SlideShare a Scribd company logo
1 of 15
FINGERPRINT:FINGER BIOMETRICS
by Rajasekaran.T
INTRODUCTION
 Fingerprinting was first created by Dr.
Henry Fault, a British surgeon in 1882.
 It based on “KEY”.
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
 Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
 Whorl-Ridges form circularly around a central point on
the finger.
Arch Loop Whorl
Sales
Loop
whorl
Arch
The human population has fingerprints in the following
percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
population
Loop
Whorl
Arch
Whorl
1.Double Loop
Whorl.
2.Plan whorl.
3.Central.
pocket Loop whorl.
4.Accidental whorl.
Loop
1.Uinar Loop.
2.Radial Loop.
Arch
1.Plain Arch.
2.Tented Arch.
Different Identification on Fingerprint
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two
spaces
Delta: space between ridges
Pore: human pore
Bifurcation Bridge Dot Double bifurcation
Opposed
bifurcation
Island (short
ridge)
Hook (spur) Lake (enclosure)
Ridge crossing Ridge ending Trifurcation
Opposed
bifurcation/ridge
ending)
Fingerprint matching techniques
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
 The correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
Two main technologies used to capture image of the fingerprint
Optical sensor – use light refracted through a prism. An optical sensor
based reader uses light to read and acquire fingerprint images. Optical
sensors can be affected by a number of real life factors such as stray
light, surface contamination or even prior fingerprint impressions
present on the sensor surface. Hence it is essential to clean the
fingerprint reader glass on a regular basis for optimal performance.
Capacitive sensor – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint
and capture the image. As sensors apply a small voltage to the finger, a
real fingerprint is required rather than a visual impression of it. This
technique makes the fingerprint reader more reliable as it becomes
harder to fake enrolment.
Image Processing
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged
areas, removing extraneous artifacts and healing most scars, cuts and
breaks.
Bio-Link SDK
Advantage of Fingerprint:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. Easy to use.
d. Small storage space required for the biometric template, reducing the
size of the database memory required
e. It is standardized.
Disadvantage of Fingerprint:
a. For some people it is very intrusive, because is still related to criminal
identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well
as with the age (is not appropriate with children, because the size of their
fingerprint changes quickly).
-THANK YOU-

More Related Content

What's hot

Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Fingerprints
FingerprintsFingerprints
Fingerprintsabelts
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemShakti Patil
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Alternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptxAlternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptxApplied Forensic Research Sciences
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writtingShanmukhaValli3
 
Fingerprints
FingerprintsFingerprints
Fingerprintsmpattani
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Alok Yadav
 

What's hot (20)

Seal impressions
Seal impressionsSeal impressions
Seal impressions
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
POROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPYPOROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPY
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Alternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptxAlternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptx
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 

Similar to Fingerprint presentation

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27s1170050
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprintsMazin Alwaaly
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Workoceanflying
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workoceanflying
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners works1180002
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2Haruki0428
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Workss1190017
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2s1190089
 

Similar to Fingerprint presentation (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Seminar
SeminarSeminar
Seminar
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
 
If2615981604
If2615981604If2615981604
If2615981604
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Fingerprint presentation

  • 2. INTRODUCTION  Fingerprinting was first created by Dr. Henry Fault, a British surgeon in 1882.  It based on “KEY”.
  • 3. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl-Ridges form circularly around a central point on the finger. Arch Loop Whorl
  • 4. Sales Loop whorl Arch The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% population Loop Whorl Arch
  • 5. Whorl 1.Double Loop Whorl. 2.Plan whorl. 3.Central. pocket Loop whorl. 4.Accidental whorl. Loop 1.Uinar Loop. 2.Radial Loop. Arch 1.Plain Arch. 2.Tented Arch.
  • 6. Different Identification on Fingerprint Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  • 7. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  • 8. Fingerprint matching techniques There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 9. Two main technologies used to capture image of the fingerprint Optical sensor – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive sensor – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 10. Image Processing Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  • 11.
  • 12.
  • 14. Advantage of Fingerprint: a. Very high accuracy. b. Is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantage of Fingerprint: a. For some people it is very intrusive, because is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).