SlideShare a Scribd company logo
1 of 61
Download to read offline
Biometric Technology
-- Finger Print Business Opportunity
Team Members:
YANG QIAN A0147178W
LIM KIM CHYE A0147179U
QUEK YONG GUAN A0147276X
SONG ZHIWEI A0026195E For information on other technologies see
http://www.slideshare.net/Funk98/presentations
2
Technology Overview
Applications
PerformanceHardware/Software
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
3
• A biometric identification system provides an automated method
of recognizing an individual based on their unique physiological
characteristics
 Metrics related to human characteristics
 These metrics are Distinctive and Measurable (label
and describe individuals)
What is Biometric?
4
Why Biometric?
• Traditional, security is by what we:
–Know (PIN, Password)
–Have (Key, smart card)
• Both of these security measures can be hacked, stolen, forgotten,
duplicated and have too many.
• Modern, security is by we:
–Are (Body)
• It is not easy to create a copy because its unique and high
accuracy.
5
Type of Biometric?
1. Finger print
2. Palm veins
3. DNA
4. Iris recognition
5. Facial recognition
6. Voice recognition
7. Signature recognition
8. Palm print
9. Hand geometry
10.Retina scan
11.Ordure/Scent
https://en.wikipedia.org/wiki/Biometrics
6
Comparison Between Biometric
Biometric Technology Accuracy Cost Device Required Social
Acceptability
DNA High High Test Equipment Low
Iris recognition High High Camera Medium -Low
Retina scan High High Camera Low
Facial recognition Medium -
Low
Medium Camera High
Voice recognition Medium Medium Microphone,
telephone
High
Hand geometry Medium -
Low
Low Scanner High
Finger print High Medium Scanner Medium
Signature recognition Low Medium Optic pen,
touch panel
High
http://kaitleencrowe.com/2015/01/22/biometric/
• Compared with other Bio Technologies, Finger Print is the best choice
Uniqueness Finger Skin Pattern
PANKANTI, S., PRABHAKAR, S., AND JAIN, A. K. On the individuality of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24 (August 2002), 1010–
1025. Available from: http://portal.acm.org/citation. cfm?id=605089.605091. 204, 212
• Human finger skin consists of friction ridges with pores.
• These ridges are formed in the ninth week of a fetal
development life, and remains the same all life long.
• A severely injured skin may be reconstructed to the same
as before.
• Identical twins have different fingerprints and no two
people have the same fingerprint.
• Every individual’s fingerprint is highly unique and suitable
for use as a form of authentication.
8
Fingerprint Security
• Deny Intruders
– Higher Accuracy computation
• 97% will return correct results
• Prevent Re-construction of fingerprint data
– Image protection
• Minutiae is retrieved and template created
– Encrypted data
– Image destruction
• Cannot reconstruct the fingerprint from data
• Fake Fingerprints Detection
– Ignore Latent Print Residue
• Cannot steal from previous user
– Detect fake/amputated finger
• Sensors detect presences of
– Temperature, Pulse, Heartbeat sensors, Blood flow
9
Technology Overview
Applications
PerformanceHardware/Software
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
How Fingerprint are acquired?
Source: http://360biometrics.com/faq/fingerprint_scanners.php
Optical Sensor
Ultrasonic with RF Sensor
Optical Sensor
module
Capacitive Sensor
Thermal Sensor
Optical Fingerprint Sensors
Problem:
1. Scratched or dirty touch
surface can cause bad image
2. Easily fooled by fake finger
3. Bulky design, only suitable for
larger static installation
Function:
1. Reflected image of fingerprint captured by
camera from the underside of a prism.
2. Image is stored for comparison with
database.
Capacitive Fingerprint Sensing
http://appleinsider.com/articles/13/08/07/apple-inc-gets-its-
fingerprints-on-advanced-touch-sensor-appears-difficult-for-android-
to-copy
Ridge
Valley
Ultrasonic Fingerprint Imaging
http://www.sonavation.com/ultrasound-biometric-sensor/
https://youtu.be/FtKKZyYbZtw (1:30)
14
Fingerprint Sensors Comparison
Optical Capacitive Ultrasound
Size Relatively big and
require camera
Can embed into
small devices
Can embed into
small devices
Method Image capture RF Field RF Field
Cost Middle Low High
Accuracy May be affected
by dirt or water
May be affected
by dirt or water
Will not be
affected by dirt or
water
Working Current 120 mA 200 mA 6 µA
Source: http://yourbusiness.azcentral.com/comparison-fingerprint-scanners-27754.html
http://artofcircuits.com/product/optical-fingerprint-sensor-module-fpm10a
