SlideShare a Scribd company logo
Fingerprint Recognition
Represented by:Represented by:
Karam ButtKaram Butt
Rana YasirRana Yasir
Tahzeeb AhmadTahzeeb Ahmad
Presented to:Presented to:
Mam IqraMam Iqra
OUTLINEOUTLINE
• Introduction to biometricsIntroduction to biometrics
• FingerprintFingerprint
• What is Fingerprint Recognition?What is Fingerprint Recognition?
• Fingerprint recognition systemFingerprint recognition system
• AdvantagesAdvantages
• DisadvantagesDisadvantages
• ApplicationsApplications
• ConclusionConclusion
BIOMETRICSBIOMETRICS
• Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and
analyzing biological dataanalyzing biological data
• Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze
human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye
retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand
measurements, for authentication purposes.measurements, for authentication purposes.
• The two categories of biometric identifiers include :The two categories of biometric identifiers include :
physiological characteristics.physiological characteristics.
behavioral characteristics.behavioral characteristics.
 PhysiologicalPhysiological characteristics :characteristics :
FingerprintFingerprint
face recognitionface recognition
DNADNA
palm printpalm print
hand geometryhand geometry
iris recognition(which has largely replacediris recognition(which has largely replaced
retina)retina)
Odour /scent.Odour /scent.
 BehavioralBehavioral characteristics :characteristics :
GaitGait
voicevoice
FINGERPRINTFINGERPRINT
• A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger.
• It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in
the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip.
• Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of
a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge
characteristics and their relationshipscharacteristics and their relationships
• These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
• Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.
• The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are
1) ridge ending and1) ridge ending and
2) ridge bifurcation.2) ridge bifurcation.
Fig 1. A fingerprint image acquired by an Optical
Sensor
• A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends
abruptly.abruptly.
• A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where
a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges.
Fig 2.ridge and valley
WHAT IS FINGERPRINTWHAT IS FINGERPRINT
RECOGNITION?RECOGNITION?
• Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as
dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and
known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if
the impressions are from the same finger or palm.the impressions are from the same finger or palm.
• The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into
two sub-domains:two sub-domains:
Fingerprint verification :Fingerprint verification :
Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one
person by his fingerprint.person by his fingerprint.
Fingerprint identification:Fingerprint identification:
Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity
by his fingerprint(s).by his fingerprint(s).
Fig 3.Verification vs. Identification
FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION
SYSTEMSYSTEM
• Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages:
(i) Fingerprint acquiring device(i) Fingerprint acquiring device
(ii) Minutia extraction and(ii) Minutia extraction and
(iii) Minutia matching(iii) Minutia matching
Fig 4. Fingerprint recognition system
1.Fingerprint acquisition:1.Fingerprint acquisition:
For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct
sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and
acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the
user’s finger is too dirty or dry.user’s finger is too dirty or dry.
2.Minutia extractor :2.Minutia extractor :
To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach
is widely used by researchers which areis widely used by researchers which are
 preprocessingpreprocessing
 minutia extraction andminutia extraction and
 post processing stage.post processing stage.
Fig 5.Minutia extractor
• For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage:
Image enhancementImage enhancement
Image binarizationImage binarization
Image segmentationImage segmentation
• The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two
operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,.
• In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and
bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and
bifurcations.bifurcations.
3.Minutiae Matching:3.Minutiae Matching:
• Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved
with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a
pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of
fingerprint images.fingerprint images.
• The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference
minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first.
• If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned
and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
ADVANTAGESADVANTAGES
 Very high accuracy.Very high accuracy.
 Easy to use.Easy to use.
 Small storage space required for the biometric template.Small storage space required for the biometric template.
  
DISADVANTAGESDISADVANTAGES
 Dirt , grime and wounds .Dirt , grime and wounds .
 Placement of finger.Placement of finger.
 Can be spoofed .Can be spoofed .
APPLICATIONSAPPLICATIONS
 Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction
 Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)
 Information System SecurityInformation System Security
 National ID SystemsNational ID Systems
 Passport control (INSPASS)Passport control (INSPASS)
 Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control
 VotingVoting
 Identification of CriminalsIdentification of Criminals
 Identification of missing childrenIdentification of missing children
 Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
CONCLUSIONCONCLUSION
• The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate
and fast in minutia extraction.and fast in minutia extraction.
• The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted
regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further
processing.processing.
• This is a very important property because suchThis is a very important property because such
unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted
fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to
minutiae extraction.minutiae extraction.
Finger print recognition

More Related Content

What's hot

Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
varsha mohite
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
Piyush Mittal
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
Abhineet Bhamra
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
Mazin Alwaaly
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
Sandeep Kumar Panda
 
Fingerprint
FingerprintFingerprint
Fingerprint
Neeraj Gupta
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithm
Fatima Akhtar
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
Nikhil Hubballi
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
Usman Siddique
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
Tushar Kayande
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
Piyush Mittal
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 

