SlideShare a Scribd company logo
FINGERPRINT
BIOMETRICS
  ESD PRESENTATION
       GROUP 2
BIOMETRICS
• Biometrics (or biometric authentication refers
  to the identification of humans by their
  characteristics or traits. Biometrics is used in
  computer science as a form of identification
  and access control. It is also used to identify
  individuals in groups that are under
  surveillance
TYPES OF BIOMETRICS
•   DNA MATCHING
•   EAR
•   EYES-IRIS RECOGNITION
•   VOICE RECOGNITION
•   FACE
•   FINGERPRINT RECOGNITION
•   FINGER GEOMETRY RECOGNITION
•   SO ON….
WHY FINGERPRINTS
• Very high accuracy.
• Is the most economical biometric PC user
  authentication technique.
• it is one of the most developed biometrics
• Easy to use.
• Small storage space required for the biometric
  template, reducing the size of the database
  memory required
• It is standardized.
IT’S AN EMBEDDED SYSTEM!!!!!
BASIC ELEMENTS OF A TYPICAL
  FINGERPRINT BIOMETRIC SYSTEM
• Sensing

• Processing

• Storage

• Interface
Biometrics System Elements
THE SENSOR
Types of Sensors

Optical
Capacitive

Thermal

 Pressure
OPTICAL
• Heart of an
  optical sensor is a
  Charged Couple
  Device ( CCD): an
  array of light
  sensitive diodes
  called photosites
  which generate
  an electrical
  signal in response
  to light photons.
Working
• Photosite records pixels.
• Ridges and valleys present on fingers are illuminated


• CCD processor ensures a clear image is taken
• Definition of the image is checked


• Collectively pixels form an image
• A to D Converter generates digital representation of image
How capacitive touch
      works
Frequency Change method




• An oscillator that oscillates
  at a high frequency (usually
  10 to 50 KHz), and uses a
  capacitor to oscillate.
555 multivibrator                            Capacitance of 10pF
                                                 (Body capacitance is about
                                                           15pF)
Note :
We use a small capacitance of 10pF because the body capacitance is small as well, usually
from 8 to 15 pF.
So, the capacitor C must be around this value, so that the body capacitance will have a big
influence to the overall capacitance.
• The touch sensor is placed in parallel with this capacitor, or some
  times the touch sensor is the capacitor itself.

• If the touch sensor is touched by a finger, then the body capacitance
  is connected in parallel to the sensor's capacitance.
• As you may know, the overall capacitance of two capacitors connected in parallel is
  increased (connecting capacitors), and this causes the oscillating frequency to
  change (bigger capacitor means lower frequency).
Before detecting touch   After detecting touch
• Using a digital comparator or any other method to sense this frequency change,
  one can determine if the touch pad is touched.
The frequency comparator –

• There are several ways to implement such a circuit.
• One of them, is to convert the frequency into a DC voltage with a
  Frequency to Voltage converter, and compare it to a fixed DC voltage.
  This method is widely used in analog applications.
The output stage –

• A Schmidt trigger compares the output values from the frequency
  comparator & it’s output leads to the LED which glows when a touch
  is detected.
Capacitive Voltage Divider method

• This is another very interesting
  technique to implement a touch
  sensor.


• The touch pad is directly connected to
  the Analog to Digital converter of a
  microcontroller.


• Here is a rough diagram of the circuit:
• The ADC module is internally driven to VDD, so that the
  capacitor used for the A/D conversion is fully charged

• The analog input (sensor) is internally disconnected
  from the ground

• The ADC module is internally connected to the Analog
  Input (sensor)
• The analog input (sensor) is internally grounded, so that
  the sensor is fully discharged
•   Internal capacitor will discharge part of its charge to the sensor (or human
    body).
•    At the end, both capacitors (the internal and the sensor) will have the
    same voltage across them. This voltage depends on the capacitance of the
    sensor.
•   When the voltage is divided, it will be times smaller than the original charge
    of the internal capacitor.
• So, immediately after step 4, the microcontroller starts an analog to
  digital conversion and reads the ADC module registers.

