SlideShare a Scribd company logo
1 of 19
𝐙𝐄𝐀𝐋
𝐈𝐍𝐒𝐓𝐈𝐓𝐔𝐓𝐄𝐒
𝙽𝙰𝚁𝙷𝙴 | 𝙿𝚄𝙽𝙴 | 𝙸𝙽𝙳𝙸𝙰
𝓡𝓮𝓭𝓮𝓯𝓲𝓷𝓰𝓲𝓷𝓰 𝓔𝔁𝓬𝓮𝓵𝓵𝓮𝓷𝓬𝓮
𝙹𝚄𝙽𝙸𝙾𝚁 𝙲𝙾𝙻𝙻𝙴𝙶𝙴 | 𝙸𝚃𝙸 | 𝙿𝙾𝙻𝚈𝚃𝙴𝙲𝙷𝙽𝙸𝙲 | 𝙴𝙽𝙶𝙸𝙽𝙴𝙴𝚁𝙸𝙽𝙶 | 𝙼𝙱𝙰 | 𝙼𝙲𝙰 | 𝙿𝚑.𝙳
www.zealeducation.com
FINGERPRINT
AUTHENTICATION
INTRODUCTION
Fingerprint authentication refers to the automated method of verifying a match between two
human fingerprint. Fingerprint are one of many forms of biometrics used to identify
individual and verify their identity.
The fingerprints have been used as a mean for identifying individual for a long time because
the fingerprint are unique and stay unchanged through out an individual life time.
This type of identification technology is more reliable, secure and effictive and uses human
physiological processes and behaviours to identifying users’ ID. This biometric-security
system is human-oriented system and is more accurate than the traditional password-based
systems. This authentication is used in many of the online transactions, confidential
financial dealings, industries, offices, institutes, colleges and security access control
systems.
A wide variety of finger print devices are available in the market today that varies in cost
and method of matching fingers mostly involving one or whole five fingers of the hand. There
are various approaches for matching the fingers like matching finger print minutiae,
straight pattern matching and ultrasonic patterns.
CONTENT
o Objectives
o What is Fingerprint?
o What is Fingerprint Authentication?
o System Overview
o Hardware
o How it Works?
o Future Scope
o Summary
o Refrence
OBJECTIVES
o The aim is to capture an item of biometric data from this person.
o It can be a photo of their or an image of their fingerprint.
o This data is then compared to the biometric data of several other persons kept in a
database.
o It will create profitable growth by assuming a leading position in selected
segments, and being recognized as a supplier of solutions with a very high level of
security.
o In the mobile industry, the most important strategic priority is to expand the
product portfolio to defend and capitalize on the company’s strong position.
What is Fingerprint?
The fingerprints are unique, don't change in the time and are different also
in identical twins.
Also this technology has some limits: excessively damp or dry skin can
compromise the systems performances, sometimes fingerprints are not usable
because of cuts or scars, besides they have an ugly impact on the user, for
the association that is done between the figure of the criminal and the
fingerprints.
Such technology is the more common even if it is not easy to be implemented
for big computational cost and request resources.
What is Fingerprint Authentication?
Fingerprint Authentication is the act of verifying an individual’s identity based on one or
more of their fingerprints. The concept has been leveraged for decades across various efforts
including digital identity, criminal justice, financial services, and border protections.
Fingerprint authentication or scanning is a form of biometric technology enables users to
access online services using images of their fingerprint. The biometric scan commonly relies
on mobile and other device native sensing technology, as this has all but eclipsed software,
third-party biometric algorithms. Some fingerprint scan solutions are architected in a
decentralized model such as FIDO (Fast Identity Online) that ensures a user’s fingerprint
template is secured on the user’s device. Here, a user’s fingerprint scan is verified locally
against itself, a token is sent to the service provider, and access is granted. The biometric
authentication takes place locally, and the biometric data itself is not stored at the
service provider.
Other fingerprint scan solutions are architected in a legacy centralized scheme in which user
templates are stored at the service provider, and matching is done against a library of all
other users’ biometrics.
These systems are commonplace in criminal justice, border protection, and national security
settings. Lastly, some fingerprint scan systems rely on specialized hardware found at the
point of care, access, or sale.
System Overview
The basic fingerprint recognition system consists of four stages:
firstly, the sensor which is used for enrolment & recognition to
capture the biometric data.
Secondly, the pre-processing stage which is used to remove unwanted
data and increase the clarity of ridge structure by using enhancement
technique.