What's hot (20)

Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithm
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 

Viewers also liked

Fingerprint
FingerprintFingerprint
Fingerprint
badaniparamesh
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
rajarose89
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
123456chan
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint Identification
IJASCSE
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint Individualization
Rmcauley
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
Mesbah Uddin Khan
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
Nabila mahjabin
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
Adit Group
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -com
Zhuo Zhang
 
Ppt1
Ppt1Ppt1
Report finger print
Report finger printReport finger print
Report finger print
Eshaan Verma
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranform
vishakhmarari
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
Alpesh Kurhade
 
"Memristor" by mahadev desai
"Memristor" by mahadev desai "Memristor" by mahadev desai
"Memristor" by mahadev desai
desaimv
 
Finger Print
Finger PrintFinger Print
Finger Print
Imran Baig
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
Jury Rocamora
 
finger prints
finger printsfinger prints
finger prints
Bhuvana Sundar
 
Memristor
MemristorMemristor
Memristor
mangal das
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
Eswar Publications
 

Viewers also liked (20)

Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint Identification
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint Individualization
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -com
 
Ppt1
Ppt1Ppt1
Ppt1
 
Report finger print
Report finger printReport finger print
Report finger print
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranform
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
"Memristor" by mahadev desai
"Memristor" by mahadev desai "Memristor" by mahadev desai
"Memristor" by mahadev desai
 
Finger Print
Finger PrintFinger Print
Finger Print
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
finger prints
finger printsfinger prints
finger prints
 
Memristor
MemristorMemristor
Memristor
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 

Similar to Finger print recognition

Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
sahoosabyasachi000
 
Biometrics
Biometrics Biometrics
Biometrics
Rana Bilal
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
SureshKumarMaurya5
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
biomatric system
biomatric systembiomatric system
biomatric system
Nimra Pervaiz
 
Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
AlenJames14
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
IOSR Journals
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
sathish sak
 
BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
Dhaval Patel
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 

Similar to Finger print recognition (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Seminar
SeminarSeminar
Seminar
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Finger print recognition