• According to the voltage that it reads, it can be determined if the
  sensor is touched or not.
• This method is extremely simple to implement with a microcontroller, because
     the only external part required is the sensor. It is completely improper to
                       implement without a microcontroller.
THE PROCESSOR
WHY DSP OVER MC
• A programmable processor like the DSP can
  address all the processing needs of a biometric
  system while providing the most viable path to
  standards and feature upgrades.
• A DSP allows the product to be small and
  portable while maintaining power-efficient
  performance all at a low overall system cost.
• The DSP architecture is built to support complex
  mathematical algorithms that involve a significant
  amount of multiplication and addition.
• The DSP executes the multiply/add feature in a
  single cycle (compared to multiple cycles for RISC
  processors)
• In addition, the Harvard architecture of the DSP
  (multiple busses) allows instruction and operand
  fetches in the same cycle for increased speed of
  operation.
BASIC BLOCK DIAGRAM
GENERAL PURPOSE
            INPUT/OUTPUT (GPIO)
• It is a generic pin on a chip whose behavior (including
  whether it is an input or output pin) can be controlled
  (programmed) by the user at run time.

• GPIO pins have no special purpose defined, and go
  unused by default. The idea is that sometimes the
  system integrator building a full system that uses the
  chip might find it useful to have a handful of additional
  digital control lines, and having these available from
  the chip can save the hassle of having to arrange
  additional circuitry to provide them.
THE SERIAL PERIPHERAL INTERFACE
               SPI-BUS
• It is a simple 4-wire serial communications
  interface used by many
  microprocessor/microcontroller peripheral
  chips that enables the controllers and
  peripheral devices to communicate each
  other. Even though it is developed primarily
  for the communication between host
  processor and peripherals, a connection of
  two processors via SPI is just as well possible.
SPI BUS
• An SPI protocol specifies 4 signal wires.
• Master Out Slave In (MOSI) - MOSI signal is generated by
  Master, recipient is the Slave.
• Master In Slave Out (MISO) - Slaves generate MISO
  signals and recipient is the Master.
• Serial Clock (SCLK or SCK) - SCLK signal is generated by
  the Master to synchronize data transfers between the
  master and the slave.
• Slave Select (SS) from master to Chip Select (CS) of slave -
  SS signal is generated by Master to select individual
  slave/peripheral devices. The SS/CS is an active low signal.
• The SPI bus, which operates at full duplex
  (means, signals carrying data can go in both
  directions simultaneously), is a synchronous
  type data link setup with a Master / Slave
  interface and can support up to 1 megabaud or
  10Mbps of speed. Both single-master and
  multi-master protocols are possible in SPI.
• To begin a communication, the bus master first
  configures the clock, using a frequency less than
  or equal to the maximum frequency the slave
  device supports. Such frequencies are commonly
  in the range of 1–100 MHz.
• During each SPI clock cycle, a full duplex data
  transmission occurs:
• the master sends a bit on the MOSI line; the slave
  reads it from that same line
• the slave sends a bit on the MISO line; the master
  reads it from that same line
A typical hardware setup using two shift
registers to form an inter-chip circular buffer
IMAGE ENCODING
STORAGE ELEMENT
• The function of the storage element is to
  store the enrolled template that is recalled to
  perform a match at the time of authentication.
• DSPs have varying sizes of internal RAM to
  address the image processing and template
  extraction processes of the various biometric
  algorithms, along with read-only memory (ROM)
  for storing the constant parts of the programming
  code.
LDO
• A low-dropout or LDO regulator is a DC linear
  voltage regulator which can operate with a
  very small input–output differential voltage.
• The advantages of a low dropout voltage
  include a lower minimum operating voltage,
  higher efficiency operation and lower heat
  dissipation.
COMPONENTS OF LDO
• The main components are a power FET and a
  differential amplifier (error amplifier).
• There are two inputs to the differential
  amplifiers.
• Low-dropout (LDO) regulators work in the
  same way as all linear voltage regulators.
• The main difference between LDO and non-
  LDO regulators is their schematic topology.
ESD PROTECTION
• Electrostatic discharge (ESD) is the sudden
  flow of electricity between two objects caused
  by contact, an electrical short or dielectric
  breakdown.
• . ESD can be caused by a buildup of static
  electricity by turbocharging, or by
  electrostatic induction.
CHARACTERISTICS OF THE PROTECTION

