SlideShare a Scribd company logo
1 of 27
Fingerprinting
Technology
“The act or an instance of taking an ink impression of
someone's fingerprints for the purpose of identification”
History
• Fingerprints have been found on ancient clay tablets, seals,
and pottery.
• In about 200 BC fingerprints were used to sign written
contracts in China.
• In 1901, Sir Edward Henry established the first fingerprint
classification system in Britain.
• 1903- First official use of Fingerprints in United States.
• 1924- FBI consolidates 800,000 fingerprints files from Across
United States
• 1975- FBI introduces the Automated Fingerprint identification
system (AFIS)
• On January 25, 2008 Pakistan Automated Fingerprints
System (PAFIS) was launched in Islamabad.
What are Fingerprints?
• A fingerprint is an impression left by the friction ridges of
a human finger.
• The skin surface of any human finger consists of a
pattern of dark lines of ridges along with white lines or
valleys between them termed as Ridges.
• The details of ridges and their sequence is what defines
the information for fingerprint identification.
Patterns of Fingerprints
• Finger patterns can be divided into 3 groups as shown
below:
 Arches Loops
 Whorls
Fingerprinting Techniques
• Exemplar
Exemplar prints can be collected
using live scan or by using ink on
Paper cards.
• Latent
In forensic science a partial
fingerprint lifted from a surface is
Called a latent fingerprint.
.
Obtaining Fingerprints
• Chemical Method
Chemical methods of techniques for visualizing fingerprints
are:
• Spraying the surface with black powder can reveal the fingerprint
patterns which can then be lifted using clear tape.
• Different chemicals like cyanoacrylate can develop fingerprints on a
variety of objects.
• Ninhydrin - forms bonds with amino acids present in fingerprints,
can also be used.
• Also, the magnetic powder can be used to reveal fingerprints and
works on shiny surfaces or plastic bags or containers.
Automatic Identification method
Fingerprints Sensors
A fingerprint sensor is an electronic device used to capture a digital image of
the fingerprint pattern.
The fingerprint images can be acquired using different sensors.
• Optical scanners take a visual image of the fingerprint using a
digital camera.
• Capacitive or CMOS scanners use capacitors and thus electrical
current to form an image of the fingerprint.
• Ultrasound fingerprint scanners use high frequency sound waves
to penetrate the epidermal (outer) layer of the skin.
• Thermal scanners sense the temperature differences on the
contact surface, in between fingerprint ridges and valleys.
Fingerprinting identification process
• Basically, digital imaging technology is used in acquiring, storing and
analyzing the fingerprint data.
• Acquiring Images
The left image given below shows the whole structure of the fingerprint
acquisition using an optical scanner and the right image is the real-time
example of the system.
Storing of images
• The acquired image is then processed using digital
image processing techniques as explained below:
• Image Image image Frequency
Segmentation normalization concentration image
image Binary image
thinning image filtering
Analyzing the Images
The system provides a list of the closest matching fingerprint
images from the print database and the results are verified to determine if an
identification is made.
Fingerprint processors
• A fingerprint processor is a digital integrated circuit that
processes binary data received from sub-systems.
• A fingerprint processor works like the brains of the
fingerprint recognition device.
• Today’s fingerprint processors are faster than ever and
are easy to integrate in application specific systems.
Applications of
Fingerprinting Technology
• Following are the applications
of fingerprinting technology in
the fields of:
1. Biometrics
• Law enforcement and public
security
• Military
• Border, travel, and migration
control
• Civil identification
• Healthcare and subsidies
• Physical and logical access
• Commercial applications
• Unlocking mobile
• Door unlocks
• Payment
• Fingerprint credit cards
• Biometrics in schools
2. Forensic
3. Crime scene investigation
5. Detection of drug use
6. Police force database
Biometrics
“Biometrics is the most suitable means of identifying
and authenticating individuals in a reliable and fast
way through unique biological characteristics.”
Biometrics authentication
and identification
Biometric authentication Biometric identification
• Biometric authentication compares
data for the person's
characteristics to that person's
biometric to determine
resemblance.
• In this mode, the question is: "Are
you indeed, Mr or Mrs. X?"
• Biometric identification
consists of determining the
identity of a person.
• It can be a photo of their face, a
record of their voice, or an image
of their fingerprint.
• In this mode, the question ​is a
simple one: "Who are you?
Biometric identifiers
2. Behavioral
measurements
• Voice recognition
• Signature dynamics
• Keystroke dynamics
• Gait, the sound of steps
• Gestures, etc.
1. Physiological
measurements
• Fingerprints
• The hand
• The finger
• Vein pattern
• The eye (iris and retina)
• The face's shape.
Uses of Biometrics
1. Law enforcement
• Criminal/suspect identification
• Automated Fingerprint
Identification Systems (AFIS).
• Store, search and retrieve,
fingerprint images and subject
records
Public security
• Live face recognition
• Face identification in a crowd
for public security – in cities,
airports, at borders, or other
sensitives such as stadiums or