http://www.techshinobiometrics.com/products/fingerprint-identification-products/fingerprint-oem-modules/
http://www.sonavation.com/ultrasound-biometric-sensor
Examples of Commercial Fingerprint
Scanners
http://perso.telecom-paristech.fr/~chollet/Biblio/Cours/Biomet/fribourg/maltoni_1.pdf
*The standard fingerprint image
resolution in law enforcement
applications is 500 pixels per inch
(ppi) Ppi = Dpi
16
3 Levels of Fingerprint classification
1. Loops ,Arches , or Whorls
2. Individual characteristic (Minutiae)
http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
17
3 Levels of Fingerprint classification
3. Pores and Ridges
1 Pores and Ridges: Fingerprint Matching Using Level 3 Features
by Jain, A; Yi Chen; Demirkus, M
2 Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
by Jain, A.K; Yi Chen; Demirkus, M
18
Basic Idea
• After these classification, a key is generated by the software algorithm.
• After finger print reader read your fingerprint, software will compare
with database.
http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901
Scan and Classify Generate a unique
user Key
Unlock access
19
Cryptography
• There is two keys:
Public key
Private key (Fingerprint key)
• The basic idea is:
 Sender encrypts data with his receiver’s public key and send out.
 Receiver will use his/her private key to decrypt the data. No one
can decrypt without receiver’s private key!
http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901
Mathematically Linked
20
Software Algorithm
• Software Classification
• http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
• http://www.bioelectronix.com/what_is_biometrics.html
Fingerprint Matching Software
• The most commonly used are:
1. Minutiae matching (commonly used)
2. Pattern matching
http://www.biometric-solutions.com/solutions/index.php?story=fingerprint_recognition
http://biometrics.mainguet.org/types/fingerprint/fingerprint_algo.htm
Advance Minutiae Based Algorithm (AMBA)
• Two processes
1. Feature Extractor
2. Matcher
http://www.supremasolution.com/
AMBA – Feature Extractor
• Feature Extractor
– Capture Image
– Enhance Ridge (Normalization, Local orientation estimation,
Local frequency estimation, Region mask estimation and
filtering)
– Extract Minutiae (Classification)
http://http://www.supremasolution.com/
http://www.cse.iitk.ac.in/users/biometrics/pages/finger.htm
AMBA - Matcher
• Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by 12 types
• Large number of certain type can result in faster searches
http://www.supremasolution.com/
Example: Apple ID touch
• Secure Enclave - using its microprocessor (A7)
to create protection to user’s data
• When device is locked:
– Data protection keys are wrapped (encapsulated)
– Data are not accessible
• When device is unlocked by the fingerprint
sensor:
– Data protection key are unwrapped (decapsulated)
– Iphone is unlocked and data is accessible
http://gizmodo.com/apple-finally-explains-touch-id-
security-in-detail-1532298901
How Fingerprint Biometric is used
• Enrollment
– Storing of fingerprint in
database
• Verification
– Known Identification of
person
– Compare the person’s
fingerprint in database
– One to one comparison
• Identification
–Unknown Identification of
person
– Search through database
for a match
– One to many comparison
Source: An Introduction to Biometric Recognition, Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, January 2004
27
Technology Overview
Applications
PerformanceSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
Optical Resolution vs Accuracy
http://biolab.korea.ac.kr/pubs/JainFpMatching_IEEEComp10.pdf
Jain, Feng, Nandakumar, Anil K. Kain, Jianjiang Fengm Karthik Nandakumar, 2010. Fingerprint Matching. Computer, 0018-9162, 36-44.
[a] http://itlaw.wikia.com/wiki/False_non-match_rate
[b] http://itlaw.wikia.com/wiki/False_match_rate
False Non-Match Rate (FNMR) is the failure of a biometric system to identify a biometric
subject or to verify the legitimate claimed identity of a biometric subject.
False Match Rate (FMR) is the proportion of the completed biometric non-match
comparison trials that result in a false match. [b]
False Positive Identification Rate (FPIR) occurs when the system finds a hit for a query
fingerprint that is not enrolled in the system.
False Negative Identification Rate (FNIR) occurs when it finds no hit or a wrong hit for
a query fingerprint enrolled in the system.
Image quality vs EER (4 software algorithm)
Image quality is important, better image, lower EER
Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K.
Jain.
ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid,
Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823,
USA
Equalerrorrate(thelower,thebetter)
Low Q Image Vs High Q Image (FRR & FAR)
Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K.
Jain.
ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid,
Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823,
Ideal Ideal
Sensor Duration vs FAR&FRR
http://www.neurotechnology.com/fingerprint-scanner-biometrika-fx-2000.html
Fingerprint Sensing Techniques, Devices and Applications Rahul Singh kingtiny@cs.cmu.edu 30th April 2003
Test data
1. Database of 100 users
(non-experts)
2. Low quality fingerprints
Efficiency
TASK SPEED_DEFAULT SPEED_FAST
Feature extraction 350 ms 260 ms
Matching 120 ms 47 ms
Identity verification 470 ms 307 ms
Accuracy:
Time taken
SPEED_DEFAULT SPEED_FAST
FAR FRR FAR FRR
0.3500 0.0049 (0.49%) 0.0005 (0.05%) 0.0032 (0.32%) 0.0009 (0.09%)
0.3750 0.0025 (0.25%) 0.0010 (0.10%) 0.0014 (0.14%) 0.0014 (0.14%)
0.4000 0.0011 (0.11%) 0.0014 (0.14%) 0.0005 (0.05%) 0.0020 (0.20%)
0.4250 0.0006 (0.06%) 0.0019 (0.19%) 0.0002 (0.02%) 0.0034 (0.34%)
0.4500 0.0004 (0.04%) 0.0026 (0.26%) 0.0000 (0.00%) 0.0049 (0.49%)
0.4750 0.0000 (0.00%) 0.0036 (0.36%) 0.0000 (0.00%) 0.0063 (0.63%)
FX2000 Optical Sensor Specification:
Resolution: 569 ppi,
Image Size: 296 x 570 pixels
Device size: 122 x 73 x 61mm
False Acceptance rate (FAR) is the
probability that the system incorrectly
authorizes a non-authorized person,
due to incorrectly matching.
False Rejection Rate (FRR) is the
probability that the system incorrectly
rejects access to an authorized person,
due to failing to match
32
Microprocessor Improvements
• Size reduced, Speed increasing, Power consumption
http://www.futuretimeline.net/subject/computers-internet.htm
+http://www.singularity.com/charts/page61.html
http://www.androidauthority.com/smartphone-hardware-2015-405022/
Technology Enabler for Finger-print Authentication in
Mobile phone
• High-resolution sensors
–Capture higher resolution fingerprint data
• Micro-Processors
–Higher Processor Speed
• Storage Capacity
–Higher storage in mobile devices
• Smaller Form Factor
–Can be installed in mobile devices
GAFUROV, D., BOURS, P., YANG, B., AND BUSCH, C. Guc100 multi-scanner fingerprint database for inhouse (semi-public) performance and
interoperability evaluation. Computational Science and its Applications, International Conference (2010), 303–306. 203, 212
34
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
35
Camera Based finger print sensor cost analysis
https://en.wikipedia.org/wiki/Touch_ID
http://www.imore.com/how-touch-id-works
http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm
Component Cost:
1. Finger Print sensor 53%
2. Cover glass 10%
3. Processing assembly 18%
4. Metal Rim 12%
5. F-PCB Component 7%
Key components:
1. laser-cut sapphire crystal
2. stainless steel detection ring
3. Touch ID CMOS sensor
4. Tactile Switch
36
http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm
Key component
-- Finger Print Sensor Volume vs ASP
• Finger print sensor price drop rapidly with high demanding growth in future
37
https://www.tractica.com/newsroom/press-releases/fingerprint-readers-in-mobile-devices-to-surpass-1-billion-unit-shipments-annually-by-2021/
Finger Print Sensor Market Demand
• High demanding forecast for fingerprint sensor, especially in Asian market.
Which can reduce fingerprint sensor manufacturing cost
38
Key component
-- Display Cover glass demand
http://www.ledinside.com/intelligence/2014/6/wearable_devices_to_spur_sapphire_market_demands_in_2015_analyzes_ledinside
http://electroiq.com/blog/2015/07/smartphone-and-tablets-still-drive-demand-for-cover-glass-as-industry-looks-to-smart-watches-for-growth/
 The major market demand
growth is from smart phone
cover glass
 Display Cover glass demand
keep increasing in past 3
years and market demand is
keep increasing until 2019
39
Key component
-- Sapphire Cost Forecast
http://www.i-micronews.com/component/hikashop/product/sapphire-applications-market-2015-from-led-to-consumer-electronic.html
• Sapphire is a major material for display cover, especially for hand phone camera cover and finger print
sensor cover. The overall price from different manufacturing process is keep going down.
Biometric Market Trends – Fingerprint Scanners
40Source: http://www.bloomberg.com/news/articles/2013-08-22/apple-iphone-rumor-boosts-biometrics-companies
Patents - Fingerprint Sensing
41
Fingerprint Sensors Patent Landscape
New strong IP enthusiasm and new players such as Apple are leaving their imprint on the market
Publication Jan. 2015