 Extremely fast response time
 Low clamping and operating voltages
 Capacity to handle high peak ESD currents
 Ability to remain undamaged by repetitive ESD
 strikes
 Minimal size
BASIC BLOCK DIAGRAM
FUTURE PROSPECTS
• Public Sector Application : eBorders, eID,
  and eGovernment.
• Commercial Application : Enterprise
  Security, Information Transactions,
  Financial Transactions.
• Technology Evolution : Secure Identity
  Core, Secure Mobility, Secure
  Credentials, and Secure Transactions.
EXAMPLES

More Related Content

What's hot

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
rajarose89
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
sathish sak
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
Tushar Kayande
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
Dheerendra k
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
Vishnu Mysterio
 

What's hot (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 

Viewers also liked

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
Página web y blog
Página web y blogPágina web y blog
Página web y blog
Karoll Cruz
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile Devices
Nok Nok Labs, Inc
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
Sadan Khan
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATE
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATEAADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATE
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATETUSHAR GUHA
 
Security via Java
Security via JavaSecurity via Java
Security via Java
Bahaa Zaid
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Fingerprint presentation...
Fingerprint presentation...Fingerprint presentation...
Fingerprint presentation...
Stina14
 
finger print based security system
finger print based security systemfinger print based security system
finger print based security system
Anand Parakkat Parambil
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Mobile commerce.
Mobile commerce.Mobile commerce.
Mobile commerce.
Wasim Akram
 
Fingerprint sensor applications and technologies – Consumer market focus - 20...
Fingerprint sensor applications and technologies – Consumer market focus - 20...Fingerprint sensor applications and technologies – Consumer market focus - 20...
Fingerprint sensor applications and technologies – Consumer market focus - 20...
Yole Developpement
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 

Viewers also liked (20)

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Página web y blog
Página web y blogPágina web y blog
Página web y blog
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile Devices
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATE
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATEAADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATE
AADHAAR (BIO METRIC IDENTIFICATION NUMBER ) BASED VEHICLE LICENSE PLATE
 
Security via Java
Security via JavaSecurity via Java
Security via Java
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Fingerprint presentation...
Fingerprint presentation...Fingerprint presentation...
Fingerprint presentation...
 
finger print based security system
finger print based security systemfinger print based security system
finger print based security system
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Mobile commerce.
Mobile commerce.Mobile commerce.
Mobile commerce.
 
Fingerprint sensor applications and technologies – Consumer market focus - 20...
Fingerprint sensor applications and technologies – Consumer market focus - 20...Fingerprint sensor applications and technologies – Consumer market focus - 20...
Fingerprint sensor applications and technologies – Consumer market focus - 20...
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
biometrics
biometricsbiometrics
biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 

Similar to Fingerprint Biometrics

Industrial training report of embedded system and robotics
Industrial training report of embedded system and roboticsIndustrial training report of embedded system and robotics
Industrial training report of embedded system and robotics
Pallavi Bharti
 
Low power
Low powerLow power
Low power
preeti banra
 
A guide to common automation terms
A guide to common automation termsA guide to common automation terms
A guide to common automation terms
Pratap Chandra
 
REPORT texto braillefinal
REPORT texto braillefinalREPORT texto braillefinal
REPORT texto braillefinalASWATHI K
 
Introduction_to_Mechatronics_Chapter4.pdf
Introduction_to_Mechatronics_Chapter4.pdfIntroduction_to_Mechatronics_Chapter4.pdf
Introduction_to_Mechatronics_Chapter4.pdf
Bereket Walle
 
Brain wave controlled robot
Brain wave controlled robotBrain wave controlled robot
Brain wave controlled robot
Rahul Wagh
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
ajinky gadewar
 