places of worship.
Border, travel, and migration control
• Fingerprint scanners and cameras at border posts
capture information that helps identify travelers
entering the country in a more precise and reliable
way.
• Use of biometric passports to increase the level of
protection for people entering and leaving the country.
• Over 1.2 billion e-passports were in circulation in
2020.
Civil identification/ voting
• Biometric technology is widely used IN recognizing
person’s identity e.g, NADRA
• Biometrics can also be critical for the "one person, one
vote​" principle.
Unlocking mobile devices
• Passcodes and pin codes in mobile devices are not
secure enough so fingerprints are more convenient and
secure way of unlocking mobile phones.
Unlocking DOOR locks
Thanks to fingerprint biometrics,
customers register their fingerprints
at the check-in.
Health care
• Biometric identification of patients optimizes the
treatment process and virtually eliminates the possibility
of errors.
• Detection of drug use
The fingerprints of tobacco smokers contain traces of cotinine, a
nicotine metabolite. Fingerprint drug test device scan the prints
of drug abuser.
Payments
• It is now possible to use your fingerprint as a payment
method, without the need to carry cash or credit cards.
• Biometrics in schools
In schools of United Nations, students and teachers’
attendance is done through biometric techniques.
Crime scene investigations
• One of the most important uses for fingerprints is to help
investigators link one crime scene to another involving
the same person.
Staff management
Using biometrics to identify employees can increase
employee accountability, which will directly lead to
increased productivity.
The biometric HR solution provides more accurate
attendance information, eliminates unnecessary payroll
costs, and reduces labor costs
Future of Biometric Technology
• Many biometric services are currently under development and
testing. However, in a few years, these biometric technologies will
be introduced everywhere.
• Plastic cards will recede into the background soon, and fingerprint
scans will become a standard daily operation.
• Experiments are underway with every possible trait, from monitoring
your heart rate to implanting chips under your skin.
• Improving modern methods in terms of protection such as scanning
3D image of a fingerprint
• Biometric identification technologies are improving so quickly that it
is difficult to predict what they will look like in a few years- like
passwords that were difficult to use, change, and remember will
remain in the past.
The biometrics market
• According to Global Markets Insights, the global
biometric market is expected to top USD 50 billion by
2024.
• Non-AFIS will account for the highest biometrics market
share, exceeding USD 18 billion by 2024.
• Pakistani biometric
technology is still
growing.
• The global biometric
technology market is
driven by growing
applications of
biometric solutions
in the commercial & government sectors.
Recent advancements in
Fingerprinting technology
• Today’s fingerprint recognition devices are faster, accurate and
securer than their previous generations and they will continue to
improve as technology and new standards grow.
• Recent advancements in fingerprint technology has resulted in
several benefits, important ones are discussed below:
• Improved anti-spoofing mechanism
• Improved speed and reduced processing time
• Ease of integration : fingerprint SDKs and APIs
• Accuracy
• Power efficiency
Advantages
• Security- fingerprints are the securest means of
protecting our personal data and accounts.
• Spoof-proof- Fingerprints are harder to fake or steal.
• Non-transferable- fingerprints are non- transferable
because every person has unique sets of fingerprints.
We cannot share them as passwords or pin codes.
• Accountability- Using fingerprints recognition also
provides high level of accountability at work
• Fast speed- compared to typing passwords, fingerprints
are proved as far more faster technique.
• User friendly- For payments or identity recognition you
don’t have to carry cards because you always have your
fingerprints with you.
Disadvantages
• System failures – Scanners are subject to the same technical
failures and limitations as all other electronic identification systems such
as power outages, errors and environmental factors.
• Errors– Using fingerprints canners can sometimes leads to
false rejections and acceptances.
• Costly– the fingerprints scanning devices are expensive and
sensitive to handle.
• Exclusions– Some people are restricted from this
technology because in older age or if anybody had a cancer
history he/ she would be excluded from using fingerprinting
technology.
• Highly complex systems – biometric technique is highly
technical and complex system as most of the population of
Pakistan is illiterate.
Conclusion
• Technology is probably the fastest developing area than any
other man made things and fingerprint recognition technology
is not an exception. Recent years have witnessed so many
advancements in fingerprint technology which is unparalleled
in the history of biometric technology.
• Mobile biometrics has particularly shown unprecedented
growth. Today, we have ultra-thin fingerprint processor that can
fit into applications like payment cards and fingerprint sensors
which can scan user prints from the smartphone display.
• Once only limited to high security facilities for access control
and identification applications, fingerprint recognition is now
available even in low-end smartphones.