42
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
Consumer Acceptance to Fingerprint Authentication
• A Survey was conducted in 2010 on 278 Students on their
acceptance level to use fingerprint for authentication
– 58% of respondents had used fingerprint for authentication
(Notebook, facility access, etc.).
– Feedback on the likely services that they would use fingerprint
authentication
Biometrictechnologyinretailing:Willconsumersaccept fingerprintauthentication? Richard Clodfelter Department
ofRetailing,TheCollegeofHospitality,Retail,&SportManagement,UniversityofSouthCarolina,SC29208Columbia,UnitedStates
44
Summary of Fingerprint Applications
-- Changing Lifestyle
• People are willing to use fingerprint technology instead of traditional way in
daily life, this is because fingerprint technology is reliable and convenient.
• Lifestyle is changing with fingerprint technology widespread used and hand
phone is a major base of this technology.
Without fingerprint With fingerprint
Mobile Phone based Applications
-- Unlock hand phone
• Since security concern, Apple and some other companies change hand phone
password from 4 number to 6 number which means users need longer time to unlock
their hand phone.
• Unlock your phone with fingerprint to save time. Hand Phone can be unlock while you
press home bottom
• Hand phone integrate reliable technology -- fingerprint function is a key to open the door
of new lifestyle.
Mobile Phone based Applications
-- Fingerprint technology in Banking
Bank Branch Bank Mobile APP
• People save time and easily to manage their bank account
by hand phone
• Banks can reduce No. of branches which means lower cost
for banks.
47
https://www.linkedin.com/pulse/biometrics-banking-
hussain-
Mobile Phone based Applications
-- Fingerprint Technology in Banking
• Compared with other Biometrics
technologies, fingerprint
technology widely used in
banking
• Asian and US are largest market
in fingerprint banking.
48
Mobile Phone based Applications
-- Mobile Bill Payment
AXS machine AXS online
• Without fingerprint, people don’t want to pay bill by mobile
phone, although some App have function of bill payment,
people are not willing to save credit card info in those App.
They have big concern on safety!
• With Fingerprint, people can pay bill by Mobile phone without
safety concern.
49
Mobile Phone based Applications
-- Mobile Manage Stock
Buy/Sell at Stock market Buy/Sell on Handphone
• More easier to manage your Stock
account by hand phone. Fingerprint
replace password, Safer than password
based online Stock.
Mobile Phone based Applications
-- Online Shopping
Traditional shopping Online shopping
• Same concern on online shopping, people are not willing to purchase
stuff from online store.
• Fingerprint can solve this issue
51
Applications on Automotive
https://www.youtube.com/watch?v=-PWbpZSBIGA
Car locker Car engine start
https://www.youtube.com/watch?v=xVXPpFpPWyU
• Use fingerprint to unlock Car or start engine are safer than current
practice, without car owner’s fingerprint, door unable to unlock and engine
unable to start.
52
Applications on Security
-- Locker, Which one your want?
https://www.youtube.com/watch?v=b
mkrLvTJj1M
Door locker with Finger print sensor
Traditional door locker
People willing to change traditional locker to
fingerprint one, there are some benefits:
1. No need bring key
2. More safer than traditional locker
53
https://www.youtube.com/watch?v=qVfddmIj_zU
USB storage with Finger print locker
Applications on Security
-- Data storage, Which one your want?
• Data storage with fingerprint function is
more safer for critical data storage.
Especially for individual privacy high
confidential information
54
Applications on sports and exercise
-- Simulators
HealthcareSport simulator
Detect grip pattern:
1. Sportsman
2. Patients
55
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
56
Entrepreneur Opportunity
Payment
$$$
Public Transport Convenient Stores
Vending
Machines
Computers
57
Entrepreneur Opportunity
Gyms
Defence
Banks
Airports
Data storage
Homes/ offices
Automobiles
58
Entrepreneur Opportunity
Sports
Newborn babies
Healthcare group
59
Recommendation
• Protect information
• Passwords not reliable - easy to forget
• Fingerprints used for centuries
• Fingerprints are unique - can verify
• Accurate
• Many applications were developed
• Lot of business opportunities
Thank you
References
• http://info-tech.com.sg/fingerprint-
readers.htm?gclid=CJ230sCexMsCFdGKaAod7HMKzQ
• http://www.entrepreneur.com/article/168946
• http://airccj.org/CSCP/vol3/csit3504.pdf