  • 1. Fingerprint Recognition Represented by:Represented by: Karam ButtKaram Butt Rana YasirRana Yasir Tahzeeb AhmadTahzeeb Ahmad Presented to:Presented to: Mam IqraMam Iqra
  • 2. OUTLINEOUTLINE • Introduction to biometricsIntroduction to biometrics • FingerprintFingerprint • What is Fingerprint Recognition?What is Fingerprint Recognition? • Fingerprint recognition systemFingerprint recognition system • AdvantagesAdvantages • DisadvantagesDisadvantages • ApplicationsApplications • ConclusionConclusion
  • 3. BIOMETRICSBIOMETRICS • Biometrics is the science and technology of measuring andBiometrics is the science and technology of measuring and analyzing biological dataanalyzing biological data • Biometrics refers to technologies that measure and analyzeBiometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eyehuman body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns ,facial patterns and handretinas and irises, voice patterns ,facial patterns and hand measurements, for authentication purposes.measurements, for authentication purposes. • The two categories of biometric identifiers include :The two categories of biometric identifiers include : physiological characteristics.physiological characteristics. behavioral characteristics.behavioral characteristics.
  • 4.  PhysiologicalPhysiological characteristics :characteristics : FingerprintFingerprint face recognitionface recognition DNADNA palm printpalm print hand geometryhand geometry iris recognition(which has largely replacediris recognition(which has largely replaced retina)retina) Odour /scent.Odour /scent.  BehavioralBehavioral characteristics :characteristics : GaitGait voicevoice
  • 5. FINGERPRINTFINGERPRINT • A fingerprint is the feature pattern of one finger.A fingerprint is the feature pattern of one finger. • It is the pattern of ridges and valleys (also called furrows inIt is the pattern of ridges and valleys (also called furrows in the fingerprint literature) on the surface of a fingertip.the fingerprint literature) on the surface of a fingertip. • Each individual has unique fingerprints so the uniqueness ofEach individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by the local ridgea fingerprint is exclusively determined by the local ridge characteristics and their relationshipscharacteristics and their relationships • These local ridge characteristics are not evenly distributed.These local ridge characteristics are not evenly distributed.
  • 6. • Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges.Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges. • The two most prominent local ridge characteristics, called minutiae, areThe two most prominent local ridge characteristics, called minutiae, are 1) ridge ending and1) ridge ending and 2) ridge bifurcation.2) ridge bifurcation. Fig 1. A fingerprint image acquired by an Optical Sensor
  • 7. • A ridge ending is defined as the point where a ridge endsA ridge ending is defined as the point where a ridge ends abruptly.abruptly. • A ridge bifurcation is defined as the point whereA ridge bifurcation is defined as the point where a ridge forks or diverges into branch ridges.a ridge forks or diverges into branch ridges. Fig 2.ridge and valley
  • 8. WHAT IS FINGERPRINTWHAT IS FINGERPRINT RECOGNITION?RECOGNITION? • Fingerprint recognition (sometimes referred to asFingerprint recognition (sometimes referred to as dactyloscopy) is the process of comparing questioned anddactyloscopy) is the process of comparing questioned and known fingerprint against another fingerprint to determine ifknown fingerprint against another fingerprint to determine if the impressions are from the same finger or palm.the impressions are from the same finger or palm.
  • 9. • The fingerprint recognition problem can be grouped intoThe fingerprint recognition problem can be grouped into two sub-domains:two sub-domains: Fingerprint verification :Fingerprint verification : Fingerprint verification is to verify the authenticity of oneFingerprint verification is to verify the authenticity of one person by his fingerprint.person by his fingerprint. Fingerprint identification:Fingerprint identification: Fingerprint identification is to specify one person’s identityFingerprint identification is to specify one person’s identity by his fingerprint(s).by his fingerprint(s).
  • 10. Fig 3.Verification vs. Identification
  • 11. FINGERPRINT RECOGNITIONFINGERPRINT RECOGNITION SYSTEMSYSTEM • Fingerprint recognition system operates in three stages:Fingerprint recognition system operates in three stages: (i) Fingerprint acquiring device(i) Fingerprint acquiring device (ii) Minutia extraction and(ii) Minutia extraction and (iii) Minutia matching(iii) Minutia matching Fig 4. Fingerprint recognition system
  • 12. 1.Fingerprint acquisition:1.Fingerprint acquisition: For fingerprint acquisition, optical or semi-conductFor fingerprint acquisition, optical or semi-conduct sensors are widely used. They have high efficiency andsensors are widely used. They have high efficiency and acceptable accuracy except for some cases that theacceptable accuracy except for some cases that the user’s finger is too dirty or dry.user’s finger is too dirty or dry. 2.Minutia extractor :2.Minutia extractor : To implement a minutia extractor, a three-stage approachTo implement a minutia extractor, a three-stage approach is widely used by researchers which areis widely used by researchers which are  preprocessingpreprocessing  minutia extraction andminutia extraction and  post processing stage.post processing stage.
  • 14. • For the fingerprint image preprocessing stage:For the fingerprint image preprocessing stage: Image enhancementImage enhancement Image binarizationImage binarization Image segmentationImage segmentation • The job of minutiae extraction closes down to twoThe job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking,.operations: Ridge Thinning, Minutiae Marking,. • In post-processing stage, false minutia are removed andIn post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations andbifurcations is proposed to unify terminations and bifurcations.bifurcations.
  • 15. 3.Minutiae Matching:3.Minutiae Matching: • Generally, an automatic fingerprint verification is achievedGenerally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching)instead of awith minutia matching (point pattern matching)instead of a pixel-wise matching or a ridge pattern matching ofpixel-wise matching or a ridge pattern matching of fingerprint images.fingerprint images. • The minutia matcher chooses any two minutia as a referenceThe minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first.minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are alignedIf the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.and matching is conducted for all remaining minutia.
  • 16. ADVANTAGESADVANTAGES  Very high accuracy.Very high accuracy.  Easy to use.Easy to use.  Small storage space required for the biometric template.Small storage space required for the biometric template.   
  • 17. DISADVANTAGESDISADVANTAGES  Dirt , grime and wounds .Dirt , grime and wounds .  Placement of finger.Placement of finger.  Can be spoofed .Can be spoofed .
  • 18. APPLICATIONSAPPLICATIONS  Banking Security - ATM security, card transactionBanking Security - ATM security, card transaction  Physical Access Control (e.g. Airport)Physical Access Control (e.g. Airport)  Information System SecurityInformation System Security  National ID SystemsNational ID Systems  Passport control (INSPASS)Passport control (INSPASS)  Prisoner, prison visitors, inmate controlPrisoner, prison visitors, inmate control  VotingVoting  Identification of CriminalsIdentification of Criminals  Identification of missing childrenIdentification of missing children  Secure E-Commerce (Still under research)Secure E-Commerce (Still under research)
  • 19. CONCLUSIONCONCLUSION • The implemented minutia extraction algorithm is accurateThe implemented minutia extraction algorithm is accurate and fast in minutia extraction.and fast in minutia extraction. • The algorithm also identifies the unrecoverable corruptedThe algorithm also identifies the unrecoverable corrupted regions in the fingerprint and removes them from furtherregions in the fingerprint and removes them from further processing.processing. • This is a very important property because suchThis is a very important property because such unrecoverable regions do appear in some of the corruptedunrecoverable regions do appear in some of the corrupted fingerprint images and they are extremely harmful tofingerprint images and they are extremely harmful to minutiae extraction.minutiae extraction.