More Related Content

What's hot

What's hot (20)

Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
face recognition
face recognitionface recognition
face recognition
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Counterfeit Presentation
Counterfeit PresentationCounterfeit Presentation
Counterfeit Presentation
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Fraudulent in plastic currency
Fraudulent in plastic currencyFraudulent in plastic currency
Fraudulent in plastic currency
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 

Similar to Fingerprinting technology

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffkantharajubn600
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBirkumarJana
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptxPavani839789
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 

Similar to Fingerprinting technology (20)

biometrics
biometricsbiometrics
biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Ai
AiAi
Ai
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics
Biometrics Biometrics
Biometrics
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric
Biometric Biometric
Biometric
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Fingerprinting technology

  • 1. Fingerprinting Technology “The act or an instance of taking an ink impression of someone's fingerprints for the purpose of identification”
  • 2. History • Fingerprints have been found on ancient clay tablets, seals, and pottery. • In about 200 BC fingerprints were used to sign written contracts in China. • In 1901, Sir Edward Henry established the first fingerprint classification system in Britain. • 1903- First official use of Fingerprints in United States. • 1924- FBI consolidates 800,000 fingerprints files from Across United States • 1975- FBI introduces the Automated Fingerprint identification system (AFIS) • On January 25, 2008 Pakistan Automated Fingerprints System (PAFIS) was launched in Islamabad.
  • 3. What are Fingerprints? • A fingerprint is an impression left by the friction ridges of a human finger. • The skin surface of any human finger consists of a pattern of dark lines of ridges along with white lines or valleys between them termed as Ridges. • The details of ridges and their sequence is what defines the information for fingerprint identification.
  • 4. Patterns of Fingerprints • Finger patterns can be divided into 3 groups as shown below:  Arches Loops  Whorls
  • 5. Fingerprinting Techniques • Exemplar Exemplar prints can be collected using live scan or by using ink on Paper cards. • Latent In forensic science a partial fingerprint lifted from a surface is Called a latent fingerprint. .
  • 6. Obtaining Fingerprints • Chemical Method Chemical methods of techniques for visualizing fingerprints are: • Spraying the surface with black powder can reveal the fingerprint patterns which can then be lifted using clear tape. • Different chemicals like cyanoacrylate can develop fingerprints on a variety of objects. • Ninhydrin - forms bonds with amino acids present in fingerprints, can also be used. • Also, the magnetic powder can be used to reveal fingerprints and works on shiny surfaces or plastic bags or containers.
  • 7. Automatic Identification method Fingerprints Sensors A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The fingerprint images can be acquired using different sensors. • Optical scanners take a visual image of the fingerprint using a digital camera. • Capacitive or CMOS scanners use capacitors and thus electrical current to form an image of the fingerprint. • Ultrasound fingerprint scanners use high frequency sound waves to penetrate the epidermal (outer) layer of the skin. • Thermal scanners sense the temperature differences on the contact surface, in between fingerprint ridges and valleys.
  • 8. Fingerprinting identification process • Basically, digital imaging technology is used in acquiring, storing and analyzing the fingerprint data. • Acquiring Images The left image given below shows the whole structure of the fingerprint acquisition using an optical scanner and the right image is the real-time example of the system.