More Related Content

What's hot

Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPTVishnu Mysterio
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 

What's hot (20)

Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 

Viewers also liked

Viewers also liked (11)

Teleportation
TeleportationTeleportation
Teleportation
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Abstract chameleon chip
Abstract chameleon chipAbstract chameleon chip
Abstract chameleon chip
 
Quantum teleportation.ppt
Quantum teleportation.pptQuantum teleportation.ppt
Quantum teleportation.ppt
 
4D_Presentation
4D_Presentation4D_Presentation
4D_Presentation
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
chameleon chip
chameleon chipchameleon chip
chameleon chip
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Similar to Biometrics/fingerprint sensors

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 

Similar to Biometrics/fingerprint sensors (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics
BiometricsBiometrics
Biometrics
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 

More from Jeffrey Funk

The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...Jeffrey Funk
 
Commercialization of Science: What has changed and what can be done to revit...
Commercialization of Science:  What has changed and what can be done to revit...Commercialization of Science:  What has changed and what can be done to revit...
Commercialization of Science: What has changed and what can be done to revit...Jeffrey Funk
 
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...Jeffrey Funk
 
The Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its ApplicationsThe Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its ApplicationsJeffrey Funk
 
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...Jeffrey Funk
 
The Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London FuturistsThe Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London FuturistsJeffrey Funk
 
Where are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by nowWhere are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by nowJeffrey Funk
 
What's behind technological hype
What's behind technological hypeWhat's behind technological hype
What's behind technological hypeJeffrey Funk
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingJeffrey Funk
 
Ride Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real SharingRide Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real SharingJeffrey Funk
 
Importance of Science, by Industry
Importance of Science, by IndustryImportance of Science, by Industry
Importance of Science, by IndustryJeffrey Funk
 
beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...Jeffrey Funk
 
Lighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their EconoimcsLighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their EconoimcsJeffrey Funk
 
Putting Context Back Into Learning
Putting Context Back Into LearningPutting Context Back Into Learning
Putting Context Back Into LearningJeffrey Funk
 
Technology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic FeasibiltyTechnology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic FeasibiltyJeffrey Funk
 
AI and Future of Professions
AI and Future of ProfessionsAI and Future of Professions
AI and Future of ProfessionsJeffrey Funk
 
Solow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AISolow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AIJeffrey Funk
 
What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?Jeffrey Funk
 
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Jeffrey Funk
 

More from Jeffrey Funk (20)

The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
 
Commercialization of Science: What has changed and what can be done to revit...
Commercialization of Science:  What has changed and what can be done to revit...Commercialization of Science:  What has changed and what can be done to revit...
Commercialization of Science: What has changed and what can be done to revit...
 
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
 
The Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its ApplicationsThe Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its Applications
 
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
 
The Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London FuturistsThe Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London Futurists
 
Where are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by nowWhere are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by now
 
What's behind technological hype
What's behind technological hypeWhat's behind technological hype
What's behind technological hype
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is Coming
 
Ride Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real SharingRide Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real Sharing
 
End of Science
End of ScienceEnd of Science
End of Science
 
Importance of Science, by Industry
Importance of Science, by IndustryImportance of Science, by Industry
Importance of Science, by Industry
 
beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...
 
Lighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their EconoimcsLighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their Econoimcs
 
Putting Context Back Into Learning
Putting Context Back Into LearningPutting Context Back Into Learning
Putting Context Back Into Learning
 
Technology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic FeasibiltyTechnology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic Feasibilty
 
AI and Future of Professions
AI and Future of ProfessionsAI and Future of Professions
AI and Future of Professions
 
Solow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AISolow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AI
 
What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?
 
