/RESEARCH-AND-EVENTS/ARTICLES/HOW-
FINGERPRINT-SENSORS-WORK
• HTTPS://WWW.SEMINARSTOPICS.COM/SEMINAR/9286/FINGER-PRINT-
AUTHENTICATION
• HTTPS://WWW.ALLEYDOG.COM/GLOSSARY/DEFINITION.PHP?TERM=BIOMETRICS
• HTTPS://WWW.ANDROIDAUTHORITY.COM/HOW-FINGERPRINT-SCANNERS-WORK-
670934/
Thank
You

More Related Content

Similar to 2019001791_Fingerprint_Authentication.pptx

Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 

Similar to 2019001791_Fingerprint_Authentication.pptx (20)

Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 

Recently uploaded (20)

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

2019001791_Fingerprint_Authentication.pptx

  • 1. PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE (GUJ.MED.) & SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT Submitted By Mr. Prince Finaviya - 71 Guided By Asst. Prof. Mansi Shah
  • 3. CONTENT • Introduction • What is a biometric? • Method of verification • Fingerprint recognition • Verification & authentication • Applications area of biometric • Advantages of biometrics • Disadvantages of biometrics • Reference
  • 4. INTRODUCTION • Fingerprint authentication technology widely used now days for security reason. • Many system want first identify user then give access to use the system . • Identification process are easy to use now days . just because of fingerprint authentication. • Fingerprints have been accepted as the most common form of biometrics authentication today.
  • 5. • Every human beings fingerprint is unique. Each fingerprint has a unique characteristic and pattern that is made up of lines and spaces. • The lines are called ridges while the spaces between the ridges are called valleys. These patterns of ridges and valleys are used to match the fingerprint for verification and authentication. • There are about one billion possible minutiae combinations on a fingerprint; since there are about 5 billion people inhabiting the earth, and each has ten fingers, this means that statistically it is likely that fifty people on earth share a fingerprint”. • In identification process, an individual presents a sample to the biometric system during enrolment. The biometric system then attempts to compare the sample with the database which has samples stored in it. This is one- to-many form of comparison. The identification process is further divided into positive identification and negative identification.
  • 6. WHAT IS BIOMETRIC ? • Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic. Biometrics as authentication Something You Know Something You Have Something You Are • Can be combined with other tools to form more secure, easier to use verification solutions. • Recognizes individuals definitively.
  • 7. METHOD OF VERIFICATION There are two methods of verification for security. Psychological verification : Verification of the organs of the human being, which will have unique identification. There are five types of verifications. These are: Fingerpri nt Handpri nt Face measurement Retinal scans DNA analysis
  • 8.  Finger print It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot.
  • 9.  Handprint It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.
  • 10.  Face measurement measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database
  • 11.  Retinal scans It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it. This energy is absorbed by the blood vessels is different in different individuals.
  • 12.  DNA analysis It involves in checking the dna pattern of a human used when physical characteristics are unrecognizable • This is one biometric that is judicially accepted. No human have identified similar DNA patterns except in twins.
  • 13. Behavioural verification this involves in oral thing done by the individual. There are 3 types of behavioral verifications,  Typing  Signature  Voice Typing Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.
  • 14.  Signature Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations.  Voice It involves in the recognition of the voice of the individual.
  • 15. FINGERPRINT RECOGNITION • This is a technique used to match and identify unique finger prints that might need to be stored and then accessed in a database.
  • 16. WHY FINGERPRINT RECOGNITION?  Pin's and passwords may be forgotten  The fingerprints in twins are not the same.  Relies on the concept that no two people have identical fingerprints.  More secure.  A person's fingerprint will not naturally change structure after about one year after birth
  • 17. FINGERPRINT RECOGNITION SYSTEMS Fingerprint recognition system is a free tool that will recognize and verify fingerprints. Fingerprint identification system is a biometric identification (id) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The three main functions of fingerprint recognition systems are: 1) Acquisition of fingerprints 2) Derivation of characteristics and 3) Matching
  • 19. FINGERPRINT SENSORS  Fingerprint scanners are security systems of biometrics. They are now used in police stations, security industries and most recently, on computers.  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan.
  • 20. There are two types of fingerprint scanners:  1. The optical scanner optical fingerprint imaging involves capturing a digital image of the print using visible light.  2. The ultrasonic scanner Ultrasonic sensors make use of the principles of medical ultra sonography in order to create visual images of the fingerprint
  • 21. VERIFICATION AND AUTHENTICATION  This refers to the automated method of verifying a match between two human fingerprints.  The analysis of fingerprints for matching purposes generally are of two types 1)patterns The three basic patterns of fingerprint ridges they are: A) arch B) loop C) whorl
  • 22.  Arch: the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
  • 23.  Loop: the ridges enter from one side of a finger and then exit on that same side.
  • 24.  Whorl: ridges form circularly around a central point on the finger.
  • 25. 2)Minutia The major minutia features of fingerprint ridges are a) ridge ending b) bifurcation. C) short ridge (dot). A) ridge ending The ridge ending is the point at which a ridge terminates
  • 26.  B) Bifurcation Bifurcations are points at which a single ridge splits into two ridges.
  • 27. c) Short ridges Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint.
  • 28. APPLICATION AREA OF BIOMETRIC o Fingerprint based biometrics has primarily been used to secure entry devices for building door locks and computer network access. o Perhaps one of the most common uses of biometric technology is smartphone security. Apple were the first to introduce the touch ID solution using fingerprint recognition technology and since then, mobile phone security has evolved to utilize a number of biometric technologies including facial recognition, iris recognition and voice recognition. A small number of banks use fingerprint readers for authorization at atms. o Grocery stores are experimenting with a fingerprint scan checkout that automatically recognizes and bills a registered user’s credit card or debit account.
  • 29. ADVANTAGES OF BIOMETRICS o It provide good security mechanism than all other security methods o It never fails in security constraints. o In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition systems attached to video surveillance systems are supposed to help catch them. o Fairly small storage space is required for the biometric template, reducing the size of the database required. o It is one of the most developed biometrics, with more history, research, and design.
  • 30. DISADVANTAGES OF BIOMETRICS o It needs high memory space in the back end. o Collect data for security is difficult o Sometimes fails the security with right users o Any time data loose in database high effect for security mechanism. o So many equipment’s are needed for provide this technology. o It highly expensive o Facial imaging can also hinder accurate identifications. o Missing body part problem.
  • 31. REFERENCE • HTTPS://WWW.ARROW.COM/EN/RESEARCH-AND-EVENTS/ARTICLES/HOW- FINGERPRINT-SENSORS-WORK • HTTPS://WWW.SEMINARSTOPICS.COM/SEMINAR/9286/FINGER-PRINT- AUTHENTICATION • HTTPS://WWW.ALLEYDOG.COM/GLOSSARY/DEFINITION.PHP?TERM=BIOMETRICS • HTTPS://WWW.ANDROIDAUTHORITY.COM/HOW-FINGERPRINT-SCANNERS-WORK- 670934/