Embedded sysyetm components
Embedded sysyetm componentsEmbedded sysyetm components
Embedded sysyetm components
lambanaveen
 
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishi
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishiWheelchaircontrolledbyheadmotionusingtilt sensorsrishi
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishi
Rishik kanth
 
Ardui no
Ardui no Ardui no
Ardui no
Amol Sakhalkar
 
arduinoworkshop-160204051621.pdf
arduinoworkshop-160204051621.pdfarduinoworkshop-160204051621.pdf
arduinoworkshop-160204051621.pdf
AbdErrezakChahoub
 
Embedded two mark question
Embedded two mark questionEmbedded two mark question
Embedded two mark question
JCT COLLEGE OF ENGINEERING AND TECHNOLOGY
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
Mrunal Deshkar
 
Silicon to software share
Silicon to software shareSilicon to software share
Silicon to software share
Narendra Patel
 
Advance Portable & Low Cost 3 Lead ECG(1).pptx
Advance Portable & Low Cost 3 Lead ECG(1).pptxAdvance Portable & Low Cost 3 Lead ECG(1).pptx
Advance Portable & Low Cost 3 Lead ECG(1).pptx
MdSazzad28
 
Wireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculationWireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculation
Udayalakshmi JK
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
DrVaibhavMeshram
 
FUNDAMENTAL OF ELECTRONICS AND HARDWARE
FUNDAMENTAL OF ELECTRONICS AND HARDWAREFUNDAMENTAL OF ELECTRONICS AND HARDWARE
FUNDAMENTAL OF ELECTRONICS AND HARDWARE
Vikrant Thakur
 

Similar to Fingerprint Biometrics (20)

Industrial training report of embedded system and robotics
Industrial training report of embedded system and roboticsIndustrial training report of embedded system and robotics
Industrial training report of embedded system and robotics
 
Low power
Low powerLow power
Low power
 
A guide to common automation terms
A guide to common automation termsA guide to common automation terms
A guide to common automation terms
 
REPORT texto braillefinal
REPORT texto braillefinalREPORT texto braillefinal
REPORT texto braillefinal
 
Introduction_to_Mechatronics_Chapter4.pdf
Introduction_to_Mechatronics_Chapter4.pdfIntroduction_to_Mechatronics_Chapter4.pdf
Introduction_to_Mechatronics_Chapter4.pdf
 
Brain wave controlled robot
Brain wave controlled robotBrain wave controlled robot
Brain wave controlled robot
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
 
Embedded sysyetm components
Embedded sysyetm componentsEmbedded sysyetm components
Embedded sysyetm components
 
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishi
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishiWheelchaircontrolledbyheadmotionusingtilt sensorsrishi
Wheelchaircontrolledbyheadmotionusingtilt sensorsrishi
 
Ardui no
Ardui no Ardui no
Ardui no
 
arduinoworkshop-160204051621.pdf
arduinoworkshop-160204051621.pdfarduinoworkshop-160204051621.pdf
arduinoworkshop-160204051621.pdf
 
Embedded two mark question
Embedded two mark questionEmbedded two mark question
Embedded two mark question
 
Wds
WdsWds
Wds
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
 
Silicon to software share
Silicon to software shareSilicon to software share
Silicon to software share
 
Project_updated
Project_updatedProject_updated
Project_updated
 
Advance Portable & Low Cost 3 Lead ECG(1).pptx
Advance Portable & Low Cost 3 Lead ECG(1).pptxAdvance Portable & Low Cost 3 Lead ECG(1).pptx
Advance Portable & Low Cost 3 Lead ECG(1).pptx
 
Wireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculationWireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculation
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
 
FUNDAMENTAL OF ELECTRONICS AND HARDWARE
FUNDAMENTAL OF ELECTRONICS AND HARDWAREFUNDAMENTAL OF ELECTRONICS AND HARDWARE
FUNDAMENTAL OF ELECTRONICS AND HARDWARE
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 