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
 

Recently uploaded

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

Biometrics/fingerprint sensors

  • 1. Biometric Technology -- Finger Print Business Opportunity Team Members: YANG QIAN A0147178W LIM KIM CHYE A0147179U QUEK YONG GUAN A0147276X SONG ZHIWEI A0026195E For information on other technologies see http://www.slideshare.net/Funk98/presentations
  • 3. 3 • A biometric identification system provides an automated method of recognizing an individual based on their unique physiological characteristics  Metrics related to human characteristics  These metrics are Distinctive and Measurable (label and describe individuals) What is Biometric?
  • 4. 4 Why Biometric? • Traditional, security is by what we: –Know (PIN, Password) –Have (Key, smart card) • Both of these security measures can be hacked, stolen, forgotten, duplicated and have too many. • Modern, security is by we: –Are (Body) • It is not easy to create a copy because its unique and high accuracy.
  • 5. 5 Type of Biometric? 1. Finger print 2. Palm veins 3. DNA 4. Iris recognition 5. Facial recognition 6. Voice recognition 7. Signature recognition 8. Palm print 9. Hand geometry 10.Retina scan 11.Ordure/Scent https://en.wikipedia.org/wiki/Biometrics
  • 6. 6 Comparison Between Biometric Biometric Technology Accuracy Cost Device Required Social Acceptability DNA High High Test Equipment Low Iris recognition High High Camera Medium -Low Retina scan High High Camera Low Facial recognition Medium - Low Medium Camera High Voice recognition Medium Medium Microphone, telephone High Hand geometry Medium - Low Low Scanner High Finger print High Medium Scanner Medium Signature recognition Low Medium Optic pen, touch panel High http://kaitleencrowe.com/2015/01/22/biometric/ • Compared with other Bio Technologies, Finger Print is the best choice
  • 7. Uniqueness Finger Skin Pattern PANKANTI, S., PRABHAKAR, S., AND JAIN, A. K. On the individuality of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24 (August 2002), 1010– 1025. Available from: http://portal.acm.org/citation. cfm?id=605089.605091. 204, 212 • Human finger skin consists of friction ridges with pores. • These ridges are formed in the ninth week of a fetal development life, and remains the same all life long. • A severely injured skin may be reconstructed to the same as before. • Identical twins have different fingerprints and no two people have the same fingerprint. • Every individual’s fingerprint is highly unique and suitable for use as a form of authentication.
  • 8. 8 Fingerprint Security • Deny Intruders – Higher Accuracy computation • 97% will return correct results • Prevent Re-construction of fingerprint data – Image protection • Minutiae is retrieved and template created – Encrypted data – Image destruction • Cannot reconstruct the fingerprint from data • Fake Fingerprints Detection – Ignore Latent Print Residue • Cannot steal from previous user – Detect fake/amputated finger • Sensors detect presences of – Temperature, Pulse, Heartbeat sensors, Blood flow
  • 10. How Fingerprint are acquired? Source: http://360biometrics.com/faq/fingerprint_scanners.php Optical Sensor Ultrasonic with RF Sensor Optical Sensor module Capacitive Sensor Thermal Sensor
  • 11. Optical Fingerprint Sensors Problem: 1. Scratched or dirty touch surface can cause bad image 2. Easily fooled by fake finger 3. Bulky design, only suitable for larger static installation Function: 1. Reflected image of fingerprint captured by camera from the underside of a prism. 2. Image is stored for comparison with database.
  • 14. 14 Fingerprint Sensors Comparison Optical Capacitive Ultrasound Size Relatively big and require camera Can embed into small devices Can embed into small devices Method Image capture RF Field RF Field Cost Middle Low High Accuracy May be affected by dirt or water May be affected by dirt or water Will not be affected by dirt or water Working Current 120 mA 200 mA 6 µA Source: http://yourbusiness.azcentral.com/comparison-fingerprint-scanners-27754.html http://artofcircuits.com/product/optical-fingerprint-sensor-module-fpm10a http://www.techshinobiometrics.com/products/fingerprint-identification-products/fingerprint-oem-modules/ http://www.sonavation.com/ultrasound-biometric-sensor
  • 15. Examples of Commercial Fingerprint Scanners http://perso.telecom-paristech.fr/~chollet/Biblio/Cours/Biomet/fribourg/maltoni_1.pdf *The standard fingerprint image resolution in law enforcement applications is 500 pixels per inch (ppi) Ppi = Dpi
  • 16. 16 3 Levels of Fingerprint classification 1. Loops ,Arches , or Whorls 2. Individual characteristic (Minutiae) http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
  • 17. 17 3 Levels of Fingerprint classification 3. Pores and Ridges 1 Pores and Ridges: Fingerprint Matching Using Level 3 Features by Jain, A; Yi Chen; Demirkus, M 2 Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features by Jain, A.K; Yi Chen; Demirkus, M
  • 18. 18 Basic Idea • After these classification, a key is generated by the software algorithm. • After finger print reader read your fingerprint, software will compare with database. http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901 Scan and Classify Generate a unique user Key Unlock access
  • 19. 19 Cryptography • There is two keys: Public key Private key (Fingerprint key) • The basic idea is:  Sender encrypts data with his receiver’s public key and send out.  Receiver will use his/her private key to decrypt the data. No one can decrypt without receiver’s private key! http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901 Mathematically Linked
  • 20. 20 Software Algorithm • Software Classification • http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm • http://www.bioelectronix.com/what_is_biometrics.html