  • 9. Storing of images • The acquired image is then processed using digital image processing techniques as explained below: • Image Image image Frequency Segmentation normalization concentration image image Binary image thinning image filtering Analyzing the Images The system provides a list of the closest matching fingerprint images from the print database and the results are verified to determine if an identification is made.
  • 10. Fingerprint processors • A fingerprint processor is a digital integrated circuit that processes binary data received from sub-systems. • A fingerprint processor works like the brains of the fingerprint recognition device. • Today’s fingerprint processors are faster than ever and are easy to integrate in application specific systems.
  • 11. Applications of Fingerprinting Technology • Following are the applications of fingerprinting technology in the fields of: 1. Biometrics • Law enforcement and public security • Military • Border, travel, and migration control • Civil identification • Healthcare and subsidies • Physical and logical access • Commercial applications • Unlocking mobile • Door unlocks • Payment • Fingerprint credit cards • Biometrics in schools 2. Forensic 3. Crime scene investigation 5. Detection of drug use 6. Police force database
  • 12. Biometrics “Biometrics is the most suitable means of identifying and authenticating individuals in a reliable and fast way through unique biological characteristics.”
  • 13. Biometrics authentication and identification Biometric authentication Biometric identification • Biometric authentication compares data for the person's characteristics to that person's biometric to determine resemblance. • In this mode, the question is: "Are you indeed, Mr or Mrs. X?" • Biometric identification consists of determining the identity of a person. • It can be a photo of their face, a record of their voice, or an image of their fingerprint. • In this mode, the question ​is a simple one: "Who are you?
  • 14. Biometric identifiers 2. Behavioral measurements • Voice recognition • Signature dynamics • Keystroke dynamics • Gait, the sound of steps • Gestures, etc. 1. Physiological measurements • Fingerprints • The hand • The finger • Vein pattern • The eye (iris and retina) • The face's shape.
  • 15. Uses of Biometrics 1. Law enforcement • Criminal/suspect identification • Automated Fingerprint Identification Systems (AFIS). • Store, search and retrieve, fingerprint images and subject records Public security • Live face recognition • Face identification in a crowd for public security – in cities, airports, at borders, or other sensitives such as stadiums or places of worship.
  • 16. Border, travel, and migration control • Fingerprint scanners and cameras at border posts capture information that helps identify travelers entering the country in a more precise and reliable way. • Use of biometric passports to increase the level of protection for people entering and leaving the country. • Over 1.2 billion e-passports were in circulation in 2020.
  • 17. Civil identification/ voting • Biometric technology is widely used IN recognizing person’s identity e.g, NADRA • Biometrics can also be critical for the "one person, one vote​" principle.
  • 18. Unlocking mobile devices • Passcodes and pin codes in mobile devices are not secure enough so fingerprints are more convenient and secure way of unlocking mobile phones. Unlocking DOOR locks Thanks to fingerprint biometrics, customers register their fingerprints at the check-in.
  • 19. Health care • Biometric identification of patients optimizes the treatment process and virtually eliminates the possibility of errors. • Detection of drug use The fingerprints of tobacco smokers contain traces of cotinine, a nicotine metabolite. Fingerprint drug test device scan the prints of drug abuser.
  • 20. Payments • It is now possible to use your fingerprint as a payment method, without the need to carry cash or credit cards. • Biometrics in schools In schools of United Nations, students and teachers’ attendance is done through biometric techniques.