Fingerprint Biometrics

  • 1. FINGERPRINT BIOMETRICS ESD PRESENTATION GROUP 2
  • 2. BIOMETRICS • Biometrics (or biometric authentication refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance
  • 3. TYPES OF BIOMETRICS • DNA MATCHING • EAR • EYES-IRIS RECOGNITION • VOICE RECOGNITION • FACE • FINGERPRINT RECOGNITION • FINGER GEOMETRY RECOGNITION • SO ON….
  • 4. WHY FINGERPRINTS • Very high accuracy. • Is the most economical biometric PC user authentication technique. • it is one of the most developed biometrics • Easy to use. • Small storage space required for the biometric template, reducing the size of the database memory required • It is standardized.
  • 5. IT’S AN EMBEDDED SYSTEM!!!!!
  • 6. BASIC ELEMENTS OF A TYPICAL FINGERPRINT BIOMETRIC SYSTEM • Sensing • Processing • Storage • Interface
  • 10. OPTICAL • Heart of an optical sensor is a Charged Couple Device ( CCD): an array of light sensitive diodes called photosites which generate an electrical signal in response to light photons.
  • 11. Working • Photosite records pixels. • Ridges and valleys present on fingers are illuminated • CCD processor ensures a clear image is taken • Definition of the image is checked • Collectively pixels form an image • A to D Converter generates digital representation of image
  • 13. Frequency Change method • An oscillator that oscillates at a high frequency (usually 10 to 50 KHz), and uses a capacitor to oscillate.
  • 14. 555 multivibrator Capacitance of 10pF (Body capacitance is about 15pF) Note : We use a small capacitance of 10pF because the body capacitance is small as well, usually from 8 to 15 pF. So, the capacitor C must be around this value, so that the body capacitance will have a big influence to the overall capacitance.
  • 15. • The touch sensor is placed in parallel with this capacitor, or some times the touch sensor is the capacitor itself. • If the touch sensor is touched by a finger, then the body capacitance is connected in parallel to the sensor's capacitance.
  • 16. • As you may know, the overall capacitance of two capacitors connected in parallel is increased (connecting capacitors), and this causes the oscillating frequency to change (bigger capacitor means lower frequency).
  • 17. Before detecting touch After detecting touch
  • 18. • Using a digital comparator or any other method to sense this frequency change, one can determine if the touch pad is touched.
  • 19. The frequency comparator – • There are several ways to implement such a circuit. • One of them, is to convert the frequency into a DC voltage with a Frequency to Voltage converter, and compare it to a fixed DC voltage. This method is widely used in analog applications.
  • 20. The output stage – • A Schmidt trigger compares the output values from the frequency comparator & it’s output leads to the LED which glows when a touch is detected.
  • 21. Capacitive Voltage Divider method • This is another very interesting technique to implement a touch sensor. • The touch pad is directly connected to the Analog to Digital converter of a microcontroller. • Here is a rough diagram of the circuit:
  • 22. • The ADC module is internally driven to VDD, so that the capacitor used for the A/D conversion is fully charged • The analog input (sensor) is internally disconnected from the ground • The ADC module is internally connected to the Analog Input (sensor) • The analog input (sensor) is internally grounded, so that the sensor is fully discharged
  • 23. Internal capacitor will discharge part of its charge to the sensor (or human body). • At the end, both capacitors (the internal and the sensor) will have the same voltage across them. This voltage depends on the capacitance of the sensor.
  • 24. When the voltage is divided, it will be times smaller than the original charge of the internal capacitor.
  • 25. • So, immediately after step 4, the microcontroller starts an analog to digital conversion and reads the ADC module registers. • According to the voltage that it reads, it can be determined if the sensor is touched or not.
  • 26. • This method is extremely simple to implement with a microcontroller, because the only external part required is the sensor. It is completely improper to implement without a microcontroller.
  • 28. WHY DSP OVER MC • A programmable processor like the DSP can address all the processing needs of a biometric system while providing the most viable path to standards and feature upgrades. • A DSP allows the product to be small and portable while maintaining power-efficient performance all at a low overall system cost.