Thirdly, feature extraction stage which take the input from the output
of the pre-processing stage to extract the fingerprint features.
Fourthly, the matching stage is to compare the acquired feature with
the template in the database.
Finally, the database which stores the features for the matching
stags. The aim of this paper is to review various recently work on
fingerprint recognition system and explain fingerprint recognition
stages step by step and give summaries of fingerprint databases with
characteristics.
How it Works?
Users can log on, lock, and unlock AccessAgent with fingerprint only. Users must scan
their fingerprint into the fingerprint reader. Users might scan their finger on any of
the following screens:
o Welcome screen
o Log on screen
o Sign up screen
o Reset password screen
This process results to a fingerprint registration template and the template is stored
in the IMS Server database. This registration template can be cached on the computer
running AccessAgent.
When the users scan their registered fingerprints, the fingerprint reference templates
are compared to each cached fingerprint registration templates. If the template is not
found, the users are prompted for their ISAM ESSO username. The username and reference
template are authenticated against the IMS Server database.
Essentially, biometric access control systems record biological data
from human beings.
They have scanners equipped to them, which collects all of this data.
For example, there’s a fingerprint scanner that analyzes one of your
fingerprints and keeps them in a data file.
You then choose who you want to have access to whatever’s behind
the access control system, and register their fingerprints.
Now, when you go to open the door, you scan your finger.
The system analyzes the print and sees if it matches one in the
database. If it does, then the access control opens up and lets you in.
If there’s no match, then access is denied.
Of course, fingerprints are just one of many examples in biometric
access control.
However, they’re the most common form of biometrics as it’s easy and
convenient to scan a print.
The frequent usage of weak passwords such as “changename",“123abc”, and “Pa$$w0rd” are a
strong indicator that enterprise organizations might be well-advised to consider a shift to
new mechanisms for secure authentication that are more resistant to subversion by careless
end-users.
Weak passwords are a problem because they are easy to guess – and they are certainly no
match for brute-force password attacks by criminals using automated password cracking
software such as John the Ripper.
One way to beef up the security of your authentication process is to force users to create
long, complex passwords, but such enforcement comes at the risk of employees writing the
passwords down – thereby defeating the attempt to increase security.
Fingerprint image systems today use different technology—optical, ultrasonic, capacitive, or
thermal—to measure the physical difference between ridges and valleys. The machinery can be
grouped into two major families: solid-state fingerprint readers and optical fingerprint
readers. The real problem is that people are soft, so each image is distorted by pressure,
skin condition, temperature, and other sampling noises.To overcome these problems we now use
noncontact three-dimensional fingerprint scanners. The images are now digital. We are very
good at high-resolution image processing today that can be adjusted by comparing the distances
between ridges to get a scale, and distorted back to the original shape.Since fingerprints are
used for security and access, these systems typically use a template that was previously
stored and a candidate fingerprint.The algorithm finds one or more points in the fingerprint
image and aligns the candidate fingerprint image to it. This information is local to the
hardware and it is not meant for data exchange. Big Data databases take time for matching, so
we try to optimize things with algorithms and database hardware; current hardware matches
around 1,000 fingerprints per second.
Hardware
o Security – security-wise, it is a vast improvement on passwords and identity
cards. Fingerprints are much harder to fake, they also change very little
over a lifetime, so the data remains current for much longer than photos and
passwords.
o Ease of use – for the user they are simple and easy to use. No more
struggling to remember your last password or being locked out due to leaving
your photo ID at home. Your fingerprints are always with you.
o Non-transferable – fingerprints are non-transferrable, ruling out the sharing
of passwords or ‘clocking in’ on behalf of another colleague. This allows for
more accurate tracking of workforce and provides additional security against
the theft of sensitive materials.
o Cost effective – from a technology management perspective, fingerprint
recognition is now a cost-effective security solution. Small hand-held
scanners are easy to set up and benefit from a high level of accuracy.
Advantages
o System failures – Scanners are subject to the same technical failures and
limitations as all other electronic identification systems such as power
outages, errors and environmental factors.
o Cost – It is true that fingerprint recognition systems are more cost
effective than ever, but for smaller organisations the cost of
implementation and maintenance can still be a barrier to
implementation. This disadvantage is lessening as devices become more cost
effective and affordable.
o Exclusions – while fingerprints remain relatively stable over
a person’s lifetime there are sections of the population that will be
excluded from using the system. For example, older people with a history of
manual work may struggle to register worn prints into a system or people
who have suffered the loss of fingers or hands would be excluded.