  • 21. Fingerprint Matching Software • The most commonly used are: 1. Minutiae matching (commonly used) 2. Pattern matching http://www.biometric-solutions.com/solutions/index.php?story=fingerprint_recognition http://biometrics.mainguet.org/types/fingerprint/fingerprint_algo.htm
  • 22. Advance Minutiae Based Algorithm (AMBA) • Two processes 1. Feature Extractor 2. Matcher http://www.supremasolution.com/
  • 23. AMBA – Feature Extractor • Feature Extractor – Capture Image – Enhance Ridge (Normalization, Local orientation estimation, Local frequency estimation, Region mask estimation and filtering) – Extract Minutiae (Classification) http://http://www.supremasolution.com/ http://www.cse.iitk.ac.in/users/biometrics/pages/finger.htm
  • 24. AMBA - Matcher • Matcher – Used to match fingerprint – Trade-off between speed and performance – Group minutiae and categorize by 12 types • Large number of certain type can result in faster searches http://www.supremasolution.com/
  • 25. Example: Apple ID touch • Secure Enclave - using its microprocessor (A7) to create protection to user’s data • When device is locked: – Data protection keys are wrapped (encapsulated) – Data are not accessible • When device is unlocked by the fingerprint sensor: – Data protection key are unwrapped (decapsulated) – Iphone is unlocked and data is accessible http://gizmodo.com/apple-finally-explains-touch-id- security-in-detail-1532298901
  • 26. How Fingerprint Biometric is used • Enrollment – Storing of fingerprint in database • Verification – Known Identification of person – Compare the person’s fingerprint in database – One to one comparison • Identification –Unknown Identification of person – Search through database for a match – One to many comparison Source: An Introduction to Biometric Recognition, Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, January 2004
  • 28. Optical Resolution vs Accuracy http://biolab.korea.ac.kr/pubs/JainFpMatching_IEEEComp10.pdf Jain, Feng, Nandakumar, Anil K. Kain, Jianjiang Fengm Karthik Nandakumar, 2010. Fingerprint Matching. Computer, 0018-9162, 36-44. [a] http://itlaw.wikia.com/wiki/False_non-match_rate [b] http://itlaw.wikia.com/wiki/False_match_rate False Non-Match Rate (FNMR) is the failure of a biometric system to identify a biometric subject or to verify the legitimate claimed identity of a biometric subject. False Match Rate (FMR) is the proportion of the completed biometric non-match comparison trials that result in a false match. [b] False Positive Identification Rate (FPIR) occurs when the system finds a hit for a query fingerprint that is not enrolled in the system. False Negative Identification Rate (FNIR) occurs when it finds no hit or a wrong hit for a query fingerprint enrolled in the system.
  • 29. Image quality vs EER (4 software algorithm) Image quality is important, better image, lower EER Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K. Jain. ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid, Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823, USA Equalerrorrate(thelower,thebetter)
  • 30. Low Q Image Vs High Q Image (FRR & FAR) Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K. Jain. ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid, Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823, Ideal Ideal
  • 31. Sensor Duration vs FAR&FRR http://www.neurotechnology.com/fingerprint-scanner-biometrika-fx-2000.html Fingerprint Sensing Techniques, Devices and Applications Rahul Singh kingtiny@cs.cmu.edu 30th April 2003 Test data 1. Database of 100 users (non-experts) 2. Low quality fingerprints Efficiency TASK SPEED_DEFAULT SPEED_FAST Feature extraction 350 ms 260 ms Matching 120 ms 47 ms Identity verification 470 ms 307 ms Accuracy: Time taken SPEED_DEFAULT SPEED_FAST FAR FRR FAR FRR 0.3500 0.0049 (0.49%) 0.0005 (0.05%) 0.0032 (0.32%) 0.0009 (0.09%) 0.3750 0.0025 (0.25%) 0.0010 (0.10%) 0.0014 (0.14%) 0.0014 (0.14%) 0.4000 0.0011 (0.11%) 0.0014 (0.14%) 0.0005 (0.05%) 0.0020 (0.20%) 0.4250 0.0006 (0.06%) 0.0019 (0.19%) 0.0002 (0.02%) 0.0034 (0.34%) 0.4500 0.0004 (0.04%) 0.0026 (0.26%) 0.0000 (0.00%) 0.0049 (0.49%) 0.4750 0.0000 (0.00%) 0.0036 (0.36%) 0.0000 (0.00%) 0.0063 (0.63%) FX2000 Optical Sensor Specification: Resolution: 569 ppi, Image Size: 296 x 570 pixels Device size: 122 x 73 x 61mm False Acceptance rate (FAR) is the probability that the system incorrectly authorizes a non-authorized person, due to incorrectly matching. False Rejection Rate (FRR) is the probability that the system incorrectly rejects access to an authorized person, due to failing to match
  • 32. 32 Microprocessor Improvements • Size reduced, Speed increasing, Power consumption http://www.futuretimeline.net/subject/computers-internet.htm +http://www.singularity.com/charts/page61.html http://www.androidauthority.com/smartphone-hardware-2015-405022/
  • 33. Technology Enabler for Finger-print Authentication in Mobile phone • High-resolution sensors –Capture higher resolution fingerprint data • Micro-Processors –Higher Processor Speed • Storage Capacity –Higher storage in mobile devices • Smaller Form Factor –Can be installed in mobile devices GAFUROV, D., BOURS, P., YANG, B., AND BUSCH, C. Guc100 multi-scanner fingerprint database for inhouse (semi-public) performance and interoperability evaluation. Computational Science and its Applications, International Conference (2010), 303–306. 203, 212
  • 35. 35 Camera Based finger print sensor cost analysis https://en.wikipedia.org/wiki/Touch_ID http://www.imore.com/how-touch-id-works http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm Component Cost: 1. Finger Print sensor 53% 2. Cover glass 10% 3. Processing assembly 18% 4. Metal Rim 12% 5. F-PCB Component 7% Key components: 1. laser-cut sapphire crystal 2. stainless steel detection ring 3. Touch ID CMOS sensor 4. Tactile Switch