  • 29. • The DSP architecture is built to support complex mathematical algorithms that involve a significant amount of multiplication and addition. • The DSP executes the multiply/add feature in a single cycle (compared to multiple cycles for RISC processors) • In addition, the Harvard architecture of the DSP (multiple busses) allows instruction and operand fetches in the same cycle for increased speed of operation.
  • 31. GENERAL PURPOSE INPUT/OUTPUT (GPIO) • It is a generic pin on a chip whose behavior (including whether it is an input or output pin) can be controlled (programmed) by the user at run time. • GPIO pins have no special purpose defined, and go unused by default. The idea is that sometimes the system integrator building a full system that uses the chip might find it useful to have a handful of additional digital control lines, and having these available from the chip can save the hassle of having to arrange additional circuitry to provide them.
  • 32. THE SERIAL PERIPHERAL INTERFACE SPI-BUS • It is a simple 4-wire serial communications interface used by many microprocessor/microcontroller peripheral chips that enables the controllers and peripheral devices to communicate each other. Even though it is developed primarily for the communication between host processor and peripherals, a connection of two processors via SPI is just as well possible.
  • 34. • An SPI protocol specifies 4 signal wires. • Master Out Slave In (MOSI) - MOSI signal is generated by Master, recipient is the Slave. • Master In Slave Out (MISO) - Slaves generate MISO signals and recipient is the Master. • Serial Clock (SCLK or SCK) - SCLK signal is generated by the Master to synchronize data transfers between the master and the slave. • Slave Select (SS) from master to Chip Select (CS) of slave - SS signal is generated by Master to select individual slave/peripheral devices. The SS/CS is an active low signal.
  • 35. • The SPI bus, which operates at full duplex (means, signals carrying data can go in both directions simultaneously), is a synchronous type data link setup with a Master / Slave interface and can support up to 1 megabaud or 10Mbps of speed. Both single-master and multi-master protocols are possible in SPI.
  • 36. • To begin a communication, the bus master first configures the clock, using a frequency less than or equal to the maximum frequency the slave device supports. Such frequencies are commonly in the range of 1–100 MHz. • During each SPI clock cycle, a full duplex data transmission occurs: • the master sends a bit on the MOSI line; the slave reads it from that same line • the slave sends a bit on the MISO line; the master reads it from that same line
  • 37. A typical hardware setup using two shift registers to form an inter-chip circular buffer
  • 39.
  • 40. STORAGE ELEMENT • The function of the storage element is to store the enrolled template that is recalled to perform a match at the time of authentication. • DSPs have varying sizes of internal RAM to address the image processing and template extraction processes of the various biometric algorithms, along with read-only memory (ROM) for storing the constant parts of the programming code.
  • 41.
  • 42. LDO • A low-dropout or LDO regulator is a DC linear voltage regulator which can operate with a very small input–output differential voltage. • The advantages of a low dropout voltage include a lower minimum operating voltage, higher efficiency operation and lower heat dissipation.
  • 43. COMPONENTS OF LDO • The main components are a power FET and a differential amplifier (error amplifier). • There are two inputs to the differential amplifiers. • Low-dropout (LDO) regulators work in the same way as all linear voltage regulators. • The main difference between LDO and non- LDO regulators is their schematic topology.
  • 44. ESD PROTECTION • Electrostatic discharge (ESD) is the sudden flow of electricity between two objects caused by contact, an electrical short or dielectric breakdown. • . ESD can be caused by a buildup of static electricity by turbocharging, or by electrostatic induction.
  • 45. CHARACTERISTICS OF THE PROTECTION Extremely fast response time Low clamping and operating voltages Capacity to handle high peak ESD currents Ability to remain undamaged by repetitive ESD strikes Minimal size
  • 47. FUTURE PROSPECTS • Public Sector Application : eBorders, eID, and eGovernment. • Commercial Application : Enterprise Security, Information Transactions, Financial Transactions. • Technology Evolution : Secure Identity Core, Secure Mobility, Secure Credentials, and Secure Transactions.

Editor's Notes

  1. rahulvatsa90@gmail.com