  • 21. Crime scene investigations • One of the most important uses for fingerprints is to help investigators link one crime scene to another involving the same person. Staff management Using biometrics to identify employees can increase employee accountability, which will directly lead to increased productivity. The biometric HR solution provides more accurate attendance information, eliminates unnecessary payroll costs, and reduces labor costs
  • 22. Future of Biometric Technology • Many biometric services are currently under development and testing. However, in a few years, these biometric technologies will be introduced everywhere. • Plastic cards will recede into the background soon, and fingerprint scans will become a standard daily operation. • Experiments are underway with every possible trait, from monitoring your heart rate to implanting chips under your skin. • Improving modern methods in terms of protection such as scanning 3D image of a fingerprint • Biometric identification technologies are improving so quickly that it is difficult to predict what they will look like in a few years- like passwords that were difficult to use, change, and remember will remain in the past.
  • 23. The biometrics market • According to Global Markets Insights, the global biometric market is expected to top USD 50 billion by 2024. • Non-AFIS will account for the highest biometrics market share, exceeding USD 18 billion by 2024. • Pakistani biometric technology is still growing. • The global biometric technology market is driven by growing applications of biometric solutions in the commercial & government sectors.
  • 24. Recent advancements in Fingerprinting technology • Today’s fingerprint recognition devices are faster, accurate and securer than their previous generations and they will continue to improve as technology and new standards grow. • Recent advancements in fingerprint technology has resulted in several benefits, important ones are discussed below: • Improved anti-spoofing mechanism • Improved speed and reduced processing time • Ease of integration : fingerprint SDKs and APIs • Accuracy • Power efficiency
  • 25. Advantages • Security- fingerprints are the securest means of protecting our personal data and accounts. • Spoof-proof- Fingerprints are harder to fake or steal. • Non-transferable- fingerprints are non- transferable because every person has unique sets of fingerprints. We cannot share them as passwords or pin codes. • Accountability- Using fingerprints recognition also provides high level of accountability at work • Fast speed- compared to typing passwords, fingerprints are proved as far more faster technique. • User friendly- For payments or identity recognition you don’t have to carry cards because you always have your fingerprints with you.
  • 26. Disadvantages • System failures – Scanners are subject to the same technical failures and limitations as all other electronic identification systems such as power outages, errors and environmental factors. • Errors– Using fingerprints canners can sometimes leads to false rejections and acceptances. • Costly– the fingerprints scanning devices are expensive and sensitive to handle. • Exclusions– Some people are restricted from this technology because in older age or if anybody had a cancer history he/ she would be excluded from using fingerprinting technology. • Highly complex systems – biometric technique is highly technical and complex system as most of the population of Pakistan is illiterate.
  • 27. Conclusion • Technology is probably the fastest developing area than any other man made things and fingerprint recognition technology is not an exception. Recent years have witnessed so many advancements in fingerprint technology which is unparalleled in the history of biometric technology. • Mobile biometrics has particularly shown unprecedented growth. Today, we have ultra-thin fingerprint processor that can fit into applications like payment cards and fingerprint sensors which can scan user prints from the smartphone display. • Once only limited to high security facilities for access control and identification applications, fingerprint recognition is now available even in low-end smartphones.