•
Disadvantages
Future Scope
The Global Fingerprint Sensor Market is projected to grow at a healthy growth
rate from 2020 to 2024 according to new research. The study focuses on market
trends, leading players, supply chain trends, technological innovations, key
developments, and future strategies.BusinessIndustryReports have new report
spread across 96 pages is an overview of the Global Fingerprint Sensor Market
Report 2020.
Biometric verification is gaining a lot of popularity among the public security
systems as well as in the commercial market.
In our daily life, we witness the use of biometric in so many places such as the
digital attendance system at offices, security checkpoints at airports, Wearable
Tech Gadgets retrieving our biological information, and even our national ID
cards aka Aadhaar cards are created using biometrics technology.
In fact, this national ID program holds the largest biometric database in the
world.
Biometric authentication regimes can solve important problems within your company's
SCADA (Supervisory control and data acquisition) security system, but they are not
helpful in all situations, and they present the system administrator with unique issues
and risks. In a SCADA security network, biometric components are useful only at the
edges of the network where people interact with the SCADA security and where secure
facilities and equipment need authorized access. The variety of biometric readings, both
invasive and remote, demonstrates that biometric security can meet a wide array of
priorities within your overall security program.
However, each biometric authentication capture device provides its own set of choices,
such as whether it is more important to your company to allow ready access in an
emergency or whether it is more important take extreme steps to exclude any unauthorized
people from accessing secure facilities.
These devices are not foolproof and can be beaten at a number of different points of
vulnerability, including tricking the scanners or reworking the system software. Storage
and protection of biometric samples can also be hazardous. Finally, biometric systems
are not yet so widespread that the law and regulations for biometric capture can be
expected to remain constant over the several years of your company's investment in these
systems.
SUMMARY
• Fingerprint Authentication
• How Does Biometric Authentication Work?
• Biometric fingerprint scanners
• Biometric Sensors
• How Fingerprinting Works
• Fingerprint Security
• Fingerprint Security Future Scope
Refrence
TEAM
Viren Manik
Nivangune
TE-B
T212026
SAWANT SUDARSHAN
SANJAYKUMAR
TE-B
T212049
Aditya Mahendra
Shelar
TE-B
T212054
Guided By
Mr. Sachin M Kolekar Sir
Department of Computer Engineering
Thank You

More Related Content

Similar to Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protectionMigrant Systems
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 

Similar to Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint (20)

Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Seetu
SeetuSeetu
Seetu
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 

Recently uploaded

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 

Recently uploaded (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint

  • 1. 𝐙𝐄𝐀𝐋 𝐈𝐍𝐒𝐓𝐈𝐓𝐔𝐓𝐄𝐒 𝙽𝙰𝚁𝙷𝙴 | 𝙿𝚄𝙽𝙴 | 𝙸𝙽𝙳𝙸𝙰 𝓡𝓮𝓭𝓮𝓯𝓲𝓷𝓰𝓲𝓷𝓰 𝓔𝔁𝓬𝓮𝓵𝓵𝓮𝓷𝓬𝓮 𝙹𝚄𝙽𝙸𝙾𝚁 𝙲𝙾𝙻𝙻𝙴𝙶𝙴 | 𝙸𝚃𝙸 | 𝙿𝙾𝙻𝚈𝚃𝙴𝙲𝙷𝙽𝙸𝙲 | 𝙴𝙽𝙶𝙸𝙽𝙴𝙴𝚁𝙸𝙽𝙶 | 𝙼𝙱𝙰 | 𝙼𝙲𝙰 | 𝙿𝚑.𝙳 www.zealeducation.com
  • 3. INTRODUCTION Fingerprint authentication refers to the automated method of verifying a match between two human fingerprint. Fingerprint are one of many forms of biometrics used to identify individual and verify their identity. The fingerprints have been used as a mean for identifying individual for a long time because the fingerprint are unique and stay unchanged through out an individual life time. This type of identification technology is more reliable, secure and effictive and uses human physiological processes and behaviours to identifying users’ ID. This biometric-security system is human-oriented system and is more accurate than the traditional password-based systems. This authentication is used in many of the online transactions, confidential financial dealings, industries, offices, institutes, colleges and security access control systems. A wide variety of finger print devices are available in the market today that varies in cost and method of matching fingers mostly involving one or whole five fingers of the hand. There are various approaches for matching the fingers like matching finger print minutiae, straight pattern matching and ultrasonic patterns.