  • 36. 36 http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm Key component -- Finger Print Sensor Volume vs ASP • Finger print sensor price drop rapidly with high demanding growth in future
  • 37. 37 https://www.tractica.com/newsroom/press-releases/fingerprint-readers-in-mobile-devices-to-surpass-1-billion-unit-shipments-annually-by-2021/ Finger Print Sensor Market Demand • High demanding forecast for fingerprint sensor, especially in Asian market. Which can reduce fingerprint sensor manufacturing cost
  • 38. 38 Key component -- Display Cover glass demand http://www.ledinside.com/intelligence/2014/6/wearable_devices_to_spur_sapphire_market_demands_in_2015_analyzes_ledinside http://electroiq.com/blog/2015/07/smartphone-and-tablets-still-drive-demand-for-cover-glass-as-industry-looks-to-smart-watches-for-growth/  The major market demand growth is from smart phone cover glass  Display Cover glass demand keep increasing in past 3 years and market demand is keep increasing until 2019
  • 39. 39 Key component -- Sapphire Cost Forecast http://www.i-micronews.com/component/hikashop/product/sapphire-applications-market-2015-from-led-to-consumer-electronic.html • Sapphire is a major material for display cover, especially for hand phone camera cover and finger print sensor cover. The overall price from different manufacturing process is keep going down.
  • 40. Biometric Market Trends – Fingerprint Scanners 40Source: http://www.bloomberg.com/news/articles/2013-08-22/apple-iphone-rumor-boosts-biometrics-companies
  • 41. Patents - Fingerprint Sensing 41 Fingerprint Sensors Patent Landscape New strong IP enthusiasm and new players such as Apple are leaving their imprint on the market Publication Jan. 2015
  • 43. Consumer Acceptance to Fingerprint Authentication • A Survey was conducted in 2010 on 278 Students on their acceptance level to use fingerprint for authentication – 58% of respondents had used fingerprint for authentication (Notebook, facility access, etc.). – Feedback on the likely services that they would use fingerprint authentication Biometrictechnologyinretailing:Willconsumersaccept fingerprintauthentication? Richard Clodfelter Department ofRetailing,TheCollegeofHospitality,Retail,&SportManagement,UniversityofSouthCarolina,SC29208Columbia,UnitedStates
  • 44. 44 Summary of Fingerprint Applications -- Changing Lifestyle • People are willing to use fingerprint technology instead of traditional way in daily life, this is because fingerprint technology is reliable and convenient. • Lifestyle is changing with fingerprint technology widespread used and hand phone is a major base of this technology.
  • 45. Without fingerprint With fingerprint Mobile Phone based Applications -- Unlock hand phone • Since security concern, Apple and some other companies change hand phone password from 4 number to 6 number which means users need longer time to unlock their hand phone. • Unlock your phone with fingerprint to save time. Hand Phone can be unlock while you press home bottom • Hand phone integrate reliable technology -- fingerprint function is a key to open the door of new lifestyle.
  • 46. Mobile Phone based Applications -- Fingerprint technology in Banking Bank Branch Bank Mobile APP • People save time and easily to manage their bank account by hand phone • Banks can reduce No. of branches which means lower cost for banks.
  • 47. 47 https://www.linkedin.com/pulse/biometrics-banking- hussain- Mobile Phone based Applications -- Fingerprint Technology in Banking • Compared with other Biometrics technologies, fingerprint technology widely used in banking • Asian and US are largest market in fingerprint banking.
  • 48. 48 Mobile Phone based Applications -- Mobile Bill Payment AXS machine AXS online • Without fingerprint, people don’t want to pay bill by mobile phone, although some App have function of bill payment, people are not willing to save credit card info in those App. They have big concern on safety! • With Fingerprint, people can pay bill by Mobile phone without safety concern.
  • 49. 49 Mobile Phone based Applications -- Mobile Manage Stock Buy/Sell at Stock market Buy/Sell on Handphone • More easier to manage your Stock account by hand phone. Fingerprint replace password, Safer than password based online Stock.
  • 50. Mobile Phone based Applications -- Online Shopping Traditional shopping Online shopping • Same concern on online shopping, people are not willing to purchase stuff from online store. • Fingerprint can solve this issue
  • 51. 51 Applications on Automotive https://www.youtube.com/watch?v=-PWbpZSBIGA Car locker Car engine start https://www.youtube.com/watch?v=xVXPpFpPWyU • Use fingerprint to unlock Car or start engine are safer than current practice, without car owner’s fingerprint, door unable to unlock and engine unable to start.
  • 52. 52 Applications on Security -- Locker, Which one your want? https://www.youtube.com/watch?v=b mkrLvTJj1M Door locker with Finger print sensor Traditional door locker People willing to change traditional locker to fingerprint one, there are some benefits: 1. No need bring key 2. More safer than traditional locker
  • 53. 53 https://www.youtube.com/watch?v=qVfddmIj_zU USB storage with Finger print locker Applications on Security -- Data storage, Which one your want? • Data storage with fingerprint function is more safer for critical data storage. Especially for individual privacy high confidential information
  • 54. 54 Applications on sports and exercise -- Simulators HealthcareSport simulator Detect grip pattern: 1. Sportsman 2. Patients
  • 56. 56 Entrepreneur Opportunity Payment $$$ Public Transport Convenient Stores Vending Machines Computers
  • 59. 59 Recommendation • Protect information • Passwords not reliable - easy to forget • Fingerprints used for centuries • Fingerprints are unique - can verify • Accurate • Many applications were developed • Lot of business opportunities