  • 4. CONTENT o Objectives o What is Fingerprint? o What is Fingerprint Authentication? o System Overview o Hardware o How it Works? o Future Scope o Summary o Refrence
  • 5. OBJECTIVES o The aim is to capture an item of biometric data from this person. o It can be a photo of their or an image of their fingerprint. o This data is then compared to the biometric data of several other persons kept in a database. o It will create profitable growth by assuming a leading position in selected segments, and being recognized as a supplier of solutions with a very high level of security. o In the mobile industry, the most important strategic priority is to expand the product portfolio to defend and capitalize on the company’s strong position.
  • 6. What is Fingerprint? The fingerprints are unique, don't change in the time and are different also in identical twins. Also this technology has some limits: excessively damp or dry skin can compromise the systems performances, sometimes fingerprints are not usable because of cuts or scars, besides they have an ugly impact on the user, for the association that is done between the figure of the criminal and the fingerprints. Such technology is the more common even if it is not easy to be implemented for big computational cost and request resources.
  • 7. What is Fingerprint Authentication? Fingerprint Authentication is the act of verifying an individual’s identity based on one or more of their fingerprints. The concept has been leveraged for decades across various efforts including digital identity, criminal justice, financial services, and border protections. Fingerprint authentication or scanning is a form of biometric technology enables users to access online services using images of their fingerprint. The biometric scan commonly relies on mobile and other device native sensing technology, as this has all but eclipsed software, third-party biometric algorithms. Some fingerprint scan solutions are architected in a decentralized model such as FIDO (Fast Identity Online) that ensures a user’s fingerprint template is secured on the user’s device. Here, a user’s fingerprint scan is verified locally against itself, a token is sent to the service provider, and access is granted. The biometric authentication takes place locally, and the biometric data itself is not stored at the service provider. Other fingerprint scan solutions are architected in a legacy centralized scheme in which user templates are stored at the service provider, and matching is done against a library of all other users’ biometrics. These systems are commonplace in criminal justice, border protection, and national security settings. Lastly, some fingerprint scan systems rely on specialized hardware found at the point of care, access, or sale.
  • 8. System Overview The basic fingerprint recognition system consists of four stages: firstly, the sensor which is used for enrolment & recognition to capture the biometric data. Secondly, the pre-processing stage which is used to remove unwanted data and increase the clarity of ridge structure by using enhancement technique. Thirdly, feature extraction stage which take the input from the output of the pre-processing stage to extract the fingerprint features. Fourthly, the matching stage is to compare the acquired feature with the template in the database. Finally, the database which stores the features for the matching stags. The aim of this paper is to review various recently work on fingerprint recognition system and explain fingerprint recognition stages step by step and give summaries of fingerprint databases with characteristics.
  • 9. How it Works? Users can log on, lock, and unlock AccessAgent with fingerprint only. Users must scan their fingerprint into the fingerprint reader. Users might scan their finger on any of the following screens: o Welcome screen o Log on screen o Sign up screen o Reset password screen This process results to a fingerprint registration template and the template is stored in the IMS Server database. This registration template can be cached on the computer running AccessAgent. When the users scan their registered fingerprints, the fingerprint reference templates are compared to each cached fingerprint registration templates. If the template is not found, the users are prompted for their ISAM ESSO username. The username and reference template are authenticated against the IMS Server database.
  • 10. Essentially, biometric access control systems record biological data from human beings. They have scanners equipped to them, which collects all of this data. For example, there’s a fingerprint scanner that analyzes one of your fingerprints and keeps them in a data file. You then choose who you want to have access to whatever’s behind the access control system, and register their fingerprints. Now, when you go to open the door, you scan your finger. The system analyzes the print and sees if it matches one in the database. If it does, then the access control opens up and lets you in. If there’s no match, then access is denied. Of course, fingerprints are just one of many examples in biometric access control. However, they’re the most common form of biometrics as it’s easy and convenient to scan a print.
  • 11. The frequent usage of weak passwords such as “changename",“123abc”, and “Pa$$w0rd” are a strong indicator that enterprise organizations might be well-advised to consider a shift to new mechanisms for secure authentication that are more resistant to subversion by careless end-users. Weak passwords are a problem because they are easy to guess – and they are certainly no match for brute-force password attacks by criminals using automated password cracking software such as John the Ripper. One way to beef up the security of your authentication process is to force users to create long, complex passwords, but such enforcement comes at the risk of employees writing the passwords down – thereby defeating the attempt to increase security.
  • 12. Fingerprint image systems today use different technology—optical, ultrasonic, capacitive, or thermal—to measure the physical difference between ridges and valleys. The machinery can be grouped into two major families: solid-state fingerprint readers and optical fingerprint readers. The real problem is that people are soft, so each image is distorted by pressure, skin condition, temperature, and other sampling noises.To overcome these problems we now use noncontact three-dimensional fingerprint scanners. The images are now digital. We are very good at high-resolution image processing today that can be adjusted by comparing the distances between ridges to get a scale, and distorted back to the original shape.Since fingerprints are used for security and access, these systems typically use a template that was previously stored and a candidate fingerprint.The algorithm finds one or more points in the fingerprint image and aligns the candidate fingerprint image to it. This information is local to the hardware and it is not meant for data exchange. Big Data databases take time for matching, so we try to optimize things with algorithms and database hardware; current hardware matches around 1,000 fingerprints per second. Hardware
  • 13. o Security – security-wise, it is a vast improvement on passwords and identity cards. Fingerprints are much harder to fake, they also change very little over a lifetime, so the data remains current for much longer than photos and passwords. o Ease of use – for the user they are simple and easy to use. No more struggling to remember your last password or being locked out due to leaving your photo ID at home. Your fingerprints are always with you. o Non-transferable – fingerprints are non-transferrable, ruling out the sharing of passwords or ‘clocking in’ on behalf of another colleague. This allows for more accurate tracking of workforce and provides additional security against the theft of sensitive materials. o Cost effective – from a technology management perspective, fingerprint recognition is now a cost-effective security solution. Small hand-held scanners are easy to set up and benefit from a high level of accuracy. Advantages
  • 14. o System failures – Scanners are subject to the same technical failures and limitations as all other electronic identification systems such as power outages, errors and environmental factors. o Cost – It is true that fingerprint recognition systems are more cost effective than ever, but for smaller organisations the cost of implementation and maintenance can still be a barrier to implementation. This disadvantage is lessening as devices become more cost effective and affordable. o Exclusions – while fingerprints remain relatively stable over a person’s lifetime there are sections of the population that will be excluded from using the system. For example, older people with a history of manual work may struggle to register worn prints into a system or people who have suffered the loss of fingers or hands would be excluded. • Disadvantages
  • 15. Future Scope The Global Fingerprint Sensor Market is projected to grow at a healthy growth rate from 2020 to 2024 according to new research. The study focuses on market trends, leading players, supply chain trends, technological innovations, key developments, and future strategies.BusinessIndustryReports have new report spread across 96 pages is an overview of the Global Fingerprint Sensor Market Report 2020. Biometric verification is gaining a lot of popularity among the public security systems as well as in the commercial market. In our daily life, we witness the use of biometric in so many places such as the digital attendance system at offices, security checkpoints at airports, Wearable Tech Gadgets retrieving our biological information, and even our national ID cards aka Aadhaar cards are created using biometrics technology. In fact, this national ID program holds the largest biometric database in the world.
  • 16. Biometric authentication regimes can solve important problems within your company's SCADA (Supervisory control and data acquisition) security system, but they are not helpful in all situations, and they present the system administrator with unique issues and risks. In a SCADA security network, biometric components are useful only at the edges of the network where people interact with the SCADA security and where secure facilities and equipment need authorized access. The variety of biometric readings, both invasive and remote, demonstrates that biometric security can meet a wide array of priorities within your overall security program. However, each biometric authentication capture device provides its own set of choices, such as whether it is more important to your company to allow ready access in an emergency or whether it is more important take extreme steps to exclude any unauthorized people from accessing secure facilities. These devices are not foolproof and can be beaten at a number of different points of vulnerability, including tricking the scanners or reworking the system software. Storage and protection of biometric samples can also be hazardous. Finally, biometric systems are not yet so widespread that the law and regulations for biometric capture can be expected to remain constant over the several years of your company's investment in these systems. SUMMARY
  • 17. • Fingerprint Authentication • How Does Biometric Authentication Work? • Biometric fingerprint scanners • Biometric Sensors • How Fingerprinting Works • Fingerprint Security • Fingerprint Security Future Scope Refrence
  • 18. TEAM Viren Manik Nivangune TE-B T212026 SAWANT SUDARSHAN SANJAYKUMAR TE-B T212049 Aditya Mahendra Shelar TE-B T212054 Guided By Mr. Sachin M Kolekar Sir Department of Computer Engineering